絕對系統 的英文怎麼說

中文拼音 [juéduìtǒng]
絕對系統 英文
absolute system
  • : Ⅰ動詞(斷絕) cut off; sever Ⅱ形容詞1 (完全沒有了; 窮盡; 凈盡) exhausted; used up; finished 2 ...
  • : Ⅰ動詞1 (回答) answer; reply 2 (對待; 對付) treat; cope with; counter 3 (朝; 向; 面對) be tr...
  • : 系動詞(打結; 扣) tie; fasten; do up; button up
  • : Ⅰ名詞1 (事物間連續的關系) interconnected system 2 (衣服等的筒狀部分) any tube shaped part of ...
  • 絕對 : absolute
  • 系統 : 1. (按一定關系組成的同類事物) system 2. (有條理的;有系統的) systematic
  1. To cool atoms to near absolute zero, physicists rely on systems of lasers and magnetic fields to trap atoms

    為了將原子冷卻至接近零度,物理學家倚靠的是雷射及磁場組成的來局限原子。
  2. In view of such case, small breweries should form adequate wort cooling procedures, barm expand propagation system and proper fermentation procedures, and establish microbial control monitoring system, which could realize thorough sterilization and washing of facilities and achieve aseptic production to improve beer quality

    中小型啤酒廠應建立麥汁冷卻工序、酵母擴培、發酵工序等工序和生產環節的微生物控制監測管理工藝過程及設備進行徹底清洗、滅菌,達到生產無菌,提高啤酒質量。
  3. High quality stainless pipe valve and seamless welded joint can ensure absolutely air conurbation and durability of pipe system

    高品質不銹鋼的管道閥門,無縫焊接的連介面,以保證的氣體密閉性和管道的耐用性。
  4. Operating system experiment system ( oses ) has been a old topic, but it developed slowly. so it is discommodity to go deep into study the principle of the operating system ( os ) for the learners, that most learners ca n ' t master the os

    「操作實驗」是一個較早的話題,可也是一個發展不夠充分的一項技術,這給深入學習操作的原理帶來了不便,以致大多數學習者操作理解不透。
  5. Drift angle position closed loop control system is achieved with 80c31 as controller, step motor as transact organ and absoluteness coder as measure organ. a large number of dada are obtained in all kinds space circumstance experiments

    設計和實現了以80c31作為偏流角控制器,以步進電機為執行元件,以式編碼器作為偏流角測量元件的偏流角位置閉環控制
  6. There are over 80 sets test apparatus in tech - innovation centre, including : anechoic chamber, vibration tester, vibration measurement analysis, impact instrument, constant temperature and humidity facilities. salt spary test case, circle insulation withstand voltage tester, insulation resistance tester, withstand voltage tester, electric lead tester, electrical leakage tester, earth resistance tester, chassis dynamometer, chassis dynamometer control system, high stability dc resistance tester, electrical capacity tester, temperature rise test system

    中心擁有各類分析測試儀器和試驗裝置80餘臺套,包括:消音室振動臺噪聲振動測試分析沖擊儀恆溫恆濕實驗儀鹽霧試驗箱匝間耐壓分析儀緣電阻分析儀地耐壓分析儀泄露電流測試儀地電阻測試儀測功機測功機控制高精度直流電阻測試儀電參數測試儀帶電溫升測試儀復合式三坐標測量儀萬分投影儀及電功測試分析等。
  7. They adopted a foolproof identification system

    他們採用了一種可靠的識別
  8. 17 grama a, gupta a, karypis k, kumar v. introduction to parallel computing

    在4000a上的實現獲得了較好的加速比和可擴展性。
  9. For the instrument system, we introduce effective steps and technique of screen or grounding screen that can restrain the great mass of interference

    儀表,介紹了能有效抑制大部分類型干擾的屏蔽和屏蔽接地措施和技術。
  10. The control system of furnace " s temperature has been widely used in every walk of life, as an important link of repair and manufacture of the electrical equipment such as electromotor transformer etc., soaking lacquer drying craft has some especial requests on drying crafto this article starts with the analysis of drying chamber " s configuration, analyzed its configuration limitation and control function limitation according to the factory " s situation and advances the conception of heated air drying circulation, in addition, this article adopts an intellectualize a / d module, a development sampling tuning - voltage circuit, and presents the method to measure online the insulation resistance of products in order to improve constantly products quality

    而浸漆乾燥工藝作為電機、變壓器等電氣設備的修理、製造中的重要環節之一,乾燥過程的質量要求有一定的特殊性。該文從乾燥爐的結構分析入手,聯繫到工廠的實際情況分析了結構功能缺陷和控制功能缺陷,提出了熱風循環乾燥的概念,同時,選擇了較為先進的a d板卡、熱電阻信號調理板等專業化智能卡,運用數字pid控制技術,構成了一個較有特色的計算機控制。此外,該文還從保證乾燥品質量的角度,採用智能化交流模塊和自製采樣調壓電路的方法,提出了在線檢測產修品的緣電阻的方法和手段,以確保企業產品質量不斷提高。
  11. The article points out the importance and necessity of the information - security from its actuality in our country. the resources in the information system, for instance, hardware, software, data, document, operator, meterial and so on, are evaluated and gived safety grade firstly. and then, it analyses the menace including the nonauthorized access, the information leak, the refused sevice, the internal objection which the system will take. the following are the corresponding control police : confirm the users " rights and duties, including the mode of using account, the limit of accessing resource, the application of password, the building of backup ; confirm the administrators " right and duties, including physical safety, system configuration, account configuration and usufruct, password management, audit and control, backup and individual intimity ; run - of - mill measure of security defence, including access control, symbol and identification, integrality control, password technique, firewall system, audit and resumption, safety of operating system, safety of database system, defence of computers " virus and resisting - deny protocol. in the end, the article offers the strategies of disposing the safety - accident and analyse after ithow. to report it, how to solve it in phase, and how to avoid it happening again. in a word, the article presents a holistic resolvent about keeping away the information system ' s security, and supplies a essential frame for its configuration, management and application

    然後,可能受到的威脅,包括非授權訪問、信息泄漏、拒服務和內部缺陷等進行分析,並提出了相應的控制策略:確定用戶的權力和責任,包括帳戶使用方式、資源訪問權限、口令應用以及建立備份等;確定管理員的權力和責任,包括物理安全、配置、帳戶設置及使用權限、口令管理、審計和監控、備份以及個人隱私等方面;一般性的安全防護措施:存取控制、標識和認證、完整性控制、密碼技術、防火墻、審計和恢復、操作安全、數據庫安全、計算機病毒防護和抗抵賴協議等。最後,事故處理和事後分析提供策略,如何報告安全事故,如何協調解決安全事故,如何避免安全事故再次發生。總之,本文信息安全防範工作給出一個整體的解決方案,為其在配置、管理和應用方面提供了基本的框架。
  12. The research of the inverted pendulum can come down to the research of the multi - variable and absolutely unstable system, so its control methods and ideas have comprehensive purposes to the general industry process, and the research of control methods also possess introductive significances

    倒立擺的研究可歸結為多變量不穩定的研究,因此其控制方法和思路處理一般工業過程具有廣泛的用途,其控制方法的研究也具有指導意義。
  13. The enterprise weiss r maschinenbau gmbh is well - known and engaged not only in crailsheim, but also in the specialized industries of its sphere of activity, with individual components production systems, final packing, set - up and at the same time with erecting, manufacturing and packing machines a competent partner

    是一家現代化的、可靠的專門產品供應商,這家供應商從事完成,工作效率,準、建立、安裝,裝備,良好的建築狀態,供給,首都、資金,電子束焊接,工程,工程效率,,輪胎成型、服裝批量生產,塗裝工程,從事貿易、做買賣,管式遠距離電信電路、管式遠距離輸電電路,鋼,廣告工作、廣告活動的製造、銷售。
  14. Abstract : in a induction motors fed by a pwm voltages sour ce inverter, the insulation system endures much higher stresses, so that its rel iability will be affected

    文摘:與電網供電相比,變頻器供電的異步電機承受了更高的應力,因而有必要以新的標準變頻電機的進行重新考慮。
  15. When switching the no - load overhead lines by alternating - current high - voltage circuit breaker which is a kind of daily operations in electric power system, over - voltage is probably bringed out and insulating property of the electric devices is breakdowned sometimes, especially, when occuring re - strike. the main purposes that the tests on switching line - charging current are performed in the laboratory are assessing re - strike performance of circuit - breakers. according to the test results, the design of the circuit - breaker is optimized and re - strike performance is improved

    交流高壓斷路器是電力中最關鍵最重要的設備之一,斷路器開合空載架空線路是電力中常見的操作,操作過程中通常會出現過電壓,緣造成威脅,嚴重時會破壞緣性能,發生事故,隨著電力電壓等級的提高、輸電線路不斷延長及傳輸容量的增大,由操作過電壓引起的緣閃絡、設備破壞事故的幾率更加突出。
  16. In this paper, the effect of the increased stresses i s discussed

    分析了變頻驅動電機的影響。
  17. Absolute system deviation

    絕對系統偏差
  18. Finally, our system is analyzed and evaluated in a " syn flood " environment, and a method of applying clustering to anomaly detection is added to improve its performance

    最後,本文模型應用於網路拒服務攻擊環境的實例進行了分析,並提出了一種應用聚類分析的改進方法。
  19. Exterior threats include the malicious code, denial of service, stealing and juggling data during transmission ; internal threats include privacy leakage, illegal access and modification. all these threats must be solved during the system construction

    外部威脅包括數據在傳輸中可能被竊取和篡改,惡意代碼,和拒服務( dos ) ;內部威脅包括了代碼的竊取和修改,員工有意和無意的訪問、修改一些他們沒有權限訪問的數據。
  20. Modify your applications to either revoke or deny execute permission on system objects

    請修改應用程序,撤消或拒絕對系統象的execute權限。
分享友人