過于看重分數 的英文怎麼說

中文拼音 [guòkānzhòngfēnshǔ]
過于看重分數 英文
place too much emphasis on grades
  • : 過Ⅰ動詞[口語] (超越) go beyond the limit; undue; excessiveⅡ名詞(姓氏) a surname
  • : 看動詞1. (守護; 照料) look after; take care of; tend 2. (看押; 監視; 注視) keep under surveillance
  • : 重Ⅰ名詞(重量; 分量) weight Ⅱ動詞(重視) lay [place put] stress on; place value upon; attach im...
  • : 分Ⅰ名詞1. (成分) component 2. (職責和權利的限度) what is within one's duty or rights Ⅱ同 「份」Ⅲ動詞[書面語] (料想) judge
  • : 數副詞(屢次) frequently; repeatedly
  • 看重 : 1. (重視) think highly of; regard as important; value; set store by 2. (估計過高) overestimate
  1. A highly efficient numerical algorithm by using multi - grid method ( mgm ) is introduced to solve the three dimensional field distribution in the present paper. formulae of the restriction and prolongation in mgm computation is deduced, and a 3d program of mgm is accomplished, which can solve the field distributions in electron optical systems for various electrostatic lenses. the 3d field distribution in an electrostatic concentric spherical model is tested with mgm algorithm and an algorithm based on finite difference method ( fdm ) respectively. comparing these two results in view of computational efficiency and computational accuracy, it appears that mgm is superior to fdm in solving electrostatic field distribution for the electron optics problem. this paper shows that the 3d field computation using mgm greatly improves the computational efficiency of field distributions in electron optical systems and shortens the computational time

    本文將一種高效率的值計算方法? ?多網格法引入三維靜電場佈的計算,多網格法利用限制和延拓可迅速求得滿足精度要求的場佈.研究了求解各種靜電透鏡電子光學系統三維場佈的多網格法程序,驗算了靜電同心球模型的三維場佈.通與目前在場計算中常用的有限差法進行比較,可以出多網格法的計算效率和計算精度優有限差法.本文表明利用多網格法計算三維場大大提高了場佈的計算效率,縮短了計算時間,因此為后續計算打下了良好的基礎
  2. It contributes to the deeper comprehesion of these probability distributions, affords more detailed theoretical basis for further studying and simulating satellite mobile channels, ? theoretical analyses and discussions of the models which are often used in the study of the propagating characteristics of satallite mobile channels are given ; meantime, some discussions on the work of model simulations are also given, ? incorrect derivation of the equality between c. loo model and corazza model in some other papers is pointed out. via the conception of received power, we derivate that in the rural environments these two models really have the equal relationship by the way of theoretical derivation and simulatant fittings. therefore, it is able to use corazza model in studying the characteristics of satellite mobile channels in the rural environments and able to avoid the iterant work of modeling, in order to enhance the efficiency and accuracy of research work, ? detailed processes of simulating lutz model by using matlab6. 0 _ simulink4. 0 and the results of comparisions are given

    本文包含有以下的主要內容: ?對衛星移動通信通道傳播特性研究中常用的三個概率佈給出了詳細的推導程;以便對這幾個在衛星移動通信通道傳播特性的研究中常用的概率佈函有更深的理解,對進一步研究衛星移動通信通道傳播特性和對通道的建模提供了更為詳盡的理論基礎; ?對衛星移動通信通道傳播特性的研究中常用的通道模型進行了理論上的析和討論,並對衛星移動通信通道建模的研究工作提出了一定的法; ?指出了以前的文獻中關c . loo模型和corazza模型的等同性的證明錯誤;並從接收信號功率的角度出發,通理論推導及模擬曲線擬合新證明了在鄉村環境下,這兩個模型的確是具有等同性的;從而在對鄉村環境下的衛星移動通信通道傳播特性進行研究時,可以只採用corazza模型來對實際的通道進行建模,這樣可以避免復的建模工作並提高研究工作的效率和準確性; ?給出了lutz模型在matlab6 . 0 _ simulink4 . 0環境下的軟體模擬實現的詳細程和整體模擬測試的對比結果,保證了該模型在硬體實現時的可靠性和可行性,從而可以將它們應用於指導模型的硬體模擬實現並可以降低硬體實現時的風險。
  3. It reframes the traceback problem as a polynomial reconstruction problem, and uses techniques from algebraic coding theory to provide robust methods of transmission and restriction. the scheme is a new solution to the traceback problem during a dos attack ; the honeypot for ddos, which is a tool of traceback, lures the attacker to believe that he successfully compromised a slave for his needs, convincingly simulating the architecture of a potential ddos attack ; the source - based approach to ddos defense, which is a useful adjunt to traceback systems, deploys a ddos defense system at source - end networks. attacks are detected by monitoring two - way traffic flows, and the attacks originating from source networks are stopped by rate - limiting ; the routing mechanism based on pushback treats ddos attacks as a congestion - control problem

    最後,就有關ddos攻擊反向追蹤問題,從四個方面對其解決方案進行了研究:在析比較幾種反向追蹤演算法的基礎上,著研究了代方法編碼反向追蹤信息的方案,該方案把追蹤構問題當作多項式構問題,使用代編碼理論技術提供魯棒的傳送和構方法,是dos攻擊程中的反向追蹤問題的一種新的解決方法; ddos陷阱作為反向追蹤的工具,引誘攻擊者相信自己成功與所需的傀儡主機通話,令人信服地模擬出潛在ddos攻擊體系結構;基於源的ddos防禦方法作為反向追蹤有用的補充,將防禦系統部署在源網路,通監控雙向流量檢測攻擊和限制速率終止來自源的攻擊;基於向後倒推的防禦ddos的路由機制把ddos攻擊作擁塞控制問題,添加功能到每個路由器來檢測並優先丟棄可能屬攻擊的包,通向後倒推上級路由器也得到通知而把這樣的包丟棄。
分享友人