點名原理 的英文怎麼說

中文拼音 [diǎnmíngyuán]
點名原理 英文
roll call principle
  • : Ⅰ名詞1 (液體的小滴) drop (of liquid) 2 (細小的痕跡) spot; dot; speck 3 (漢字的筆畫「、」)...
  • : Ⅰ名詞1 (名字; 名稱) name; appellation 2 (名聲; 名譽) fame; reputation 3 (名義) name 4 (姓...
  • : Ⅰ形容詞1 (最初的; 原來的) primary; original; former 2 (沒有加工的) unprocessed; raw Ⅱ動詞(原...
  • : Ⅰ名詞1 (物質組織的條紋) texture; grain (in wood skin etc ) 2 (道理;事理) reason; logic; tru...
  • 點名 : 1 (查點人數時叫名字) call the roll; keep track of one s attendance; make a roll call 2 (指名)...
  1. Abstract : the qiantang estuary with violent hydrodynamic conditions is well known for its tidal bore. the regulation of the estuary in the past, especially the progress since the founding of new china are reviewed. the principles of the regulation and planning of the qiantang estuary formulated in 1960s are expounded, i. e., to narrow the river to reduce the tidal prism, and to increase the ratio of the river flow to tidal discharge. the experience of estuary regulation / reclamation is summarized, especially the engineering measures to protect the groin head and to use polder dykes as sea defense works. finally, the effect is analyzed of the large - scale constraction / reclamation in the estuary on the tides, flooding high water level, estuary bed and the northern deep waterway in the hangzhou bay

    文摘:以涌潮聞的錢塘江河口,動力強勁,破壞力極大.回顧錢塘江河口歷代治情況,重記述1949年以來治工作的進展,論述60年代提出的錢塘江河口治規劃的指導思想,即縮窄江道,減少進潮量,增大山潮水比值的整治則.總結整治規劃實施過程中治江圍塗經驗,特別是「以圍代壩」和丁壩壩頭保護等工程措施.分析錢塘江河口大規模治江圍塗后對錢塘江河口潮汐、洪水位、河床以及杭州灣北岸深槽的影響
  2. After analysising the theory and characteristics of the corba and mobile agent technologies, the paper brings forward firstly a kind of mobile agent architecture - coma, and gives the solution to coma ' s asynchronous transfer, concurrent control, naming, location and intelligence mechanism in detail. furthermore, aiming at making up the flaws of the application servers based on corba in distributed group environment and solving the problem of object ' s remotion on the corba server, the paper proposes a kind of corba architecture based on mobile agent - maorb, discusses naming and transparent transfer of mobile agent in a maorb system in detail, and gives a reasonable improvement method

    本文在分析了corba和移動agent這兩種分散式技術的運行及其特之後,首先提出一種應用於協同環境下的移動agent體系結構coma ,並詳細給出了coma的異步遷移、並發控制、命和尋址,智能化機制這幾個關鍵技術的解決方法。進而,為了彌補單純的利用corba技術來構建分散式集群環境中應用服務器的不足,解決corba服務端對象的可移動性問題,本文又提出了一種基於coma的corba體系結構maorb ,詳細討論了maorb系統中移動agent的命和透明遷移以及corba和coma的結合度問題,並給出了合的解決方案。
  3. Based on the original classic dream of red mansion and guided by theoretical innovation, this paper presents a reinterpretation and repositioning for the jade culture background and concepts of jade beautifulness, jade deity, jade treasure and jade virtue involved in the novel and for the recognition, application and contribution of china ' s jade culture from the new viewpoints of jade studies and jade culture, and proposes the new perspective that jade is the soul of dream of red mansion and this novel is the classic literary work for china ' s jade culture

    摘要以《紅樓夢》著為基礎,以思想論創新為先導,以文化創新和學術創新為切入,對《紅樓夢》的玉文化背景、玉美、玉神、玉寶、玉德的觀念以及對中國玉文化的認識、運用、貢獻,從玉學、玉文化的新觀進行了重新詮釋和定位,提出《紅樓夢》的靈魂是玉、是一部中國玉文化流芳百世的經典文學著的新認識。
  4. Zhengzhou coal industry ( group ) limited liability company ( hereinafter referred to as zheng meijituan companies ) built in 1958, when the new federated mining bureau, january 1989 renamed zhengzhou mining bureau, 1996 1 january original coal department approval for the establishment of state - owned exclusive investment companies, in september 2002 with china xinda, china huarong asset management corporation for the joint formation of a new company property is a category of countries large enterprises, national levels enterprises, the original coal department establish a modern enterprise system one of the pilot units, the coal industry and the first issuance of stock - listed companies

    鄭州煤炭工業(集團)有限責任公司(簡稱鄭煤集團公司) ,始建於1958年,時新密礦務局, 1989年1月更為鄭州礦務局, 1996年1月經煤炭部批準組建為國有獨資公司, 2002年9月與中國信達、中國華融資產管公司聯合組建為產權多元化新公司,是國家大型一類企業,國家二級企業,煤炭部首批建立現代企業制度試單位之一,煤炭行業第一家發行股票並上市的企業。
  5. U. s. a has plan to spend eleven hundred million dollars to build a great high - power laser setting of 192 routes of laser which is named nif the basic theory of laser - fusion is firstly brought forward by wang ganchang academician in 1964

    美國計劃花11億美元建造一個為國家火裝置( nif )的192路大型高功率激光裝置。激光聚變的基本是由中國的王淦昌院士於1964年最先提出的,中國在這一領域的研究水平也是國際領先的。
  6. It combines feeder automation, and develops the fault identifying principle from one direction to two direction. so it enhances the redundancy of fault information, and improves the reliability of the fault location. we choose the transient zero current prior to others, for it is bigger than others mostly

    本文敘述了饋線系統保護,提出了基於饋線自動化系統的幾種單相接地故障處方案,討論了這幾種方案下故障特徵量的比較方式,分析了故障特徵量選用的出發以及配電終端地址命規則等問題。
  7. The paper mainly discussed the pki foundation technology knowledge and the concept, discussed the base knowledge and the basic principle of the modern cryptography. the article introduced and compared main algorithm characteristic, the speed, the encryption intensity of each kind of encrypt. elaborated the public key system in the pki system application : digital envelope, digital signature, as well as digital certificate definition, form and use

    論文主要論述了pki基礎技術的一般知識和概念;討論了現代密碼學的基本知識和基本;對各種加解密演算法的主要特、速度、加密強度進行了簡要的介紹和比較;論述了公開密鑰體制在pki體系中的應用:數字信封、數字簽,以及數字證書定義、格式及用途。
  8. The method, based on the finite element theory, force - method theory, increment method and middle stiffness method, making use of the increment of curvature of the section, works out the increment of load applying and is proved in this thesis

    接著,本文根據有限單元和力法、增量法及中剛度論,提出了本文暫且命為曲率力法的非線性分析方法。該方法通過增加截面的曲率來反求框架外加荷載的增量,並在文中以試驗的框架模型為例,給出了整個推導過程。
  9. She integrated her jungian - based approach with what she learned from lowenfeld, which led sandplay therapy to a different clinical direction. she named this approach sandplay. in 1980 ' s, sandplay was introduced into schools in america

    她將榮格的分析心論引入沙盤游戲治療之中,加入了象徵、型的觀,將沙盤游戲治療引向了另一個臨床維度,並將其命為「沙盤游戲」 。
  10. The main places of interest of yili prefecture are : the bell and drum tower in huiyuan city ; the guhuangqu drangon entrance ; the ruins of the gold - roofed temple and the mohe old city ; the suchan waisihan mazar ; the ancient city of hainute ; the shengyou temple ; the xiaohongnahai stone figure ; the xiata village culture scenery ; the abureleshan rocks ; the tangbula hot spring scenery ; the qiaxi tour scenery and the nalati grassland, etc. with the reform policy of our central government " open to the west ", yili prefecture has become an attractive commercial place and also a traveling resort

    主要勝古跡有惠遠城、古皇渠龍口、金頂寺遺址、磨河城遺址、速擅歪思汗麻扎、海努古城遺址、聖佑廟、小洪那海石人、夏塔古文化風景區、阿布熱勒山巖畫群、唐巴拉溫泉風景區、恰西旅遊風景區、那拉提大草等。伴隨著西部大開發的進行,伊犁地區以她獨特的地環境和人文環境,已成為邊貿和旅遊熱
  11. The key - letters method is the integrative product of the keyword method, a well - known mnemonic strategy in the western world, with the characteristics of the chinese characters

    摘要關鍵字母法是將西方世界著的關鍵詞方法的同漢字特相結合的?物。
  12. The author, as a j. m and a career lawyer, basing on the trait of her specialty and her profession, with legal principles she has mastered, analyzed the reformation of the systems of state owned enterprises in a frame work of the legal mechanism. it is expected that the research can provide a theoretical basis for the judicial practice, and especially can promote the scientific, unitary and standard practice of the trial

    本文作者作為一法律碩士研究生和執業律師,根據專業和職業特,試圖運用所掌握的法律,用法律機制的框架分析國有企業改制行為,希望為司法實踐提供論依據,特別是對審判實踐的科學、統一與規范帶來促進作用。
  13. Every night at 22 : 00 dormitory supervisor will conduct roll call in the bed room. not yet return explain the reason

    寢室規定每日晚上22 : 00宿舍管員到寢室,未歸者需述明因。
  14. In can - bus communication technique, the circuit design method of can - bus node and the technique of structuring distributed can - bus controlling network are put forward, how to realize can calling and broadcasting communication under pelican mode is explained thoroughly, and the computational technique of bit - timing parameter of can controller sja1000 is detailed

    在can總線通信技術中,給出了can總線節電路的設計方法和基於can總線的分散式控制網路的組建方法,詳細論述了增強模式下can總線分散式控制網路實現和廣播通信的與方法,深入探討了can控制器sja1000位定時參數的計算方法。
  15. The fourth chapter introduces the circuit design method of can - bus node, as well as the technique of structuring distributing - type can - bus measuring and controlling network, explains thoroughly how to realize can calling and broadcasting communication under pelican mode, and discusses detailedly the computational technique of bit - timing parameter of can controller sja1000. the latter part of this chapter points out several important problems confronted and solved by the author in the course of designing can - bus communication system

    第四章介紹了can總線節電路的設計方法和基於can總線的分散式測控網路的組建方法,詳細論述了增強模式下can總線分散式測控網路實現和廣播通信的與方法,深入探討了can控制器sja1000位定時參數的計算方法,總結了作者在設計can總線通信系統的過程中遇到和解決的幾個關鍵問題。
  16. In the dissertation, the principle and foundation of digital signature technique, pki frame were firstly summarized, the development process and main characteristics of office automation, the present state and main secuirty problem of our aoas were then discussed in detail. digital signature technique was introduced into the aoas, the project about pki and the ca institute and jtjca certification system model for army were followed

    論文首先對數字簽技術、基礎技術及pki框架體系進行了較全面的概述和總結;接著對辦公自動化的發展歷程和主要特、我軍辦公自動化系統現狀及存在的主要安全問題進行了深入分析;最後,論文將數字簽技術引入軍隊辦公自動化系統,提出了我軍pki及ca中心系統的設計方案,提出了軍隊jtjca認證系統模型。
  17. Then on the basis of broad investigation on internet search engine, the author listed the use and characteristics of me eight most popular search engines, and compared their search effects

    首先對搜索引擎的概念、特、類型、工作作了分析,然後在廣泛調查網際網路搜索引擎的實踐上,同時列舉了4大著搜索引擎的使用和特,並在搜索效果上作了比較。
  18. This course features a rigorous introduction to modern cryptography, with an emphasis on the fundamental cryptographic primitives of public - key encryption, digital signatures, pseudo - random number generation, and basic protocols and their computational complexity requirements

    本課程精確地介紹近代密碼學,並重介紹始公鑰加密的密碼基礎、數字簽、虛擬隨機數的產生、基本協議及相關的計算復雜度要求。
  19. Based on the known principle of fixed points in mathematical analysis, a sufficient convergence condition of the erasure recover algorithm for low - density erasure codes is shown. 5

    基於著的不動,證明了低密度糾刪碼的刪除錯誤恢復演算法穩定收斂的一充分條件; 5
  20. A motion to disallow a member s vote on grounds of his direct pecuniary interest may be moved without notice by any member immediately upon the statement by the president, chairman of a committee of the whole council or chairman of his judgment on whether there is a required majority or, if a division has been ordered, upon his statement of the numbers of members recorded in the division

    以某議員有直接金錢利益為由將其表決作廢的議案,可無經預告由任何議員在立法會主席、全體委員會主席、委員會主席或小組委員會主席說出按其判斷議案是否獲得所需的過半數票后,立即動議;如有命令進行表決,有關議案可在立法會主席、全體委員會主席、委員會主席或小組委員會主席說出表決所記錄的有關議員數目后,立即動議。
分享友人