散列圖解 的英文怎麼說

中文拼音 [sǎnlièjiě]
散列圖解 英文
scatter diagram
  • : 散動詞1. (由聚集而分離) break up; disperse 2. (散布) distribute; disseminate; give out 3. (排除) dispel; let out
  • : Ⅰ動1 (排列) arrange; form a line; line up 2 (安排到某類事物之中) list; enter in a list Ⅱ名詞1...
  • : Ⅰ名詞1 (繪畫表現出的形象; 圖畫) picture; chart; drawing; map 2 (計劃) plan; scheme; attempt 3...
  • : 解動詞(解送) send under guard
  1. In addition to the provisions set forth in the preceding paragraph, general armistices normally contain a number of political and military stipulations concerning such matters as the evacuation of territory ; disposition of aircraft and shipping ; cooperation in the punishment of war crimes ; restitution of captured or looted property ; communications facilities and public utilities ;. civil administration ; displaced persons ; and the dissolution of organizations which may subvert public order

    除前述條款外,為維持公共秩序,全盤休戰協議通常包括一系與戰區撤退、飛機與船艦之處置、對戰犯的懲罰、擄獲物或劫掠財產之賠償、通訊設備與公共設施、民政治理、離人員重新安置,和破壞公共秩序之組織等有關的政治與軍事條款。
  2. The agent of kdc according to the picture and individual character information which users input, the base key of producing automatically, make the conversation every side produce the self - same main key, has solved the problem of key distribute ingeniously. and it utilize irreversible hash function produce session key realize one - time key. the thesis has also analysed the application of different situations that the agent of kdc among the conversation modes in many ways

    本文提出的個性化kdc代理根據用戶輸入的片和個性信息,自動產生基密鑰,分別運用公開密鑰系統進行交換,使通話各方各自產生完全相同的主密鑰,巧妙地決了密鑰分配和加密密同步的問題,並利用單向函數的性質,基於相同的演算法產生用於加密密的一次一密會話密鑰。
  3. Most of these standards are based on the method of inter - frame motion compensation and two - dimensional discrete cosine transform ( 2d - dct ) and encode and describe the color video in ycbcr 4 : 2 : 0 format, which want to take advantage of human visual system ( hvs ) to save bit expense by decreasing the resolution of two color difference components

    當前國際上的壓縮標準普遍採用幀間運動補償加幀內二維離餘弦變換的編碼方法,並且將彩色視頻序表示為ycbcr格式,試利用人眼的視覺特性降低對色差信號的析度來節省比特開銷。
  4. In this paper, we analyzed the modulation of the interference intensity of each pixel on the time sequence speckle patterns in the time domain and proposed a new phase retrieve method, time sequence phase method ( tspm ), in which the time sequence speckle interferograms are used to obtain the whole field deformation of the object

    本論文通過對序上各點在時間軸上斑強度調制函數的變化進行分析,提出了一種基於時間序斑干涉場的相位調方法,進而獲得物體全場變形信息。
  5. Discussing the structure of the data management system lor train diagram, and proposing a web - based distributed application settlement scheme which bring convenience to the users

    車運行數據管理系統採用的體系結構進行了討論。並提出了基於動態web的分式應用決方案,使系統的使用更加靈活方便。
  6. In the above example, a simple hashmap or binary search tree could have easily solved the problem, but implementing one of these data structures in xsl would be inconvenient and unnecessary

    在上面的示例中,如果使用一個簡單的( hashmap )或二進制搜索樹就可以輕易地決問題,但是用xsl實現一個這樣的數據結構並不是很方便,並且是不必要的。
  7. The main research contents are as follovvs : after the analyzing of the process of making train diagram, according with its character, and take into account the trend of innovation, chooses the total solution based on the b / s architecture, 3 - tier operation distributed and 2 - tier data distributed to separate the data from operation and simplify the development and maintenance ; the e - r data model that is accord with the 3nf criterion is designed after analyzing the data structure of the train diagram system. emphasis on the permission security of the distributed system, take the view schema, coupled with the login authentication and permissions validation, to ensure the data accessing domination, and take the synchronization, error control, and restore capability to advance the data security ; on the basis of b / s solution architecture, after comparing the existing transportation technologies, b - isdn and adsl is selected as the major solution architecture based on the package - svvitched networks. furthermore, error control, firewall, and encryption techniques are introduced to prevent the hacker attack and ensure the networks safety

    論文的主要研究內容包括:對目前我國車運行管理體制和編制流程進行詳細分析,根據其「幾上幾下」的特點,並結合未來「網運分離」體制改革的變化預測,選擇採用與之相適應的基於b s體系架構、三層業務分佈、二層數據分佈的整體方案,實現業務與數據的分離,降低開發與應用過程的復雜度和總體成本;對車運行系統的數據信息進行分析,設計符合3nf規范的數據e - r關系模型,並著重研究處于分式系統中的車運行數據信息的訪問權限和數據安全問題,提出以視模式結合用戶識別權限審定實現數據權限劃分,以並發處理、容錯技術、恢復技術提高系統的數據安全性;在基於b s架構的系統整體方案基礎上,對當前多種數據傳輸技術進行分析比較,採用b - isdn為主幹網、 adsl為接入端的基於公用數據網路分組交換技術的系統網路體系結構,並針對網路自身安全性和黑客攻擊與侵入問題,詳細討論綜合採用差錯控制、防火墻、數據加密密等技術手段提高系統的網路安全性能。
  8. 1. 8mm wide, 12mm long made fom nickel silver case with open bottom for solding mechanism easy to assemble tasted with 30, 000 movements

    裝彈弓推板系,寬度1 . 8mm ,高鎳白銅材料說明
  9. 2. 0mm wide, 12mm long made fom nickel silver case with open bottom for solding mechanism easy to assemble tasted with 30, 000 movements

    裝彈弓推板系,寬度2 . 0mm ,高鎳白銅材料說明
  10. 2. 6mm wide, 12mm long made fom nickel silver case with open bottom for solding mechanism easy to assemble tasted with 30, 000 movements

    裝彈弓推板系,寬度2 . 6mm ,高鎳白銅材料說明
分享友人