非終端的 的英文怎麼說
中文拼音 [fēizhōngduānde]
非終端的
英文
nonterminating- 非 : Ⅰ名詞1 (錯誤) mistake; wrong; errors 2 (指非洲) short for africa 3 (姓氏) a surname Ⅱ動詞1 ...
- 終 : Ⅰ名詞1 (最後; 末了) end; ending; finish 2 (指人死) death; end 3 (姓氏) a surname Ⅱ形容詞(...
- 端 : Ⅰ名詞1 (東西的頭) end; extremity 2 (事情的開頭) beginning 3 (門類; 方面) item; point 4 (原...
- 的 : 4次方是 The fourth power of 2 is direction
- 端的 : 1 (事情的經過; 底細) the whole process from beginning to end; the whole course of2 (果然; 的確...
-
So unless the pentagon is prepared to carpet the nation with interceptors, it is clear that terminal defense is not an appropriate response to the threat of a few nuclear - armed icbms
所以,除非五角大廈準備在美國各地全面部署攔截器,否則終端防禦系統並不適合用來因應核子洲際彈道飛彈所造成的威脅。My first computer experience involved dumb terminals, green phosphor, light pens, and a good game of tic - tac - toe
我在計算機方面的初次經歷涉及到了啞終端、綠色熒光屏、光電筆和一款非常出色的游戲tic - tac - toe 。Connection fitting ( hardware ) is mainly applicable for the connection of the conducting wire of aerial electric power line and terminals of lightning conductor, the connection of offline perch jumper wire and the repair of conducting wire
接續金具主要用於架空電力線路的導線及避雷線終端的接續、非直線桿塔跳線的接續及導線補修等。The catv charge and control system is mainly composed of the management software 、 the header data modulator and the terminal charge and control equipment. i am responsible for design catv charge and control equipment and test system. the header data modulator is used to encrypt the control single from computer and transmit it into the appointed frequency. the terminal charge and control equipment demodulate out the control single from data modulator and transmit it to the addressing control part, where the demodulated fsk single is received and well - handled by the cpu unit, decode the unauthorized signals and deliver it to the shut point, shut point make use of capability of wideband anf characteristic of shut, then the signal of illegal customer will be turn off and vice versa, the legal customer can receive the normal signal
前端數據調制器完成對計算機輸出的控制信號加密處理,將指令碼載送到一指定頻率點。終端收費控制器解調出控制信號,送至單片機尋址控制部分。單片機尋址控制部分接收經fsk數據解調器送來的信號,送入cpu單元后,解出不授權信號,然後向關斷部分送入信號,關斷部分利用pin二極體的寬帶工作能力以及關斷特性,實現對非授權用戶或者非法用戶的信號關斷,使之不能正常收視,繳費用戶進行開通正常收視,達到控制用戶通道的管理。Present a modified particle filter ( pf ) algorithm based on the los / nlos binary state information of propagation environment using the numerical method of the probability density function ( pdf ) about the hybrid noise. the key idea is using numerical method to calculate the hybrid noise pdf, and integrating binary environment information to get filtering result
2 .給出了應用粒子濾波器改進直達波與非直達波混合環境中移動終端跟蹤性能的新演算法,特色是利用數值方法計算混合噪聲密度函數,結合二元環境信息完成濾波估計。Due to the continuous progress of techlnology and fast increment of information capacit } r, especially the development of network technology and multi - media technolog } r. data process has transformed from the traditional rnode to a nex ' ! - stvle mode. for instance svstematic structure transformed from terminal host computer rnode to client / server struct - ure mode, network circumstance transformed from lan to internet
隨著技術的不斷進步和信息量成倍地增加,特別是網路技術和多媒體技術的發展,使信息處理從傳統模式向新型模式轉變,如體系結構從終端主機方式到客戶服務器結構方式、網路環境從局域網到internet等開放網、信息結構從結構化到非結構化等,這些變化必將促使信息檢索技術的研究和不斷發展,以滿足人們對提高信息獲取能力的需要。[ font = tahoma ] [ size = 3 ] [ color = darkslategray ] [ b ] the defining and ongoing innovations of this age ? biotechnology, thecomputer, the internet ? give us a chance we ' ve never had before to endextreme poverty and end death from preventable disease
這個時代無時無刻不在涌現出新的革新? ?生物技術,計算機,網際網路? ?它們給了我們一個從未有過的機會,去終結那些極端的貧窮和非惡性疾病的死亡。The result reveals that the stress control tube comprising a composite structure of the nonlinear resistive and capacitive material shows the best performance in improving electric field distributions in cable terminations
分析結果表明,採用由電容性和非線性電阻性材料復合絕緣結構的應力控制管時,電纜終端的電場分佈最為均勻。Designers and registered electrical workers may be uncertain whether conductive parts such as metallic bathroom accessories, metallic windows or metallic door handles are extraneous conductive parts. when difficulties are encountered, you may carry out a measurement as illustrated in figures 4 and 5. in figure 4, a is an exposed conductive part with a resistance rcpc to main earthing terminal
附圖四載列外露非帶電金屬部分a及懷疑為非電氣裝置金屬部分b (例如是金屬水喉管或木門的金屬手柄) , a對總接地終端的阻抗為rcpc , b對地的阻抗為rx 。The documents which shall follow this agreement such as letters of intent, full corporate offers, bank comfort letters, contract terms and conditions, banking details or pre - advised payment instruments and / or any information contained in such documents may not be passed, under any circumstance, to another intermediary or broker or trader or any company or private persons who are not end buyers or end suppliers without prior specific written consent of the party ( s ) providing such information
合同條款應經簽署需經合作方或互利合作的第三方同意.文件應按照意向書,責任供貨函(完整的共同報價) ,銀行保函,合同條款,銀行詳細資料和預先通知支付票據來做.在任何情況下給非終端購買者或終端供應商另一中間或經紀人或商人或任何公司或個人,在沒有優先特別經簽約方書面同意提供這些信息,任何信息在這些文件中將不能通過Wireless localization and tracking is a hot research topic, several theorestic and applied results have been in recent years. this paper addressed two problems : 1. how to mitigate position error caused by non - line - of - sight ( nlos ) propogation when we use range - based tracking algorithm in cellular networks
本文探討了其中的兩個問題: 1 .在跟蹤蜂窩移動通信網路中移動終端的運動軌跡時,如何利用粒子濾波器減弱非直達波傳播對濾波跟蹤演算法精度的顯著影響In computer security, the use of security personnel to patrol work areas, particularly outside normal working hours, to detect intruders and unauthorized use of terminals, to check for security violations
計算機安全學中,安全人員在工作間內巡邏,特別是在正常工作時間以外的時間里檢查入侵者、終端的非法使用及其它安全違章行為。A security device ( often part of a terminal ) that reads information ( often from a magnetic strip ) on a badge inserted in a slot. in this way, it can prevent the unauthorized use of a display station before allowing an operator to sign on
一種安全設備(通常是終端的一部分) ,它可以讀取插入槽中的標記卡上的信息(這些信息往往以磁條碼的形式記錄在標記卡上) 。用這種辦法,在允許操作員進入系統前,可以防止對一個顯示工作站的非法使用。參閱badge 。Each yacc declaration part declares the names of both the terminal and non - terminal symbols tokens, and may also describe operator precedence and data types for various symbols
每個yacc聲明段聲明了終端符號和非終端符號(標記)的名稱,還可能描述操作符優先級和針對不同符號的數據類型。Components are various terminal and non - terminal symbols put together by the rule
Components是根據規則放在一起的不同的終端和非終端符號。The common method of operating an unintelligent crt terminal on a full duplex link ; each character that is keyed in is returned from the destination ( usually a local computer or a terminal control unit ) before it is displayed on the screen
在全雙工鏈路上操作非智能crt終端的一種通常方式,在該方式下,每個鍵入的字元都是先從目的地(通常為一本地的計算機或終端控制器)被返回來,然後才顯示到屏幕上。Is a symbol that is a group of non - terminal and terminal symbols
:是一組非終端符號和終端符號組成的符號。In this example, result is the non - terminal symbol the rule describes
在這個例子中, result是規則描述的非終端符號。Microsoft has released a windows patch that will prevent ts cals from being inadvertently allocated to devices that are not intended to be licensed for terminal services usage
Microsoft發布了一個windows修補程序,可以防止無意中將ts cal分配給非終端服務用途的設備。This paper analyzes the architecture of distributed firewalls based on comparing with the traditional firewalls : network firewalls and personal firewalls. it brings forward a new design about the distributed firewalls in which some host firewalls and a control center constitute the whole distributed firewalls with reserving the old network firewalls. a host firewall is a packet - filtering firewall that filters the network packets come from inside the network based on the information of network application program, ip address, tcp or udp port and so on
本文在與傳統的網路防火墻、個人防火墻技術對比的基礎之上,結合計算機網路安全的本質與要求,對分散式防火墻這一全新的防火墻體系結構進行了分析,提出一種充分利用現有技術和投資的分散式防火墻系統的設計方案,即在保留傳統網路邊界防火墻的同時,設計一種駐留在內部網路終端的主機防火墻及其控制中心,將防火墻延伸到內部網路的終端,從而有效防範來自網路內部的非法訪問與惡意破壞。分享友人