健壯型 的英文怎麼說

中文拼音 [jiànzhuàngxíng]
健壯型 英文
athletic type
  • : Ⅰ形容詞1 (強壯) strong; robust 2 (雄壯; 大) grand; magnificent; grandiose Ⅱ動詞(加強; 使壯大...
  • 健壯 : healthy and strong;anosia;robust:品德優秀, 體格健壯 sound in character and strong in body
  1. Umds is small, strong and expansible project

    " umds是個小、可擴展的項目。
  2. The rottweiler is a medium to large size, stalwart dog, neither heavy nor light and neither leggy nor weedy

    羅威那犬體中等偏大,身體,意志堅定,體重不宜過重或過輕,腿不宜過長,腿毛不宜濃密。
  3. In order to maintain the robustness of network security, we start our project of laboratorial chinese web documents " orientation text classifiers

    為了維護網路安全的性,因此我們提出了實驗中文web文檔傾向性分類鑒別器項目。
  4. The tamworth, a beautiful, long bodied, ginger pig and rare breed of today, is about the closest we have in looks to the tudor pig

    現在的塔姆沃思豬很漂亮,體長,,現在這種品種已經很少了,它比較接近於英國都鐸王朝時期的豬。
  5. This xml - over - http model works to decouple service interfaces by adding an open, robust, human - readable abstraction layer between them

    這種「 http上的xml 」模致力於通過在服務介面之間添加一個開放、和容易被人理解的抽象層來消除它們之間的耦合。
  6. To make a product ' s quality insensitive to the noise and improve the product ' s reliability, a percentile based optimization model for robust design is also presented by taking into account both the design objective robustness and the feasibility robustness of design constraints

    為了提高產品的抗干擾能力和可靠性,在同時考慮設計目標的性和設計約束的可行性的基礎上,建立了基於分位數的產品設計優化模
  7. None of the current still - image compression and coding standards can match all the new requirements of image processing, such as compression, roi coding, robustness, different types of still images, interactivity, security, expansion and open architecture. however, by using new techniques and depending on its new features, jpeg 2000 can address all the needs

    本文的立題意義在於利用jpeg2000具有的特性和採用的新技術,解決包括這些壓縮、 roi編碼、性、多種圖像類、交互性、安全性、可擴充性和開放性等新的圖像應用領域的不同需求。
  8. This model is very robust, flexible, and vendor - independent

    這個模非常、靈活並且是獨立於廠商的。
  9. It solves payment issue through sharing pos and brush card. it solves info sharing and exchanging problem by enterprise application integration it adopts research method of software engineering and uses touch - screen, network, database technology and so on to carry through total design of the system and build the software : it uses user status identify and responsibility control to ensure database and application program ' s security ; it strengthen the code by coding optimize ; it captures and discards application runtime error to enhance the system ' s stability ; it uses multimedia voice and moving picture to show help information, thus makes the system easy to use ; it greatly reduces the maintenance work of the system by self - updating function ; it is an opening system by using star - model network top structure, supporting standard network communication protocol ? tcp / ip and offering standard software interfaced criterion

    論文採用軟體工程的研究方法,使用觸摸屏、網路、數據庫等技術,進行了系統總體方案設計和軟體開發:通過對數據庫和應用程序的用戶身份識別和權限控制,保證數據存取和應用程序的安全性;通過對代碼進行優化提高了代碼的性;通過捕捉並拋出系統運行時的異常錯誤提高了系統的穩定性;通過多媒體語音、圖形和動畫提示幫助信息來增強系統的易用性;客戶端程序自動升級功能提高了系統的可維護性,有效地減少了維護工作量;系統採用星的網路拓撲結構,支持標準的tcp ip網路通訊協議和規范的軟體介面標準,具有良好的開放性。
  10. A ring - based architectural model of middle agents, which is based on ring - based organizational structure and token - based coordination mechanism, is proposed for promoting the robustness and scalability of the system

    為了保證系統的性和可擴展性,設計了一種環形middleagent體系結構模。這種模基於環形組織結構和令牌環協作機制。
  11. I describe the process of building the module in detail, introduce its architecture and function, and finally, i introduce the system " encrypted usb disk ", which i attend as a primary role, as an implementation of the common data security platform

    在信息保密安全平臺的建模過程中,引入了組件技術和模塊化設計方法,保證了模性、可移植性和可擴展性,為信息安全產品的開發提供了新的思路。
  12. On the foundation of analysing middleware, the paper puts forward the enterprise computing model based on j2ee and soa, and around the characteristic of haleness, high efficiency, reuse and expansibility, emphatically sets forth the design patterns, communication technique of components and the thought of container instancing component of the model

    在分析中間件技術的基礎上,提出在j2ee平臺上引入soa架構實現企業計算的模,並圍繞、高效、復用和擴展等性能,重點闡述模的設計模式、容器實例化組件的思想及組件間的通信技術。
  13. An approach to product robust design based on integrated surrogate models is proposed

    摘要提出一種基於集成替代模的產品設計方法。
  14. A new control system based on windows os for horizontal cold chamber die casting machine mode " j11280 " is designed. by analyzing the windows 9x os principle and j11280 ' s performance demand, it resolves the real - time control and device - dependence problem. using multi - thread, dll, shared - memory and activex technology enhance the efficiency and performance

    將windows操作系統引入j11280臥式冷室壓鑄機控制系統中,通過分析windows系統的運行機制和壓鑄機的性能指標,解決了控制系統的實時性和設備相關性問題,使用多線程、動態連接庫、共享內存及activex技術提高了系統的效率和性。
  15. In the end, a novel blind software watermarking scheme was proposed based on statistic distribution of instructions. it is one of the most robust software watermarking schemes

    論文提出並實現了一種新的基於代碼指令統計分佈的盲提取軟體水印方案,該方案是當前性最強的軟體水印方案之一。
  16. Compared with the lsb algorithm, the robustness of this algorithm is stronger ; compared with the echo hiding algorithm, the detection watermarking of this algorithm is easier, the calculation is simpler ; compared with the time - domain algorithm based on psychoacoustic masking, the calculation complexity is relatively low, the transparency does not rely on experience value, and the embedding amount is larger

    與lsb演算法相比,該演算法具有較強的性;與回聲演算法相比,該演算法檢測水印容易,計算簡單;與基於心理學掩蔽模時域演算法相比,該演算法計算簡單,透明性不依賴經驗值系數,且嵌入量大。基於振幅比較的數字音頻水印(機密信息)隱藏演算法。
  17. This dissertation presents a concrete deduce for factoring the 3d image - warping equation ; confirmed the correctness and robustness of id warp and reconstruction ; realizes the whole modeling procedure after sampling six depth images around the model ' s bounding box

    本文在理論上詳細推導了3dwarp等式的數學分解;實踐上系統論證了圖像一維warp變換的正確性和性;實現了采樣幾何模6個面的深度圖像后按包圍盒方式重新繪制模的具體過程。
  18. The dissertation analyzed the malicious flow behavior based on the resource control and allocation - competition. furthermore, the network resource control model for malicious flows was proposed analyze the relationships of resource allocation fairness, network robustness and network control. the characters of

    本文首次從internet網路資源控制和分配競爭的角度出發對惡意數據流的網路行為進行了理論分析,建立了網路資源控制模,並在此模下分析了網路惡意數據流對internet資源分配公平性、網路性和網路控制的影響與關系。
  19. Experiments demonstrate that neoren algorithm yields accurate results for clusters with arbitrary shapes, variable sizes, variable densities and outliers

    對典數據的測試結果表明, neoren聚類演算法能夠發現任意形狀、大小、密度的簇,對孤立點也很
分享友人