園矩 的英文怎麼說

中文拼音 [yuán]
園矩 英文
sononori
  • : 名詞1 (種蔬菜、花果、樹木的地方) an area of land for growing plants 2 (供人游覽娛樂的地方) a ...
  • : 名詞1. (畫直角或正方形、矩形用的曲尺) carpenter's square; square2. (法度; 規則) rules; regulations 3. [物理學] moment
  1. As addenda, a tennis and fives court, a shrubbery, a glass summerhouse with tropical palms, equipped in the best botanical manner a rockery with waterspray, a beehive arranged on humane principles, oval flowerbeds in rectangular grassplots set with eccentric ellipses of scarlet and chrome tulips, blue scillas, crocuses, polyanthus, sweet william, sweat pea, lily of the valley bulbs obtainable from sir james w. mackey limited wholesale and retail seed and bulb merchant and nurseryman, agent for chemical manures, 23 sackville street, upper, an orchard, kitchen garden and vinery, protected against illegal trespassers by glasstopped mural enclosures, a lumbershed with padlock for various inventoried implements

    可以增添一個網球兼手球場,一片灌木叢,用植物學上最佳辦法設置一座熱帶椰子科植物的玻璃涼亭,有噴泉裝置的假山石,按照人道的原則設計的蜂窩。在形的草坪上布置一座座橢圓形花壇,將深紅和淡黃兩色的鬱金香藍色的天蒜報春花西櫻草美洲石竹香豌豆花和歐鈐蘭都栽培成別致的卵形球根購自詹姆斯w馬凱伊爵士247的股份有限公司,他是個種籽與球根批發兼零售商,苗木培養工,化學肥料代理商,住在上薩克維爾街二十三號。果樹蔬菜和葡萄各一座。
  2. " it was from caderousse that i intended demanding shelter, and, as we never entered by the door that opened onto the road, i resolved not to break through the rule, so climbing over the garden - hedge, i crept amongst the olive and wild fig trees, and fearing that caderousse might have some guest, i entered a kind of shed in which i had often passed the night, and which was only separated from the inn by a partition, in which holes had been made in order to enable us to watch an opportunity of announcing our presence

    「我當時就是想去要求卡德魯斯給予庇護的。我們是從來不走前門的,所以我決定不破壞老規,而是翻過花的籬笆,在橄欖樹和野生的無花果樹中間爬了進去。我怕卡德魯斯那兒有別人,就躲進了一間小屋裡,我以前常常在那間小屋裡過夜,它和客棧正屋只隔著一層墻板,墻板上有洞,我們可以從洞里向里偷看,等候機會宣布我們的到來。
  3. Alice was rather doubtful whether she ought not to lie down on her face like the three gardeners, but she could not remember ever having heard of such a rule at processions ; and besides, what would be the use of a procession, thought she, if people had all to lie down upon their faces, so that they couldn t see it

    愛麗絲不知道該不該像那三個丁那樣,臉朝地的趴下,她根本不記得王室行列經過時,還有這么一個規。 「人們都臉朝下趴著,誰來看呢?這樣,這個行列有什麼用呢? 」
  4. From the viewpoint of method, the first step is to determine the available investment options or opportunity set of the locations of crude oil tankers zone involving some six representative factors such as the unit engineering expense, unit operating cost, constructing period, the location land features, unit constructing engineering amount, unit land opportunity cost. these factors stem from the economic, societal and environmental regulations and rules. the second step is to specify how to choose among these available options

    從方法上來看,首先確定以單位工程造價、單位運行成本、建設期、地形特徵、單位土建工程量、單位土地機會成本等六個綜合經濟、社會及環境指標為代表的原油罐區方案決策目標集,其次制定桃、西山、填海三個決策待選方案,然後建立基於優先關系的相對優屬度陣及各影響因素的權重集,從而進行模糊動態規劃評價,最後優選出最佳的桃方案。
  5. The quadrilateral mesh and a special kind of linear basis function is selected on the rooftop so that the treatment of the attachment of the wire antenna to the surface patch is easier than other methods reported in literatures. using the proposed method, the analyses and prediction of electro - magnetic compatibility of the electrically small conducting structure are achieved, which provides a theoretical guidance in the system level design

    在使用量法的過程中,山于在金屬物體表面運用四邊形面元進行剖分,並在面元上選擇了一種特殊的線性基函數,時在細天線和面元的連接處使用了改進了的方法,使得在處理細天線與面元電流相連接的部分較之以往文獻提到的方法更為簡單。
  6. In this paper, by studying the feature of the netflow data and the mib status of the network equipments, at the same time, in terms of analyzing the characteristics of network attack, worm spread, virus infection and network misuse behaviors, our work is based on the facts that most of the anomaly traffic in campus network has influences of the netflow data and network equipment status. an approach is present to assess the threats of the traffic in terms of five factors : the traffic bytes distribution, flow number distribution, packets number distribution, equipment cpu utilization and the memory utilization. the weight of each factor is computed and determined by fuzzy relation matrix 。 an prototype system is designed to test the method and the results are analyzed to evaluate the availability of our method

    本文研究了netflow流數據的特徵和網路設備運行狀態數據,分析了校網網路異常攻擊、蠕蟲病毒和網路濫用行為的特點,基於大多數的網路流異常必然反映在網路網路流量數據特徵的變化以及網路設備運行狀態的改變這樣一個事實,提出了一套基於網路流量和網路設備運行狀態的異常威脅評估方法,確定了5種威脅評估因素:網路流帶寬分佈、網路流數量分佈、網路流包數量分佈、網路設備cpu利用率、網路設備內存利用率,並採用模糊關系陣方法計算和分配這5種評估因素在評估函數中的權重。
分享友人