查询词典 in detail
- 与 in detail 相关的网络例句 [注:此内容来源于网络,仅供参考]
-
According to need of the system , I combined essential the step of developing engineering ,so seriesly in term of this development flow, I will discuss this procudure in detail and concisely in this thesis on principle of brachylogy hiberarchy, which is from definining question,a-the-board explanation for the system, and in favor of expanding the system in the future.
论文在论述时严格按照开发流程,以有详有略,层次分明、重点突出的原则,从问题定义、需求分析、总体设计、详细设计到编码、测试的顺序进行分析论述的,给系统一个清晰、全面地说明。有利于系统将来的扩充及完善。
-
According to need of the system , I combined essential the step of developing software engineering ,so seriesly in term of this development flow, I will discuss this procudure in detail and concisely in this thesis on principle of brachylogy hiberarchy, which is from definining question,analysising requirement, designing collectivity and to coding and testing.thus providing clear and across-the-board explanation for the system, and in favor of expanding the system in the future.
基于系统开发的过程是根据实际工作需要而结合软件工程的基本开发步骤设计开发的论文在论述时严格按照开发流程,以有详有略,层次分明重点突出的原则,从问题定义需求分析总体设计详细设计到编码测试的顺序进行分析论述的,给系统一个清晰全面地说明有利于系统将来的扩充及完善
-
According to need of the system I combined essential the step of developing software engineering so seriesly in term of this development flow I will discuss this procudure in detail and concisely in this thesis on principle of brachylogy hiberarchy which is from definining questionanalysising requirement designing collectivity and to coding and testing.thus providing clear and across-the-board explanation for the system and in favor of expanding the system in the future.
论文在论述时严格按照开发流程,以有详有略,层次分明、重点突出的原则,从问题定义、需求分析、总体设计、详细设计到编码、测试的顺序进行分析论述的,给系统一个清晰、全面地说明。有利于系统将来的扩充及完善。关键词:工资管理系统、Windows 操作系统平台、Delphi开发环境、使用权限。
-
Linear solvation energy relation was firstly introduced in the paper, and the method and step of gaining the special parameters of solvent and solute were introduced in detail, and these special parameters were used to selection and optimization of extractive agent in extractive distillation. The model of predicting activity coefficient at infinite dilution was established by linear solvation energy relation. By the above theory, several candidate solvents were selected to separate C5 fraction, and by experiment of vapor-liquid phase equilibrium at atmosphere pressure, the mixture of N-methyl-pyrrolidone including 4% water was used extractive agent of separating C5 fraction. Then binary vapor-liquid phase equilibrium of the some compound in C5 fraction and N-methyl-pyrolidone were determined at atmosphere pressure and correlated by NRTL equation. Isoprene being objective compound, experiments were operated in the laboratory-scale column; the processes were simulated by RadFrac model in ASPEN PLUS. And by the combination of experiment and simulation, the new process of separation of C5 was established.
本文首先对线性溶剂化能关系进行了分析介绍,也介绍了采用溶剂化能关系得到溶质溶剂特性参数的方法步骤,并将这些参数用于萃取精馏萃取剂的选择与优化;也通过线性溶剂化能关系式建立无限稀释活度系数预测模型,取得了一定的预测精度;将通过上述方法初选的溶剂进行了常压汽液平衡的测定研究,通过实验研究选定含水4%的N-甲基吡咯烷酮溶液做为C5分离的萃取剂,测定了大量N-甲基吡咯烷酮与C5组分的二元平衡数据,并进行关联计算;以异戊二烯为目标产物在实验室规模的精馏塔内进行了C5分离的实验研究,取得大量塔内数据;通过选用合适的热力学模型,采用ASPEN中RadFrac模块对分离过程进行模拟研究,通过实验与模拟相结合,建立了C5分离的新工艺,为将来的工业化打下了坚实的基础。
-
Chapter 1 briefs the relation between invariance and computer vision and summarizes the research and application of invariance in computer vision. Chapter 2 first derives the transformations of three camera models, then makes the correpondences between the models and three typical geometrical transformation groups by analysing the transformations respectively. The correspondences supply the theoretical basis for applying geometrical invariants to resolve the problems of computer vision. In Chapter 3, we describe the geometrical invariant theory and prove some geometrical invariants of coplanar points, lines or conics by algebraic method. In order to use the invariants of conic pairs to describe general 2D shapes, we discuss the perspectively invariant representation of planar curves using conies in detail. A system consisted of two TMS320C25 and based on moment invariants is introduced in Chapter 5. The system can recognize more than 30 different shapes of object model or more than 10 plane models with similar shape in real time.
第一章简述了不变性与计算机视觉的关系,以及计算机视觉中的不变性研究和应用概况;第二章推导了计算机视觉中常用三种投影模型的变换关系,通过对这三种变换关系的分析,分别建立了这三种投影模型和几何学中的三种变换群之间的一一对应关系,为几何不变性在计算机视觉中的应用提供了理论基础;在第三章中,我们介绍了几何不变性的理论,并且用代数方法证明了共面点、直线、二次曲线的几何不变量和射影不变量;为了把二次曲线的不变量用于一般二维形状描述,在第四章中我们详细地讨论了用二次曲线实现一般平面曲线的透视不变性表示的方法;第五章介绍了用两片TMS320C25构成的、基于不变矩形特征的运动目标实时识别系统。
-
It is in urgent need to build a traffic accident information spatial-database based on GIS. The contents of a perfect traffic accident information spatial-database should include three parts, i.e. spatial-database, influential factors database and database of metadata and data dictionary. Its important application value is described. The data in the database are organized with the idea of layer-organization in GIS. The structure of each table and correlation in-between these tables are designed in detail. T...
笔者分析了建立基于GIS的交通事故信息空间数据库的紧迫性;探讨了完备的交通事故信息数据库的内容构成,认为应包括空间数据库、影响因素数据库以及元数据和数据字典库三大部分;研讨了交通事故空间数据库的重要应用价值,进而采用GIS的分层组织思想对交通事故信息空间数据库中的数据进行组织;详细设计了各个数据表以及数据表间的关系,建立了包含交通事故对象、人、车、路以及环境等要素的交通事故空间数据库,为交通事故研究提供完备的数据支持。
-
In this paper, the concept of network security and security structures of OSI and Internet is introduced, and various threats confronting the computer network are also discussed. Several kinds of network information security technologies, including firewall technology, virtual private network, intrusion detection system, data encryption technology, identity authentication and security protocol etc. are also examined. The security of internal network is the biggest problem in the construction of each network. The solution to this problem lies in setting up a firewall. The theory of a firewall and the approach to its actualization is studied. Intrusion detection system, an important part of the computer network security system, has gained extensive attention. IDS monitors the computer and network traffic for intrusion and suspicious activities. It not only detects the intrusion from the extranet hacker, but also the intranet users. The emergence of virtual private network paves the way for realizing secure connection of LAN quickly and at a relatively low cost. The concept, function, key techniques, including the tunnel technology, and the ways to realize VPN are expounded in this paper. Also introduced is the data encrypt network technology, which is called the soul of computer network security, such as digital digest, digital signature, digital certificate, digital encrypt arithmetic and so on. At the same time, the principle and the process of implementing network security by digital certificate and digital signature, the basic principle and characters of security protocols, and finally, three of the security protocols, concerning the security problems in network, IPsec, SLL and SET are analyzed in detail Computer network system should be a system of dynamic defence, both dynamic and static, passive as well as active, and even offensive, combined with management and technology.
本文系统地介绍了网络安全的概念、OSI及Internet的安全体系结构,并讨论了计算机网络面临的各种安全威胁;内部网络的安全问题是每个建网单位面临的最大问题,可以认为防火墙技术是解决网络安全的一个主要手段,本文研究了防火墙的原理及其实现手段;作为一种主动的防御措施,入侵检测系统作为网络系统安全的重要组成部分,得到了广泛的重视,TDS对计算机和网络资源上的恶意使用行为进行识别和响应,不仅检测来自外部的入侵行为,也监督内部用户的未授权活动;虚拟专用网技术的出现,为实现网络间的连接提供了快速安全但又相对便宜的手段,本文较深入的探讨了实现VPN的隧道技术,并对VPN的概念、功能、实现途径、基本构成、关键技术及发展前景等问题进行了全面论述;数据加密技术是网络安全核心技术之一,本文从数据加密算法、数字摘要、数字签名及数字证书等几方面简要介绍了数据加密技术,并分析用数字证书和数字签名实现网络安全的原理和过程;对安全协议的基本原理、主要特点进行了较为深入的研究,并就网络的安全性问题剖析了三种安全协议:IPsec协议、SLL协议和SET协议。
-
According to the demand of high magnetic field power supply, reference is increased with a set ramp rate and stops at a set stable value, so reference system is composed of digital setting and digit to analog converting circuit. But the stability of reference is mostly guaranteed by the performance of D/A circuit, so D/A circuit is particularly studied in reference system. The scheme of D/A circuit, the selection of DAC and its voltage reference, hardware anti-jamming design and PCB design are discussed in detail, and software of remote control and PLC are discussed in brief. Zero-flux DC current transformer well satisfies the demands of the high stability of Load current detection unit, so the principle of zero-flux DC current transformer is analyzed; in the mean time a project which detects the long term stability is designed. During 8 hours, analog signal which is detected with high precision digit multimeter is recorded in computer at 1HZ frequency by GPIB communication. The drift error source and related parameters are explained in the compare-amplify part. Detailed subtraction circuit is designed; also amplifier chip and periphery components are selected and verified according to the theory of error analysis.
根据强磁场电源的需求,参考源应按照软件设定的斜率逐渐上升到设定稳态值,则参考源系统应由数字给定和数模转换电路两大部分组成,而参考源的稳定度主要依靠完成数模转换功能的模拟电路的性能来保证,因此本文对参考源系统的研究以数模转换电路为重点,分别从电路方案的确定、数模转换芯片及其基准电压源的选取和验证、电路板硬件抗干扰和PCB设计几方面进行了论述,然后对数字给定部分的远控组态和PLC程序设计作了简要介绍;采用零磁通原理的直流电流转换器很好地满足了对负载电流检测单元高稳定度的需求,本文详细分析了零磁通检测的原理,并在选定此种类型电流转换器的基础上设计了一套检测长期稳定度的方案,8小时内以1秒为采样周期,通过计算机Labview程序和高精度数字电压表的GPIB通讯,将被高精度数字电压表数字化后的模拟信号采样值连续记录至计算机中;比较放大环节简要阐述了漂移产生的原因和相关参数指标,确定了具体的减法电路形式,并根据误差分析理论对运算放大器和外围元器件进行了选取和验证。
-
Indicating the main characteristics of production technology in mail process center. Knowing in detail of the computer model and simulation method of discrete event system; investigation of computer simulation software; comparison and analysis the advantage and disdvantage of the simulation software. Modeling and simulating the package sorting production line in Xinjiang Newspapers and Periodicals Emitting Office and analyzing the simulation result. Modeling and simulating the hanging sorting -production line in Urmqi Mail Processing Center and analyzing the simulationresultProposes a simulation design method for the mail center auto product line, and made a simulation design for package emitting auto product line in Xinjiang Newspapers and Periodicals Emitting Office. Modeling a mathematical model and simulate for the construction of the sorting table of package sorting machine, and proposes a scheme of discriminatingly setting the buffers of sorting table.
本文的主要工作如下:针对邮政业务,特别是邮件处理中心的邮政业务作详细的调查分析,指出邮件处理中心生产工艺的主要特征;通过详细的了解离散事件系统计算机仿真技术的研究方法,并对计算机仿真软件作了周密的调查,借鉴、分析比较其功能特性的优缺点后,根据实际情况选购了本论文所需的仿真软件工具;对报刊发行局包件分拣生产线作计算机建模和仿真,将仿真结果作分析总结;对邮件处理中心转运中心的推推分拣生产线作计算机建模和仿真,得到仿真结果并作总结分析;提出邮件处理中心自动生产线的仿真设计方法,对报刊发行局期刊发行自动化生产线作仿真设计;最后对包件分拣机上包台结构建立数学模型和计算机仿真,提出多级上包台区别设置缓冲区的方案。
-
In this paper, we present a detection technology based on intrusion events in order to overcome the shortcomings of high false alert rate, serious redundant alerts and poor expression about the intrusion activities in today's intrusion detection systems. We describe the design ideas about the important methods used in this technology such as multi-sensor data fusion, raw alert distinguishment based on fuzzy rules and so on in detail.
在本文中,我们针对目前入侵检测系统普遍存在的误报率高、报警信息冗余现象严重和对入侵表述能力不强的缺陷,提出了一种基于入侵事件的检测分析技术,详细描述了该技术所采用主要方法的设计思想,如多传感器数据融合以及基于模糊规则的原始报警信息鉴别等。
- 相关中文对照歌词
- Devil's In The Detail
- 推荐网络例句
-
With Death guitarist Schuldiner adopting vocal duties, the band made a major impact on the scene.
随着死亡的吉他手Schuldiner接受主唱的职务,乐队在现实中树立了重要的影响。
-
But he could still end up breakfasting on Swiss-government issue muesli because all six are accused of nicking around 45 million pounds they should have paid to FIFA.
不过他最后仍有可能沦为瑞士政府&议事餐桌&上的一道早餐,因为这所有六个人都被指控把本应支付给国际足联的大约4500万英镑骗了个精光。
-
Closes the eye, the deep breathing, all no longer are the dreams as if......
关闭眼睛,深呼吸,一切不再是梦想,犹如。。。。。。