虛數的虛構的 的英文怎麼說
中文拼音 [xūshǔdexūgòude]
虛數的虛構的
英文
imaginary-
Fist of all, on the basis of the research of agone boffins, this author investigates the interaction mechanism of bolts and rock, and introduces the elastic ? lastic analytical resolution which is consist of the liner structure, the equivalent reinforced wall rock and the original wall rock in the simple loading from the equivalent well - proportioned view ; this solution is very important meaning for the engineering design. on the basis of coulomb friction model, the author introduces the finite element equation of the contact problem in order to provide the academic foundation for the application of msc. marc. finally, combining the engineering practice of the non - linear analysis of shield tunnel through yellow river of the south - north water transfer and using the model of friction, the author researched the evolution law of stress and displacement field in the structure of grouted rock bolts, and analyzed the effect to the stress and deformation of surrounding rock mass due to anchor supports
首先,在前人研究成果的基礎上,對錨桿與圍巖的相互作用機理進行研究,利用全長錨固錨桿的中性點理論,從等效均化的角度來考慮錨桿對圍巖的加固作用,並推導了在簡單荷載作用下,含有襯砌、等效加固后的圍巖、原始圍巖三者的彈塑性解析解,對工程設計有著重要的參考意義;在數值模擬方面,以考慮錨固圍巖滿足規則化庫侖摩擦模型為基礎,利用虛功原理推導了接觸問題的有限元方程的計算格式,為開發運用大型商用有限元軟體msc . marc提供了理論根據,也形成了本文的理論基礎:最後,論文以南水北調東線穿黃隧洞穩定性分析項目為工程實例,利用本文所述的接觸問題的摩擦模型理論,對錨桿支護結構的應力場、位移場的變化規律進行了研究,分析了加錨支護對隧洞圍巖應力、變形的影響。Sequentially, the author discussed the technologies of medical image 3d visualization according to the clinical applications. with the development of computer, 3d visualization and computer graphics, the 3d visualization of medical images has progressed from fourier transform and convolve inverse projection to mpr ( multi - planar reformation, mpr ) and mtp ( maximum intensity projection, mtp ), nowadays, the real 3d reconstruction method, surface and volume rendering has risen. the image registering, image segmentation, pixel data set construction and 3d special interpolation are the key technologies in medical images 3d reconstruction
隨著計算機技術、三維可視化理論和計算機圖形學的發展,醫學圖像的三維可視化技術也從傅立葉變換、卷積反投影等基本圖像處理演算法,發展到真正的三維重建演算法:面繪制和體繪制;醫學圖像的三維可視化技術的應用也從三維醫學成像發展到虛擬內窺鏡,以及今天的虛擬可視化人體研究;而圖像的配準、圖像分割、體數據集的構建、三維空間插值則是醫學圖像三維可視化實現過程中的關鍵技術環節。Until now, when climate modellers began to run one of their models on a computer, they would “ seed ” it by feeding in a plausible, but invented, set of values for its parameters
目前為止,當氣候模型學家在計算機上運行他們的模型之一時,他們會通過為模序的參數設置一組可行但是虛構的數值來給這個模型「播種」 。Finally, according to the requirement that the transparent data must be exchanged interactively on space - flight and aerial distributed experiment and measurement system, the method that the distributed experiment and measurement system with the middle component of virtual shared memory is introduced, and its software wraps based on fast ethernet, rpc and broadcasting data are developed. according to the character of multi - task and high real - time in ivems, the technique of management, fault tolerance and the synchrony of multi - line are discussed detailedly
在此基礎上針對航天、航空產品的分散式試驗與測試系統對透明數據交互的需求,採用虛擬共享內存中件構造分散式試驗與測試系統的方法,參與設計了虛擬共享內存中件,並獨立完成了基於快速以太網、 rpc和udp廣播數據的虛擬共享內存中件的通訊技術設計與實現。The thesis made a useful attempt on modeling and simulation of vmt, and upbuilded a platform to train the nc machine tool operator
本文就虛擬機床的幾何建模和運動模擬作了一些有益的嘗試,基本構造出了一個用於數控培訓的模擬平臺。A digital automatic ultrasonic inspection system designation is introduced. this system was developed with pc computer and embedded dsp, combining computer software and hardware, ultrasonic nondestructive testing, digital signal processing, embedded rtos and visual instruments technology. it meet the requirements of automatic inspection such as high repetitively frequency and real time alertation
該方案以pc機和dsp系統為核心構成主從機系統框架,以基於虛擬儀器思想的pc機應用程序和基於dsp的嵌入式實時操作系統構成雙重軟體結構,把傳統的超聲波無損檢測技術和先進的虛擬儀器技術、數字信號處理技術、嵌入式實時操作系統、計算機介面通信技術相結合,從而滿足了自動化探傷中1k / s的重復頻率和實時報警的要求。After the briefly present the origin and features of internet protocol version 6 ( ipv6 ), the paper detailedly introduced the conception, characters, security technologies of vpn, and main tunnel protocols used to implement and deploy vpns. after analyzing and comparing these technologies of realizing vpns, we choosed ipsec. then, the paper analyzed in the ipsec structure, function, work mode, and its components such as authentication header ( ah ), encapsulating security payload ( esp ), internet key exchange ( ike ), encryption and authentication algorithms, security association, security policy, and how they cooperate with each other in order to secure ip packages
在簡要介紹ipv6協議的由來和優點之後,詳細闡述了虛擬專用網的概念、特點、安全技術及實現的關鍵隧道協議,通過對實現技術的分析比較,選用了安全性強大的ipsec隧道技術,接著深入研究了ipv6安全協議ipsec的體系結構、操作模式,詳細論述了ipsec協議簇的各個組成部分,如認證報頭ah協議、封裝安全載荷esp協議、密鑰管理ike協議、加密認證演算法、安全聯盟和安全策略等,以及這些組件之間如何協作,來共同實現對網路層ip數據包的安全保護。They are expanding model of the bomb body, bursting model of the bomb body and motion model of the fragments. according to the models, the paper gives a detailed algorithm for the whole process of the bomb explosion. ( 7 ) based on the explosion mechanism and the stochastic characteristic of the shell, the paper advances some reasonable hypotheses and supposes that the explosion process of the shell is a markov process, thus constitutes two explosion models of the shell : the imitation model an
(刀從爆炸的機理出發,利用合理的假設,將殼體的爆炸過程處理為馬爾可夫過程,把爆炸的機理同爆炸的隨機性聯系在一起,建立了殼體爆炸的兩種模型:模擬模型和簡化模型,提出了破裂程度的倍密度函數和破裂方向的倍密度函數兩個概念,得到了基於半邊結構的虛擬殼體爆炸過程中任一條邊出現裂縫的概率公式。Most people recognize the fact that he was a historical figure, but there are some who think he is mythological. even though there is more evidence for the existence of the life of jesus christ then there is of caesar augustus. some people feel, still think he s just a myth
有人認為?是一位老師,大多數人承認?是一位歷史人物,不過也有人認為?是虛構的即使證明耶穌基督存在的證據,比證明凱撒大帝活過的證據還要多,仍有人認為?只是神話。This article is divided into four parts : part one emphasizes the common theory that corporate governance structure figures out the agent problems caused by the separation of ownership and control power, and sets forth correlative research done by domestic and foreign scholars from the relationship between centralization degree of ownership and performance, the relationship between incentive of senior managers and performance, and the relationship between board and performance. and puts forward some deficiencies in domestic research, for example, the select of performance is bald ; most research methods are cross section analysis, there is little research basing on both time serial and cross section datum ; and there is little research have the inside and outside corporate governance factors in the selection of corporate governance structure indexes
描述性分析介紹了我國上市公司治理結構的現狀;通過公司治理變量的線性組合,採用主元分析法來構造反映公司治理水平的指標z ,並由此z指標回歸經營績效指標得出公司經營績效與公司治理的整體效果有相同方向變化的結論;變量之間的相關關系揭示了這些變量之間關系的合理信息;面板數據結果顯示:第一大股東持股比例、國有控股虛擬變量與經營績效負相關;第二至第十大股東股權集中度、董事會持股比例和總經理持股比例與經營績效正相關。In wormhole meshes, a reliable routing is supposed to be deadlock - free and fault - tolerant. many routing algorithms are able to tolerate a large number of faults enclosed by rectangular blocks or special convex, none of them, however, is capable of handling two convex fault regions with distance two by using only two virtual networks
在應用蟲孔路由的mesh結構的多處理機系統中,已經有許多基於維數序的容錯的路由演算法被提出,其中大多數路由演算法只能容忍矩型或凸型的故障節點組成的區域,但是,至今還沒有一個演算法能應用兩個虛擬通道處理凸型convex故障區域距離大於和等於2的情況。This paper employs the dynamic - static force principle to simplify the mathematical models, and employs the virtual - displacement principle and adopts the sor digital algorism to extract the dynamical performances. the solutions extracted is coincidental with the practical situations
本論文應用了達朗貝爾原理簡化數學模型,並應用虛位移原理和sor迭代法求解機構的動力特性,求得的模擬曲線與實際情況比較吻合。The advanced aviation and aerospace test and simulation systemrequest high quality of transparent data communication. a new plan to apply the virtual sharing memory middleware to build the distributed simulation platform is proposed and the form, function, hierarchic structure, and method of realization are described ; how to build the distributed simulation platform using the virtual sharing memory middleware is introduced
針對航空、航天分佈試驗與模擬系統對透明數據交互的需求,提出了應用虛擬共享內存中件構造分佈模擬平臺的方案,描述了虛擬共享內存中件的組成、功能、層次化結構與實現方式,介紹了應用虛擬共享內存中件構造分佈模擬平臺的方法。It ' s well known that the project documentations " storage and management have an very important effect on the development of all kinds of project, and as the information age is coming, network technology has been applied to this procedure gradually. this article mainly introduces the study and realization of a internet - based project documentation storage and management system which application programming frame is built with delphi6. 0 and sql server2000. based on the tcp / ip protocol, the system try to establish a c / s model with connection - oriented, dependable stream sockets and multithread technology to complete some especial data communications by networks, such as the files of project, directory of user, all self - defined commands or messages and their parameters, and so on
本文所研究的《基於internet的項目文檔存儲管理系統》通過delphi6 . 0和visualc + + 6 . 0相結合的開發平臺,結合sqlserver2000 ,將client server模式的數據庫技術和windowssocket網路通信技術進行集成,遵循tcp ip協議,同樣採用c s結構運行於internet ,通過服務器將處于各個不同物理位置的客戶機連接起來,形成一個交流平臺;其中,引入了目前國際上流行的先進的安全管理控制方法? ?角色控制理論對用戶進行權限分配,使擁有相應角色的人具有相應權限;然後系統自動根據組織部門或用戶的設立在服務器端生成相應的網路「虛擬文件櫃」 ,使擁有相應權限的人可以對相應文件櫃中的文檔進行整理;再通過多線程技術和windows套接字通信機制在tcp ip協議上實現了單個文件及目錄的傳輸。2. virtual technology in this section, firstly, introduce virtual instrument development and analyze the main principles in tractor testing projects ( including shaft mass, left - and - right side trigging forces, smoke density, noise and velocity ). secondly, propose a general design combined multifunction data acquisition devices ( daq ) with lab view diagram language
( 2 )虛擬儀器技術介紹了虛擬儀器的發展特點,分析了拖拉機主要的檢測項目(軸重、左右制動力、煙度、噪聲、速度)的檢測原理和手段,提出一套基於多功能數據採集卡daq和圖形化編程語言labview的虛擬儀器構建方案。The main argument of this text includes : 1. the crime of contract swindling refers to such conduct in which the actor, with the purpose of illegal possession and no sincerity of fulfilling contract at all, swindles the other party ' s relatively large amount of money and property by way of fabricating subject, false assure, false perform, going into hiding or other fraudulent means during the course of signing or fulfilling acontract
本文的主要論點包括: 1 、合同詐騙罪是指以非法佔有為目的,根本沒有履行合同的誠意,在簽訂、履行合同過程中,採取虛構主體、虛假擔保、虛假履行、逃匿或者其他欺騙手段,騙取對方當事人財物,數額較大的行為。A flight trajectory math model of an assumed cruise aircraft is built according to a simple blue print of the flight control system, with the foundation of a particular analysis of its kinematics and dynamics. a linear light - disturbed minor - cycled movement model and the transform function models are got through some simplifications
本文以某個虛構的巡航式飛行器的飛行控制系統為研究對象,首先討論了一個簡單的總體方案,然後根據此方案,在詳細分析此飛行器運動學與動力學的基礎上,建立了飛行器飛行模擬數學模型,並在允許的條件下進行簡化得出了此飛行器線性化小擾動短周期運動模型與傳遞函數模擬模型。Then according to the characteristic of computer processing, after study the typical modeling method on regular objects and irregular objects, the algorithm based on half edge data structure is posed and implemented on pc
然後又根據計算機處理的特點,在研究了規則形體和不規則形體的典型建模方法之後,形成了基於半邊數據結構的虛擬戰場中爆炸效應生成與顯示的演算法,並在微型計算機上加以實現。In order to discuss potential solutions to these challenges, we ll describe a fictitious scenario and focus on how to resolve certain issues with data and processing centers in a distributed environment
為了討論對這些挑戰的可能解決方案,我們要描述一個虛構的場景,並將重點放到如何用分散式環境中的數據和處理中心解決特定的問題。The use of multimedia technology and multi - data structure, and the development of virtual reality and network technologies make the contents of electronic atlas more abundant and vivid, the representation form more flexible and versatile
多媒體技術和多維數據結構的應用,虛擬現實技術和網路技術的發展,使得電子地圖集的內容更加豐富生動,表現形式更加靈活多樣。分享友人