非終端的 的英文怎麼說

中文拼音 [fēizhōngduānde]
非終端的 英文
nonterminating
  • : Ⅰ名詞1 (錯誤) mistake; wrong; errors 2 (指非洲) short for africa 3 (姓氏) a surname Ⅱ動詞1 ...
  • : Ⅰ名詞1 (最後; 末了) end; ending; finish 2 (指人死) death; end 3 (姓氏) a surname Ⅱ形容詞(...
  • : Ⅰ名詞1 (東西的頭) end; extremity 2 (事情的開頭) beginning 3 (門類; 方面) item; point 4 (原...
  • : 4次方是 The fourth power of 2 is direction
  • 端的 : 1 (事情的經過; 底細) the whole process from beginning to end; the whole course of2 (果然; 的確...
  1. So unless the pentagon is prepared to carpet the nation with interceptors, it is clear that terminal defense is not an appropriate response to the threat of a few nuclear - armed icbms

    所以,除五角大廈準備在美國各地全面部署攔截器,否則防禦系統並不適合用來因應核子洲際彈道飛彈所造成威脅。
  2. My first computer experience involved dumb terminals, green phosphor, light pens, and a good game of tic - tac - toe

    我在計算機方面初次經歷涉及到了啞、綠色熒光屏、光電筆和一款常出色游戲tic - tac - toe 。
  3. Connection fitting ( hardware ) is mainly applicable for the connection of the conducting wire of aerial electric power line and terminals of lightning conductor, the connection of offline perch jumper wire and the repair of conducting wire

    接續金具主要用於架空電力線路導線及避雷線接續、直線桿塔跳線接續及導線補修等。
  4. The catv charge and control system is mainly composed of the management software 、 the header data modulator and the terminal charge and control equipment. i am responsible for design catv charge and control equipment and test system. the header data modulator is used to encrypt the control single from computer and transmit it into the appointed frequency. the terminal charge and control equipment demodulate out the control single from data modulator and transmit it to the addressing control part, where the demodulated fsk single is received and well - handled by the cpu unit, decode the unauthorized signals and deliver it to the shut point, shut point make use of capability of wideband anf characteristic of shut, then the signal of illegal customer will be turn off and vice versa, the legal customer can receive the normal signal

    數據調制器完成對計算機輸出控制信號加密處理,將指令碼載送到一指定頻率點。收費控制器解調出控制信號,送至單片機尋址控制部分。單片機尋址控制部分接收經fsk數據解調器送來信號,送入cpu單元后,解出不授權信號,然後向關斷部分送入信號,關斷部分利用pin二極體寬帶工作能力以及關斷特性,實現對授權用戶或者法用戶信號關斷,使之不能正常收視,繳費用戶進行開通正常收視,達到控制用戶通道管理。
  5. Present a modified particle filter ( pf ) algorithm based on the los / nlos binary state information of propagation environment using the numerical method of the probability density function ( pdf ) about the hybrid noise. the key idea is using numerical method to calculate the hybrid noise pdf, and integrating binary environment information to get filtering result

    2 .給出了應用粒子濾波器改進直達波與直達波混合環境中移動跟蹤性能新演算法,特色是利用數值方法計算混合噪聲密度函數,結合二元環境信息完成濾波估計。
  6. Due to the continuous progress of techlnology and fast increment of information capacit } r, especially the development of network technology and multi - media technolog } r. data process has transformed from the traditional rnode to a nex ' ! - stvle mode. for instance svstematic structure transformed from terminal host computer rnode to client / server struct - ure mode, network circumstance transformed from lan to internet

    隨著技術不斷進步和信息量成倍地增加,特別是網路技術和多媒體技術發展,使信息處理從傳統模式向新型模式轉變,如體系結構從主機方式到客戶服務器結構方式、網路環境從局域網到internet等開放網、信息結構從結構化到結構化等,這些變化必將促使信息檢索技術研究和不斷發展,以滿足人們對提高信息獲取能力需要。
  7. [ font = tahoma ] [ size = 3 ] [ color = darkslategray ] [ b ] the defining and ongoing innovations of this age ? biotechnology, thecomputer, the internet ? give us a chance we ' ve never had before to endextreme poverty and end death from preventable disease

    這個時代無時無刻不在涌現出新革新? ?生物技術,計算機,網際網路? ?它們給了我們一個從未有過機會,去結那些極貧窮和惡性疾病死亡。
  8. The result reveals that the stress control tube comprising a composite structure of the nonlinear resistive and capacitive material shows the best performance in improving electric field distributions in cable terminations

    分析結果表明,採用由電容性和線性電阻性材料復合絕緣結構應力控制管時,電纜電場分佈最為均勻。
  9. Designers and registered electrical workers may be uncertain whether conductive parts such as metallic bathroom accessories, metallic windows or metallic door handles are extraneous conductive parts. when difficulties are encountered, you may carry out a measurement as illustrated in figures 4 and 5. in figure 4, a is an exposed conductive part with a resistance rcpc to main earthing terminal

    附圖四載列外露帶電金屬部分a及懷疑為電氣裝置金屬部分b (例如是金屬水喉管或木門金屬手柄) , a對總接地阻抗為rcpc , b對地阻抗為rx 。
  10. The documents which shall follow this agreement such as letters of intent, full corporate offers, bank comfort letters, contract terms and conditions, banking details or pre - advised payment instruments and / or any information contained in such documents may not be passed, under any circumstance, to another intermediary or broker or trader or any company or private persons who are not end buyers or end suppliers without prior specific written consent of the party ( s ) providing such information

    合同條款應經簽署需經合作方或互利合作第三方同意.文件應按照意向書,責任供貨函(完整共同報價) ,銀行保函,合同條款,銀行詳細資料和預先通知支付票據來做.在任何情況下給購買者或供應商另一中間或經紀人或商人或任何公司或個人,在沒有優先特別經簽約方書面同意提供這些信息,任何信息在這些文件中將不能通過
  11. Wireless localization and tracking is a hot research topic, several theorestic and applied results have been in recent years. this paper addressed two problems : 1. how to mitigate position error caused by non - line - of - sight ( nlos ) propogation when we use range - based tracking algorithm in cellular networks

    本文探討了其中兩個問題: 1 .在跟蹤蜂窩移動通信網路中移動運動軌跡時,如何利用粒子濾波器減弱直達波傳播對濾波跟蹤演算法精度顯著影響
  12. In computer security, the use of security personnel to patrol work areas, particularly outside normal working hours, to detect intruders and unauthorized use of terminals, to check for security violations

    計算機安全學中,安全人員在工作間內巡邏,特別是在正常工作時間以外時間里檢查入侵者、法使用及其它安全違章行為。
  13. A security device ( often part of a terminal ) that reads information ( often from a magnetic strip ) on a badge inserted in a slot. in this way, it can prevent the unauthorized use of a display station before allowing an operator to sign on

    一種安全設備(通常是一部分) ,它可以讀取插入槽中標記卡上信息(這些信息往往以磁條碼形式記錄在標記卡上) 。用這種辦法,在允許操作員進入系統前,可以防止對一個顯示工作站法使用。參閱badge 。
  14. Each yacc declaration part declares the names of both the terminal and non - terminal symbols tokens, and may also describe operator precedence and data types for various symbols

    每個yacc聲明段聲明了符號和符號(標記)名稱,還可能描述操作符優先級和針對不同符號數據類型。
  15. Components are various terminal and non - terminal symbols put together by the rule

    Components是根據規則放在一起不同符號。
  16. The common method of operating an unintelligent crt terminal on a full duplex link ; each character that is keyed in is returned from the destination ( usually a local computer or a terminal control unit ) before it is displayed on the screen

    在全雙工鏈路上操作智能crt一種通常方式,在該方式下,每個鍵入字元都是先從目地(通常為一本地計算機或控制器)被返回來,然後才顯示到屏幕上。
  17. Is a symbol that is a group of non - terminal and terminal symbols

    :是一組符號和符號組成符號。
  18. In this example, result is the non - terminal symbol the rule describes

    在這個例子中, result是規則描述符號。
  19. Microsoft has released a windows patch that will prevent ts cals from being inadvertently allocated to devices that are not intended to be licensed for terminal services usage

    Microsoft發布了一個windows修補程序,可以防止無意中將ts cal分配給服務用途設備。
  20. This paper analyzes the architecture of distributed firewalls based on comparing with the traditional firewalls : network firewalls and personal firewalls. it brings forward a new design about the distributed firewalls in which some host firewalls and a control center constitute the whole distributed firewalls with reserving the old network firewalls. a host firewall is a packet - filtering firewall that filters the network packets come from inside the network based on the information of network application program, ip address, tcp or udp port and so on

    本文在與傳統網路防火墻、個人防火墻技術對比基礎之上,結合計算機網路安全本質與要求,對分散式防火墻這一全新防火墻體系結構進行了分析,提出一種充分利用現有技術和投資分散式防火墻系統設計方案,即在保留傳統網路邊界防火墻同時,設計一種駐留在內部網路主機防火墻及其控制中心,將防火墻延伸到內部網路,從而有效防範來自網路內部法訪問與惡意破壞。
分享友人