英语人>网络例句>method of work 相关的网络例句
method of work相关的网络例句

查询词典 method of work

与 method of work 相关的网络例句 [注:此内容来源于网络,仅供参考]

In this work, GC-MS, ICP-OES, UV-Visible Spectrophotometry were employed to determine the trace concentrations of the above six hazardous substances, and a standard method system for screening primarily, extraction, qualitative and quantitative analyses of the six substances was established and their factors were analyzed. By evaluating the relative standard deviation, recovery, repeatability, limit of detection, linear relation etc., the optimum parameters were given and thus the precision of analysis was equal to or higher than the IEC 62321 standard, meeting the requirement of RoHS.

针对中国电子电气业在遵守RoHS符合性实践中存在的诸多问题,本文采用GC-MS,ICP-OES,UV-Visible分光光度法等,对我国南方和香港地区各类电子电气产品中六种有害物质进行痕量分析,建立了一套标准的六种有害物质初步筛选、萃取、定性、定量分析方法,并对此方法体系的影响因素进行分析,对其相对标准偏差、回复率、再现率、检出限、线性关系等进行评估,得出了优化测试参数,在此条件下其检测的精密度达到或高于国际IEC 62321标准,满足RoHS测试要求。

The research of grading for beef marbling by computer vision was carried out in this paper for the first time domestically, the work that done and the accomplishment are as follows:(1) Using quantitative method ,beef marbling area was proved to be the most important quantification index of marbling "rich degree".

本文首次在国内利用计算机视觉和神经网络技术进行牛肉大理石花纹分级的研究,所做的工作和取得的成果如下:(1)从定量的角度明确了大理石花纹面积是大理石花纹"丰富程度"最重要的量化指标。

Throughout my work, the expression method is not the core, rather I prefer to focus on the elements of the masochistic and ironic humor or the comical tragedy.

在我所有的作品中,表达方式并不是重点,而是想聚焦於被害者的特性,以及讽刺性的幽默或是卡通式的悲剧。

Also the SEM/EDS work need experience of handling different materials and samples, as well as different preparation method.

扫描电镜的操作需要一定的经验(技术员需要在工作中积累对不同材料和不同样品的观察方法,包括电镜样品的制备方法

This article consists of four parts: In the first part of thesis introduced Heisenberg's early years of life and the creation of Matrix mechanics, expounded Münich、G?ttingen,Copenhagen, three places different academic atmosphere which produce to Heisenberg's institute of physics, and revealed how to set up Matrix mechanics by mathematics method; The second part introduce Schr?dinger's university life, the research results, and the establishment of Wave mechanics. The different academic atmosphere of Vienna and Zürich have the difference influence which brings to Schr?dinger's research work, how to establishment the Schr?dinger equation based on Hamilton equation of classical mechanics, and elaborated the physical controversy caused by the equivalent.; The third part analyzed two mechanics different approaches in which the way to propose the question and solve the question; The last part recommend the different philosophy interpretations, Schr?dinger's interpretation onΨfunction, the statistical interpretation of Wave mechanics, uncertainty principle, and which caused this free discussion of quantum mechanics.

文章共分为四部分:第一部分介绍了海森伯的早年生活及其创立矩阵力学的过程,阐明了慕尼黑、哥廷根、哥本哈根三地不同的学术氛围对海森伯的物理研究所产生的不同作用,并揭示了海森伯如何用数学方法建立矩阵力学方程的过程;第二部分介绍了薛定谔的大学生活、研究成果,以及波动力学的创立过程,说明了维也纳和苏黎世不同的学术气氛给薛定谔的研究工作带来的不同影响,解释了薛定谔以经典哈密顿方程为基础建立薛定谔方程的过程,并阐述了等价性所引起的物理争论;第三部分分析了两种力学的思想进路在提出问题、解决问题上的不同;最后一部分介绍了对两种力学形式不同的哲学诠释,薛定谔对Ψ函数的诠释、波函数的统计解释和测不准原理,以及由此引起的量子力学的大讨论。

Applied in the general medical check-up of our college, the method saved the work amount 7 days/person ...

在我院的检验工作中,平均每年可节省检验师一人七天的工作量,同时创造经济效益710元。

The security of PKI system itself is especially emphasized during the system design and implementation process, which is in accordance with the pervasive characteristic of PKI. Second, the concept of a Trusted Key Management Center is introduced for the first time. This technology greatly strengthens key management practices and allows for smooth transition from PKI to Key Management Infrastructure. Third, certificate status mechanisms are investigated in depth, and a certificate revocation performance simulation system is devised. All these work will provide guides to practice and employment of PKI applications. Based on time constraints, a new taxonomy for authenticated dictionaries is proposed. Fourth, formal analysis ofOCSP protocol is carried out; then an efficient and scalable OCSP system is developed. Fifth, the special requirements caused by the working environments of Wireless PKI are analyzed. Based on communicative hashing and dynamic Merkle hash tree, an efficient certificate status validation method suitable for WPKI is presented. Sixth, one important kind of fair exchange protocols is studied, and a new CEMBS based on RSA cryptosystem is proposed. Afterwards, a novel fair exchange protocol totally based on RSA signature scheme is devised.

在系统设计和实现的过程中,考虑到PKI作为普适性安全基础平台的特点,特别强调PKI系统自身的安全性;第二,首次在PKI系统的设计中提出了"可信密钥管理中心"的概念,这一独特设计大大地强化了密钥管理功能的实施,为PKI向密钥管理基础设施的平滑过渡提供了良好的技术准备;第三,对证书状态验证机制进行了深入研究,设计了证书状态模拟系统,以指导PKI系统和应用的部署和实施;在此基础上,基于时间约束首次给出了认证字典的一种新的分类方法;第四,对OCSP协议进行了形式化分析,设计和实现了一种高效、可扩展的OCSP系统;第五,分析了WPKI工作环境对设计安全基础平台提出的特殊要求,结合无线移动设备的具体特点,基于可交换杂凑函数和动态Merkle杂凑树设计出了一种适用于WPKI环境的高效证书状态查询机制;第六,对一类公平交换协议进行了深入的研究,从设计公平交换协议的密码基础结构出发,提出了一种新型的基于RSA密码体制的高效CEMBS;在此工作的基础上,设计了一种基于RSA密码体制的最优化公平交换协议。

The security of PKI system itself is especially emphasized during the system design and implementation process, which is in accordance with the pervasive characteristic of PKI. Second, the concept of a Trusted Key Management Center is introduced for the first time. This technology greatly strengthens key management practices and allows for smooth transition from PKI to Key Management Infrastructure . Third, certificate status mechanisms are investigated in depth, and a certificate revocation performance simulation system is devised. All these work will provide guides to practice and employment of PKI applications. Based on time constraints, a new taxonomy for authenticated dictionaries is proposed. Fourth, formal analysis of OCSP protocol is carried out; then an efficient and scalable OCSP system is developed. Fifth, the special requirements caused by the working environments of Wireless PKI are analyzed. Based on communicative hashing and dynamic Merkle hash tree, an efficient certificate status validation method suitable for WPKI is presented. Sixth, one important kind of fair exchange protocols is studied, and a new CEMBS based on RSA cryptosystem is proposed. Afterwards, a novel fair exchange protocol totally based on RSA signature scheme is devised.

在系统设计和实现的过程中,考虑到PKI作为普适性安全基础平台的特点,特别强调PKI系统自身的安全性;第二,首次在PKI系统的设计中提出了"可信密钥管理中心"的概念,这一独特设计大大地强化了密钥管理功能的实施,为PKI向密钥管理基础设施的平滑过渡提供了良好的技术准备;第三,对证书状态验证机制进行了深入研究,设计了证书状态模拟系统,以指导PKI系统和应用的部署和实施;在此基础上,基于时间约束首次给出了认证字典的一种新的分类方法;第四,对OCSP协议进行了形式化分析,设计和实现了一种高效、可扩展的OCSP系统;第五,分析了WPKI工作环境对设计安全基础平台提出的特殊要求,结合无线移动设备的具体特点,基于可交换杂凑函数和动态Merkle杂凑树设计出了一种适用于WPKI环境的高效证书状态查询机制;第六,对一类公平交换协议进行了深入的研究,从设计公平交换协议的密码基础结构出发,提出了一种新型的基于RSA密码体制的高效CEMBS;在此工作的基础上,设计了一种基于RSA密码体制的最优化公平交换协议。

On the principle of the deformation work this paper words out a very simple method for approximate calculation of the extrusion force in the metalic plastic extrusion processes.

运用变形功原理,推导出求金属塑性挤压过程中挤压力的一种极其简捷的近似计算式。

The main work of the thesis consists of summarizing the characteristics of the approximation methods,compiling the programs of approximation methods,and getting availability of every approximation method according to examples.

本文的主要工作是总结各种近似方法的特点,编写各近似方法的程序,通过算例总结出各种近似方法的适用性。

第54/80页 首页 < ... 50 51 52 53 54 55 56 57 58 ... > 尾页
推荐网络例句

But we don't care about Battlegrounds.

但我们并不在乎沙场中的显露。

Ah! don't mention it, the butcher's shop is a horror.

啊!不用提了。提到肉,真是糟透了。

Tristan, I have nowhere to send this letter and no reason to believe you wish to receive it.

Tristan ,我不知道把这信寄到哪里,也不知道你是否想收到它。