漏模式 的英文怎麼說

中文拼音 [lóushì]
漏模式 英文
pumpleak modell
  • : Ⅰ動詞1 (從孔或縫中滴下、透出或掉出) leak; drip 2 (泄漏) divulge; disclose; leak 3 (遺漏) le...
  • : 模名詞1. (模子) mould; pattern; matrix 2. (姓氏) a surname
  • : 名詞1 (樣式) type; style 2 (格式) pattern; form 3 (儀式; 典禮) ceremony; ritual 4 (自然科...
  • 模式 : model; mode; pattern; type; schema
  1. It is an important part of modern enterprise management, and is the core of the construction enterprises. in order to survive in intensive competition, some construction enterprises establish a more apposite cost system called target cost management ( tcm ) for cost control

    但從實行目標成本管理的效果來看,仍然存在著許多疏和弊端,因此有必要對目標成本管理、步驟、環節及方法進行更為深入、細致地探討。
  2. Fsmail adopts and implements the asynchronous event driven mechanism, with all those network i / o operations in the server working under the non - blocking style ; accomplishes object - oriented heap with the dynamic array, adapted to any type of data ; adopts the multi - queue scheduling mechanism based on a fsm, easily to fulfill the extentions of delivery funtions ; fulfills the non - blocking domain name resolvement mechanism and the caching of the resolved results ; implements the non - blocking user database management and the caching of the user data recently accessed ; uses the unified memory pool management, avoiding the memory leakage and improving the performance of the fsmail server ; lastly, implements the log management server based on the c / s mode, eliminating the inconsistency of the logging metadata and being adapted to any kind of application logging

    Fsmail採用並實現了異步事件驅動機制,所有網路i o的實現使用了非阻塞方;以動態數組實現了基於面向對象的堆隊列,屏蔽了堆數據的非一致性;使用了基於有限狀態機的多隊列郵件調度機制,為后續版本的擴展性提供了良好的介面機制;服務器內部實現了非阻塞的域名解析機制,並實現域名地址緩存;實現了非阻塞的用戶數據庫管理塊,並實現用戶數據緩存;使用了統一的內存池管理機制,既防止了內存泄,又提高了服務器的性能;最後,還實現了基於c s的日誌管理服務器,屏蔽了日誌數據元的非一致性。
  3. Chartists fall prey to their own behavioural flaw, finding “ confirmation ” of patterns everywhere, as if they were reading clouds in their coffee futures

    圖表分析師成為自身行為洞的犧牲品:他們四處尋找對的「證實」 ,就好像他們從所持的咖啡期貨中看出的花樣。
  4. The new study points out that the 20 - year - old model for spider " ballooning " which assumed that spider silk is rigid and straight and spiders just hang at the bottom was flawed when applied in moving, turbulent air

    新發現指出20年前提出的「氣球」有洞,特別是把它運用到蜘蛛遇到流動的,不穩定的氣流的情況下。 「氣球」假設蜘蛛絲是又硬又直的,而蜘蛛則吊在絲網的末端。
  5. The government should be aware of the problems confronting singapore s esplanade, such as water leakage through the canopy glass, cleaning difficulties, excessive air - conditioning costs, strong draughts at the piazzas during typhoons, and the heavy construction cost of the canopy. there is a possibility that hong kong may be burdened by the same problems. foster s design will make the facility inflexible

    政府應留意新加坡濱海藝術中心( esplanade )的情況,包括天篷玻璃會水、清潔困難、空調昂貴、臺風會令露天廣場成為風口、天篷的建築成本昂貴,將成為香港人的負擔、 foster的設計令場館缺乏彈性,以及管理不詳等問題,引以為鑒。
  6. Based on the picture processing technology, the vision technology, and the pattern recognition technology, this program helps detect unqualified foamed mask packaging products made of aluminum - plastics, like those with omission assemblage, fragments, and foreign bodies

    以圖像處理技術為基礎,結合視覺技術、識別技術來檢測出裝、碎片、異物等不合格鋁塑泡罩包裝產品。
  7. In order to resolve the problem of low accuracy, computing overhead and the high false negative probability that the current detection technology suffered, the protocol misuage detection becomes one of the research fields in the development of network intrusion detection

    針對基於匹配方法的誤用檢測技術存在的檢測率低、計算量大和高報率等問題,使用協議分析方法實現異常檢測技術成了網路入侵檢測的重要研究方向。
  8. Moreover, a novel algorithm is presented with the ability of checking whether a nonself pattern is a hole or not

    另外論文還提出了一個演算法,用於直接判斷某個nonself是否為檢測洞。
  9. Using the mm5 model to conduct investigation of numerical simulation for this case, it was basically possessed of a capability to reproduce the genesis, development and evolution of the large - scale and mesoscale weather systems

    本文以mm5擬分析「雅安天」為代表,著重研究了不同邊界層參數化方案對雨量中心強度、雨區分佈的影響以及雅安暴雨時的緯向垂直環流結構。
  10. According to the facts of chemical spill accidents in waterway transport, systematic analysis is made on the suitable dispersion models and source strength calculation models of multiple spilled substance, resource and environment respectively, so as to decide the poison and fire & explosion danger area of an accident through the way of dispersion simulation. to resolve the problem to the calculation of spill amount from tanks, calculation formulas on various types of tanks were worked out ; at the same time, research is carried out on the source strength calculation of mixtures with regard to the possible spillage of chemical mixture in waterway transport. for the sake of convenient application, a computer software for the simulation of dangerous area is developed which can provide great assistance to the decision - making of emergency response and reach the target of reducing the damage of the life, property and environment to the smallest degree

    根據水運化學品泄事故的具體實際,針對各種泄物質、泄源和環境條件研究了各自適用的擴散和源強計算型,以便通過擴散擬確定事故的毒害和火災爆炸危險區域;為解決儲罐泄量計算困難的實際問題,推導了適用各型儲罐、液艙的泄量計算公;針對化學品水路儲運泄事故中泄物質可能會以混合物形存在的情況,探討了混合物的蒸氣釋放源強計算;為方便實用,開發了蒸氣擴散危險區域擬計算機軟體,從而為事故應急決策提供了有力的輔助支持,以達到盡可能減少人員傷亡和財產損失,減輕環境污染的目標。
  11. And then this text made the countermeasures of building credit risk management system : the first, good credit culture should be formed to build the cultural foundation of risk management of credit ; secondly, the structure of risk management should be improved to block up the loopholes of current risk supervision mode ; besides, credit collection system should be built as the guarantee because credit measure models needing accurate reliable datum ; most important, to achieve the revolution of credit risk management, credit risk models should be set up ; finally, chinese commercial banks need took measures to manage credit risks, including the adoption of asset securitization and credit derivative securities

    最後是打造信用風險工程化管理體系的對策部分:首先是要構建良好的信用文化,打造信用風險管理的文化基礎;其次要構建全面的風險管理,完善信用流程監控洞;同時,度量型需要準確可靠的數據來源,因此需要完善的徵信體系作為保障;最重要的,是建立先進的信用風險型,實現信用風險量化管理的革命;最後還需要引入多樣的風險轉移手段,疏通信用風險緩釋渠道。
  12. The thesis, in the probability analysis and computation, considers the failure history of space frames and trusses, adopts the bound criterion and algorithms on the base of system ' s critical strength, and introduces the soft self - adaptation control bound into the identification of dominant failure modes ; at the same time, with the incremental load method and differential equalized recursive method, computes the limit - state function of failure mode and probability index precisely under no leaking the dominant failure modes

    文中在可靠性分析和計算部分,考慮空間剛桁架結構系統的失效演化歷程,採用基於系統臨界強度的約界準則和約界演算法,將柔性自適應控制邊界引入失效識別過程;同時,用荷載增量法和微分等價遞歸演算法相結合,確保在嚴格不遺主要失效的情況下,快速準確地求解失效的極限狀態方程和可靠度指標。
  13. The rcd has three failure modes the reject - operation, the wrong - operation and the malfunction of handle. the reliability check should consider this characteristic and these failure modes. the success ratio r and the failure ratio a are applied as reliability criterion of rcd

    首先,針對電保護器不頻繁動作的保護電器的工作特點以及發生拒動、誤動故障及操作故障三類故障的失效,採用保護成功率r和失效率作為可靠性特徵量,並給出了可靠性特徵量的估計方法。
  14. Measures for further developing concrete mix design were presented based on above work. for example, adopts pfca as an index in designing durability of concrete, uses mortar slump flow test to select cements and water - reducers and to measure saturation dosage of water - reducer in mortar and then determine optimum dosage of it in concrete, uses bar - slump test to determine stability and fluidity of fresh concrete, and consequently, the workability of high fluidity and high stability concrete such as pumped or self - compacting concrete can be designed by adopting proper cfvm determined in terms of rheological properties of designed mortar measured with cone - based rheometer

    如採用粗集料破碎率作為耐久性設計的一個指標;採用砂漿坍落擴展度試驗選擇水泥和減水劑,確定砂漿中減水劑的飽和摻量,並通過上述數學計算混凝土中減水劑的飽和摻量,以此為參照確定最佳摻量;採用障礙坍落度試驗確混凝土的穩定性和流動性,結合由砂漿流變儀測定的砂漿流變性能確定合理的砂漿填充系數,從而實現對高流動性高穩定性要求的混凝土(如泵送和免振自密實等)的工作性設計。
  15. In present methods of track - to - tack correlation, the false and lost track - to - track correlation have not been taken into account in the complex background with dense targets. so two kinds of methods are proposed to deal with this problem, one of which is the correlation algorithm based on fuzzy synthetic decision and d - s evidence theory, another is based on k - nearest neighbor ( k - nn ) principle and d - s evidence theory. the two methods combine the logic of fuzzy decision and strictness of statistical classification with intelligence of evidential theory successfully

    目前的航跡關聯方法在密集目標環境下,航跡錯關聯概率和關聯概率較大,針對這一問題,本文利用d - s證據理論,提出了基於糊綜合決策的d - s航跡關聯方法和基於k近領域的d - s航跡關聯方法,兩種方法成功地將糊決策的邏輯性和統計分類的嚴密性與證據理論的智能特性相結合,擬結果說明了兩種方法的有效性和實用性。
  16. Artifical neural networks are employed for defect accurate recognition and calculation, the traditional bp neural network and wavelet basis function neural networks can successfully predict or estimate defect shape and geometry parameters, their application to the magnetic flux leakage inspection is put forward at first

    將神經網路識別方法應用到缺陷磁檢測中來,提出了用bp網路和小波神經網路對缺陷進行定量識別,精度高、效果好。
  17. The pattern recognition method of pipe mfl signals is put forward, the features of signals are extracted from the recorded flux leakage response and characterizing definition is introduced as well ; the main - part analysis, nonlinear regression, statistical methods are studied and used to establish characterization and compensation algorithms, the quantitative estimation of defect geometry and the result accuracy are accepted

    引入了缺陷磁信號的識別方法,提出了缺陷磁場及缺陷外形尺寸的特徵量;實現了用主成分分析、多元非線性回歸和統計識別分析等方法對缺陷磁信號波形進行特徵提取和定量識別,精度在誤差準許范圍內。
  18. This study utilized the eclectic research framework integrating model - building and case study logics with the art of political analysis methodology, constantly going back and forth between historical description and reviewing analysis with continuing dialogue between theoretical and empirical studies, for the purpose of fulfilling two objectives of this study : on the one hand, systematically explaining the details of this whole decision - making process ; on the other hand, trying to build and verify a conceptual model for understanding the general decision - making process of american trade policies

    為達到此二目標,本研究首先從類似的貿易法及貿易政策決策過程的文獻進行探討,發現解釋力仍然不足;故再從更根本的思想源頭著手,對貿易/政經理論、決策理論、意識型態/態度和貿易政策的互動關系進行有系統的文獻探討;然後再在這些研究結晶的基礎上,提出本論文的整體觀念及測驗性假設,試圖完全填補至今仍存的解釋洞。
  19. The one dimension lyapunov exponent mode of boiler tube leak prediction is confirmed

    確定了爐管泄預報的一維lyapunov指數
  20. The vulnerability results because of a flaw in the multiple unc uniform naming convention provider, which is a network file system resource locator that runs in kernel - mode memory in windows

    該安全洞是因為多個unc (統一命名約定)提供程序( mup )中存在缺陷所致,其中mup是在windows內核內存中運行的網路文件系統資源定位器。
分享友人