等分面數 的英文怎麼說

中文拼音 [děngfēnmiànshǔ]
等分面數 英文
divide faces
  • : Ⅰ量詞1 (等級) class; grade; rank 2 (種; 類) kind; sort; type Ⅱ形容詞(程度或數量上相同) equa...
  • : 分Ⅰ名詞1. (成分) component 2. (職責和權利的限度) what is within one's duty or rights Ⅱ同 「份」Ⅲ動詞[書面語] (料想) judge
  • : Ⅰ名詞1 (頭的前部; 臉) face 2 (物體的表面) surface; top 3 (外露的一層或正面) outside; the ri...
  • : 數副詞(屢次) frequently; repeatedly
  • 等分 : divide from the middle; [航空; 航海] halve; halving
  1. This thesis tries to solve the problems in the design and construction of jinping cascade 2 hydropower station. a typical section is selected to analysis seepage, seepage control and fem numerical simulation. the influence of different plans of excavation and support on seepage field of subsurface water and stability of adjoining rock are studied. the homologous support pattern is suggested according to the research results

    本文就錦屏二級水電站(一期)深埋長隧洞的設計和施工中臨的一些問題,選取隧洞的一個典型斷進行滲流、滲控析和開挖及支護的有限元值模擬,從而就深埋隧洞不同的開挖及支護方式對地下水滲流場及圍巖穩定性的影響和所應採取的支護措施進行了探索、研究。
  2. This dissertation can be divided into three parts as following : focusing on institutional risk control, this dissertation demonstrated the effect of institutional risk on dis " objects by analyzing the relationship between deposit insurance and financial development, financial stability and market discipline, in light of foreign or native primary theory and empirical results of dis. in virtue of statistical method and with the theory of game, this dissertation explored the cause the institutional risk such as moral risk and adverse selection, on the basis of which discussed the approach of controlling institutional risk and proper deposit insurance pattern. because deposit insurance assessment is the core of institutional risk control, this dissertation introduced and discussed deeply the passive casualty - insurance model, the option - pricing model, the game - theory - based pricing model, and reasonable pricing interval, and put forward the hierarchical pricing strategy of dis on the balance of information confiscatory and risk - based - assessment necessity

    本文以存款保險制度風險控制為中心,在借鑒國內外關于存款保險制度的基本理論和實證的基礎上,通過析存款保險與金融發展、金融穩定和市場懲戒的關系,論證了存款保險制度風險對存款保險制度目標的影響;並藉助統計學的方法,運用信息博弈論的觀點,從主要制度參與者? ?投保機構和存款保險機構? ?的效用函出發,對存款保險所引發的道德風險和逆向選擇制度風險的成因進行深入的剖析,探討有效控制制度風險的途徑和制度參的安排模式;由於存款保險定價是制度風險管理的核心問題,本文還專門對意外存款保險消極模型、存款保險的期權定價模型、基於信息經濟學的存款保險定價模型以及合理定價區間定價模式進行深入析和詳細評述,闡述各種定價思路的局限性和可能運用的空間,通過權衡信息的充性和風險定價的必要性,提出存款保險制度的層次性定價策略。
  3. Function shows the duration and frequency of each behavior pattern, and the output file of the frequency contingency table. all saved files are in ascii format and can be read by most commercial word processors and statistics programs

    析功能方,除了可計算每一行為目錄的持續時間和發生頻率基本據之外,並可以把行為序列轉換成頻度關連表,再由
  4. Analyzing data " function shows the duration and frequency of each behavior pattern, and the output file of the frequency contingency table. all saved files are in ascii format and can be read by most commercial word processors and statistics programs

    析功能方,除了可計算每一行為目錄的持續時間和發生頻率基本據之外,並可以把行為序列轉換成頻度關連表,再由
  5. The retinal image segmentation, the feature points of blood vessel extraction, the feature correspondency, the transformation model of retinal image and the registration parameter optimizing methods are all the main facts studied in the paper

    主要研究內容包括視網膜圖像血管網路的割、血管特徵點的提取、特徵對應性、變換模型以及參優化
  6. Using the mode of ais network at sea for reference, relying on the background of " human first " navigation human culture, using the theory of modern logistic " bpr, and get the idea of " the core is information flowing ", then describer the seaman ' s work on board particularly. apply some modern technology, such as : network and digital communication, database, visual procedure, from network construction, database designing, database linking, to interaction windows designing, achieve the following functions step by step

    借鑒ais海上網路建設模式,依託以人為本的航海人文背景,利用現代物流理論的過程優化理念,現代物流的核心為信息流的理念,對航海活動中船方工作內容予以細化,利用現代網路與據通信技術、據庫技術、可視化編程技術網路建設、據庫設計、編程工具與據庫的訪問方法、可視化界的設計若干步驟,逐步實現系統如下方的功能。
  7. Taking united states, united kingdom, germany, france, european union, japan, taiwan and hong kong of china for example, the author compared the legislation style and experience on company share repurchase such as the systems of applying scope, restriction on property and quantity, decision - making body, restriction on possession and disposure of owner ' s shares, decision - making procedure, report procedure, information disclosure procedure, avoidance of illegal behaviors in these countries and districts

    第三章公司股份回購制度的實體立法比較比較研究了上述國家(地區)在股份回購適用范圍、取得財源、取得量、股份回購的決定機關、自己股份保有與處的限制以及違法、脫法行為防止方的規定與經驗。第四章公司股份回購制度的程序立法比較比較研究了上述國家(地區)股份回購的決定程序、股份回購的申報(或備案)程序、信息公開程序及程序違法行為的防止的規定與經驗。
  8. Value evaluates a specification to be evaluated through 5 respects value, what show in the graph is by central emanative 5 groups of coordinate, the extraction of coordinate center is worth for 0, the numeric value that presses divide into equal parts is outward outside disperse the internal heat with sudorifics, highest value is 100

    價值評估說明通過五個方來評估個股的價值,圖中顯示的是由中心發散的五組坐標,坐標中心的取值為0 ,按值值向外外發散,最高值為100 。
  9. Representative websites of subject information gateway ( sic ) in china were described as to their establisher, subject type, information structure, management system, metadata application and resource organization

    摘要通過對中國學科信息門戶網站建設現狀的調查,從建設單位、學科類型、信息內容、管理系統、元據應用和資源組織析學科信息門戶建設的現狀。
  10. Then i gave out the ten steps when a data base marketing system is being built in sedan market. in chapter four, i talked about how do we collect and collate the data used in sedan marketing system, studied the discrimination and the excerption of primary data and secondary data problem

    然後論述了在轎車行業開發據庫營銷系統的十個步驟;在第四章,主要是研究在轎車營銷據庫系統中,所需據的類以及收集、整理的內容,研究了初級據、次級據的甄別選錄問題。
  11. After comparing in detail the current popular 24 idss or ids prototypes from the aspects of the granularity, methods, and tune of detection, data - collection, and data - processing, we find out the problems in the most of the current idss that they are generally platform dependent, inefficient in detection methods, lack intelligent in data analysis, inextensible as the network configurations changed or upgraded, and inadaptive when the new attack methods emerge

    本文首先從據來源、據處理周期、據收集和析、入侵檢測方法、系統運行平臺七個方對當前較具有影響力的24種入侵檢測系統或原型進行了詳細的比較,析了現有入侵檢測系統在系統平臺的異構性、系統檢測方法的效率、入侵析的智能性、臨新的入侵方法時的適應性和網路配置發生變化時的可擴展性的不足和問題。
  12. Three genetic coefficients, including maximum phyllochron, elongation internode number and plant height, were used to describe the genetic differences in leaf blade and internode among different wheat varieties

    模型引入3個品種參,即最大葉熱間距、伸長節間和株高,別反映了不同小麥品種在葉片和節間的遺傳差異性。
  13. The article points out the importance and necessity of the information - security from its actuality in our country. the resources in the information system, for instance, hardware, software, data, document, operator, meterial and so on, are evaluated and gived safety grade firstly. and then, it analyses the menace including the nonauthorized access, the information leak, the refused sevice, the internal objection which the system will take. the following are the corresponding control police : confirm the users " rights and duties, including the mode of using account, the limit of accessing resource, the application of password, the building of backup ; confirm the administrators " right and duties, including physical safety, system configuration, account configuration and usufruct, password management, audit and control, backup and individual intimity ; run - of - mill measure of security defence, including access control, symbol and identification, integrality control, password technique, firewall system, audit and resumption, safety of operating system, safety of database system, defence of computers " virus and resisting - deny protocol. in the end, the article offers the strategies of disposing the safety - accident and analyse after ithow. to report it, how to solve it in phase, and how to avoid it happening again. in a word, the article presents a holistic resolvent about keeping away the information system ' s security, and supplies a essential frame for its configuration, management and application

    然後,對系統可能受到的威脅,包括非授權訪問、信息泄漏、拒絕服務和內部缺陷進行析,並提出了相應的控制策略:確定用戶的權力和責任,包括帳戶使用方式、資源訪問權限、口令應用以及建立備份;確定系統管理員的權力和責任,包括物理安全、系統配置、帳戶設置及使用權限、口令管理、審計和監控、備份以及個人隱私;一般性的安全防護措施:存取控制、標識和認證、完整性控制、密碼技術、防火墻系統、審計和恢復、操作系統安全、據庫系統安全、計算機病毒防護和抗抵賴協議。最後,對事故處理和事後析提供策略,如何報告安全事故,如何協調解決安全事故,如何避免安全事故再次發生。總之,本文對信息系統安全防範工作給出一個整體的解決方案,為其在配置、管理和應用方提供了基本的框架。
  14. There are three parts in the article. the beginning is the summary about especial credit risk in city commercial bank management. at first, via the data explains that the loan object of the city commercial bank mainly concentrates small enterprises, then discusses why the city commercial bank concentrates this lay, then further via the small enterprise livability, compensative resource, the finance

    首先,通過調查所得的據說明了城市商業銀行的貸款對象主要集中於小企業這個層次,然後詳細論述了城市商業銀行為什麼會將貸款對象主要集中在這個層次,再進一步通過對小企業存活率、償債來源、財務管理狀況、管理者素質析,說明了為什麼將貸款對象集中於小企業會極大的增大城市商業銀行的貸款信用風險。
  15. The hardware is composed of digital luminometer, rotate encoder, step motor and data acquisition card, solenoid - operated clutches. the software is developed in visual c + + 6. 0 which is an oop programming environment and has plenty of resource to use. this system can implement high speed, automatic measurement

    課題對測定系統進行了總體設計,硬體部字照度計、旋轉編碼器、步進電機、電磁離合器組成,軟體部利用acl - 8216據採集卡,以vc + + 6 . 0作為軟體開發平臺,充利用vc + + 6 . 0生成友好界的優勢和acl - 8216的資源,開發出了測試系統。
  16. Chapter two is data sample of system. it will discuss the data conversion theory, 24bit e - a data conversion, mux - channel switch sampling technology, and emc design. among them, we will introduce the principle and application of ads 1251, application of photomos technology in mux - channel switch sampling, and emc design with hardware and software of gas feed controller, which has good performance in reliability

    第二章介紹系統的據採集,該部包括24bit -采樣原理、多路信號切換採集技術和電磁兼容設計,其中,主要介紹了ads1251晶元的工作原理和應用, photomos技術在多路信號切換采樣中的應用,以及配氣控制器在硬體、軟體所做的電磁兼容設計,通過這些設計使得系統具有很好的穩定性和抗干擾性。
  17. This subject is with ovid ( journals ovid full text ) data base an example with two domestic biomedical information full text biomedicine electronic periodical that circle use often most these, proquest of umi, search to it characteristic, discipline distribute, sci, etc., that authoritative data base includes than serious, and jcr periodical influence factor analyze a lot of go on and appraised and study, can purchase the reference of offering of the department in order to expect the analysis result of a subject for readers and electronic periodical, do some exposition on appraisal of the electronic periodical of medical science of foreign language at the same time

    本課題以ovid和umi這兩種國內生物醫學情報界最常使用的全文生物醫學電子期刊據庫為例,對其檢索特性、學科佈、被sci權威據庫收錄的比重,以及jcr期刊影響因子多個方進行了評價研究,以期望本課題的析結果能給讀者和電子期刊采購部門提供參考,同時對外文醫學電子期刊的評價研究作些闡述。
  18. Based on the studies of specimens, taxonomic revision of the genus kadsura jussieu has been finished with special reference to seed morphology. other information from phytomorphology, phytotomy, phytoembryology, phytocytotaxonomy, molecular systematics and phytochemistry etc. has also been considered during the revision. more than 1, 100 specimens from 11 herbaria worldwide have been examined

    本文主要根據對世界范圍南五味子屬kadsurajussieu植物標本的研究,結合種子形態方的實驗據,參考植物形態學、植物解剖學、植物胚胎學、孢粉學、植物細胞類學、子系統學和植物化學的資料,對世界性南五味子屬植物作出全類學修訂。
  19. Polarimetric synthetic aperture radar ( polsar ) investigates the transverse vectorial nature of plane em waves and provides the complex scattering matrix of a scatterer. scattering polarimetry is sensitive to the shape, orientation, and dielectric properties of scatters

    極化合成孔徑雷達( polsar )研究電磁波的矢量特徵,通過測量和析目標的極化散射特性,獲取目標的介電常、物理特性、幾何形狀和取向的大量信息。
  20. This investigation of the two species is mainly dealing with their morphological characters, population biology, pollination biology and molecular biology, based on the following methods such as section slides, sem, artificial pollination, rapd analysis and gravity glass slides. this study is intended to demonstrate the distribution patterns of the populations for the two species, the numerical and spatial characteristics of ecological difference, the biological characters of seeds, pollination mode and reproductive stratigies, and molecular genetics. in light of the results from this study, the reasons that resulted in the present dangerous situation for the two species were discussed, and the suggestions for protecting them were proposed

    本研究以種群為單位,採用石蠟切片、掃描電鏡、重力玻片、人工授粉、 rapd方法,對兩種植物的形態生物學、種群生物學、繁殖生物學和子生物學進行了詳細研究,以揭示它們的種群佈類型及成因、種群生態環境差異的量特徵和空間特徵、種子生物學特徵、傳粉和生殖策略以及種群子遺傳特徵,進而探討兩物種瀕危的成因和機制,並針對性地提出了科學合理的保護對策和建議。
分享友人