虛界邊 的英文怎麼說

中文拼音 [jièbiān]
虛界邊 英文
pseudo edge
  • : Ⅰ名詞1 (空虛) void; emptiness 2 (政治思想等方面的道理) guiding principles; theory 3 (二十八...
  • : 名詞1 (相交的地方; 劃分的界限) boundary 2 (一定的范圍) scope; extent 3 (按職業、工作或性別等...
  • : 邊Ⅰ名詞1 (幾何圖形上夾成角的直線或圍成多邊形的線段) side; section 2 (邊緣) edge; margin; oute...
  1. Introducing the theory and application of boundary element method on the sound radiation, giving the process of solving vibration noise radiation problem using boundary element analysis software ; presenting the coupling theory and the combination analysis of finite element method and boundary element method, and doing relevant analysis based on close drum shell ; programming the noise data simulation program using the numerical calculation software, simulating the acoustic and pressure data of a key point in the transient response acoustic field of the close drum shell, realizing the audibility of the noise, using the virtual reality tools to simulate the vibration noise of the drum shell ; combining the finite element method and boundary element method to analyze the vibration noise radiation of some gear box, and completing the whole simulation process of the vibration noise of the gear box

    綜合介紹了元法在聲輻射問題上的理論及應用;並給出了運用元法分析軟體求解振動聲輻射問題的過程。闡述了有限元法和元法的耦合理論及組合分析方法,並以封閉鼓形薄殼為分析對象進行了相應的分析。利用數字計算軟體編制了噪聲數據模擬程序,並模擬了通過組合方法分析封閉鼓形薄殼瞬態響應聲場而獲得一關鍵點的聲壓數據,實現聲音的可聽化,隨后通過擬現實工具實現了該情形下橢球殼振動噪聲的擬模擬。
  2. We can use the principle of virtual power to establish consistent boundary conditions.

    我們可以採用功率原理建立相容的條件。
  3. As one of the design for testability technology, boundary scan test ( bst ) fixes boundary scan cells between the device pins and core logics. thus, the bsc acts as the virtual test probe that carries out the test stimulus and captures the test response

    作為一種結構插入的可測性技術,掃描測試( bst )技術將掃描寄存器單元安插在集成電路內部的每個引腳上,其作用相當于設置了施加激勵和觀測響應的內建擬探頭。
  4. In addition, in order to solve the differencing equations, feasible project is presented to deal with the first and second boundary conditions. finally, jacobi interation method is selected for the solution of the equation systems

    為了實現內點離散方程組的封閉,本文就第一、二類條件在計算時的處理和擬點的外插法求值,給出了可行的解決方案。
  5. This method utilizes the distribution property of image intensity. given the false alarm probability, the threshold for likelihood difference can be determined

    該方法利用sar圖像的強度分佈特性,根據警率確定相鄰區域之間存在的似然差函數的閾值。
  6. By taking advantages of epipolar line features and depth discontinuities in reference 中國科學院 軟件 研究所 博士 學位 論文 基于 圖 象 的 快速 繪制 技術 的 研究 images , an efficient inverse wmping algorithm is pfoposed in chapter 3 for gcnerating nagcs of novel views by combining multiple eference images 帆 enhm different vie 呷 oints because continuous segnents determi 。 d by pairs ofedge pixels at co 。 spending epipolar lines are order kept , only pairs of edge pixels in the reference 渝 明 e e necess 叨 口 cowute to obtain generalized disparity of all points in the desired image as a result , sighficant acceleraion could be made in the endering pfo 比 鴕 two accelerating techiq 此 s e presented in this algori 山 mb accelerate the hole illing process his algorithm extends the reference images rom projection of single col : ii ’ ected surface in previously developed nvnverse w 出 下 er to ima 驢 s captured rom complex scene in chapter 4 , an 《 dent ibr method is prese 庇 仙 y takn ull 訕 antage of 呷 bies c 咖 the method can simulate the 3d details on sllri : ace of object successfully he 。 叩 proach , called rered ature mopmp consists of two pans at fst , an origi 。 ltexture with orthogonal displacements per pixel is deco 啊 osed into a series of new t6 刀 mfcs with each 他 lug a given displacement per pixel , called ae , ea atures , or lt hen hese lt e used to render the novel view by conventional texture mapping d avoid gaps n the endered hlla 驢 , some phels are to be interpolated nd extended in the 廠 kaccoding to the depth differe eee between two neighbor pixels in the original texture as these ltlt fc … e much storage nd therefore much time is equired to install ltlt into the text ’ ufc buffec an 舊 thod is pfoposed to co 呷 fcss the ltlt , nd the cottcspondingfclldering method is given experimental esults show that the new method is efficient , especially n rendering those objects with a smaller depth rnge compared withtheir size , such as relief surfaces of building

    與己有的三維變換方法相比較,該方法不但成功地填補了由於投影區域擴張而產生的第一類空洞,而且成功地填補了由於空間深度非連續物體相互遮擋而產生的第二類空洞,從而方便地實現了擬環境中的漫遊;基於物體表面深度的連續性,本文提出了一個位移預測方法? ?此方法可以從單幅參考圖象獲得逆映射過程中所需要的目標圖象的位移信息,從而大大提高了演算法的效率:與通常的正向映射演算法相比,此演算法克服了多幅參考圖象所帶來的計算量成倍增長等問題,而且誤差較小。 2 )基於極線幾何的快速逆映射演算法。利用參考圖象的信息與隱含的遮擋關系,以及極線幾何的性質,本文第三章提出了一個基於極線幾何的快速3 『一中國科學院軟體研究所博士學位論文基於圖象的快速繪制技術的研究逆映射演算法,從多幅參考圖象精確合成當前視點目標圖象。
  7. He was for some time without reflection or thought for the divine charm which is in the things of nature, specially after a fantastic dream ; then gradually this view of the outer world, so calm, so pure, so grand, reminded him of the illusiveness of his vision, and once more awakened memory

    此時他讓自己完全沉醉在大自然的聖潔嫵媚里了,一切回憶和思慮都拋在了一,當人們在一場迷亂的怪夢以後,通常總是這樣的於是,眼前的這個寧靜,純潔,宏偉的現實世漸漸的向他證實了夢的幻,他開始回憶起來。
  8. In this paper, the shortages and limitations of the perimeter firewall and current host firewall are analyzed, the current network attacks and the methods defending against them are analyzed and discussed, the strategies of the network security in the intranet are discussed, the scarcities of the current applications for the host firewall in the intranet are analyzed, a kind of intranet host firewall model based on the techniques of tcp / ip packets filter, vpn and ids is designed and discussed deeply

    本文針對網路安全的現狀,分析了防火墻及現有主機防火墻的不足之處;對現有黑客的網路攻擊手段與方法進行分析研究,並對防禦這些攻擊的方法進行了研究;對企業網的網路安全策略進行討論,分析了現有主機防火墻在企業網中應用的不足,並在此基礎上,結合包過濾、擬專用網、入侵檢測等防火墻技術,設計了一種企業網中的主機防火墻模型,並對這一模型進行了較深入地研究。
  9. ( 2 ) to determine the worst load case accurately and quickly, influence faces of main sections are plotted < > ( 3 ) combining the influence face with the pre - reinforcement space fe model, the internal force and the stability are computed, then the main reasons of the disease are analyzed

    ( 2 )為準確快速地確定最不利荷載工況,運用位移原理和元相結合的新方法,繪制了主要檢算截面的內力影響面。 ( 3 )應用空間有限元模型,結合內力影響面,對加固前進行內力和穩定性計算,分析其主要的病害原因。
  10. The author first introduces several problems that interlaced video suffers from : the basic vertical resolution is inadequate for displaying filmlike quality, and interlaced video generates visual artifacts, including edge flicker, shimmering, and diagonal jaggedness. then the author reviews some representative de - interlacing algorithm that has been proposed

    論文首先介紹了隔行電視存在的若干個缺陷:對于顯示類似於電影質量的圖像而言,隔行電視的基本垂直解析度是不夠的;隔行電視還會產生許多視覺像,例如沿閃爍、爬行和鋸齒等,接著簡單回顧了學術已經提出的經典的去隔行技術。
  11. The corresponding control equation is given. the control equation and boundary condition about the addiontional small deformation ' s effect caused by initial stress using virtual principal theory in cylindrical reference frame. generalized stress and strain and equivalent constitutive equation are given

    第四章提出了描寫柱形薄殼中初應力的數值特徵,將應力的三維分佈轉化為二維分佈,給出相應的支配方程;在柱坐標系中,利用功方程建立了初應力對附加小變形影響的控制方程和條件;給出了廣義應力、廣義應變及等效本構關系。
  12. The phrases of km are : first, how a company obtain and utilize interior knowledge ; second, how to capture and take advantage of other organizations " knowledge ; third, the integration of all these knowledge sources. the final objective is to build learning organization

    知識的擬組織化可分為三個層面:本企業如何通過擬的手段獲取和利用知識;跨組織的獲取和利用知識;不同的知識主體一體化。最終目的是建立基於知識管理的學習型組織。
  13. A constitutive model of 3d contact with friction is established with the use of penalty parameter and an incremental statement of problem is carried out

    藉助罰因子建立了三維摩擦接觸的本構模型,給出了三維摩擦接觸問題的增量描述,推導了接觸問題的互補功方程。
  14. Basing on them, we propose a new algorithm of removing pseudo elements by which we can ensure the candidate edge generated by the broken line in 2d views is pseudo element if it is inside of the face which can be seen completely. at last delete other pseudo elements by the topological information of former methods. 2. for the low efficiency and bad capability of disposing multi - solutions of the decision - making after generating face loops, we thoroughly analyzed the former divide - conquer algorithm and decision - chaining algorithm

    以這些定義和定理為基礎,提出了新的假元刪除演算法,通過判斷視圖中的二維所生成的候選是否在完全可見有平面內來判斷該候選是否為假元而將其刪除,再結合前人的成果利用三維拓撲信息刪除其它假元,從而降低了面環的生成數目和決策求解的搜索空間,提高了三維重建的效率。
  15. It shows that the accuracy of the virtual boundary element method is better than that of the boundary element method as the distance between virtual boundary and real boundary is optimum

    對強流電子槍的計算表明,在同等條件下,取定最佳的距離與單元數,元法較元法的精度要高。
  16. The " wavefront " domain decomposition method developed above is used in the division of flow field domain. the quantity of physics variables on the " subjunctive " boundary elements needs mutual communication of subdomains during the simulation

    流場區域的劃分採用改進的「波陣面」區域分裂演算法, 「擬」單元的物理量的計算由子區域之間相互通訊來完成,信息的發送方式採用「循環式」發送方式。
  17. After subdividing the initial meshes by using the above domain - splitting algorithm, we smooth the grid by the parallel method. in this phase, smoothing " subjunctive " boundary points needs mutual communication of subdomains

    利用改進的區域分裂演算法,對并行生成的初始網格重新劃分,實現了網格的并行光順,其中「擬」節點的光順需要子區域之間相互通訊。
  18. So it is necessary to reflect the inner reality physical field ' s numerical number analogy method to analysis and improve the magnetic field and the computing accuracy of the cable ' s eddy - current detection. T his affords helping for the researching of biased cable instrument in the future. first open domain electric magnetic problem ' s breaking method is done with, which supposing fictitious boundary far away from the region. second breaking the infinite region into the finite region and supposing the electric magnetic is too small to be ignored

    通過採用目前處理開域電磁場問題的截斷法,人為地設定一個遠離待求區域的,將無限區域截斷為有限區域,且認為在該外面的電磁場已衰減得足夠小,小到可以忽略不計,從而令上的電磁場場量為零,在此有限區域內採用較為成熟的A , A法,並且併入庫侖規范建立數學模型。
  19. The fbc for connecting the subdomains on fictitious boundary is developed according to the actual field distribution in the waveguide to ensure the propagation of waves between adjacent subdomains. the relaxed algorithm is introduced to improve the iterative convergence

    文中從實際場分佈出發,在劃分區域的上給出了連接子域的吸收條件,並通過引入鬆弛演算法,構建了一種能夠用於分析波導問題的鬆弛迭代區域分解法。
  20. Most key idea and important technique of this algorithm including forecasting model are introduced in this paper. the comparison of the several vbf methods in solving a 2d heat transient initial - boundary problem is given. finally, conclusions of this paper and suggestions for future research are given

    文中給出了預測演算法的預測模型,詳細論述了預測方法的主要思想和關鍵技術,並在對一類二維熱傳導方程的求解過程中使用到的各種預測方法進行了比較及分析。
分享友人