給出個方案 的英文怎麼說

中文拼音 [gěichūfāngàn]
給出個方案 英文
java or jsp
  • : 給Ⅰ動詞1 (送對方某物; 使對方得到) give; grant 2 (用在動詞后 表示交與 付出) pass; pay 3 (叫; ...
  • : 個Ⅰ量詞1 (用於沒有專用量詞的名詞) : 一個理想 an ideal; 兩個月 two months; 三個梨 three pears2 ...
  • : Ⅰ名詞1 (方形; 方體) square 2 [數學] (乘方) involution; power 3 (方向) direction 4 (方面) ...
  • : 名詞1 (長桌) table; desk 2 (案件) case; law [legal] case 3 (案卷; 記錄)record; file 4 (提...
  • 方案 : scheme; plan; programme; project; proposal; suggestion; formula; scenario; outline
  1. On the demand of application and according to the soluhons menhoned above, a method of displacement waiting auto - sy ' nchronizing is put forward, which is based on match filters. at the end a complete and speeflc set of hardware circuits and software programs which haplements the scheme, is also presented in the ancle. the synchronization system was tested in the pool and in the shallow wate near m port, the result of the test shows that its performance is satisfactory

    論文著重介紹實現了跳頻通信系統同步的一般法,並詳細分析和對比跳頻同步系統的捕獲,在此基礎上,提了一基於匹配濾波器的位移等待式自同步,設計、完成並了詳細硬體連線電路圖、軟體程序流程圖和部分程序清單,該自同步法在實驗室水池實驗取得良好的效果,並在廈門港海域進行了現場實驗測試,具有較低的誤碼率和一定的檢測概率,結果令人滿意。
  2. A pure software solution is given in order to gather more tracking data. the reason of the zenith - blind - zone forming is analyzed detailedly. the conclusion is that the extent of the zenith blind zone was restricted by three parameters : maximum azimuth angular velocity of tracking mount, flight level and airspeed of the target

    本文依據不改變系統硬體結構的研究思路,提基於目標軌跡預測技術的解決過天頂跟蹤的構想,具體實施步驟,預計可使系統單站單圈次跟蹤採集到的有效數據總量提高約一倍。
  3. Towards each part of the apparatus, the detial theory discursion and the design scheme and fdcture arts was gived

    對于傳感器的各組成部分,詳細地進行理論推導,了設計及製作工藝。
  4. The article points out the importance and necessity of the information - security from its actuality in our country. the resources in the information system, for instance, hardware, software, data, document, operator, meterial and so on, are evaluated and gived safety grade firstly. and then, it analyses the menace including the nonauthorized access, the information leak, the refused sevice, the internal objection which the system will take. the following are the corresponding control police : confirm the users " rights and duties, including the mode of using account, the limit of accessing resource, the application of password, the building of backup ; confirm the administrators " right and duties, including physical safety, system configuration, account configuration and usufruct, password management, audit and control, backup and individual intimity ; run - of - mill measure of security defence, including access control, symbol and identification, integrality control, password technique, firewall system, audit and resumption, safety of operating system, safety of database system, defence of computers " virus and resisting - deny protocol. in the end, the article offers the strategies of disposing the safety - accident and analyse after ithow. to report it, how to solve it in phase, and how to avoid it happening again. in a word, the article presents a holistic resolvent about keeping away the information system ' s security, and supplies a essential frame for its configuration, management and application

    然後,對系統可能受到的威脅,包括非授權訪問、信息泄漏、拒絕服務和內部缺陷等進行分析,並提了相應的控制策略:確定用戶的權力和責任,包括帳戶使用式、資源訪問權限、口令應用以及建立備份等;確定系統管理員的權力和責任,包括物理安全、系統配置、帳戶設置及使用權限、口令管理、審計和監控、備份以及人隱私等面;一般性的安全防護措施:存取控制、標識和認證、完整性控制、密碼技術、防火墻系統、審計和恢復、操作系統安全、數據庫系統安全、計算機病毒防護和抗抵賴協議等。最後,對事故處理和事後分析提供策略,如何報告安全事故,如何協調解決安全事故,如何避免安全事故再次發生。總之,本文對信息系統安全防範工作整體的解決,為其在配置、管理和應用面提供了基本的框架。
  5. 3. a simple and high secure electronic cash system with multiple banks was presented, which has overcome the limitation of existing electronic cash system scheme

    3 .了一設計簡單、高安全性的多銀行電子現金,克服了已有電子現金系統的缺陷。
  6. The calculation methods of shelters ’ capacity and the discount method of road capacity under the situation of emergency evacuation were given. then, taking emergency evacuation of the beijing 2008 olympic games as an example, we make out the emergency evacuation preplan for olympic games. on the aid of the advanced computer system simulation techniques, using emergency evacuation simulation software to animate the whole process of olympic evacuation for the fist time, and got some key parameters that can provide decision making supports for decision - makers, such as, the whole evacuation time, the average evacuation speed etc. and the simulation results were analyzed

    本文首先分析了我國大城市的交通狀況和突發事件發生狀況,在分析國內外應急疏散研究現狀的基礎上,借鑒國內外應對突發事件應急疏散的經驗和教訓,結合我國大城市突發事件應急疏散的具體特點,提了大城市突發事件應急疏散研究的總體框架,提了突發事件應急避難所和應急疏散道路的選擇原則,了應急避難所的容量計算法和疏散道路在應急狀態下的道路通行能力的折算法;然後以北京2008年奧運會突發事件的應急疏散為例,制定了奧運會突發事件應急疏散預,藉助先進的計算機系統模擬技術,首次利用應急疏散模擬軟體orems對整疏散過程進行了模擬,得到了總體疏散時間、平均疏散速度等可以為決策者提供決策支持的關鍵參數,並對模擬結果作了分析。
  7. According to the design principle of systems construction, this paper offers the collectivity layout projet which particularly introduces design thought in some aspects, for example : in function, in physical structure, in configure of software and hardware and son on. finally, this paper detailedly introduces the principle, the function, the flow and the systems structure of six subsystems which involved in urban public safety traffic management control system. the six subsystems are : geography information system

    按系統建設的原則,論文了系統建設的總體設計,從功能上、物理結構上和軟硬體配置等面詳細介紹了城市公安交通管理控制系統的設計思路,最後,論文詳細地介紹了城市公安交通管理控制系統的六子系統? ?地理信息系統、指揮調度管理系統、交通信號控制系統、車輛闖紅燈自動拍照系統、交通信息發布系統和電子數據大屏顯示系統等的原理、功能和處理流程和系統構成。
  8. ( 2 ) the prover can freely choose a group of users he wants to realize his anonymous scope

    ( 3 )利用群簽名和環簽名的思想,了一可追蹤的匿名認證
  9. The three - order modulator has a 2 - 1 cascaded structure and 1 - bit quantizer at the end of each stage, the modulator is implemented with fully differential switched - capacitor circuits. and then, the discussion will begin by exploring the design of various circuit blocks in the modulator in more detail, i. e., ota, switched - capacitor integrator, quantizer, two - phase non - overlapping clock signal, etc., at the same time, these circuits will be simulated in spectre and hspice. at last, the whole cascaded modulator will do behavioral level simulation by matlab soft and simulink toolbox

    本論文中,首先介紹模數轉換器的各種參數的意義,以及一階sigma - delta調制器和高階sigma - delta調制器的原理;解決高階單環sigma - delta調制器不穩定性的,引入級聯結構調制器,特別針對級聯結構調制器中的失配和開關電容積分器的非理想特性進行詳細的討論;本設計的sigma - delta調制器採用2 - 1級聯結構和一位量化器,調制器採用全差分開關電容電路實現;同時對整調制器的各模塊進行了電路設計,包括跨導放大器、開關電容積分器、量化器、兩相非交疊時鐘等,並利用hspice和spectre模擬工具對這些電路進行模擬測試;最後,利用matlab軟體和simulink工具對整級聯調制器進行行為級模擬。
  10. After analysising the theory and characteristics of the corba and mobile agent technologies, the paper brings forward firstly a kind of mobile agent architecture - coma, and gives the solution to coma ' s asynchronous transfer, concurrent control, naming, location and intelligence mechanism in detail. furthermore, aiming at making up the flaws of the application servers based on corba in distributed group environment and solving the problem of object ' s remotion on the corba server, the paper proposes a kind of corba architecture based on mobile agent - maorb, discusses naming and transparent transfer of mobile agent in a maorb system in detail, and gives a reasonable improvement method

    本文在分析了corba和移動agent這兩種分散式技術的運行原理及其特點之後,首先提一種應用於協同環境下的移動agent體系結構coma ,並詳細了coma的異步遷移、並發控制、命名和尋址,智能化機制這幾關鍵技術的解決法。進而,為了彌補單純的利用corba技術來構建分散式集群環境中應用服務器的不足,解決corba服務端對象的可移動性問題,本文又提了一種基於coma的corba體系結構maorb ,詳細討論了maorb系統中移動agent的命名和透明遷移以及corba和coma的結合度問題,並了合理的解決
  11. 9 nguyen l, safavi - naini r. efficient and provably secure trapdoor - free group signature schemes from bilinear pairings. in proc

    在對原有的進行分析后,我們同時也了一新的群簽名來克服上述的問題。
  12. This dissertation focus on the load balancing of signaling gateway, mainly inculde two part : in first part, considered trillium dft architecture, the dissertation presents a scheme suited for signaling gateway, involving software design and implement of m3ua distributed module df and mtp3 distibuted module ldf ; the second part presents the design details of m3ua and mtp3 protocol themselves load balancing mechanism. at the end of this dissertation, a performance test result of based on load balancing signaling gateway are given

    本文著重於討論信令網關負載均衡設計與實現,主要分為兩部分進行闡述,第一部分根據trillium分散式系統架構,提適合大容量信令網關中ss7和m3ua協議負載均衡的解決,並詳細m3ua協議側分散式模塊df的軟體設計、實現過程; mtp3協議側分散式模塊ldf的軟體設計,模塊劃分,介面定義,流程圖實現;第二部分提了m3ua和mtp3協議體內的負載均衡解決,並詳細介紹了其設計實現。
  13. The main design points of passive design techniques have been dissertates by the numbers, from three aspects of building groups, single buildup and building parts, which include building group layout, orientation space between, wind protection solar heating, thermal mass and nocturnal cooling and natural ventilation etc. the dissertation also explains the whole climate design process is three stage of climate analysis, conceptual design stage and schematic design evaluation and at last, taking a high - rise residential building as an example case study, evaluates its climate adaptation strengths and limits, and then proposes the correctional advises for responsive to climate

    本文著重從建築群體關系、單體設計、局部構造三層面上論述了各設計分區技術策略的設計要點,包括布局、朝向、間距、防風、太陽g睬暖、建築蓄熱降溫、自然通風等。最後本文以西安為例,了建築氣候設計程序為氣候分析?設計?評價三主要過程,並對一高層住宅建築的氣候適應性進行了分析和評價,提的修改建議。
  14. In this thesis, the critical components of pcs are analyzed and tested in detail. i present the scheme of reliability qualification test of capacitors, furthermore, analyze the sampling inspection scheme theoretically for capacitors and put forward the proposals to improve this scheme. for most of components in pcs with high reliability or long lifecycle, which need great investment of time and material for their reliability tests, this paper provides a new and effective statistical method for this kind of components - the progressive stress accelerated life testing with exponential distribution

    可靠性試驗也是可靠性工程的重要組成部分,能源系統許多元器件為高可靠性、長壽命器件,且大部分是非標準器件,為保證整系統的可靠性,必須對備選元器件進行可靠性試驗,本文對能源系統關鍵器件進行了詳細的試驗分析,了電容器的鑒定試驗,對其抽樣試驗進行了理論分析並改進建議。
  15. Using the finite element method we simulate the properties of given or projected geometries of parts from different aspects introduction of force, extreme loadings etc. and together with our customers select the further direction of development from the approaches to a solution

    我們使用有限元法fem ,從不同面力的引入極限載荷等模擬了定元件或計劃里的元件的幾何外形。和我們的客戶一起選擇進一步的研發向,從這種法中得
  16. In the method, linguistic assessment information is transformed into the form of triangular fuzzy number and an optimization model is constructed through calculating the distance between every alternative and positive ideal point to determine unknown attribute weights, on the basis of which fuzzy appraisal value of each alternative and possibility about triangular fuzzy numbers are calculated to rank alternatives

    了求解具有部分指標權重信息的語言多指標決策問題的計算步驟,其核心是將語言評價信息轉化為三角模糊數,通過計算每與理想點之間的距離,構建最優化模型,求得未知的指標權重值,進而可計算的模糊評價值,相應地通過計算兩兩模糊評價值比較的可能度,得到所有的排序結果。
  17. Based on the additive weighting model and the expectation and square difference method for priorities, the calculating method for minimum changes of weight is obtained when the ranking position between two alternatives is reversed

    在區間數的「期望差」排序法基礎上,基於加權模型,對區間數多屬性決策中權重靈敏度進行分析,並了當兩之間排序位置顛倒時某一指標的權重最小變化量的計算法。
  18. At last, the article gives a sample of building a vpn server with the rras of windows 2000 os based on the given plan. the procedure of accessing to the vpn server is monitored with the help of the " microsoft network monitor ". the analysis based on the monitoring result provides the safety property of the vpn communication, and verifies the availability of the plan to some extent

    最後,文章根據提了一利用windows操作系統的路由和遠程訪問服務( rras )建立vpn訪問服務器的實例,並通過運行windows2000系統的「網路監視器」對訪問該vpn服務器的過程進行了監視和分析,對vpn通信的安全性進行了檢驗,在一定程度上驗證了本文提的有效性。
  19. In the following parts, the detailed implementations of hardware and software, such as serial communication extension, the lcd ' s interface with dsp, rtos module, protocol conversion module, etc. are presented

    在隨后的章節里,詳細討論了實現這的硬體和軟體細節,了串口通信擴展,液晶介面等硬體電路,以及rtos ,通信協議等軟體模塊。
  20. Following are the main results of this thesis : 1 detailedly analyze some related schemes concerning group key management and authentication, especially logical key hierarchy ( lkh ) and one - way function tree ( oft ). we point out the reasons that oft fails to provide forward and backward security

    本論文基於這兩面,主要研究成果如下:對目前存在的多播組密鑰管理進行了詳細的研究分析,尤其是邏輯密鑰分層( lkh )和單向函數樹( oft ),並oft不能前向保密和後向保密的依據。
分享友人