典型系統 的英文怎麼說

中文拼音 [diǎnxíngtǒng]
典型系統 英文
canonic system
  • : Ⅰ名詞1 (標準; 法則) standard; law; canon2 (典範性書籍) standard work of scholarship 3 (典故...
  • : 系動詞(打結; 扣) tie; fasten; do up; button up
  • : Ⅰ名詞1 (事物間連續的關系) interconnected system 2 (衣服等的筒狀部分) any tube shaped part of ...
  • 典型 : 1 (在同類中最具有代表性的人或事) typical case; typical example; model; type; specimen 2 (具有...
  • 系統 : 1. (按一定關系組成的同類事物) system 2. (有條理的;有系統的) systematic
  1. The results showed as follows : ( 1 ) 6 traits are correlative with genomic factors according to analysis of population genetics and comparison of the coherence of twins. ( 2 ) the hereditary mode of rolling tongue or pointed tongue was the dominant heredity of single gene of autosome, and the can - rolling type or can - pointed type was the dominant character

    本文首次從群體遺傳學、家分析、譜分析及雙生子分析多個角度並結合多種相關數理計方法,對6項人類學特徵的遺傳方式進行了探討,初步確定了各項特徵的遺傳方式,評價了各特徵的遺傳與環境的相對重要性。
  2. The interface and concrete operations of the prototype system and results of machining features recognition are illustrated by examples, in which there is a typical shaft, a 2. 5d part without conicoid and a 2. 5d part with conicoid

    分別以一個的軸類零件,一個不具有二次曲面的2 . 5維零件,以及一個具有二次曲面的2 . 5維零件為例,介紹了原的界面和加工特徵識別的具體過程及識別的最終結果。
  3. Some typical schemes are implemented via this data structure ( loop subdivision, catmull - clark subdivision, do - sabin subdivision, hybrid subdivision, adaptive subdivision ). the technique of opengl is utilized to accomplish some basic operations, such as rotation, zoom, pan, pick and so on. finally the algorithms studied by our research group are integrated, and a prototype system based on subdivision surface is developed

    ( 4 )改進了適合於曲面細分的的翼邊數據結構,並實現了的細分演算法( loop細分、 catmullclark細分、 doo - sabin細分、混合細分、自適應細分) ;採用opengl技術實現了旋轉、縮放、平移、拾取等圖形的基本幾何操作;最後將本課題組研究成果加以集成,開發了一個基於細分曲面的原
  4. Then the different behaviors between fixed series capacitor and tcsc are compared aiming at ssr, when they are individually applied to typical model of ieee second benchmark on subsynchronous resonance

    繼而以ieeesecondbenchmarkonsubsynchronousresonance為例,比較了固定電容串補與可控串聯補償在模中針對同步發電機次同步振蕩這一行為所造成的差異表現。
  5. Classic erm system demo version help

    精簡終端連線說明
  6. Through describing some typical systems, we analyze models and structures widely adopted by most of current distributed intrusion detection systems ( dids )

    本文首先通過對一些典型系統的描述,分析了目前分散式入侵檢測所廣泛採用的結構模
  7. The paper introduces two typical structures of bas system in urban rail transit, that is, the independent system structure and integrated system structure, analyzing through comparison the features, virtues and defects of the two systems and the conditions that permit to adopt these two systems

    摘要介紹城軌交通中環境與設備監控( bas )的典型系統結構,包括獨立結構和集成結構;通過對比,分析結構的特點、利弊和採用條件。
  8. According to the statistical meaning of system failure and the property of order statistics, failure probability models are developed for serial system, parallel system and k - out - of - n ( f ) redundant system without any assumption such as " independent system "

    文中以典型系統形式為背景,根據失效的計學意義以及次序計量的性質,應用次序計量,建立具有普適性(不需要作獨立失效假設)的串聯、並聯及表決的失效概率模
  9. 4 ) based on the above architecture introduced in this thesis, two key parts of the multi - sensor multi - target tracking system of c3i systems, which are data relation and identification, are discussed in details

    4 )基於本論文構造的框架,深入分析現代c3i數據融合的典型系統? ?多傳感器多目標跟蹤中的兩個關鍵環節? ?數據關聯和目標識別的演算法實現。
  10. The order of our discussions " about these tasks is as follows : firstly, we pay more attention to the characteristics and difficulties of its environment including the concept, typical system model, main challenges, mobile network connection and soft application. secondly, according to mobile specialties of the environment we make the sort of data into four kinds : general data, time series, spatial data and time - spatial data, and present general processing of data mining. lastly, we discuss the methods of data mining of these four kinds respectively : after the introduction of the actuality of data mining of every kind, an algorithm of rule updating based on rough set is given, then put forward the processing of data related to mobile users and flow chat according to characteristics of the other three kinds

    本文對以上任務的討論順序安排如下:首先是對移動計算環境的技術特點和難點進行討論,包括移動計算的概念和典型系統、主要挑戰、移動聯網以及軟體應用這幾個大的方面;其次根據移動環境的移動特性把移動計算環境中的數據分為普通數據,時間數據,空間數據以及時空數據,提出了在移動計算環境中數據挖掘的一般流程;接下來分別對這四類數據進行挖掘演算法的討論:每一部分都是先介紹該類數據的挖掘方法研究現狀,對于普通數據,針對我們已提出的一種挖掘演算法-粗糙集演算法( rs ) ,提出了對應的規則更新演算法,對於後三種數據,本人根據其在移動計算環境中的特點分別提出了與移動用戶相關的該類數據的一種具體的處理方法和演算法流程圖,包括基於移位連接方法的多屬性時間序列的挖掘演算法,基於apriori演算法的空間關聯規則數據挖掘方法以及關于移動用戶移動模式的時空數據挖掘方法,並用matlab對其中的規則更新演算法和時間序列的挖掘演算法這兩方面進行了實例模擬。
  11. Firstly, this thesis gives a brief historical retrospect of the development of dve. then based on the analysis of current typical dve systems and the future requirements of dve, this thesis proposes building a web - based distributed virtual environment ( wdve ). the target of wove is to create a real virtual space, a cyberspace, which is a single simulation environment inhabited by millions and consisting of various virtual environments on the internet

    本文首先簡要回顧分散式虛擬環境的發展歷史,然後根據其未來發展的技術需求,在分析現有典型系統的基礎上,提出建立一個基於web的分散式虛擬環境( web - baseddistributedvirtualenvironment , wdve ) ,並指出wdve的最終目標是要在internet上建立一個可以容納成千上萬用戶的、面向多種領域的模擬環境,以實現網上的虛擬世界,即賽伯空間( cyberspace ) 。
  12. The old control system mainly using - and - now ca n ' t meet the high and complicated requirements of modern ship to control its boiler. it is imperative under the situation to use computer for ship control area. and the remarkable plc used currently by industry process control area is the most reliable, simple and convention way to realize computer control on board modern ship. the paper introduce simply the basic principle of plc and the characteristic of simens plc s5 - 115u and a typical boiler system of huge oil tank. on this base, the paper pay more attention to making control programme of s5 - 115u for huge marine fuel oil boiler. and pid control method is singly adopted for water level control and steam pressure control of the fuel oil boiler

    以繼電? ?接觸器為主的老一代控制已不能滿足現代船舶對其鍋爐控制的越來越高、越來越復雜的要求,這一領域的計算機化已勢由必行,而應用在當前工業過程式控制制領域中引入注目的可編程序控制器( plc )又是使其計算機化的最簡便和可靠途徑。本文主要介紹可編程序控制器( plc )的基本工作原理、德國西門子可編程序控制器s5 - 115u和大油輪鍋爐的典型系統,在此基礎上對用西門子s5 - 115u控制大船舶燃油鍋爐進行了編程。
  13. The main works of this paper are : 1. typical systematic effects due to geometry change are well known. the external flow field of the automobile model was simulated to find out how it reacted to the aerodynamics characteristic, when the foreside geometry of automobile body changed

    本文主要工作如下: 1 、根據幾何尺寸對典型系統的影響,改變汽車車頭外形的基本尺寸,將不同外形尺寸參數下的模在虛擬流場中進行外流場的數值模擬,分析其對氣動性能的影響,得到最基本的外形概念。
  14. The mechanism that induction motor losing stability can lead to voltage stability is confirmed by the analysis results of typical system and multi - machine system

    典型系統和多機下的研究結果都表明,感應電動機的失穩可能導致電壓崩潰。
  15. The sib of differential - algebra equation ( dae ) can be interpreted as one mechanism of transient voltage unstable or voltage collapse, and this mechanism is illustrated under multi - machine system. moreover, the algorithm for search sib point under multi - machine system is proposed. the study of dae model and its singularity - perturbed model shows that they are different in essence

    微分-代數方程下的奇異誘導分岔可作為暫態電壓崩潰的一種機理解釋,在典型系統中詳細地分析了該機理,並在多機中構造出相應的算例,此外還提出了在多機中計算奇異誘導分岔點的演算法設想。
  16. Mixed h2 h controller design based on standard h parametrizing controllers

    控制的典型系統及其反饋控制器設計
  17. Compared with some typical systems, the results of channel capacity analysis of mimo channel are given

    根據其數學模,分析了mimo的通道容量,並與一些典型系統進行了對比。
  18. Look at the whole picture, collect attackers ’ information widely, get a comprehensive knowledge of attackers ’ target 、 method 、 exploit 、 propagation, etc. firstly, it introduces several popular network security tools based on honeypots

    從全局著眼,廣泛搜集攻擊樣本,對攻擊的對象、手段、代碼及傳播等等信息作一個全面地了解。首先,本文介紹了國內外流行的幾種利用蜜罐作為網路安全工具的典型系統
  19. Beside, many software applications also need administrator privileges to run properly without conflicts, as they are designed to write to system locations during normal operation, and computer in locked - down state in which users operate in standard user mode severely limits user productivity

    然而,在很多情況下,管理員的權限需要由最終用戶執行某些任務,如安裝或更新節目和演出的典型系統級的任務。
  20. In the first section of paper, it analyzes condition of network security at present, studies technologies of ids ( anomaly - based and misused - based ) and introduces criterion and classification of ids, gives examples of each representative systems and their merits and shortcomings

    本論文主要陳述了當前網路安全的現狀和各種攻擊方式。介紹入侵檢測的標準及分類,分析了其採用的技術(基於異常和基於誤用) ,介紹了各自的典型系統和優缺點。
分享友人