虛構層 的英文怎麼說

中文拼音 [gòucéng]
虛構層 英文
fictitious layer
  • : Ⅰ名詞1 (空虛) void; emptiness 2 (政治思想等方面的道理) guiding principles; theory 3 (二十八...
  • : Ⅰ動詞1 (構造; 組合) construct; form; compose 2 (結成) fabricate; make up 3 (建造; 架屋) bui...
  • : i 量詞1 (用於重疊、積累的東西 如樓層、階層、地層) storey; tier; stratum 2 (用於可以分項分步的...
  • 虛構 : fabricate; make up; fiction
  1. The rights mechanism of enterprises changes from the absent ownership and degressive sense of responsibility to the dir ect accreditation and intendance of owners, and the structure of property rights optimizes

    企業從一個所有權代理且置、責任意識遞減的權利機制,轉變為由所有者直接委派並監督的權利機制,企業的產權結因而得到優化。
  2. The second part analyze the direct causes of enron ' s abrupt collapse and probes into the set up of special purpose entities of hiding debts and counterfeit increase of income and profits, which received wide criticism from the investors, and the relevant transactions which caused the financial crisis of the company and resulted in the sharp shrink of its stock price and degradation of credit to junk bond

    內容涉及被投資者普遍指責的用於隱藏債務、增收入及利潤的特殊目的實體的搭建,以及觸發安然公司債務危機並由此導致其股價巨幅縮水、信用等級被降至垃圾級的關聯交易。第三部分從安然的發展戰略、企業文化、公司治理結等方面分析安然失敗的深次原因。
  3. Lucubrating opening layered architecture of virtual manufacturing

    擬製造開放式次化體系結的研究
  4. After the briefly present the origin and features of internet protocol version 6 ( ipv6 ), the paper detailedly introduced the conception, characters, security technologies of vpn, and main tunnel protocols used to implement and deploy vpns. after analyzing and comparing these technologies of realizing vpns, we choosed ipsec. then, the paper analyzed in the ipsec structure, function, work mode, and its components such as authentication header ( ah ), encapsulating security payload ( esp ), internet key exchange ( ike ), encryption and authentication algorithms, security association, security policy, and how they cooperate with each other in order to secure ip packages

    在簡要介紹ipv6協議的由來和優點之後,詳細闡述了擬專用網的概念、特點、安全技術及實現的關鍵隧道協議,通過對實現技術的分析比較,選用了安全性強大的ipsec隧道技術,接著深入研究了ipv6安全協議ipsec的體系結、操作模式,詳細論述了ipsec協議簇的各個組成部分,如認證報頭ah協議、封裝安全載荷esp協議、密鑰管理ike協議、加密認證演算法、安全聯盟和安全策略等,以及這些組件之間如何協作,來共同實現對網路ip數據包的安全保護。
  5. The capsulation and extension of the functions form a virtual machine environment, programmes running on which appear to be the same as they do on a single pc, also, the difference between api interfaces in different commercial operating systems is masked, as well as meeting the transparence demands of operating system, and enhancing the transplantable ability of the applied programmes in the upper layer to a great extent

    這些封裝及功能擴展,成了一個擬機環境,程序如同運行在pc機上一樣。這就屏蔽了底商用操作系統api之間的差異,就滿足了rsp之上的應用對操作系統透明性的需求,很大程度上增強了應用(也稱業務)軟體的可移植性。
  6. At a relatively high level of abstraction, an ecf chart may extend to well over fifty event nodes ; many investigations produce ecf charts that contain over one thousand events and conditions

    在相對性的高階中,造成因素與事件圖可能會延展超過50個事件點,許多調查人員製作造成因素與事件圖,會含括超過1000個事件和狀況。
  7. A lot of people have not regarded memoir as the literary works to create, but write down history purly, the pursuit to the literature quality of memoir only stay in processing the aspect polished to the characters, only history study value such an memoirs, have literature study value, it is the memoir of the individual interests writing, studies value and will give a great discount too in history. p p because this subjective, objective respect the restrictions of termseses, make the literature value relative novelses of memoir wait for other literature come and say relatively poor and weak by types, it is difficult to bring literature researcher s attention

    秉筆直書,不能,聯想和想像的空間受到了限制,開拓回憶錄文學價值的努力也就隨之受到制約其次,創作回憶錄並非文學家的專利,任何人都可以把對自己歷史的回顧與思考付諸文字。很多人沒有把回憶錄當作文學作品來創作,而是純粹地記錄歷史,對回憶錄文學性的追求僅停留在對文字進行加工潤色的面上,這樣的回憶錄只有歷史研究價值,而沒有什麼文學研究價值,為個人利益寫作的回憶錄,歷史研究價值也會大打折扣。
  8. The folklore, story - telling and fictionalization are the general standards for average content, and the gossipers, neighbors with little knowledge and minor officials are the people who wrote novels at three different levels

    民間性、敘事性和一定的性是小說標準的基本內容; 「道聽途說者」 、 「閭里小知者」和「稗官」是分屬三個次的小說家。
  9. A new kind of theory and calculating method which is suitable to cable supported bridges was developed in this paper. cable element can include the structure ' s geometry nonlinearity and initial stress, virtual laminated element has high calculating efficiency and good precision. dimensions of lsctb was put forward based on conclusions of optimum analysis

    推導了適合纜索承重橋梁的纜索單元;引入擬單元理論,提出適用於大跨纜索承重橋梁鋼箱梁的一種新方法?合板單元法,該單元具有計算效率高,可以模擬復雜結並滿足工程需要等諸多優越性。
  10. Considering the state - of - the - art of such kind of structural system, the author gives a simulative analysis of the system with the feiyunjiang bridge in wenzhou zhejiang province as an engineering example using three methods : 3 - d beam or bar fem, classical plate / shell fem and virtual laminated element method. the virtual laminated element method may deals with many key issues in simply - supported - continuous system easily such as the matter of actual material or virtual material, mesh replacement

    針對國內外對先簡支后連續結體系的研究普遍缺乏深度這一現狀,我們以浙江溫州瑞安市飛雲江大橋引橋為工程背景,運用空間梁桿系有限元、經典的板殼單元法以及合單元法對該體系進行了施工模擬分析。
  11. Lung is a mythological creature, it has no lung, so it can live in deep water and also in out space wihtout air

    (龍是的神話生物,它沒有肺,所以既能夠在深水中生活,也能夠在沒有空氣的外空間生活。 )
  12. The conclusions from this research include : ( 1 ) the real part mainly effects the delay time between two peaks of gpr signal, the larger the real part, the longer the delay time. ( 2 ) the imaginary part mainly affects the peak amplitude of gpr waveform except that from pavement surface, the higher the imaginary part, the lower the peak amplitude. ( 3 ) the neglect of imaginary part of dielectric will increase the analyzing error obviously when it is higher

    分析了路面結材料介電常數實部和部對雷達電磁波反射信號的影響,並得出以下結論: ( 1 )介電常數的實部主要影響雷達反射波的時延,實部越大,時延越長; ( 2 )部主要影響除路表反射波幅之外的其它結界面的反射波波幅,部越大,反射波幅越小; ( 3 )當介質介電常數部較大時,忽略部將給分析結果帶來明顯的誤差; 3
  13. It s entirely made up, so please don t try to overanalyze it, but instead observe the separation of duties at each analysis layer

    它完全是出來的,所以請不要嘗試過度地分析它,只是觀察每一個分析負責的分離操作即可。
  14. The studies of western view of china, on the ground of post - modernist and critical knowledge, assumes that it is an image of cultural " others " constructed on the stratum of social imagination by the west, and it produces and allocates meaning, in which there is no objective knowledge, nor truth or fiction

    在後現代的、批判的知識立場上研究西方的中國觀,假設西方的中國觀是西方在社會想象次上築的有關文化他者的形象,自身生產與分配意義,無所謂客觀的知識,也無所謂真實或
  15. Seek the sound cable tension to aim at minimum of maximum stress by the method of fem analysis combined with optimization. during optimization, use virtual lamina beam element to analyze the structure. the result of optimization of the cable tension of wenhui bridge shows this method is easy, effective and applicable

    合梁單元對結進行計算,以梁和塔的最大應力最小為優化目標,採用有限元計算同優化分析相結合的方法來確定斜拉橋的合理成橋恆載索力,文暉大橋成橋恆載索力的優化結果表明該方法簡單、高效、適用。
  16. Confronted with the challenge from the postmodernist view of metaphor, the author holds that metaphor can adequately convey information from the historical reality. from the author ’ s point of view, the famous base / upper building metaphor, which is usually considered as the foundation of historical materialism, can truly describe the dialectical relationship between economical structure and ideological structure

    針對后現代歷史隱喻觀,論文認為,雖然歷史隱喻包含想象的成分,但是它能夠真實地再現過去實在;雖然歷史唯物主義的基本理論是通過經濟基礎/上建築這樣一個隱喻表述的,但這個「建築物」隱喻並非是一種想象或,它真實地描述了以生產力和生產關系之間的矛盾運動為內容的歷史發展過程。
  17. Mr stephen sze s article the creation of " social realism " in hong kong s cantonese cinema, analyses the several levels of realism seen in hong kong cinema. he explores with depth the simplistic concepts that shooting on the set equals fabrication and shooting on location equals realism

    史文鴻先生的香港粵語片中社會現實的營造分析香港電影中不同次的現實,把一些簡化的觀念如廠景製作,實景拍攝現實等作出較深入的探索。
  18. Just as there is more complexity to the compute layer of the architecture in figure 1, so the data virtualisation layer is more complex than it might appear

    正如此處的復雜性比圖1中體系結的計算的復雜性更高一樣,此處的數據也比圖1中的更為復雜。
  19. For instance, some companies fake their registered capital or achievements in order to enter stock market with exaggeration to cheat investors or creditors ; some major stockholders or management dominate companies in order to turn the listed companies into their own " automatic teller ' s machines ". consequently, the capital of companies has been shifted secretly with the result that the rights of many investors ", creditors employees " have been casually damaged ; some companies evade or abandon their debts viciously ; and so on

    然而,現實中,公司信用並未因此而有所提高,相反,公司信用出現危機:公司注冊資本和業績,包裝上市,欺騙投資者和債權人;公司被大股東或管理操縱,上市公司成了它們的「取款機」 ,公司被掏空,廣大投資者、債權人和職工的權益被肆意踐踏;公司惡意逃廢債務,等等。
  20. The results show that the database hierarchy of the whole virtual scene is more effective and more proper, and that the real - time display efficiency and simulation effects also have been improved. the fixed frame rate which generally amounts to 50 - 60 frames / second can be achieved, at least 20 frames / second

    研究結果表明整個擬場景數據庫結次更加合理恰當,擬場景的實時顯示效率以及實時模擬效果都有所提高,保持恆定的幀速,至少20幀秒,通常可達50 60幀秒。
分享友人