英语人>网络例句>by comparison with 相关的网络例句
by comparison with相关的网络例句

查询词典 by comparison with

与 by comparison with 相关的网络例句 [注:此内容来源于网络,仅供参考]

Based on the data of aerosol chemical compositions obtained at WMO GAW(World Meteorological Organization Global Atmospheric Watch) station in eastern China——Lin'an regional background air pollution monitoring station,two methods(referred as Malm method and Stelson method) that were described by Malm and Stelson were used to study the mass closure of sampled aerosols.The inter-comparison of reconstructed aerosol masses with the gravimetric masses showed good agreements,although the tw...

通过在WMO GAW区域大气本底污染监测站——临安大气本底污染监测站采集的气溶胶样品的化学成分的分析结果,分别用Malm(1994)和Stelson(1981)提出的方法(分别记为Malm方法和Stelson方法)重建气溶胶质量浓度,并与称重获得的质量浓度进行对比,发现虽然Stelson方法和Malm方法所考虑的物质组成及所使用的化学成分个数并不相同,其计算结果略有差异,但总的来说2种方法都能较好的反映绝大部分的气溶胶质量,在实际应用中可以根据所分析的化学成分数据情况和研究的目的采用不同的质量重建方法。

To have a deeper understanding to this question, by University of California Shengtakelusi Branch school computation biologist David a Haussler leadership's research team, to 5 kind of vertebrate -- person, the mouse, the big mouse, the chicken and the globefish -- trash DNA sequence with 4 kind of insects, two kind of worms and 7 kind of yeast's trash DNA sequences has carried on the comparison.

为了对这一问题有更深的了解,由美国加利福尼亚大学圣塔克鲁斯分校的计算生物学家David Haussler领导的一个研究小组,对5种脊椎动物——人、小鼠、大鼠、鸡和河豚——的垃圾DNA序列与4种昆虫、两种蠕虫和7种酵母的垃圾DNA序列进行了比较。

In this paper, three methods for color image retrieval have been presented: hypercomplex SVD image retrieval, combination of hypercomplex convolution filter and hypercomplex SVD image retrieval and hypercomplex matrix correlation image retrieval. We made comparison among these hypercomplex-methods, and compared them with the traditional image retrieval methods. Experiment results showed that the hypercomplex-methods we presented in this paper could well conquer the problems existed in traditional image retrieval methods, and their retrieval results are much better. Meanwhile, this paper presented a new color image quality assessment based on hypercomplex SVD. It is a novel color image quality assessment that can be used as a graphical or a scalar measure to predict the distortion introduced by a wide range of noise sources. It reliably measures the distortion not only within a distortion type at different distortion levels, but also across different distortion types.

提出了超复数奇异值分解检索法,超复数卷积滤波与超复数奇异值分解相结合的检索法以及超复数矩阵相关检索法等三种超复数彩色图像检索方法,在对提出的三种算法进行比较的同时也将其与传统图像检索方法进行了比较,结果证明,超复数彩色图像检索法能较好地克服传统图像检索方法存在的问题,且检索结果更优;同时,本文提出了基于超复数奇异值分解的彩色图像质量客观评估法,这种全新的图形化与数值化相结合的方法不仅能够准确评估出彩色图像的不同失真等级,还能够区分不同的失真类型,从真正意义上实现了彩色图像的质量评估。

A comparison is made against Galbraith s criticism of the mainline economics and his social reformist ideas along with the analysis by the development economist Lewis of the functions of institutions for the economic growth, thus establishing the important guidance of Myrdal s institutionalist economic theory for developing c.

在此基础上,与加尔布雷思对主流经济学的批评和社会改良思想进行了比较,并与发展经济学家刘易斯对制度在经济增长中作用的分析进行了比较,提出缪尔达尔的制度经济思想对发展中国家具有重要的指导意义。

By integral in mean and comparison theorem, boundednesses of consumer population and resources, as well as a sufficient condition for population's weak persistent in mean are given when the environment is with a small capacity.

利用积分均值法和比较定理,给出消费者种群和资源量的有界性,以及环境容量较小情形下种群弱平均持续生存的充分条件。

Through comparison of the results of numerical simulation and experiment results, two equation model was validated with constants recommended by Launder and Spalding in the paper.

采用Launder和Spalding提供的模型常数,通过数值模拟分析结果与实验值的比较确认了两方程κ-ε湍流模型对本实验装置的适用性。

The distribution of variance, exhibited severe skewness which can be adjusted by natural logarithm transformation. Table 1.Comparison TA with GE of HRV. Table 1. presented the RR interval、 Ln、 LF% and variance of two groups. TA had significant higher than GE.

在安静心跳率TA比NT及HT患者之心跳率低,且达显著水准;TA与NT及HT间R-R波间隔时间皆有显著差异;在Ln的结果,TA与HT有显著差异 NT与HT也有显著差异;LF%的结果,TA显著高於HT,NT与另两组皆无显著差异;心率变异度部份HT皆显著低於另外两组。

It includes four parts: 1 Part I, it introduces the basic knowledge of computer viruses such as computer virus definition, history and important viruses events, features, behavior phenomena, difference with computer software and hardware troubles, damage behavior and capability, classification, naming, future trend, etc; 2 Part II, it introduces the corresponding knowledge of computer systems related to computer viruses such as the composing of software and hardware of the computer system, storage media and its working mechanism, interrupt technologies,.com/.exe/.pe file formats and their working mechanism, etc; 3 Part III, it introduces computer virus mechanism and theory such as computer virus structure, work flow, working mechanism of key modules, typical technologies used to design computer viruses including the corresponding traditional technologies (interrupt filching, memory resident, etc.), the corresponding new routine technologies (self-encrypting, Mutation Engine, etc.), and the corresponding new technologies used by some prevalence computer viruses such as macro viruses, e-mail viruses, worm, hacker, Trojan, mobile phone viruses, the working mechanism analysis of some kinds of typical and prevalence computer viruses such as file-type viruses, macro viruses, e-mail viruses, worm viruses, hacker, Trojan, mobile phone viruses, the analysis of some typical and prevalence computer viruses examples including BALL viruses, WORD macro viruses, WantJob viruses, Code Red viruses, BO Trojan, etc; 4 Part IV, it introduces the defense and killing technologies of computer viruses such as the aim and criterion of computer viruses defense and killing, prevention methods and corresponding technologies, detection technologies (comparison method, character code scanning method, behavior inspecting method, analysis method, etc.), manual and automatic killing technologies, immunity technologies such as IBM digital immunity system, new anti-viruses technology trends (real-time anti-viruses technologies, 32 kernel technologies, active kernel technologies, etc.), some typical virus defense and killing softwares (Symantec AntiVirus product, PC-Cillin AntiVirus product, etc.), the defense and killing method analysis of some kinds of typical and prevalence computer viruses (file-type viruses, macro viruses, worm viruses, hacker, etc.), for example, firewall and intrusion detection technologies for anti-hacker, the defense and killing of some typical and prevalence computer viruses examples including WORD macro viruses, Code Red viruses, BO Trojan, etc.

课程内容具体包括四大部分:1)第一部分,介绍计算机病毒基本知识,包括:计算机病毒定义、病毒发展史及重大事件、病毒特点、病毒表现现象及与软硬件故障的区别、病毒破坏行为及危害性、病毒的传播途径及媒介、病毒分类、病毒的命名及计算机病毒技术发展趋势等内容;2)第二部分,介绍与计算机病毒有关的计算机系统相关知识,包括:计算机系统软硬件组成、存储介质结构及工作原理、计算机系统引导机理及流程、中断技术、。com/。exe/。pe等文件格式及工作机理等内容;3)第三部分,讲解计算机病毒机理,包括:计算机病毒的组成结构、病毒工作流程、病毒引导/触发/感染/破坏等模块的工作机理、计算机病毒所采取的编制技术(包括中断窃取/内存驻留等传统编制技术、自加密/隐形/变形机等新的常规编制技术、宏病毒/电子邮件病毒/网络蠕虫/特洛伊木马/黑客/手机病毒等一些新的流行病毒所采取的编制技术等)、一些类型的典型或流行计算机病毒的工作机理分析(包括:引导型病毒、文件型病毒、宏病毒、电子邮件病毒、蠕虫病毒、黑客、特洛伊木马、手机病毒等)、一些典型或流行的计算机病毒实例剖析(包括:小球病毒、WORD宏病毒、求职信病毒、红色代码病毒、冰河木马等)等内容;4)第四部分,讲解计算机病毒防治技术,包括:计算机病毒防治目的、病毒防治策略及规范、病毒在管理和技术上的预防措施、病毒检查技术(包括:比较法/病毒特征码扫描法/行为监测法/虚拟执行法/分析法等)、手工和自动病毒清杀技术、病毒免疫技术(包括:针对某种一次性感染病毒的基于病毒标签的免疫方法/基于自我完整性检查的计算机病毒免疫方法/IBM的数字免疫系统等)、反病毒技术的新发展(包括:实时反病毒技术/32位内核技术/主动内核技术/以毒攻毒技术等)、诺顿/趋势/金山等公司的病毒防治软件产品、一些类型的典型或流行的计算机病毒(包括:引导型病毒、文件型病毒、宏病毒、蠕虫病毒、电子邮件病毒、手机病毒、黑客、特洛伊木马)的防治措施(其中,也包括介绍面向防范黑客攻击的防火墙、入侵检测技术)、一些典型或流行的计算机病毒防治实例剖析(包括:WORD宏病毒、红色代码病毒、冰河木马v1.1/v2.2等)、多层次病毒防护体系等内容。

Hile the powerful, but they will be powerful and sometimes bring a lot of inconvenience, the complexity of the operation, the resources are occupied by a number of issues, and their comparison, Windows own format Txt small, convenient and quick more suitable for use with normal, based on a variety of reasons, we need to document a variety of useful information extracted characters, making it easier for the security of information transmission, storage and more convenient to use the useful information and so on.

ord等格式虽然功能强大,但是,他们强大的功能有时候也会带来许多不便,复杂的操作,占用的资源都有一些难题,和他们相比,Windows自带的Txt格式体积小,方便快捷,更适合与平时使用,基于多种缘故,我们需要将多种文件中的有效果字符信息提取出来,这样便于信息的安全传输,存储以及更方便的使用其中的有用信息等等。

By the examples of numerical integration the comparison is carried out with tradional methods.

最后给出了数值积分算例,并与传统计算方法作了比较分析。

第47/55页 首页 < ... 43 44 45 46 47 48 49 50 51 ... > 尾页
推荐网络例句

Fancy gold-plated dangling earrings with facetted White Opal crystals.

花式镀金悬垂耳环与facetted白欧泊水晶。

This essay chooses the study aim from biology teachers in middle school in Shi Jiazhuang which tells us that most of the middle school biology teachers in Shi Jiazhuang have the"burnout", lower successfulness, individualize.

本文选取石家庄市初中生物教师作为研究对象,运用问卷调查的方法对石家庄市初中生物教师职业倦怠的现状进行调查,调查结果发现,石家庄市初中生物教师这一群体普遍存在职业倦怠,情感枯竭程度偏高,成就感偏低,去个性化程度最为严重。

In measurements of a day,generallyspeaking,the photosynthesis of birch in mesophytic habitat is better than that in xerophytichabitat(peak values are 12.8,10.33μmolCO2m-2s-1 respectively);that of sexual birch inmesophytic habitat is better than that of clone birch(peak values are 9.87,6.71μmolCO2m-2s-1respectively);that of young tree is better than that of seedling(peak values are12.37,10.05μmolCO2m-2s-1 respectively).

在一天中的各个时刻,总体说来,中生生境生长的白桦光合作用超过旱生生境生长的白桦光合作用(净光合速率峰值分别为12.8、10.33μmolCO2m-2s-1);白桦幼树的光合作用超过白桦幼苗(净光合速率峰值分别为12.37、10.05μmolCO2m-2s-1);中生生境有性白桦的光合作用超过无性白桦的光合作用(净光合速率峰值分别为9.87μmolCO2m-2s-1、6.71μmolCO2m-2s-1)。