模式原型 的英文怎麼說
中文拼音 [móshìyuánxíng]
模式原型
英文
pattern prototype-
This thesis firstly introduces new demands of aerial product logistics support under high - tech war and some defects of traditional logistics support, and puts forward a kind of system model of aerial product logistics support following data - sharing of cals, and emphasizes detm. secondly it sets forth application of step and xml in the ietm, researchs conversion of xml schema and relation schema, and simply researchs mapping of xml and express. afterword, a based - xml framework of info - transfer between different platform are presented, according to this framework, the author establish a archetypal system of helicopter information query system based xml and dbms
本文首先介紹了現代高科技戰爭條件下對航空產品維修保障的新要求,概述了傳統的後勤保障技術的不足,遵循cals的數據共享的理念,提出了航空產品維修保障系統模型,重點研究了互動式電子技術手冊;接著分析了step標準和xml技術在製作互動式電子技術手冊中的應用,重點研究了肌模式和關系模式之間的相互轉換,初步研究了xml和express語言之間的映射關系;然後,提出了基於xml的一種解決航空產品信息跨平臺傳遞的解決方案,給出了該方案的具體實現流程和詳細的通訊協議,並開發了基於xul和數據庫的某型號直升飛機的信息查詢原型系統。My project is to research and devise a enterprise scm software system, that based the two grades and four libraries ( department development library, department controlled library, department development library, enterprise controlled library, enterprise product library ), and use the jbcm which was devised by the beijing beida software engineering co., ltd. as the antitype. we call it cmis
本課題就是以中國電子科技集團公司第十研究所為需求方,以北大軟體配置管理工具軟體jbcm為原型,進行二次開發,研製一套基於兩級四庫(即部門開發庫、部門受控庫、企業受控庫和企業產品庫)模式下的企業級軟體配置管理系統( cmis ) 。This archetypal human holds keys to group evolution
這一原型模式維系著群體進化的鑰匙。It determines what soul level archetypal pattern we will have
它決定我們會擁有的靈魂級別原型模式。The author considers the legal system of intellectual property right is opening so that the domain name should be included as a kind of independent right. in the following parts of the essay, the author explores the fundamental causes of conflict and re - classifies the types of conflict between domain name and trademark, reanalyzes the similarity and the difference between domain name and trademark, makes comparison between the three major domain name dispute resolutions that have already been provided ( udrp, acpa and the domain name disputes solution of china ), it can provide ground for an effective method for solution. at last, the thesis baldly points out that it should stand an independent legal status in ip law
故,筆者欲突破在商標及商標法框架下研究域名的思維定勢,重新審視域名法律地位、分析其法律屬性;以域名與商標沖突為典型,研究導致沖突的原因;從平等中立的角度,以貫穿經典案例的方法重新劃分沖突分類:以橫向比較分析的研究方法評介全球具有代表性的沖突解決方案和我國新的域名政策以及司法解釋,為正確提出解決方案建立基礎;探討域名爭議解決的主要原則,分析域名在我國的立法模式;最後,筆者將在全文分析的基礎上,嘗試提出域名權利問題,以期能從根本上尋求解決域名的法律保護以及沖突的公平解決的合理機制。Stability of rock slopes is generally controlled by the structure of rock masses, especially the soft structure surfaces. analysis of rock mass structures is a key to establish geological models and numerical simulation and a foundation to assess the stability of rock slopes. the weak structure surfaces are mainly bedding planes, faults, joints, schistosity plane and contact zones of intrusive bodies. since they are different in genesis and scale, the rock masses are different in features and mechanical intensities. based on the combination of rock structure bodies, 15 basic modes of deformation and failure of rock slope are systematically summarized. the deformation and failure of rock masses actually result from the recombination and rearrangement of these rock bodies. there are 11 types of rock mass structures and various deformation and failure of bank slopes are present in the reservoir area of the three gorge project
巖體結構,特別是軟弱結構面對基巖斜坡變形與破壞具有顯著的控製作用,巖體結構模式分析是建立斜坡地質模型和數學模型的關鍵和評價斜坡穩定性的基礎。巖層層面斷裂構造節理裂隙片理與劈理以及侵入體和圍巖的接觸帶等是控制基巖斜坡穩定的軟弱結構面,這些成因不同大小不一的結構面將巖體分割成性質各異力學強度不均的各種巖體結構體,構成了15種基巖斜坡變形破壞的巖體結構基本模式。不同結構體的重新組合與排列是斜坡失穩的內在原因。Based on the principle of advance, adaptive, reliability, high efficiency and flexibility, the general configuration strategy and the key technology has been deeply analyzed and optimized with the systematic and community in general and adaptive and contraposition in detail. the harmonic in both respects has been realized technically and the contradiction between adaptive and community solved. with the synthetic developing tool based on the database, the capp system called synthetic development capp ( sd - capp ) which is of the properties of synthetic, modular redeveloped and integrated has been developed
本論文以提高系統的先進性和實用性以及高效,靈活為基本原則,對capp的總體構成策略及其關鍵技術進行了深入地分析和優化,宏觀上充分體現系統性和通用性,微觀上切實體現針對性和適應性,技術上實現二者的協調統一,較好地處理了適應性與通用性這對既相互關聯、又相互制約的矛盾;採用基於數據庫的綜合開發工具模式,研究並開發了綜合式、模塊化、具有二次開發和一定集成功能的capp系統? ?基於數據庫的典型零件capp綜合開發系統( syntheticdevelopmentcapp ) ( sd - capp ) 。We first present a number of desiderata for an xml - based query language, and based on this criterion, we introduce the syntax of a simple core ian - guage for semistructured data and then describe four extensions that have resulted in working prototypes. second, we present the algorithm for computing the result of a regular expression on data graph with cycles, the first - order interpretation of querying language for semistructured data, and explore structural recursion and bisimulation in semistructured data and propose an efficient and systematic way to computing a bisimulation between the two graphs. we also proposed and implemented a web querying system with database features
基於這些準則,對一個簡單的半結構數據查詢核心語言的語法提出了兩方面擴充;給出了計算數據圖中正規表達式的演算法;對半結構數據查詢語言的一階邏輯描述、結構遞歸和數據圖的雙態模擬( bisimulation )等問題進行了研究,提出了一種判定數據圖的bisimulation演算法;在xml數據查詢語言研究的基礎上,設計並實現了一種具有數據庫查詢特性的web查詢系統原型。The materials in this study were arabidopsis thaliana. ( wt ) and its mutants including ethylene over producer mutant ( eto1 - 1 ), ethylene insensitive root mutant ( eir1 - 1 ) and ethylene insensitive mutant ( etr1 - 3 ). from the phenotypes of 12 - d - old seedlings of arabidopsis wt and mutants, the root gravitropism was obviously enhanced in etol - 1, but diminished in eir1 - 1 and etr1 - 3, compared with wt. the shoot negative gravitropism was also diminished in etiolated seedlings of etr1 - 3
以擬南芥的eth過量產生型突變體( etol - 1 ) ,根對eth不敏感型突變體( eirl - 1 ,地上部對eth響應) , eth不敏感型突變體( etrl - 3 ,地上部和根均對eth不敏感)及其野生型( wt , columbia生態型)為實驗材料,利用根的向重力性反應為模式,分析了其中eth對auxin效應的調控及其原因。In the future development, exceeding to reach a company will follow the principle of " way of thinking innovation, mode innovation, management innovation, development innovation ", make people the center, overall, moderate and can keep on of development, actively walk new technique road, let the innovation accompany with the whole processeses of business enterprise development. pay attention to exertive brand advantage in the production the management, excellent turn industrial structure and product structure, with the decision, courage of " phoenix nie pan, bath fire rebirth " and the taste, intelligence of the globalization practical change growth way, at the realm realization of the two greatest industries of the manufacturing industry and servicing business cross over type development, move loudly ten thousand matter benefits is more brilliant with glorious new movement
在未來的發展中,邁達公司將遵循「思路創新模式創新管理創新發展創新」的原則,以人為本,全面協調可持續的發展,積極走新型技術道路,讓創新伴隨著企業發展的全過程。在生產經營中注重發揮品牌優勢,優化產業結構和產品結構,以「鳳凰涅?浴火重生」的決心勇氣和全球化的眼光智慧切實轉變增長方式,在製造業和服務業兩大產業領域實現跨越式發展,奏響萬事利更加燦爛和輝煌的新樂章。On the basis of introducing the principle of the tf / ar radar, this paper analyzes the conditions of effectively jamming the tf / ar radar in typical tactical act of hedgehopping, which include the disposition and quantity of electron reconnaissance / jammer, calculates the capability request of equipments in the method of sensor / hand - emplaced jammer, and concludes that it is difficult to jam tf / ar radar at the present time
摘要在介紹地形跟隨迴避雷達工作原理的基礎上,通過設定典型超低空突防飛機的戰術行動,分析了對雷達實施有效干擾所必須具備的條件,包括偵察干擾機的部署、數量要求等;並計算了在傳感器擺放(投擲)式干擾機模式下對裝備的性能要求,得出了在目前技術條件下,對地形跟隨迴避雷達實施干擾在技術和戰術上都是困難的。The paper discussed the following four points : the security of java, the implemention of mvc pattern and the principle and implemention of the send and incept of e - mail based on java ; the principles and implemention of smtp, pop3 and imap, and the characteristic of the e - mail server sendmail, qmail and postfix ; the principles and implemention of symmetrical encryption and unsymmetrical encryption technology, and the advantages and disadvantages of them ; the characteristic of rubbish e - mail, and the principles and implemention of anti - rubbish e - mail technology
本文研究的主要內容包括: java技術安全性, java對mvc模式的實現,以及java技術解決電子郵件發送和接收問題的原理和實現方法;電子郵件相關協議smtp , pop3和imap的原理和實現方法,以及電子郵件服務器sendmail 、 qmail和postfix的特點;對稱加密與非對稱加密技術的原理和實現方法,以及兩者的優點和缺點;典型垃圾郵件的特徵,以及反垃圾郵件技術的原理和實現方法。During its realization, the system needs to establish a general isomerous distributed platform, which founded on objectified distributed middleware, java - ejb mode, for realizing the oo prototype system. the system offered the description of objects " inheriting relationship and leading one. the modules " being put into use validated the methods brought in this thesis
本系統用對象化分佈中間件java - ejb模式建立了通用的異構分佈平臺,實現了面向對象的原型系統;給出了系統中對象的繼承和引用關系描述;並通過多個模塊的投入使用驗證了本文所提出方法的有效性。Net education is playing an important role in modern instruction as an new education pattern. but education resource measuring up net education is seriously scarce because there is idea of yearning for quick success and instant benefit and the juvenility development of education function, this is a jar problem of limiting development of net education. net course have many shortcoming and insufficient as important part of net resource
網路教學作為一種新型教育模式,在現代教學中正發揮著巨大的作用。但由於社會上存在著急功近利的思想,由於網路的教育功能發展還不夠成熟等原因,致使用於網路教學的合格教學資源不足,這幾乎成了制約網路教學發展的瓶頸問題。網路課程作為教學資源的重要組成部分同樣存在著很多的缺點和不足。26 pacitti e, simon e. update propagation strategies to improve freshness in lazy master replicated databases. vldb journal, 2000, 8 : 305 - 318. 27 ladin r, liskov b, shrira l, ghemawat s. providing high availability using lazy replication
最後,我們在我們的pdms原型系統上進行了大量的模擬實驗,實驗結果表明2dcma在數據一致性維護方面比mork的演算法性能要好並且在定義一致性維護方面, 2dcma演算法比集中式視圖維護演算法的性能要好。In addition, by the deep introduction of antitrust guideline for the licensing of intellectual property issued by the u s department of justice and the federal trade commission and several business review letters on mpeg and dvd pools issued by the antitrust division of u s department of justice, the disquisition provides the basic principles for operation of the patent pool, such as the inclusion rule, voluntary rule and bona fide rule, as well as many specific legal characteristics of the patent pools
同時通過對美國司法部與聯邦貿易委員會發布的知識產權許可的反壟斷指南以及美國司法部反壟斷司針對mpegla和dvdpool兩個專利池組織發布的商務復核意見的深入分析,總結了專利池許可模式,尤其是為推行標準設立的大型開放型專利池許可模式在運作中所應遵守的包容性,自願性以及誠實信用原則以及若干具體的法律特徵。In this thesis, based on pershing ii surface to surface missile, a new kind of ballistic missile was designed with an additional rocket engine, which can be ignited twice. firstly, aerodynamic computational models of missile body and warhead which reentry with supersonic are built according to the task requirements ; secondly, the propulsion system model of missile is built whose first two stages are solid rocket engines and the third stage is liquid - solid combined rocket engine. the nozzle and the shape of the engine are designed to meet the needs of the populsion project ; thirdly, the trajectory model of the mass point is built and a wavy trajectory is designed & optimized ; finally, the ability of a missile ' s breaking through defence is analyzed
以美國潘興導彈為原型,增加可兩次點火的末級發動機,改裝成具有跳躍能力的地地彈道導彈;首先,根據任務需求,建立了導彈的氣動模型,並建立了彈頭再入時高超聲速氣動模型;其次,建立了導彈推進系統模型,前兩級採用了固體火箭發動機,第三級採用了固?液組合火箭發動機,並在總體方案要求下,對發動機噴管和外形進行了設計;第三部分,建立了導彈質點彈道模型,設計了一條跳躍式彈道,並對跳躍式彈道進行了優化設計;最後,對導彈進行了突防能力分析,從分析的結果可以看出,跳躍式彈道的突防能力比常規的拋物線彈道要強。In this paper, the numerical harbor should include following contents : 1. database of wave field, tidal current field, sediment field in researched area ; 2. database of ship styles. 3. numerical model used to analysis data. 4. plans of outer dike, utilities of sea line, and selections of waterway, which based on the above databases
本文認為,對于港區而言,數值化的內容應包括以下幾個方面: ( l )所研究港區的波浪場、潮流場及泥沙場等自然條件數據庫的建立; ( 2 )船型數據庫的建立; ( 3 )數值分析模式的建立; ( 4 )提出建立在自然條件基礎之上的外堤布置、碼頭岸線利用策略及航道的擬定方案(即優化模式的建立) ; ( 5 )按照經濟最優原理快速準確地提出碼頭裝卸的策略及當前方案。2. pseudo - static force testing of twelve full - scale connections, including top - seat angle connections, two web flange and top - seat connections, extended - end - plate connections, slit - t steel connections and dog - bone connections are carried out for the first time in our country
2首次在國內大規模地進行了頂底角鋼連接、帶雙腹板頂底角鋼連接、外伸端板連接以及短t型鋼連接等半剛性連接以及狗骨式剛性連接這五種連接類型共十二個原型試件的擬靜力試驗。Then the advantages and the disadvantages of current intrusion detection system were studied. in numerous intrusion methods, the attack from the bounce host is more difficult to defend. this paper aims at this kind of attack method, proposes a framework model of a distributed - ids based on soft agents and builds a prototype on this model
在眾多入侵方式中,通過跳板主機發起的入侵攻擊是一種較難防範的攻擊方法,本文針對這種攻擊方式,利用agent的移動性和自主性優勢,提出了一個基於軟體agent的分散式入侵檢測系統構架,並針對該構架進行了建模與原型實踐。分享友人