查询词典 integral part
- 与 integral part 相关的网络例句 [注:此内容来源于网络,仅供参考]
-
When heating,the part was exposed in the air,so it's easier to be oxdized,decarburized,which effect the surface characters of part.
金属加热时,工件暴露在空气中,常常发生氧化、脱碳(即钢铁零件表面碳含量降低),这对于热处理后零件的表面性能有很不利的影响。
-
The process features and shape features of the electronic part are classified and defined, and then the feature model library is built, which enables rapid input of the part information. The rules and methods of stamping process design are summarized to build the stamping process library, so that the stamping process can be designed rapidly and intelligently. Furtherly, the process design rules and methods in process station layout of multi-station progressive die as well as the methods of decompounding and compounding process and the expression method of the process station layout are concluded and summarized, and then the rule library and case library of process station layout are built. Designing the process station layout rapidly is carried out based on rules and cases. At last the rapid design function of process station layout is validated through simulating the rapid designing layout system of multi-station progressive die on Pro/E 3D platform.
主要研究成果有:对电子产品冲压件的工艺特征与形状特征进行了分类和定义,建立了特征模型库,实现了冲压件信息的快速输入;归纳了冲压工艺设计规则和方法,建立了冲压工艺知识库,实现了冲压工艺快速与智能化设计;归纳总结了多工位级进模工步排样中的工序设计原则和方法,工序分解与工序组合方法,工步排样知识的表示方法,建立了工步排样规则库和实例库,利用基于规则和实例的推理方法,实现了工步排样的快速设计;在Pro/E三维软件平台上开发了电子产品多工位级进模工步排样快速设计系统,系统通过实例验证了工步排样的快速设计功能。
-
This thesis mainly deals with the packet filter firewall by applicating Netfilter on the basis of Linux, consisting of seven parts: first, it generally describes the firewall; second, it introduces the exploiting platform Linux and the software debug environment; third, it simply analyzes some networking protocols; fourth, it analyzes the network attacks and their defensing measures; fifth, it describes the most important part of the thesis--the analysis of netfilter's frame and the exploiting and designing process of the firewall; sixth, it introduces the design of the device drivers of the Linux which is the theory base of exploting the user's interface ; the last part is the applicating guide of its exploiting process.
本文介绍了运用Netfilter防火墙技术,在LINUX环境上实现包过滤防火墙的方法和过程,在内容上主要包括了七个部分:第一部分对防火墙的概述;第二部分则介绍此次开发的平台LINUX和软调环境;第三部分对几种网络协议做了简单的分析;第四部分分析了网络攻击及其防御措施;第五部分则是本次设计的核心部分Netfilter框架分析以及防火墙的开发设计思路;第六部分则介绍LINUX设备驱动程序的设计,它是开发用户接口部分的理论基础;最后则是所开发程序的使用说明部分。
-
This thesis mainly deals with the packet filter firewall by applicating Netfilter on the basis of Linux, consisting of seven parts: first, it generally describes the firewall; second, it introduces the exploiting platform Linux and the software debug environment; third, it simply analyzes some networking protocols; fourth, it analyzes the network attacks and their defensing measures; fifth, it describes the most important part of the thesis--the analysis of netfilters frame and the exploiting and designing process of the firewall; sixth, it introduces the design of the device drivers of the Linux which is the theory base of exploting the users interface ; the last part is the applicating guide of its exploiting process.
本文介绍了运用Netfilter防火墙技术,在LINUX环境上实现包过滤防火墙的方法和过程,在内容上主要包括了7个部分:第1部分对防火墙的概述;第2部分则介绍此次开发的平台LINUX和软调环境;第3部分对几种网络协议做了简单的分析;第4部分分析了网络攻击及其防御措施;第5部分则是本次设计的核心部分Netfilter框架分析以及防火墙的开发设计思路;第6部分则介绍LINUX设备驱动程序的设计,它是开发用户接口部分的理论基础;最后则是所开发程序的使用说明部分。
-
This thesis mainly deals with the packet filter firewall by applicating Netfilter on the basis of Linux, consisting of seven parts: first, it generally describes the firewall; second, it introduces the exploiting platform Linux and the software debug environment; third, it simply analyzes some networking protocols; fourth, it analyzes the network attacks and their defensing measures; fifth, it describes the most important part of the thesis--the analysis of netfilters frame and the exploiting and designing process of the firewall; sixth, it introduces the design of the device drivers of the Linux which is the theory base of exploting the users interface ; the last part is the applicating guide of its exploiting process.
本文介绍了运用Netfilter防火墙技术,在LINUX环境上实现包过滤防火墙的方法和过程,在内容上主要包括了七个部分:第一部分对防火墙的概述;第二部分则介绍此次开发的平台LINUX和软调环境;第三部分对几种网络协议做了简单的分析;第四部分分析了网络攻击及其防御措施;第五部分则是本次设计的核心部分Netfilter框架分析以及防火墙的开发设计思路;第六部分则介绍LINUX设备驱动程序的设计,它是开发用户接口部分的理论基础;最后则是所开发程序的使用说明部分。
-
In this book I have endeavoured to show, first, what are the necessary expenses of the sovereign, or commonwealth; which of those expenses ought to be defrayed by the general contribution of the whole society; and which of them by that of some particular part only, or of some particular members of it: secondly, what are the different methods in which the whole society may be made to contribute towards defraying the expenses incumbent on the whole society, and what are the principal advantages and inconveniences of each of those methods: and, thirdly and lastly, what are the reasons and causes which have induced almost all modern governments to mortgage some part of this revenue, or to contract debts, and what have been the effects of those debts upon the real wealth, the annual produce of the land and labour of the society.
在第5本书中,我将尽力解释下面几个部分,首先,哪些公共财产是必须花费的,其中哪些是需要全社会来承担的费用,哪些只需要部分人群支付;其次,整个社会来负担公共支出的方法,以及各种方式主要的优点和切点;最后,到底是什么原因促使现代政府用它的部分税收进行放贷,或者借出钱,以及这些负债对于真实财富和物资年产量和社会劳动力的影响。
-
This article is divided into seven sections: The first part deals with Martin Luther King Jr.'s experiences in his early years; the second with the Montgomery bus boycott led by King ,the action lasted one year and a few weeks and finally the city's buses were desegregated; the third with the Southern Christian Leadership Conference built by King and his other black leaders ,aiming at promoting the successful Montgomery action; the fourth with the letter from the Birmingham jail,this section fully demonstrated King's strong will and persistence for Black Civil Movement ;the fifth with Challenges of the final years,during which King had to meet the challenges from inside and outside for his business; the sixth with Posthumous reputation and legacy,this part records the reputation King owned after his death in honor of his outstanding contribution for Black Civil Movement and the controversy; the seventh with assessment,it mainly focuses on great influence King had on human being ,especially American politics and economics.
摘要这篇文章分为六个部分,第一部分介绍了马丁·路德·金早年的成长历程;第二部分记述了金投身民权事业,组织蒙哥马利罢乘运动,这场运动前后持续了一年零几个月,最后迫使法院判决该市在公交车上实施种族隔离的做法是非法的,活动取得成功;第三部分记述了金和其他黑人民权领导人建立南方基督教领导会议,以寻求蒙哥马利胜利后的进一步发展;第四部分记述了金被捕后,在伯明翰监狱仍坚持斗争,充分显示了他对黑人民权事业的坚定信念;第五部分记述了金在遇害的前几年,为了进一步发展他的事业,所面临的来自内外的挑战;第六部分记述了金死后,为了纪念其对民权运动作出的卓越贡献,各种殊荣纷至踏来,从而也引发了对金的争议;最后一部分探讨了金死后,对后世,尤其是对美国社会政治和经济的影响。
-
We feel very pleased that your part designates us as the exclusive agency of your part.
对贵方有意指定我们成为贵方产品的独家代理,我们感到很高兴。
-
Cross-section Imaging Measurement simultaneously digitizes both exterior and interior surfaces of a part, a full data geometry model of a part can be constructed. The technique helps to shorten the design-to-manufacture time and reduce the cost of the product.
采用层去图象法测量技术可以同时测量零件的内外轮廓特征,得到零件的完整数据模型,精度也较高,而且还有助于缩短产品的设计和生产周期,降低生产成本。
-
Considering that magic cube is easy to disarrange and hard to solve, I designed the Magic Cube Stream Cipher: the main part is a virtual cube filled with data; by turning the magic cube many times, original data are disarranged and new ones are generated; new data serve as current secret key, which is a part of the key stream.
我根据魔方&打乱容易恢复难&的特性,设计了魔方流密码算法:主体是一个由数据构成的虚拟魔方;利用多次魔方变换改变数据&魔方&的整体状态并生成新的数据;以此作为本次加密运算的密钥。
- 相关中文对照歌词
- Part Time Mutha
- Integral
- Conflict
- Part Of Me
- How I Miss Sally Bray
- No Part Of You
- Death Panorama
- Every Part Of Me
- Crazy Love, Vol. II
- Till Deaf Do Us Part
- 推荐网络例句
-
" I' d like to get some rough idea about music in the baroque ear, please."
请简要介绍一下巴罗克时期的音乐,好吗?
-
The results showed that the peak latency and pattern of SEPs elicited by electrical needling in LI-l1 and MP were similar. The amplitude of SEPs elicited by electrical needling in LI-l1 was higher than that of MP. There was no obvious SEPs generation when MM was electrical needling.
结果显示,电针刺激曲池穴和其邻近桡侧伸腕长肌运动点诱发性脑电波的波形和波峰时间是类似的,只是穴位的诱发性脑电波波幅较大,而电针刺激非穴位点并没有明显的诱发性脑电位。
-
Mom and Dad better bone up on these not so ordinary competitions like polo, yachting and synchronized swimming!
爸爸妈妈更好的骨落实这些不是普通的比赛一样,水球,帆船和花样游泳!