追蹤模式 的英文怎麼說

中文拼音 [zhuīzōngshì]
追蹤模式 英文
tracking
  • : Ⅰ動詞1 (追趕) chase after; run after; pursue; catch up with 2 (追究) trace; look into; get to...
  • : 名詞(腳印; 蹤跡) footprint; track; trace; trail
  • : 模名詞1. (模子) mould; pattern; matrix 2. (姓氏) a surname
  • : 名詞1 (樣式) type; style 2 (格式) pattern; form 3 (儀式; 典禮) ceremony; ritual 4 (自然科...
  • 追蹤 : have in the wind; follow the trail of; track; trace; pursue
  • 模式 : model; mode; pattern; type; schema
  1. In this paper, high - order accurate weighted essentially non - oscillatory ( weno ) schemes are investigated and their applications in hyperbolic conservation laws are discussed. based on this, a new weno difference scheme which based on dispersion - relation - preserving relation is developed, and representative test cases with this scheme for computational aeroacoustics ( caa ) problems has been implemented and compared in order to test capability of wave capturing ; in addition, weno schemes generally do not converge at high order in the presence of contact discontinuity of euler equations, so a conservative front tracking technique coupling weno schemes and level set method to simulate the translating density profile is presented here, and numerical simulation with this technique for representative test case has been implemented and results show the desired accuracy

    本文研究了高階精度加權基本無振蕩( weno )格及其在雙曲守恆律方程中的應用,在此基礎上作了兩個方面的工作:一是針對高頻聲波問題構造出一種基於保色散關系( drp )的weno有限差分格,並對計算氣動聲學( caa )問題的代表性算例進行了大量數值實驗,比較了該格捕捉波數的能力;另外,針對高階weno格在處理euler方程的接觸間斷時精度有所降低的問題,研究了利用界面技術levelset方法和高階激波捕捉weno格相結合的一種守恆方法,並且給出有代表性的密度滑移面問題的算例,得到一致高階精度的數值擬結果。
  2. We first constructed five traceable opratores and confined the detailed syntax of these five opratores so that we can explain each result of opratores and can construct the multi - opratores data cleaning program. through propagate the key information of each opratores, the mechanism of data lineage can trace the data cleaning program, which construct over the traceable oprators so that we can analysis and explain the cleaning result. according to the analysis and research of the incremental mode and conflict of data modification, we can correct and improve the exceptions which appear during the data modification

    接下來的數據沿襲機制通過傳遞各個操作的標識值,實現了對構造于可溯操作基礎上的數據清理程序的,從而提供了對數據清理程序執行過程及結果的分析和解釋功能;同時利用互動數據修改功能以及時糾正和改進數據清理過程中所出現的異常,並對數據修改過程中所涉及到的增量執行及操作沖突進行了充分地分析與研究。
  3. Meanwhile, it elaborates the juncture that information technology has brought to the implementation of developmental assessment from different perspectives. also, the writer expounds the essentials, strategies, and models of developmental assessment of students " learning processes under e - learning environment. furthermore , it puts forward the designing process and construction scheme of the web - based, dynamic assessment system

    從不同角度論述信息技術給發展性評價的實施帶來了契機;並著力研究並設計基於網路的對學習過程的動態評估系統,分析對學習過程的發展性評價的評價要點,系統運用的發展性評價策略,運用該系統實施發展性評價的
  4. Feel the thrill of the chase in a dynamic open world as you go head - to - head with drivers who customize their cars to go against tuners, exotics, muscle cars, and cops armed with advanced tactics, suvs, and helicopters

    在一個完全開放的漫遊中,感受的快感,和與你相同的改裝高手們用轎車、改裝車、超級跑車、警車、警用suv和警用直升機一爭高下!
  5. This article focuses on the study of workshop level ' s management reform based on the factory level production management system, to accomplish the process standardization and automatization of workshop work planning management, workshop work management, vehicle vin bar code tracking management, and workshop resources management and control, to finally accomplish the goal to use information technology to support production management modernization

    本文著重研究,在工廠級的生產管理系統的基礎上向下延伸,著重於車間級管理上進行改革,實現車間作業計劃管理、車間作業管理、汽車vin條碼管理、車間資源管理與控制的流程化、自動化,達到以信息化支持生產管理現代化的目的。
  6. Frame rate can be changed between 30 fps ( high precision mode ) for fine focus checking and 60 fps ( smooth mode ) for following movement

    您可選擇每秒30格(高精確度)的畫面顯示速率,進行微細的對焦檢查;或以每秒60格(流暢)的畫面顯示,及拍攝主體動作。
  7. The proposed fuzzy sliding mode controller does not require any knowledge of a nonlinear system and attempts to improve both transient and stability margins

    建議的糊滑動控制器是針對非線性系統在未知參數變化與結構下的強健控制,其設計包含補償器、衰減技術、糊邏輯近似法。
  8. The study limitations point to a need for revising measures of social desirability, refining analytical models of overestimates, conducting more research on time diary reliability and validity, making comparative analyses of multiple methods for time data collection, and replicating past studies using a representative national sample and longitudinal design

    對未來研究的建議包括更改社會贊許性的測量方法,重建對高估時間的分析,更多時問日誌的信度與效度的研究,多元方法綜合運用於時間測量方法的比較分析,鼓勵對其他自營職業婦女與其他學科領域從事類似的時間運用研究,以及從事具代表性樣本與樣本的反覆檢驗。
  9. The study find : ( 1 ) the communication among the team members is the key to the success of team work ; ( 2 ) in arena assessment, the leader is the key person who should hold the concept in related areas ; ( 3 ) the team members held positive attitude toward transdisciplinary model ; ( 4 ) giving more detailed information about the case, improving communication opportunities for team members and continuing follow - up will contribute directly toimprovements of the model

    研究結果發現: ( 1 )專業人員間的溝通合作是運作的重要關鍵; ( 2 )跨專業團隊評估中采一人主導評估,因此角色釋放相當重要,主導者需要對兒童整體發展非常了解; ( 3 )參與評估的專業人員對跨專業團隊評估持肯定態度; ( 4 )整個需要改善的部分,包括評估前應該有更完整的個案資料,加強專業人員間的溝通,需要更落實后續部分。
  10. Computer control is easy through the ieee - 488 interface, or via the second rs - 232 port. since all channels perform their own processing and the i o is handled by the main processor, the power analyzers offer unparalleled interface speed. twelve analog and 16 digital outputs can be set to track and alarm on specific parameter ranges

    經由ieee - 488或rs - 232埠可提供簡易的電腦控制,由於所有通道均進行固有的處理及由主處理器管理i 0 ,功率分析儀遂能提供非平行的介面速度, 12個擬和16個數字輸出可被設作與警報特殊參數范圍
  11. This model was composed of a tracking process model based on activity network diagram and multi sub closed loop processes, a boolean matrix description model of tracking sections and associations among sections, a matrix style organization structure and a quality problem driven organization model

    型包含基於活動網路圖的多個閉環子過程的過程型、過程節點及節點間聯系的布爾矩陣描述型,以及矩陣的管理組織結構和以質量問題為驅動的組織型。
  12. It reframes the traceback problem as a polynomial reconstruction problem, and uses techniques from algebraic coding theory to provide robust methods of transmission and restriction. the scheme is a new solution to the traceback problem during a dos attack ; the honeypot for ddos, which is a tool of traceback, lures the attacker to believe that he successfully compromised a slave for his needs, convincingly simulating the architecture of a potential ddos attack ; the source - based approach to ddos defense, which is a useful adjunt to traceback systems, deploys a ddos defense system at source - end networks. attacks are detected by monitoring two - way traffic flows, and the attacks originating from source networks are stopped by rate - limiting ; the routing mechanism based on pushback treats ddos attacks as a congestion - control problem

    最後,就有關ddos攻擊反向問題,從四個方面對其解決方案進行了研究:在分析比較幾種反向演算法的基礎上,著重研究了代數方法編碼反向信息的方案,該方案把重構問題當作多項重構問題,使用代數編碼理論技術提供魯棒的傳送和重構方法,是dos攻擊過程中的反向問題的一種新的解決方法; ddos陷阱作為反向的工具,引誘攻擊者相信自己成功與所需的傀儡主機通話,令人信服地擬出潛在ddos攻擊體系結構;基於源的ddos防禦方法作為反向有用的補充,將防禦系統部署在源網路,通過監控雙向流量檢測攻擊和限制速率終止來自源的攻擊;基於向後倒推的防禦ddos的路由機制把ddos攻擊看作擁塞控制問題,添加功能到每個路由器來檢測並優先丟棄可能屬于攻擊的包,通過向後倒推上級路由器也得到通知而把這樣的包丟棄。
  13. Weather : hang a thermometer outside to track the temperature. observe weather patterns and make forecasts

    天氣:在屋外掛一個溫度計以每日溫度變化。觀察天氣轉變的,並試著做天氣預報。
  14. Assistive devices, such as braille display, screen enlargement and voice synthesising software, touch screen and trackball, have been installed to cater for the distinctive needs of special groups such as the elderly and people with disabilities

    政府也在電腦安裝了點字顯示器、屏幕放大軟體、語音擬軟體、輕觸顯示屏及球等輔助工具,照顧長者及殘障人士等的需要。
  15. Need for speed ? most wanted black edition combines illicit street racing and tuner customization with the intensity of strategic cop pursuits to challenge you to become the most notorious and elusive street racer

    《極品飛車:無間》黑盒包裝版集成了非法街頭飈車和賽車改裝調教,同時融入警車抓捕,旨在將玩家培養成游戲中最臭名昭著的街車賽手。
  16. This essay firstly systematically introduces the theories and key technologies of vpn with the detailed presentation of the functions of safety manage central - - - - the automatic production and distribution of passwords, remote - controlled destroy of passive and active passwords, loading special data in air and special tracing of cell phones that are out of control. besides, the researchers has analyzed the contents and findings of similar researches both domestics and overseas with the emphases on the in - depth research of safety communication gateway in order to confirm a system model and carry out the macro - design. after that is the detailed introduction of the design realization of special information transportation

    本文首先系統地介紹了gsm移動通信保密專網的原理知識及關鍵技術,詳細介紹了安全管理中心的功能- -密鑰自動產生和分配、被動和主動密鑰遙控銷毀、專用數據空中加載、以及失控專用手機等,並且對國內外同類研究的內容和成果進行分析;重點對安全通信網關進行了深入研究,確定了一種系統型並進行了總體設計,然後對其中專用信息傳輸的設計實現進行重點介紹;本文還對安全管理中心的短消息安全通信網關與專用手機進行性能測試,測試結果表明該系統符合課題的各項技術指標,實現了安全通信網關的各項功能需求;最後,總結課題工作,對下一步系統進行完善和發展的內容提出了具體建議。
  17. In forming triangles, i present a new clockwise judge pattern to the arithmetic. in outputing triangles, i set up a topo structure of triangles and output them. these changes can improve efficency of arithmetic. i tested the algorithm with data points and found the time complexity to be linear

    2在tsung - paofang和les . piegl提出的delaunay三角網生成演算法的基礎上,本文對演算法作了一些改進和完善,將原演算法的右側追蹤模式,完善和細化為順時針追蹤模式
  18. Intrusion detection system is an active security technology developed in the recent decade, which integrates detection, audit, alert and response function. as an important part in information security mechanism, it supplies a gap for access control and identity authentication, thus becoming a main study area. in this thesis, the various intrusion detection models and detection methods are firstly categorized and studied, merits and defaults of which are discussed in detail, then the intrusion response system and intrusion traceback are studied

    本論文對現有的各種入侵檢測型和技術進行了系統歸類和分析研究,詳細討論了各檢測分析技術的優點和存在的不足;對入侵響應系統和入侵技術進行了初步的研究;在研究基於靜態自治代理和移動代理的入侵檢測基礎上,設計了一種基於多代理的分散入侵檢測與響應系統型( multi - agent - basedintrusiondetectionresponsesystem , maidrs ) 。
  19. We then specify where the observer s eye will be located. the ray tracing program will mathematically model the objects, the light rays and the observer and compute the colour for each pixel on the screen

    光線的程會利用數學擬物件光線及觀察者之間的關系,從而計算觀察者在電腦屏幕上應看到的影像。
  20. Light sources are then set up at assigned locations. we then specify where the observer s eye will be located. the ray tracing program will mathematically model the objects, the light rays and the observer and compute the colour for each pixel on the screen

    光線的程會利用數學擬物件、光線及觀察者之間的關系,從而計算觀察者在電腦屏幕上應看到的影像。
分享友人