未構造的 的英文怎麼說

中文拼音 [wèigòuzàode]
未構造的 英文
unconstructed
  • : Ⅰ副詞1 (沒) did not; have not 2 (不) not Ⅱ名詞1 (地支的第八位) the eighth of the twelve ear...
  • : Ⅰ動詞1 (構造; 組合) construct; form; compose 2 (結成) fabricate; make up 3 (建造; 架屋) bui...
  • : Ⅰ動詞1 (做; 製作) make; build; create; produce 2 (假編) cook up; fabricate; concoct 3 [書面語...
  • : 4次方是 The fourth power of 2 is direction
  • 構造 : structure; construction; constructional detail; tectonic; structural; makeup; anatomy; constituti...
  1. The true dimensions of a divine creativity would be unendurable for any one consciousness of whatever import , and so that splendor is infinitely dimensionalized ( most intensely throughout ) , worlds spiraling outward with each " " moment " " of a cosmic breath ; with the separation of worlds a necessity ; and with individual and mass comprehension always growing at such a rate that all that is multiplies itself at microseconds , building both pasts and futures and other time scales you do not recognize

    一個神聖真正維度對任何一個無論何種意義意識而言,都是無法忍受,這種壯麗是無限維度化(強烈到遍布一切) ,這同樣是意識無法忍受,這些世界隨著宇宙呼吸每一『瞬間』向外盤旋;因為它們相互分離是一種需要;因為個人和大眾內涵總是以如此速率增長,以致於一切全有每一微秒都在增殖它自身,建過去和來,以及你們並不知曉其他時間量度。
  2. Then, we can compare the current action pattern with the pattern in the pattern database to find out the known or unknown misuse intrusions and anomaly intrusions. the system model is extensible for adding new intrusion detection agents or new intrusion models. it adopts data mining technology to cut down the dependency of manual encoding and expert experience

    這些模式可用來指導系統屬性選擇和,挖掘生成出有用系統或者用戶行為模式(正常或者異常) ;通過比較當前系統行為模式和已有模式規則相似度來發現已知或者誤用入侵和異常入侵活動。
  3. Some existing topology - unaware collective operations algorithms do n ' t make use of the information about network topology. firstly, these approaches construct a model of network topology and make use of a set of parameters to describe the communication characteristics of a network model, then build the optimal trees based parameter values and their models to realize collective communication

    現有一些知拓撲型集合通信演算法,並不利用網路拓撲結信息,都是首先對網路模型化,並且用各種參數來描述該模型中網路通信特點,然後基於此模型和其參數值為集合通信操作最優樹來實現集合通信。
  4. Recently, when a. dmitrienko ( 2000 ) [ 5 ] constructed the sequential confidence regions for maximum likelihood estimates, they put forward a new asymptotic property : bounded cost of ignorance, that is lim ( en ( d ) - n ( d ) ) <. it ' s an asymptotic property which is worthy of consideration

    最近, a . dmitrienko ( 2000 )在極大似然估計序貫置信區域時,提出了一個新漸近性質:知代價有界性( boundedcostofignorance ) ,即這是一個很值得考慮漸近性質。
  5. Danger in criminal law, as a basic theoretical issue in normative criminal law, always attracts enough attentions from the native and foreign scholars, different theories about it are massive and disagree with each other. the phenomenon reflects that the issue is profound and the criminal theories are abundant and extensive. but the related theories are so complicated and confusing as to make troubles and confusions to judicial practice, and the condition is disadvantage to construct and develop the criminal subject

    本文通過對危險概念相關分類分析,提出了「理論推定危險? ?規范性危險」這一分類,並且在這一分類框架之下,對遂犯危險、抽象危險犯危險與具體危險犯危險內容與判斷做了簡要分析,提出了自己觀點。
  6. E ) lack of foresight on finance lease scheme, which causes irrational tenor structure and imbalanced annual outflow of rental payments, results in funding costly. to solve aforesaid problems, thesis finds out the following principles for optimizing ca ' s aircraft finance : a ) determining the volume and currencies of ca ' s cross - border aircraft finance based on the annual outflow of foreign debt repayments and annual net inflow of foreign exchange, so are the dominated currencies in debt. b ) enlarging the portion of borrowings at floating interest rate in ca ' s whole foreign debt

    針對以上存在主要問題,本文進一步提出了優化飛機融資總體想,包括:根據其每年外匯流入總量及幣種成確定國航合理飛機境外融資規模應與負債幣種;在利率結方面,擴大浮動利率在整個國航外債中比重,選擇適當時機將部分固定利率貸款轉換為浮動利率貸款;在飛機引進多元化方面,通過與飛機製廠商、出租公司飛機互換方式優化機隊成,結合提前中止現有飛機租賃就能夠起到優化債務結和機隊事半功倍效果,以及在來飛機融資中優先使用經營性租賃等。
  7. From the constructor s point of view, the uninitialized object is argument 0 and the other arguments passed to newobj follow in order

    函數角度,初始化對象是參數0並且被傳遞到newobj其他參數遵循一定順序。
  8. Centering on this theme, this paper lays out its discussion in the following five aspects ; 1. the raising of the value chain concept in this part of the paper, combining historical sight with the reality of the then usa, analysis is made on the background for the raising of the value chain concept. in the so - called most developed free market economy country usa, enterprises were subjected to the strict control of the government

    為了使圍繞價值鏈和其戰略基礎研究和目標更加明確,有必要或應當將另一積極活躍價值管理領域理論和方法融入價值鏈研究之中,為此本文特辟專章簡述了該領域經濟增加值(即eva )概念以及它會計和財務簡明計算方法: eva =稅后凈經營利潤-佔用資本資本成本率、期望來eva現值= npv 。
  9. The fourth part concerns the construction of the news law. here, the writer advances some proposals with regard to the general principles, sub - principles and the supplementary articles of the news law in future china, and finishes his designing the frame of the news legislation from the law theories to the concrete law norms

    最後,在中國新聞法部分,筆者提出了有關來中國新聞法總則、分則、附則等具體內容建議,並在此完成了自我設計從法學理論到具體法律規范中國新聞立法框架。
  10. You can argue that the most compelling applications for p2p have yet to be invented, and if jxta ended up with policy - or implementation - specific details embedded into its fundamental infrastructure layer, such undreamt - of applications might never work with the platform

    您可以爭辯說, p2p最引人注目應用程序尚開發,那麼如果jxta把特定於策略或實現細節嵌入其基礎層后就完事話,那麼這些尚想像到應用程序就可能永遠不會和這個平臺一起工作。
  11. Forecasts of future continental motion developed slowly as offshoots of the theory of plate tectonics, which won acceptance in the 1960s and 1970s, shattering old dogmas of continental immobility

    預測來大陸塊動態,漸漸發展成地板分支,在1960和1970年代成為定論,並粉碎大陸塊靜止不動舊說。
  12. Tracking differentiator approaches for solving optimization problems and finding roots of algebraic equations

    利用跟蹤微分器知函數尋優器及求根器
  13. Abstract : the associated gas in the west end of the ziliujing structure has been mined for several years, but it is necessary to exploit further

    文摘:自流井西端鹽鹵伴生氣已開采多年,氣源並枯竭,仍有進一步挖潛、勘探、開發必要。
  14. Using these dates, the study develops a supply - demand analysis system ( consists of cobb - douglas production function modek nerlovian supply response model and double log demand function model ) to point out all the important factors affecting the supply and demand of japonica rice in china and the extent of influence respectively, especially the paper analyzed the trade status and international competitiveness of japonica rice thoroughly under the framework of china ' s joining to the wto, and according to the analysis of development trend and natura1. economic and social factors of influencing japonica rice industry, predicts the development of japonica rice industry in 2005 and 2010, brings forward some of strategies and suggestions for the future development of japonica rice industry

    以這些數據為基礎了我國粳稻(米)供求分析系統(該系統由c - d生產函數模型、 nerlovian供給反應模型和雙對數需求函數模型三大模型成) ,以此來揭示影響我國粳稻(米)供求各種重要因素以及各因素影響程度,特別是在wto框架下,比較全面、深入地分析我國粳米貿易態勢和國際競爭力問題,同時根據當前我國粳稻產業發展態勢以及對影響粳稻產業發展自然、經濟和社會等各重要因素進行分析,據此預測我國粳稻產業在2005年和2010年發展情況,並對我國粳稻產業來發展提出相應對策和建議。
  15. We can apply these digital tenor models to solve problems confronted during deposit exploration. those models can help study shape, scale and distribution of different ore bodies in the deposit area, reveal the relationship between tectonics of the deposit area and copper deposit realization, they can also offer some information for deposit exploration and laneway digging

    應用數字品位模型( dtm )可以形象直觀地反映礦區銅元素分佈規律及不同礦體產狀、規模;展示礦區與銅元素礦化關系;可以為礦山開采和巷道開拓提供重要參考資料;還可以由已知推知,為礦區外圍找礦提供輔助性信息。
  16. The latter had never been underdrawn : its entire anatomy lay bare to an inquiring eye, except where a frame of wood laden with oatcakes and clusters of legs of beef, mutton, and ham, concealed it

    櫥櫃從上過漆它整個任憑人去研究。只是有一處,被擺滿了麥餅牛羊腿和火腿之類木架遮蓋住了。
  17. In this paper, chroma dc coefficients are selected as the carrier data because chroma dc coefficients are robust. also, alterable steps are used to select one part of the coefficients, so the watermark is imperceptible ; before watermark embedding, the watermark is divided into many parts, every part is individually embedded into one gop of the video, even if a gop is destroyed, the watermark can be extracted correctly, this methods promotes the robustness of the watermark ; in addition, in order to promote the security of the watermark, the user ' s id and password are used to generate chaos sequence by the chaos system which is created in this paper, later, watermark is mixed by the chaos sequence. also, the embedding position of the watermark bit is modified by one chaos sequence, so, unauthorized person can not extract or remove the watermark, since the embedding position is unknown

    本文認為,色度dc系數是魯棒性非常好參數,因而選擇色度dc系數作為水印信息載體,同時,採用可變步長選擇部分系數,保證了水印隱形性;在嵌入水印時,本文採用水印信息「網格劃分」 、各子塊獨立嵌入視頻方案,由於水印信息子塊是相對獨立嵌入視頻中每一相對獨立圖組當中,即使某一圖組收到一定破壞,也能夠恢復水印信息,使水印健壯性得到提高;此外,為了提高水印信息安全性,在嵌入水印信息時,根據用戶輸入id號和密碼,利用本文混沌系統產生混沌序列對水印信息進行變換,同時,對每一水印信息比特嵌入位置也採用了偽隨機序列進行調整,這樣,授權用戶不能提取水印信息,也難以擦除其中水印信息,因為嵌入位置是
  18. Based on fourth - order cumulant, a computationally efficient method for joint estimating both directions of arrival and ranges of near field sources with known carrier frequency is firstly presented. the proposed algorithm need not any spectral peak searching and the 2 - d parameters are automatically paired. lt is suitable for arbitrary additive gaussian noise environment. in the following section, a 3 - d esprit method for jointly estimating of frequencies, doa ' s and ranges of multiple near - field sources with unknown carrier frequencies is proposed. the parameters estimation are given by the eigenvalues of different matrices. furthermore, its performances are confirmed by several computer simulations

    利用四階累積量,第五章首先給出了一種載頻已知情況下基於近場源距離和波達方向聯合估計演算法,通過陣列輸出信號四階累量矩陣使空間信號到達方向和距離估計無需譜峰搜索,且參數自動配對,適合於任意高斯噪聲環境。進一步在第三節提出了一種載頻情況下多個近場窄帶信號源doa 、距離和頻率聯合估計3 - desprit演算法。
  19. There are 2 exploratory wells in the area, shi - 1 and lh - 11 - 1, among which, oil and gas shows were found in the at the 1st, 2nd and 3rd intervals of shahejie formation, lower tertiary in shi - 1 well

    其中,位於仙鶴時1井已居沙一、二和沙三段見到良好油氣顯示,但見工業性油氣流。
  20. Abstract : the development regularities of bedding slipping structures in yueliangtian mine by analysis of their forms and features. in the light of geomechanics theory the formation mechanisms of bedding slipping structures and related structures are analyzed. their influence to mine s safety and operation is explained through some actual examples. the virgin area of the mine is predicted

    文摘:通過觀察月亮田礦層滑表現形式及特徵,歸納了其發育規律;從地質力學角度分析了該礦井層滑及其他相關形成機理;利用實例說明了層滑對礦井安全和生產影響;並對該礦開采區域進行了預測。
分享友人