非常用記錄 的英文怎麼說

中文拼音 [fēichángyòng]
非常用記錄 英文
non-current record
  • : Ⅰ名詞1 (錯誤) mistake; wrong; errors 2 (指非洲) short for africa 3 (姓氏) a surname Ⅱ動詞1 ...
  • : Ⅰ動詞1 (使用) use; employ; apply 2 (多用於否定: 需要) need 3 (敬辭: 吃; 喝) eat; drink Ⅱ名...
  • : Ⅰ動詞1 (把印象保持在腦子里) remember; bear in mind; commit to memory 2 (記錄; 記載;登記) writ...
  • : Ⅰ名1 (用做記載物的名稱) record; register; collection; selections 2 (姓氏) a surname Ⅱ動詞1 (...
  • 記錄 : 1 (寫下來) take notes; keep the minutes; record; write down; log; enter; read in 2 (當場記錄下...
  1. Psittacula agapornis ), oscine passenon ( emberiza rutila ) and the vocalizations of sub - oscine passerine ( melopsittacus undulates, psittacula agapornis ) after sectioning nxiits were recorded by sharp gf - 6060 recorder. cooledit2000, an acoustic analyzing software, was used to produce the original wave and it ' s expanded time windows, sonograms, spectrums and power static histograms. to distinguish the acoustic differences of their natural vocal and to find the changes of sub - oscine passerine ' s song after sectioning nxiits, the above results is acoustically analyzed and compared, expecting to provide some advantage to further explaining the mechanism of vocal production

    本實驗以鳴禽(家鴿、家雞) ,亞鳴禽(虎皮鸚鵡、牡丹鸚鵡)以及鳴禽(栗? )為實驗材料,其正叫聲以及亞鳴禽斷nxiits后的叫聲,cooledit2000聲音處理軟體制出原始信號及其展開圖,聲圖,頻率譜圖以及能量統計分布圖,並對所得結果進行聲學比較分析,以期得到鳴禽、亞鳴禽及鳴禽叫聲在聲學特性上的差異,以及亞鳴禽在斷神經后叫聲的聲學變化,旨在為進一步解釋其發聲機制提供幫助。
  2. It is necessary to control the mechanical stimuli precisely in the studies of cardiac mechano - electrical feedback ( mef ). in the present study a ventricular pressure - clamping system has been developed, which can be applied to isolated - perfused rabbit hearts. controlled by a computer, this system not only can make the left ventricle follow a command defining the same pressure wave as that during a beating cycle under physiological condition, but also deliver mechanical stimuli with a proper waveform to the ventricle at a particular time phase. this system integrates multiple functions, including perfusing, pacing, recording of electrocardiogram and monophasic action potentials, and clamping and measuring of ventricular pressures in isolated - perfused hearts. thus, it is a distinct system for investigating the phenomena and mechanisms of cardiac mef at organ level

    在心臟機械電反饋的研究中準確控制機械刺激是重要的.本研究室構建了一套適於離體家兔心臟的心室壓力鉗系統.該系統通過計算機控制壓力鉗,不僅能模擬正生理條件下左心室的壓力波形,還能在心室活動周期的特定時相、以適當波形對心室施加機械刺激.該系統集心臟灌流與起搏、表面心電圖、單相動作電位、心室壓力鉗制與測定等多種功能於一體,特別適於器官水平上觀察機械電反饋現象並探討其機制
  3. Abstract : it is necessary to control the mechanical stimuli precisely in the studies of cardiac mechano - electrical feedback ( mef ). in the present study a ventricular pressure - clamping system has been developed, which can be applied to isolated - perfused rabbit hearts. controlled by a computer, this system not only can make the left ventricle follow a command defining the same pressure wave as that during a beating cycle under physiological condition, but also deliver mechanical stimuli with a proper waveform to the ventricle at a particular time phase. this system integrates multiple functions, including perfusing, pacing, recording of electrocardiogram and monophasic action potentials, and clamping and measuring of ventricular pressures in isolated - perfused hearts. thus, it is a distinct system for investigating the phenomena and mechanisms of cardiac mef at organ level

    文摘:在心臟機械電反饋的研究中準確控制機械刺激是重要的.本研究室構建了一套適於離體家兔心臟的心室壓力鉗系統.該系統通過計算機控制壓力鉗,不僅能模擬正生理條件下左心室的壓力波形,還能在心室活動周期的特定時相、以適當波形對心室施加機械刺激.該系統集心臟灌流與起搏、表面心電圖、單相動作電位、心室壓力鉗制與測定等多種功能於一體,特別適於器官水平上觀察機械電反饋現象並探討其機制
  4. 21 pajarola r, sainz m, lario r. extreme splatting : external memory multiresolution point visualization. department of computer science, university of california irvine, 2004, uci - ics - 04 - 14. 22 airey j m, rohlf j h, brooks f p jr. towards image realism with interactive update rates in complex virtual building environments

    二是考察各個層次結點的幾何誤差情況,並為每種幾何誤差序列中最先滿足該誤差要求的層次片段,以便成象時能很快剔除太粗糙的點數據,這對于模型的近距離成象是的。
  5. In the past, a computer event recorder had to exactly match the hardware, and it could provide only limited functions. the users also had to spend much time to facilitate the operation ( dawkin, 1971 ; white, 1971 ; noldus, 1989 ). nowadays users only need to devote themselves to writing software, and they can ignore the compatibility issue of hardware because of improvements in computers

    以往的電腦事件器由於電腦不普及,必須密切的配合硬體,不但昂貴且功能受到很大的限制,使不方便,往往必須花相當多的時間來學習操作;現今由於電腦軟體和硬體的改良進步,使研究人員得以專心於軟體的寫作,而不必擔心硬體無法配合,而且利軟體來行為其功能可以多樣化而容易配合使者的需求,一般操作過電腦的人可以立即進入情況,無須特別的訓練,可使得動物行為的研究更加方便而有效率。
  6. Using our new behavioral detection spyware doctor can prevent these keyloggers from recording keystrokes and causing damage much sooner than keylogger blockers based on signature - dependent methods

    較之於傳統基於特徵碼偵測方竊碼密反的式取工具,使了最新行為偵測技術的s . d將能夠阻的松輕止密碼竊取器鍵盤敲擊定位以的成造此由及損失
  7. Although direct waves are much stronger than scattering wavefields, the imaging of the underground anomaly is still well reconstructed from the reverse time process

    即使利含有明顯直接波信號的歷時亦可有效的重建地下散射體的影像。
  8. Secondly, by means of arranging and analyzing the construction monitor data, the practicality method of proposing the dewatering calculation model and parameters of the non - constantly pumping dewatering well was proposed, moreover the equivalent calculation model and parameters of the erhe project was proposed. thirdly, based on calculating the design scheme of dewatering well with the equivalent calculation model, the optimized scheme of dewatering well of the erhe project was proposed and the well number was reduced to 32 where it was 42 in the old scheme. at last, based on the well construction, the dewatering well structure and constructing technique in the soft soil area were exploited in addition, the significative analysis and evaluation attitudes to the old design scheme of dewatering well project were impersonally proposed

    首先,根據工程地質及水文地質條件和工期分析,提出了「二河」降水井的設計方案;其次,通過系統整理分析抽水井的施工監測,提出了降水井的施工監測確定抽水降水井井流模型和參數的實方法,並建立和確定了「二河」降水井抽水、有越流的完整潛水井等效模型和參數;接著,通過等效井流模型進行降水井方案的計算,提出了「二河」降水井的優化方案,使原方案的42眼井降到32眼井;最後,通過對降水井成井施工實踐的總結,開發了適于軟土區的降水井結構和成井施工技術。
  9. The photography, the recording wild dog ecology investigation as well as the investigation public, the folk accepts the place to have to utilize the fund to be huge and to be urgent, no matter from all walks of life donates how many, and we all extremely feel grateful assign the use properly ; in view of the commodity part, the animal correlation thing, the animal medication, the clean thing, above all is the consumables which we necessary also must use every day, the demand is extremely high

    拍攝、野狗生態調查以及查訪公立、民間收容場所所需運資金較為龐大與迫切,不論各界捐贈多少,我們都感激並且妥善分配使;針對物資部份來說動物相關品、動物藥、清潔品,上述都是我們每天必備也必須使的消耗品需求極高。
  10. Smart guard pro protects & hides all your private information ( like messages, contacts, galleries, call logs, office, notes, wallet etc. ). automatically hides all calls & messages

    保護你的簡訊,地址簿,圖庫,通訊,辦公資料,便簽,電子錢夾。強大,實
  11. Log is am important file created and preserved by computer system, in which it well keeps the record of e - criminal - trail thus providing crucial clues and evidence sources for computer crime cracking

    日誌是計算機系統產生並保留的一份重要文件,它著犯罪者利計算機進行犯罪的大量「痕跡」 ,是打擊計算機犯罪重要的線索和證據來源。
  12. The ids works by two way, misuse detection and anomaly detection, misuse detection flags an intrusion on intrusion signature, this kind of detecting technic can be realized much more easily, and much more accurate, but it can not find some intrusiones that have been disguised or new kinds of intrusion. the anomaly detection can detect in more wide field, anomaly detection can compare new statistic data with average record, then anomaly record will be found, but it ' s more difficult to set a threshold, if the threshold is too big, some intrusion may be put through, if the threshold is too small, the ids will give more false positive alarm, and the threshold will be different with different people or different period, so the ids just simply show us their suspicious record, the administrator or expert will be in duty to analyze this record and give conclusion, the ids give more alarm than it should, leave us more detection record to analyze, and this is a hard work, we can not distinguish an intrusion or not if we analyze only one record, but we can judge if we find the relation among mass detection evidence. in this article, we try distinguish an intrusion using d - s theory ( proof theory ) instead using manual work, the ids will be more helpful and efficient

    檢測採的是特徵檢測的方法,實現較為簡單,判斷的準確性較高,但是不能判斷一些經過偽裝的入侵或特徵庫中尚未包含的入侵,異檢測能夠根據以往的特徵平均值,判斷出異情況,但是對于異到什麼程度才視為入侵,這個閥值難以確定,閥值設定的太高,有可能漏過真正的入侵,如果設定的閥值太低,又會產生較高的誤警率,而且這個閥值因人而異,因時而異,因此現在的入侵檢測系統把這部分異以一定的形式顯示出來或通知管理人員,交給管理人員去判斷,而這些ids系統難以判斷的,如果對每個證據單獨地進行觀察,可能是難以判斷是否是入侵,而把許多先後證據關聯起來,專家或管理人員根據經驗能夠判斷訪問的合法性,本文試圖引入人工智慧中證據理論的推理策略和示例學習方法,代替人工檢查分析,可以提高效率,降低誤警率,並可以對一個正在進行得可疑訪問實現實時檢測,通過搜索及時判斷,及時阻斷法訪問,比事後得人工處理更有意義。
  13. A security device ( often part of a terminal ) that reads information ( often from a magnetic strip ) on a badge inserted in a slot. in this way, it can prevent the unauthorized use of a display station before allowing an operator to sign on

    一種安全設備(通是終端的一部分) ,它可以讀取插入槽中的標卡上的信息(這些信息往往以磁條碼的形式在標卡上) 。這種辦法,在允許操作員進入系統前,可以防止對一個顯示工作站的法使。參閱badge 。
  14. So for instance, if your cookbooks include one recipe for checking a bug - tracker for new bugs in software you are developing, and another recipe for checking cvs for new check - ins, you could very easily use these to construct a specialized recipe that notifies you only of those bugs that have

    因此,比如說您的食譜包含一個為當前開發的軟體進行錯誤追蹤,查找新錯誤的配方,還有一個檢查cvs新登的配方,您就可以簡單地把它們構造成一個特殊的配方,該配方是專門來通知您那些根據cvs
  15. Establish and maintain development fleet routine and non routine maintenance processes and records

    建立和保持開發的車輛規和規的維修流程和
  16. If you use the navigation buttons to move through the records of a database table on a data form, this exception may be thrown with the additional information, " column column does not allow nulls. " this behavior occurs because the primary key or the " not null " column of the database table was not selected in the data form wizard

    如果使導航按鈕在數據窗體上的數據庫表的之間移動,則可能會引發此異,並顯示附加信息: 「列column不允許空值。 」此行為的發生是由於在「數據窗體向導」中未選擇數據庫表的主鍵或「null 」列。
  17. Prior to its submission, other scientists had verified that a very unusual signal had been received by some very special device they employed to monitor this victim ' s tv set

    在這個被提交之前,另一些科學家已經證實了一個不尋的信號,它是通過一些特別的設備接收到的,他們被僱去監測受害者的電視機。
  18. Note, however, that if logging is enabled, the generated log files can become quite large, so you should plan for scheduled backup of old log files

    但是請住,如果日誌功能已啟,生成的日誌文件將會大,因此您應規劃舊日誌文件的預定備份。
  19. It ' s significant to further the study of the environment evolvement and forming mechanism, and this helps to open out its ecological essential, protect and develop the oasis, lacated in the cross belt which converge northeaster and northwester, yutian oasis was threatened by the ilowing sand, and has the bad nature conditions the main purpose of the paper is applying fractal theory to research on the change of transitional belt between oasis and desert, which is a typical ecosystem in arid zone

    而荒漠與綠洲之間的植被帶即過渡帶則最為敏感、完整地了這兩大生態系統之間的相互作與相互轉化,深入研究這一特殊地帶的環境演變過程、特徵及形成機制對于揭示其生態學實質、維護和發展綠洲具有重要的實踐意義。於田綠洲位於東北風與西北風的交匯地帶,受到流沙侵蝕的危害很嚴重,自然條件惡劣,生態環境異脆弱,人民的生存環境受到了很大的威脅。
  20. " have you ever told even one lie ? " asks the examiner. " no, " says the man - and the needles on the polygraph machine barely shift from their rhythmic movements

    當然,你可能猜想這傢伙在說假話,但今天所的測謊儀卻不能。它們所能的脈搏、呼吸、皮膚溫度和其它信號,只能提示某人在回答一個不利的問題時似乎有些緊張。
分享友人