非破壞技術 的英文怎麼說
中文拼音 [fēipòhuàijìshù]
非破壞技術
英文
nondestructive technique- 非 : Ⅰ名詞1 (錯誤) mistake; wrong; errors 2 (指非洲) short for africa 3 (姓氏) a surname Ⅱ動詞1 ...
- 破 : Ⅰ動詞1 (完整的東西受到損傷) be broken; be damaged 2 (使損壞) break; break down; damage 3 (使...
- 壞 : Ⅰ形容詞1 (不好的; 惡劣的; 使人不滿意的) bad 2 (表示程度深 多用在表示心理狀態的動詞或形容詞後面...
- 技 : 名詞(技能; 本領) skill; ability; trick; technique
- 術 : 術名詞1. (技藝; 技術; 學術) art; skill; technique 2. (方法; 策略) method; tactics 3. (姓氏) a surname
- 破壞 : 1 (使建築物等損壞) destroy; wreck; ruin 2 (使事物受到損害) do great damage to; do harm to; da...
-
To partially compensate for less destructive power, however, engineers can design earth - penetrating technology that allows a nonnuclear warhead to dive deeper and detonate closer to its target
不過為了盡量彌補破壞力較小的缺憾,工程師可以設計出特殊的鉆地技術,讓非核彈頭更深入地下,接近目標后引爆。Nuclear energy. nuclear fuel cycle technology - waste - non - intrusive, non - destructive determination of the tritium activity of a package containing tritiated waste by measurement of helium - 3 leakage from the package
核能.核燃料循環技術.廢棄物.通過從封殼里泄露出來的氦- 3的測量對含氚廢棄物封殼的氚放射性進行非侵入和非破壞性測量At present, there can be little doubt that the whole of mankind is in mortal danger, not because we are short of scientific and technological know - how, but because we tend to use it destructively, without wisdom
目前,人類處境危急,並非缺少科學和技術訣竅,而是人們想要無知地將之用於破壞的目的。In this paper, we mainly analyze the pricing strategy of digital products under the network economy environment. digital products are the results of the development of information technology with three characteristics of indestructibility, transmutability and reproductivity
數字化產品是信息技術發展的產物,在網路經濟環境下的數字化產品的具有與傳統產品截然不同的特性,包括非破壞性、可改變性和可復制性三種物理特點。In this paper, we take high molecule physics and the damage theory of rheologic material with lacuna as the basic, make the experiment as a mostly measure, take the pmma as a research object, to study the pmma ' s nonlinear viscoelasticity of high polymer. the technique showing minute details in minute view measure is used by the author to observe the change of crazing damage density follow the change of stress, time and temperature in term of creep and flab
本文以高分子物理學、含缺陷流變性物體的材料破壞理論為基礎,以實驗為手段,以工程中常用的pmma為研究對象,對pmma銀紋破壞的非線性力學行為進行了研究。作者採用顯微技術,對pmma在蠕變或鬆弛條件下,不同應力水平和不同基溫下的pmma銀紋損傷進行了實驗研究。Detection ultrasound is a non - destructive technique that provides information about physico - chemical properties, such as composition, structure, physical state and rheology properties
檢測超聲技術為一非破壞性檢測技術,可以用來分析檢測食品體系中的組成、質構、流變學性質等物化性質。In many fields, such as remote sensing, nuclear medical, computer tomography, geophysical prospecting, groundwater hydrology, global ocean modeling, image processing, tumor detection, nondestructive detection, the objective of applied sciences and engineering is the recovery of the original signal given a collection of noisy observations of the original signal ; we call these problems inverse problem
在遙感技術、核醫療技術、計算機斷層掃描( ct )技術、地質勘探、地下水文學、電磁輻射、圖像恢復和重構、腫瘤檢測、非破壞性檢測等科學研究和工程實踐中,經常需要根據一組觀測到的數據來估計目標的真實信號,而觀測到的數據往往是真實信號經模糊、失真和加噪等過程后所得的輸出信號,通常稱這類問題為逆問題。In order to reveal load mechanism and failure mode of thick pile caps, by means of the test of 1 / 4 - scale models of thick pile caps with six piles and post - handling study of 3 - dimensional non - linear finite element adina, this paper points out the shortage, which is that the design of pile caps is carried out by flexural strength in chinese technical code for building pile foundations jgj94 - 94 and american reinforcement concrete building construction code aci318 - 02, promulgates that the failure mode of thick pile caps is punching failure and load transfer mechanism is the strut - and - tie, which is that zones of concrete with primarily unidirectional compressive stresses are modeled by compress struts, while tension ties are used to model longitudinal reinforcement over pile
摘要為揭示厚承臺的傳力機理和破壞形式,通過對4個1 : 5比例的六樁厚承臺的模型試驗研究與三維非線性有限元adina的后處理研究,指出中國建築樁基技術規范jgj94 - 94與美國鋼筋砼房屋建築規范aci318 - 02規范中,承臺以彎曲強度進行配筋計算的設計方法之不足,揭示出厚承臺的破壞模式是沖切破壞,傳力機理是以帶有主要單向壓應力的砼區域作斜壓桿,樁頂區域的縱筋作拉桿的空間桁架。Please express the concept and the setup of non - destructive techniques used for detecting the flaws and flaw sizing of imperfection nature in materials in bar or sheet
請敘述非破壞技術在棒狀或片狀材料探測缺陷與缺陷尺寸的應用原理與步驟。Thus, there ' s nothing wrong or surprising in the content industry ' s campaign to protect itself from the harmful consequences of a technological innovation
由此,文化產業為了使自己免於技術革新帶來的破壞性沖擊,而採取的保護性運動,本無可厚非,也沒有什麼值得大驚小怪的。Uplift reduction by drainage is an important technology for ensuring large - sized channel lining works, especially in preventing damage of uplift in high groundwater level to lining body during the non - conveyance period
摘要大型渠道襯砌中的排水減揚壓技術是確保渠道襯砌施工的一項重要技術,對于防止非輸水期特別是汛期高地下水位對襯砌體的揚壓破壞具有重要作用。The bue can has the functions of in polysleeve way, non - destructive bus arbitration technigue, super - strong - error measurement and high communication rate etc. which have been widely used in the various low cost, high anti - interference multi - machine systems
Can總線以其多主方式、非破壞性總線仲裁技術、超強錯誤檢測和高通信速率等功能在各種低成本、高抗干擾的多機系統中得到了廣泛應用。The system described in this paper uses the technology of metadata and xml to implement the function of data shared, which assure the original character of resource without any change in that metadata is good at describing the non - structural data and xml is extensible dynamically to describe structural data
本文採用將元數據和xml相結合的技術手段,利用元數據善於描述非結構化數據的特性,加上xml的可描述可動態擴展的特性來描述結構化數據,從而在保證不破壞或更改原有遺留系統資源的前提下,實現了對多種類型的分散式數據的共享。With values such as low cost, simple and fast for field operation and non - resource and non - devastation, this approach provides a novel thought and technique for directly exploring oil - gas pools
該方法成本低廉、野外施工簡單且快捷,屬無源和非破壞性的勘探技術,為直接尋找油氣藏提供了一種新的思路和技術方法。This paper analyzes the architecture of distributed firewalls based on comparing with the traditional firewalls : network firewalls and personal firewalls. it brings forward a new design about the distributed firewalls in which some host firewalls and a control center constitute the whole distributed firewalls with reserving the old network firewalls. a host firewall is a packet - filtering firewall that filters the network packets come from inside the network based on the information of network application program, ip address, tcp or udp port and so on
本文在與傳統的網路防火墻、個人防火墻技術對比的基礎之上,結合計算機網路安全的本質與要求,對分散式防火墻這一全新的防火墻體系結構進行了分析,提出一種充分利用現有技術和投資的分散式防火墻系統的設計方案,即在保留傳統網路邊界防火墻的同時,設計一種駐留在內部網路終端的主機防火墻及其控制中心,將防火墻延伸到內部網路的終端,從而有效防範來自網路內部的非法訪問與惡意破壞。分享友人