隱極機 的英文怎麼說

中文拼音 [yǐn]
隱極機 英文
non-salient pole machine
  • : Ⅰ動詞(隱瞞; 隱藏) hide; conceal Ⅱ形容詞1 (隱藏不露) hidden from view; concealed 2 (潛伏的; ...
  • : i 名詞1 (頂點; 盡頭) the utmost point; extreme 2 (地球的南北兩端; 磁體的兩端; 電源或電器上電流...
  • : machineengine
  1. With the rapidly development of computer network technology and the widely use of network technology in every walk of life, people transmit data through computer network more and more frequently, including all kinds of secret information ( for example, military secret ; bussiness secret ; personal private information ). today, as a result of poor security of our network system, we can not prevent the transmittied information from stealing and modifying unlawful. thus, the computer network technology is applied to our daily life restrictedly. recently, many network applications with voip ( for example msn messenger ; dialpad ; distributed multipoint multimedia conferences ) take no measures to encrypt their data

    隨著計算網路技術的迅猛發展和網路技術在各行各業中的廣泛應用,人們通過計算網路傳輸數據日益增加,其中包含了各種密信息(例如軍事密信息、商業密信息、個人私信息等) 。由於目前的網路系統缺乏足夠的安全性,不能有效防止網路上所傳輸的信息被非法竊取和修改,因而大地限制了計算網路技術在日常工作中的應用。當前,基於voip技術的各種網路應用,如msnmessenger , dialpad ,以及一些分散式多媒體會議系統,竟然未採取任何加密措施
  2. The exchanges amongst the participants were conducted in a constructive and open manner and, as expected, discussions centred on obstacles such as data protection, confidentiality issues, bank secrecy and client privilege as well as the impact and opportunities created by developments in the field of information technology

    與會者交流的態度都是積而開放的。一如預期,討論集中在各方合作上的障礙如保障私、保密事項、銀行密及客戶權益,以至資訊科技發展的影響與所製造的會等。
  3. The mutual concealment of offenses among the kin in our county show a series of vivid characteristics through several thousand years. and it is so similar with the modern special immunity of relatives as witness, which could not be said just as a accident

    我國傳統法律中的親屬容制度,經歷了數千年的歷史發展,體現出一系列鮮明的特徵,並且與現代的親屬作證特免權為類似,這不能說僅僅是一種緣巧合。
  4. Cool wall wizard dreaming to automatically download various colors wallpaper to work intensely all day into your computer, no longer feel monotonous and boring ; extremely rich in the network wallpaper, the 12 classification, support manually download new wallpaper ; intelligent frame rapid trimming technology, adaptive various popular display size ; timing can be manually or replacement of desktop wallpaper, different timing of the transformation also supports random transform mode ; circle player in the process, support the insertion of local wallpaper, wallpaper and local networks of pictures that turn ; to hide / show desktop icons, wallpaper and user - friendly viewing ; since the launch set to boot, the first time you gave surprise ; cool wall wizard provide three kinds of styles console skin ( white fashion, classic black, gray and elegant ) ; wallpaper borders can set the color to the background transparent desktop text

    雪狐酷壁精靈自動下載各類絢麗的壁紙,讓整天對著電腦埋頭工作的你,不再感到單調、無聊;豐富的網路壁紙庫,十二大分類,支持手動下載新壁紙;智能邊框快速切邊技術,能自適應各種流行的顯示器尺寸;可以定時或手動更換桌面壁紙,提供不同變換時間的選擇,還支持隨變換模式;循環播放過程中,支持插入本地壁紙,實現網路壁紙和本地圖片的交替顯示;可藏/顯示桌面圖標,方便用戶觀賞壁紙;允許設定開自啟動,第一時間就給你驚喜;酷壁精靈提供有3種風格的控制臺皮膚(白色時尚、黑色經典、灰色典雅) ;還能設置壁紙邊框的顏色,讓桌面文字的背景透明。
  5. Chapter four focuses on the countermeasures against anti - dumping from the view of government and enterprises respectively. the following is the major viewpoints in the thesis : anti - dumping has developed into one of the major forms of trade barriers, which has its root deeply set into the economy and its internal features ; the backward managerial style of chinese enterprises constitutes the primary internal cause of the severe situation in which they have been suffering from anti - dumping ; the discriminating practices violate, in essence, the relative wto principles ; to break the anti - dumping barrier, the chinese government should straighten out the export practices, build up trade and business associations, and appeal to the wto dispute settlement body. as for enterprises, they should alter their marketing strategies and strengthen the cooperation with international business entities

    本文的主要觀點有:反傾銷自二十世紀下半期以來逐漸發展成為一種主要的國際貿易壁壘,有其深刻的經濟客觀需要以及自身的特點;中國企業普遍不存在對海外市場的傾銷能力,落後的經營管理方式是造成中國企業遭遇反傾銷制裁的主要內因;替代國制度從本質上講是違背wto反傾銷協議原則的;欲打破反傾銷封鎖,我國政府對內應整頓出口經營秩序,建立健全商會職能,對外應在研究吃透有關規則的基礎上積向wto爭端解決構申訴,以從根本上扭轉不利局面;企業應轉換經營思維,調整經營策略,積應訴並加強國際合作,才能消除遭致國外反傾銷的內部患。
  6. The number of the hidden layers of mul - tilayer perceptrons ( mlps ) is analyzed, and three - layer perceptrons neural network is adopted ; by analyzing the mechanism of the neural cells in hidden layer, a method for combining genetic algorithm and bp algorithm to optimize the design of the neural networks is presented, and it solves the defects of getting into infinitesimal locally and low convergence efficiently, it can also solve the problem that it can usually obtain nearly global optimization solution within shorter time through using genetic algorithm method lonely ; several examples validate that this algorithm can simplify the neural networks effectively, and it makes the neural networks solve the practical problem of fault diagnosis more effectively

    對多層感知器層數進行了分析,確定採用三層感知器神經網路;通過對層神經元作用理的分析,引入了遺傳演算法與bp演算法相結合以優化設計神經網路的方法,有效地解決了bp演算法收斂速度慢和易陷入局部小的弱點,還可以解決單獨利用遺傳演算法往往只能在短時間內尋找到接近全局最優的近優解的問題;通過實例驗證了這種演算法能夠有效地簡化神經網路,使神經網路更加有效地解決實際的故障診斷問題。
  7. It is committed to promote mechanisms to increase trust and confidence of participants in electronic commerce in order to encourage greater use of the internet to perform transactions and one of its initiatives is " data privacy "

    電子商貿小組一直致力發展加強參與者對電子商貿的信任和信心的制,以鼓勵更多人進行網上交易。資料私是電子商貿小組積關注的一項議題。
  8. Rotating electrical machines - specific requirements for cylindrical rotor synchronous machines

    旋轉電.同步電的特殊要求
  9. Methods for the determination of interturn short - circuit in the rotor winding of cylindrical synchronous generators

    式同步發電轉子匝間短路測定方法
  10. 6 the laws governing the internal faults are investigated. this has provided theoretic foundation to the configuration and optimization of protection for synchronous generator with internal armature winding faults

    本文所討論的雖然是凸同步發電,但是其結構具有一定的代表性,同步發電可以作為特例用類似的方法分析。
  11. During its operation, the rotor of the machine is always under the great suppression of centrifugal force. the surface of rotor is the most important part to enduring the forces and thermal energy. so the windings of rotor are in a common problem of happening one - point to earth short fault, two - point to earth short fault, or turn - to - turn short fault

    汽輪發電是一種高速式同步電,在其運行時,轉子受到強大的離心力的作用,而轉子表面是承受械應力和發熱的最關鍵的部件,因此汽輪發電轉子繞組容易發生一點接地、匝間短路和兩點接地短路故障。
  12. At the same time, the sensitive information contained in electronic documents are confronted with big secure hidden trouble, because of the lack of users " secure consciousness and the confusion of documents management

    目前由於各企業員工對信息安全認識不足,普遍計算使用水平低下以及企業內部對電子文檔管理的混亂,承載于電子文檔中的敏感信息面臨著大的安全患。
  13. China s rigid currency regime is highly distortionary and poses risks to china s economy - - sowing the seeds for excess liquidity creation ; asset price inflation ; large speculative capital flows ; and over - investment

    中國一成不變的貨幣制度具有大的扭曲性,使中國經濟面臨風險埋下種種患,導致流動資產過渡積累,資產價格膨脹,巨額投資本流動和過度投資。
  14. A new genetic neural network is to conduc the non - rigid modeling, which is first put forward, in accordance with some drawbacks of the current software compensation, which include low accuracy and trouble some expressions. and the current difficult questions, which include local minimum problem and the selection of the number of neural network hidden units, are done

    針對現有誤差補償過程中精度較低等問題,提出了一種改進的遺傳神經網路演算法建立三坐標測量非剛性誤差模型,這種演算法克服了現有bp演算法神經網路建模存在的局部小點、網路單元數選擇等問題。
  15. A new safety analysis method for aircraft structural system with multiple implicit limit state equations

    適用於含多個限狀態方程的飛結構系統安全分析新方法
  16. Network attacks damaged networks and users, among which dos ( denial of service ) attacks become one of the common network attack techniques by the characteristics, such as extensive area, strong concealment, simpleness and efficiency, etc. dos attacks greatly affected the effective service of network and host systems, especially among which, ddos ( distributed denial of service ) attacks are greatly threatening internet, since they are difficult to recognize and defense due to their concealment and distribution

    隨著網際網路的迅速普及和應用的不斷發展,各種黑客工具和網路攻擊手段也隨之倍出,網路攻擊導致網路和用戶受到侵害,其中拒絕服務( dos , denialofservice )攻擊以其攻擊范圍廣、蔽性強、簡單有效等特點成為常見的網路攻擊技術之一,大地影響網路和業務主系統的有效服務。其中,尤其是分散式拒絕服務( ddos , distributeddenialofservice )攻擊,由於其蔽性和分佈性很難被識別和防禦嚴重威脅著internet 。
  17. The motion, to be proposed by hon andrew leung kwan - yuen, says : " that, as there are from time to time complaints about serious invasion of personal privacy by some media organisations and earlier on, peep photos of a female artiste changing her clothes had been taken and published by a magazine which seriously invaded the privacy of the artiste and trampled on women s dignity, thereby causing a great public outcry ; this council urges the government to expeditiously take measures, including

    該項議案將由梁君彥議員提出,內容為:鑒于不時有投訴指部分傳媒構嚴重侵犯個人私,早前更有雜志偷拍及刊登女藝人的更衣照片,嚴重侵犯當事人的私及踐踏女性的尊嚴,引起公眾大不滿,本會促請政府盡快採取措施,包括:
分享友人