等分面數 的英文怎麼說
中文拼音 [děngfēnmiànshǔ]
等分面數
英文
divide faces- 等 : Ⅰ量詞1 (等級) class; grade; rank 2 (種; 類) kind; sort; type Ⅱ形容詞(程度或數量上相同) equa...
- 分 : 分Ⅰ名詞1. (成分) component 2. (職責和權利的限度) what is within one's duty or rights Ⅱ同 「份」Ⅲ動詞[書面語] (料想) judge
- 面 : Ⅰ名詞1 (頭的前部; 臉) face 2 (物體的表面) surface; top 3 (外露的一層或正面) outside; the ri...
- 數 : 數副詞(屢次) frequently; repeatedly
- 等分 : divide from the middle; [航空; 航海] halve; halving
-
This thesis tries to solve the problems in the design and construction of jinping cascade 2 hydropower station. a typical section is selected to analysis seepage, seepage control and fem numerical simulation. the influence of different plans of excavation and support on seepage field of subsurface water and stability of adjoining rock are studied. the homologous support pattern is suggested according to the research results
本文就錦屏二級水電站(一期)深埋長隧洞的設計和施工中面臨的一些問題,選取隧洞的一個典型斷面進行滲流、滲控分析和開挖及支護的有限元數值模擬,從而就深埋隧洞不同的開挖及支護方式對地下水滲流場及圍巖穩定性的影響和所應採取的支護措施等方面進行了探索、研究。This dissertation can be divided into three parts as following : focusing on institutional risk control, this dissertation demonstrated the effect of institutional risk on dis " objects by analyzing the relationship between deposit insurance and financial development, financial stability and market discipline, in light of foreign or native primary theory and empirical results of dis. in virtue of statistical method and with the theory of game, this dissertation explored the cause the institutional risk such as moral risk and adverse selection, on the basis of which discussed the approach of controlling institutional risk and proper deposit insurance pattern. because deposit insurance assessment is the core of institutional risk control, this dissertation introduced and discussed deeply the passive casualty - insurance model, the option - pricing model, the game - theory - based pricing model, and reasonable pricing interval, and put forward the hierarchical pricing strategy of dis on the balance of information confiscatory and risk - based - assessment necessity
本文以存款保險制度風險控制為中心,在借鑒國內外關于存款保險制度的基本理論和實證的基礎上,通過分析存款保險與金融發展、金融穩定和市場懲戒等方面的關系,論證了存款保險制度風險對存款保險制度目標的影響;並藉助統計學的方法,運用信息博弈論的觀點,從主要制度參與者? ?投保機構和存款保險機構? ?的效用函數出發,對存款保險所引發的道德風險和逆向選擇等制度風險的成因進行深入的剖析,探討有效控制制度風險的途徑和制度參數的安排模式;由於存款保險定價是制度風險管理的核心問題,本文還專門對意外存款保險消極模型、存款保險的期權定價模型、基於信息經濟學的存款保險定價模型以及合理定價區間等定價模式進行深入分析和詳細評述,闡述各種定價思路的局限性和可能運用的空間,通過權衡信息的充分性和風險定價的必要性,提出存款保險制度的層次性定價策略。Function shows the duration and frequency of each behavior pattern, and the output file of the frequency contingency table. all saved files are in ascii format and can be read by most commercial word processors and statistics programs
在分析功能方面,除了可計算每一行為目錄的持續時間和發生頻率等基本數據之外,並可以把行為序列轉換成頻度關連表,再由Analyzing data " function shows the duration and frequency of each behavior pattern, and the output file of the frequency contingency table. all saved files are in ascii format and can be read by most commercial word processors and statistics programs
在分析功能方面,除了可計算每一行為目錄的持續時間和發生頻率等基本數據之外,並可以把行為序列轉換成頻度關連表,再由The retinal image segmentation, the feature points of blood vessel extraction, the feature correspondency, the transformation model of retinal image and the registration parameter optimizing methods are all the main facts studied in the paper
主要研究內容包括視網膜圖像血管網路的分割、血管特徵點的提取、特徵對應性、變換模型以及參數優化等方面。Using the mode of ais network at sea for reference, relying on the background of " human first " navigation human culture, using the theory of modern logistic " bpr, and get the idea of " the core is information flowing ", then describer the seaman ' s work on board particularly. apply some modern technology, such as : network and digital communication, database, visual procedure, from network construction, database designing, database linking, to interaction windows designing, achieve the following functions step by step
借鑒ais海上網路建設模式,依託以人為本的航海人文背景,利用現代物流理論的過程優化理念,現代物流的核心為信息流的理念,對航海活動中船方工作內容予以細化,利用現代網路與數據通信技術、數據庫技術、可視化編程技術等,分網路建設、數據庫設計、編程工具與數據庫的訪問方法、可視化界面的設計等若干步驟,逐步實現系統如下方面的功能。Taking united states, united kingdom, germany, france, european union, japan, taiwan and hong kong of china for example, the author compared the legislation style and experience on company share repurchase such as the systems of applying scope, restriction on property and quantity, decision - making body, restriction on possession and disposure of owner ' s shares, decision - making procedure, report procedure, information disclosure procedure, avoidance of illegal behaviors in these countries and districts
第三章公司股份回購制度的實體立法比較比較研究了上述國家(地區)在股份回購適用范圍、取得財源、取得數量、股份回購的決定機關、自己股份保有與處分的限制以及違法、脫法行為防止方面的規定與經驗。第四章公司股份回購制度的程序立法比較比較研究了上述國家(地區)股份回購的決定程序、股份回購的申報(或備案)程序、信息公開程序及程序違法行為的防止等方面的規定與經驗。Value evaluates a specification to be evaluated through 5 respects value, what show in the graph is by central emanative 5 groups of coordinate, the extraction of coordinate center is worth for 0, the numeric value that presses divide into equal parts is outward outside disperse the internal heat with sudorifics, highest value is 100
價值評估說明通過五個方面來評估個股的價值,圖中顯示的是由中心發散的五組坐標,坐標中心的取值為0 ,按等分的數值值向外外發散,最高值為100 。Representative websites of subject information gateway ( sic ) in china were described as to their establisher, subject type, information structure, management system, metadata application and resource organization
摘要通過對中國學科信息門戶網站建設現狀的調查,從建設單位、學科類型、信息內容、管理系統、元數據應用和資源組織等方面分析學科信息門戶建設的現狀。Then i gave out the ten steps when a data base marketing system is being built in sedan market. in chapter four, i talked about how do we collect and collate the data used in sedan marketing system, studied the discrimination and the excerption of primary data and secondary data problem
然後論述了在轎車行業開發數據庫營銷系統的十個步驟;在第四章,主要是研究在轎車營銷數據庫系統中,所需數據的分類以及收集、整理等方面的內容,研究了初級數據、次級數據的甄別選錄等問題。After comparing in detail the current popular 24 idss or ids prototypes from the aspects of the granularity, methods, and tune of detection, data - collection, and data - processing, we find out the problems in the most of the current idss that they are generally platform dependent, inefficient in detection methods, lack intelligent in data analysis, inextensible as the network configurations changed or upgraded, and inadaptive when the new attack methods emerge
本文首先從數據來源、數據處理周期、數據收集和分析、入侵檢測方法、系統運行平臺等七個方面對當前較具有影響力的24種入侵檢測系統或原型進行了詳細的比較,分析了現有入侵檢測系統在系統平臺的異構性、系統檢測方法的效率、入侵數據分析的智能性、面臨新的入侵方法時的適應性和網路配置發生變化時的可擴展性等方面的不足和問題。Three genetic coefficients, including maximum phyllochron, elongation internode number and plant height, were used to describe the genetic differences in leaf blade and internode among different wheat varieties
模型引入3個品種參數,即最大葉熱間距、伸長節間數和株高,分別反映了不同小麥品種在葉片和節間等方面的遺傳差異性。The article points out the importance and necessity of the information - security from its actuality in our country. the resources in the information system, for instance, hardware, software, data, document, operator, meterial and so on, are evaluated and gived safety grade firstly. and then, it analyses the menace including the nonauthorized access, the information leak, the refused sevice, the internal objection which the system will take. the following are the corresponding control police : confirm the users " rights and duties, including the mode of using account, the limit of accessing resource, the application of password, the building of backup ; confirm the administrators " right and duties, including physical safety, system configuration, account configuration and usufruct, password management, audit and control, backup and individual intimity ; run - of - mill measure of security defence, including access control, symbol and identification, integrality control, password technique, firewall system, audit and resumption, safety of operating system, safety of database system, defence of computers " virus and resisting - deny protocol. in the end, the article offers the strategies of disposing the safety - accident and analyse after ithow. to report it, how to solve it in phase, and how to avoid it happening again. in a word, the article presents a holistic resolvent about keeping away the information system ' s security, and supplies a essential frame for its configuration, management and application
然後,對系統可能受到的威脅,包括非授權訪問、信息泄漏、拒絕服務和內部缺陷等進行分析,並提出了相應的控制策略:確定用戶的權力和責任,包括帳戶使用方式、資源訪問權限、口令應用以及建立備份等;確定系統管理員的權力和責任,包括物理安全、系統配置、帳戶設置及使用權限、口令管理、審計和監控、備份以及個人隱私等方面;一般性的安全防護措施:存取控制、標識和認證、完整性控制、密碼技術、防火墻系統、審計和恢復、操作系統安全、數據庫系統安全、計算機病毒防護和抗抵賴協議等。最後,對事故處理和事後分析提供策略,如何報告安全事故,如何協調解決安全事故,如何避免安全事故再次發生。總之,本文對信息系統安全防範工作給出一個整體的解決方案,為其在配置、管理和應用方面提供了基本的框架。There are three parts in the article. the beginning is the summary about especial credit risk in city commercial bank management. at first, via the data explains that the loan object of the city commercial bank mainly concentrates small enterprises, then discusses why the city commercial bank concentrates this lay, then further via the small enterprise livability, compensative resource, the finance
首先,通過調查所得的數據說明了城市商業銀行的貸款對象主要集中於小企業這個層次,然後詳細論述了城市商業銀行為什麼會將貸款對象主要集中在這個層次,再進一步通過對小企業存活率、償債來源、財務管理狀況、管理者素質等方面的分析,說明了為什麼將貸款對象集中於小企業會極大的增大城市商業銀行的貸款信用風險。The hardware is composed of digital luminometer, rotate encoder, step motor and data acquisition card, solenoid - operated clutches. the software is developed in visual c + + 6. 0 which is an oop programming environment and has plenty of resource to use. this system can implement high speed, automatic measurement
課題對測定系統進行了總體設計,硬體部分由數字照度計、旋轉編碼器、步進電機、電磁離合器等組成,軟體部分利用acl - 8216數據採集卡,以vc + + 6 . 0作為軟體開發平臺,充分利用vc + + 6 . 0生成友好界面的優勢和acl - 8216的資源,開發出了測試系統。Chapter two is data sample of system. it will discuss the data conversion theory, 24bit e - a data conversion, mux - channel switch sampling technology, and emc design. among them, we will introduce the principle and application of ads 1251, application of photomos technology in mux - channel switch sampling, and emc design with hardware and software of gas feed controller, which has good performance in reliability
第二章介紹系統的數據採集,該部分包括24bit -采樣原理、多路信號切換採集技術和電磁兼容設計,其中,主要介紹了ads1251晶元的工作原理和應用, photomos技術在多路信號切換采樣中的應用,以及配氣控制器在硬體、軟體等方面所做的電磁兼容設計,通過這些設計使得系統具有很好的穩定性和抗干擾性。This subject is with ovid ( journals ovid full text ) data base an example with two domestic biomedical information full text biomedicine electronic periodical that circle use often most these, proquest of umi, search to it characteristic, discipline distribute, sci, etc., that authoritative data base includes than serious, and jcr periodical influence factor analyze a lot of go on and appraised and study, can purchase the reference of offering of the department in order to expect the analysis result of a subject for readers and electronic periodical, do some exposition on appraisal of the electronic periodical of medical science of foreign language at the same time
本課題以ovid和umi這兩種國內生物醫學情報界最常使用的全文生物醫學電子期刊數據庫為例,對其檢索特性、學科分佈、被sci等權威數據庫收錄的比重,以及jcr期刊影響因子分析等多個方面進行了評價研究,以期望本課題的分析結果能給讀者和電子期刊采購部門提供參考,同時對外文醫學電子期刊的評價研究作些闡述。Based on the studies of specimens, taxonomic revision of the genus kadsura jussieu has been finished with special reference to seed morphology. other information from phytomorphology, phytotomy, phytoembryology, phytocytotaxonomy, molecular systematics and phytochemistry etc. has also been considered during the revision. more than 1, 100 specimens from 11 herbaria worldwide have been examined
本文主要根據對世界范圍南五味子屬kadsurajussieu植物標本的研究,結合種子形態方面的實驗數據,參考植物形態學、植物解剖學、植物胚胎學、孢粉學、植物細胞分類學、分子系統學和植物化學等方面的資料,對世界性南五味子屬植物作出全面的分類學修訂。Polarimetric synthetic aperture radar ( polsar ) investigates the transverse vectorial nature of plane em waves and provides the complex scattering matrix of a scatterer. scattering polarimetry is sensitive to the shape, orientation, and dielectric properties of scatters
極化合成孔徑雷達( polsar )研究電磁波的矢量特徵,通過測量和分析目標的極化散射特性,獲取目標的介電常數、物理特性、幾何形狀和取向等方面的大量信息。This investigation of the two species is mainly dealing with their morphological characters, population biology, pollination biology and molecular biology, based on the following methods such as section slides, sem, artificial pollination, rapd analysis and gravity glass slides. this study is intended to demonstrate the distribution patterns of the populations for the two species, the numerical and spatial characteristics of ecological difference, the biological characters of seeds, pollination mode and reproductive stratigies, and molecular genetics. in light of the results from this study, the reasons that resulted in the present dangerous situation for the two species were discussed, and the suggestions for protecting them were proposed
本研究以種群為單位,採用石蠟切片、掃描電鏡、重力玻片、人工授粉、 rapd分析等方法,對兩種植物的形態生物學、種群生物學、繁殖生物學和分子生物學等方面進行了詳細研究,以揭示它們的種群分佈類型及成因、種群生態環境差異的數量特徵和空間特徵、種子生物學特徵、傳粉和生殖策略以及種群分子遺傳特徵,進而探討兩物種瀕危的成因和機制,並針對性地提出了科學合理的保護對策和建議。分享友人