來源路徑 的英文怎麼說

中文拼音 [lāiyuánjìng]
來源路徑 英文
source path
  • : 來動詞1 (從別的地方到說話人所在的地方) come; arrive 2 (發生; 來到) crop up; take place; come ...
  • : 名詞1. (水流起頭的地方) source (of a river); fountainhead 2. (來源) source; cause 3. (姓氏) a surname
  • : 1 (道路) road; way; path 2 (路程) journey; distance 3 (途徑; 門路) way; means 4 (條理) se...
  • : Ⅰ名詞1 (狹窄的道路; 小路) footpath; path; track 2 (達到目的的方法) way; means 3 (直徑的簡稱...
  • 來源 : 1. (事物所從來的地方) source; origin 2. (起源; 發生) originate; stem from
  • 路徑 : 1. (道路) way; route; trajectory; path; tail; travel2. (門路) method; ways and means
  1. Not only was the pattern of recordings along the artificial lateral line similar to the pattern recorded from the nerve cells of a real fish, but the computer could also decipher it to follow the source of the pulse as it moved along different paths

    結果顯示不僅該系統記錄的圖形與從真正的魚身上的神經細胞所記錄的圖形相似,而且配套的電腦程序還能通過對記錄圖形的解讀追蹤沿著不同移動的脈沖水波的頭。
  2. We can use the mm5 model in definite time, definite area weather forecasting. we conclude that : : the moving route of this necw in its developing progress was direct - south along latitude, the cold air is rough, and just this made the rough vertical velocity ; the necw southern moving and conflicting with the west pacification sub - tropical high makes rough jet steam. the plenty south - west warm and wet air made by the jet stream gave the rainstorm demanded vapor ;. the rough vertical velocity by jet stream is a main reason in this rainstorm ; the mm5 model uses four - direction analysis data as its input, this avoids some errors occurred in observe and transfer, thus made the result more useful

    綜合分析認為: ( 1 ) 、這次冷渦在其發生發展過程中,其移動是沿經圈直線南壓,攜帶的冷空氣勢力較強,形成槽后較強的垂直運動; ( 2 ) 、西太平洋副熱帶高壓偏北位置與東北冷渦南壓形成的急流軸,把不斷的西南暖濕氣流輸送到遼西地區,也就是急流軸的左前方位置,為這次暴雨的產生提供了充足的水汽; ( 3 ) 、低空急流不但為暴雨輸送水汽,其造成的較強的垂直環流也是產生強降水的一個主要原因; ( 4 ) 、 mm5模式以四維同化資料作為初始場,最大限度地避免了觀測誤差可能造成的積分不穩定,提高了模擬結果的參考價值。
  3. In this model, based on the business nature of guarantee institutions that mainly handle with contingent liabilities, the author adopted uncertainty analisis to best describe the behaviors of guarantee institutions and unveil the mechanism as well as the root of the looting behavior and how guarantee institutions retrogressed to loot

    在此,筆者重點針對擔保機構主要經營或有負債的特點引入了不確定分析,使新的模型能夠應用於擔保機構。筆者通過對擔保機構行為做出數理描述和分析,揭示擔保機構掠奪風險產生的主要根和理論機理,以及由此產生的擔保機構蛻變
  4. Generalized multiprotocol label switching : an overview of routing and management enhancements. ieee communications magazine, 2001, 39 : 144 - 150. 19 fontaine m, smith d g. bandwidth allocation and connection admission control in atm networks

    在論文中,將針對波長的使用效率的長度波長轉換器使用的個數及點對點傳送所花費的網評估所研究的演算法執行效能。
  5. Put forward my proposal about the reformation of the taxation system, as well as the complementary measures, it is the surface that farmers " burden is caused by the primary government who charge farmers excessively, the deep reason is the unbalance developing strategy for national ecnomic and the difference between the city and the rural earea. link theory with the prctising program interal and external, i put forward my proposal to abolish agricultural tax, practice the same taxation, set up land rent system

    過分地掘取農業剩餘的同時,還實行重城輕鄉的公共產品分配政策,造成農村財政呈「缺血」狀態,不得已實行「三提五統」收費制解決農村公共產品的提供問題,制定製度出發點的錯誤以及制度本身的不完善,造成「三亂」久治不愈;其次,由於行政管理體制改革滯后,機構臃腫,冗員過多;再加上農民反負成本高,反負意識差和農村制度供給的依賴性,造成農民負擔越發沉重,並成為中國許多問題的根
  6. This code also blocks access to the resource using all alternative names or paths

    的資。此代碼還阻止使用所有替換名稱或訪問資
  7. Contract network is used in the negotiation among agents. synthesized scheduling criteria are proposed, which includes processing time, machining cost and efficiency as well as transfer routes. optimization of dynamic scheduling is achieved by adjusting the weights of these parameters

    其構成因子將加工時間、加工成本、設備利用率及加工問題考慮在內,作為資agent計算標值的重要參數,並通過對相關權系數的調節優化車間調度目標。
  8. The application study of improved bp algorithm in sediment science - using two set of experiment data mentioned above, the value of d _ ( cmax ) and gross bed - load transport rate in non - uniform sediment with a wide distribution in flume experiment of stead sediment transportation have been forecasted by ann generator

    改進bp演算法在泥沙科學中的應用研究?將收集整理后的兩次水槽試驗實測資料作為數據,利用生成器生成網對水槽平衡輸沙試驗中的最大起動粒和總輸沙率進行預測。
  9. The book sage portrait record selected 32 sages from thousands of historical figures, gave a brief account of their academic achievements, set up a standard for later generations, paved the way for scholars to study, and became the source of zhang zhidong ' s book answering questions

    摘要《聖哲畫像記》從數千年燦若群星的歷史名人中精選三十二位,畫龍點睛地概述其為學成就,並藉此作為后輩為文的圭臬,給學者治學提供讀書門選擇的便利,為后張之洞《書目答問》起到探導流的作用。
  10. At the same time, the carbon cycle at mid - latitudes of north hemisphere still remains unknown, which leads people to nowhere in gaining a deep understanding of the mechanism of global change. in xilin river basin, inner mongolia, which is right located at the mid - latitudes of north hemisphere, the high speed of social - economic development shows high rate and strong intensity to land use / land cover change in the past two decades. in this paper, remote sensing, gis and ecological modeling techniques were combined to study the land use / land cover change and carbon cycle of xilin river basin

    文章首先對內蒙古錫林河流域四個時期的landsattm / etm +影像進行土地利用/土地覆蓋分類、成圖;通過對比,分析了錫林河流域近20年的的土地利用/土地覆蓋變化;並進一步運用gis方法研究了錫林河流域草地退化的演化;最後運用century模型模擬了內蒙古錫林河流域大針茅草原、羊草草原的碳循環過程,繪制了其碳循環模式圖;並進一步分析了錫林河流域典型草原生態系統對大氣碳庫的/匯功能。
  11. In this paper, the mechanism, methods of and countermeasures to denial of services attacks are discussed. after that, several packet marking schemes for traceback are reviewed and some improvements to the basic packet marking scheme are given, which reduce the workload and false positive rate in the attack tree reconstruction. knowing that in existing packet marking schemes, router marks packets with fixed probability, which results in that many packets are required in path reconstruction and that attacker could encumber path reconstruction via spoofed marking information

    在本文中,我們首先研究了拒絕服務攻擊的攻擊機制、方法及其對策,並對以包標記的方式追蹤拒絕服務攻擊的的各種方法進行了深入的研究,分析了它們各自的優缺點,並對基本包標記方案作了改進,使得其攻擊重構時的運算量和重構的誤報率在原有基礎上大為降低,達到或超過了其他一些方案的水平。
  12. Considering the limited energy and transmission range of sensor nodes in sensor networks, an innovative routing algorithm named self - adaptive flooding based on delay is proposed. in this algorithm, sources deliver route request packets ( rreq ) and sink answers route reply packets ( rrep ) to build routes. in order not to miss optimum routes with the best metrics, the algorithm is to wait a specific amount of time to ensure that almost the rreq near the best metrics is received

    為此本文在無線傳感器網中研究了基於自適應的由演算法,主要工作如下:針對傳感器節點能量及傳輸范圍有限等特點,提出了一種基於延遲的自適應洪泛由演算法,首先通過節點在網內用較小的由請求報文和由回復報文建立由,由建立的過程中自適應地確定等待時間以使更優的由請求報文得到轉發,然後節點再沿著建立好的轉發較大的數據報文。
  13. The article applies the basic economics theories, analyses its costs made - up and structure, the sources of its benefits on the basis of the net - bank development. it also discusses the approaches to improve the benefits of the net - banks. at the same time, it contracts with and analyses the traditional banks

    本文運用經濟學基本原理,從網銀行的發展入手,分析網銀行的成本組成和結構,分析網銀行的收益,探討提高網銀行收益的途,並與傳統銀行進行比較分析,從而為網銀行更好地生成和發展探索有效的途提出了作者的看法。
  14. The article highlights the implementation of how to detect the route to an aimed intranet by traceroute, how to determine the operating system by the tcp / ip stacks fingerprints, how to find the users information of the common os, how to realize the port scan by multi - thread, how to find the vulnerabilities of a terminal, and how to control a remote system by the trojan horse

    文章還詳細介紹了如何利用traceroute和由的traceroute探測到達目標網;如何利用常規方法和tcp ip協議棧指紋特徵識別操作系統類型;如何探測常見操作系統的用戶信息;如何利用多線程實現埠掃描;如何發現系統中與用戶、服務相關的漏洞缺陷;如何利用木馬技術實現遠程控制等。
  15. After that, further study i will give a comparative complete definition on the interaction between teachers and students in order to construct an all round theory and give an explantion on its characteristics and features. facturs and outer forms, and so on. part two - in this part in the light of former theory, combining with chinese teaching practice, i will make an active research on " the interaction " and from teachers " standpoit, i ' ll explore a new interactive teaching system, and put forward a feasible operating approach

    第一部分是理論架構,研究主要以「互動」為切入點,對其追根溯之後,給出教育學中的「互動」之義,在此基礎上進一步研究得出比較完整的「師生互動」定義,建構全面的「師生互動」理論,對其本質特徵、功能表現、影響因素、外在表現形式等作全面解釋;第二部分將以第一部分的理論為依據,並結合語文教學實踐,對語文課堂的「師生互動」進行動態研究,並從教師的立場出發,積極探索一種「師生互動」的新的教學機制,提出一套切實可行的操作;第三部分將從實例的角度緊扣第二部分的研究分析「師生互動」的語文課堂。
  16. The main contents are as follows : ( 1 ) the measurement data processing theory and the design scheme of gps tunnel control network are introduced ; a wavelet analysis technique that can efficiently reduces the multi - path effects caused by tall buildings is presented ; finally, the factor sources of transfixions errors of underground tunnel and limit error distribution method which depends on unequal influence principle are proposed

    具體研究內容如下: ( 1 )研究了遂洞gps測控網的布設、數據處理理論;探討和研究了構築物反射等產生的多效應的影響及應用小波分析理論有效減弱gps接收信號的多噪聲的方法;討論了地下隧洞貫通的誤差及貫通誤差的優化配賦方法。
  17. Then, using recursive arithmetic calculated reliability indices for directory tree, the method was realized by vb program ; the other is a method of reliability evaluation by interval arithmetic, which is the use of interval arithmetic to evaluate reliability, and the computation theory is also given. during the calculation, interval number replaced the component " s parameter and it takes into consideration the uncertainty of all of the parameters. in the study of power distribution system configuration, a new configuration model is set up which takes into account simultaneously the losses minimization and system reliability, then improved genetic arithmetic is described detail and of advantage for solving this problem

    在配電網可靠性評估的研究中,提出了兩種實用的配電網可靠性評估方法:其一是利用網分層和遞歸演算法理論,使用高級語言進行程序設計,提出了一種基於vb編程的配電網可靠性評估方法,該方法通過程序實現了網拓撲結構的分層等效和可靠性指標的遞歸計算,使整個計算過程得到了簡化,並且界面窗口的可視化,使得評估過程便捷、形象;其二是提出了一種基於區間演算法的配電網可靠性評估方法,該方法是一種利用區間理論計算配電系統可靠性的不確定性評估方法;文章給出了區間運算的原理;討論了配電系統中區間數據的,並用區間數代替元件的可靠性參數,對輻射形配電網進行了可靠性評估。
  18. Thirdly, we study how to use the genetic algorithm solve the multi - objective optimization singlecast qos routing algorithm. the simulation result shows that the method can find singlecast route quickly and effectively. it also shows that the model can provide different service to different rank network data, balance the network load and reduce the network congestion effectively

    第三,研究了如何利用遺傳演算法求解多目標最優化單播qos由,模擬實驗驗證了演算法能夠快速有效地找到,並能為不同等級的數據提供不同質量的傳輸服務,有效地提高了網利用率,平衡了網負載,減少了網擁塞。
  19. If a quarantined domain is located in the trust path between two domains, users from domains on the other side of the quarantined domain cannot access resources in the quarantining domain

    如果被隔離的域位於兩個域之間的信任中,則自被隔離域的另一方的域用戶將無法訪問隔離域中的資
  20. For example, upsells and cross - sells, marketing campaigns, base contracts, and business policies can be shared via the store path for the corresponding resource

    例如,上銷及交叉銷售、營銷活動、基礎合約和業務策略可以通過相應資的存儲共享。
分享友人