查询词典 process control
- 与 process control 相关的网络例句 [注:此内容来源于网络,仅供参考]
-
It is a generalization of the nonlinear diffusion equation proposed by Perona-Malik and the method presented by Cuesta, and interpolates between the nonlinear parabolic equation and the nonlinear hyperbolic equation, thus can effectively control the diffusion process so that noises can be removed and details of the image such as edges can be preserved as much as possible simultaneously.
提出了一种包含对时间的分数阶导数的非线性扩散方程,它是对Perona-Malik的非线性扩散方程和Cuesta提出的方程的推广,介于非线性抛物方程和非线性双曲方程之间,从而能有效地控制扩散过程,使得在去除图像噪声的同时能够尽可能地保留图像的边缘等细节信息。
-
This thesis is designed for using the general webcam, the information that acquired from the webcam and process after computer can imitate the movement of the cursor of the mouse , even the mouse event by clicking the icon that we want, it doesn't need to control mouse manually.
本论文主要在设计出利用一般的网路摄影机,加上经过电脑的运算后,即可模拟出滑鼠指标的移动,甚至是触发滑鼠的事件来点击我们想要的物件,也就是做出一个完全不需手动操控的滑鼠。
-
In order to process conveniently,we need to fit out with suitable style space curve usually in control processing.
在数控加工中,通常需要将空间曲线用合适的样条拟合出来,以方便加工。
-
A process for preparing cycloolefin features that in the presence of catalyst slurry containing metal Ru catalyst, water and metallic sulfate, the mononuclear aromatics is partially hydrogenated by hydrogen, and includes a step to control the activity of catalyst.
一种生产环烯烃的方法,该方法是在含有金属钌催化剂、水和金属硫酸盐的催化剂浆液存在下用氢部分加氢单环芳烃进行该方法,其中包括控制催化剂活性的步骤。
-
With the corresponding theoretical model established and perfected, it would be possible to provide a quantitative view of how proteins to control the process of cytokinesis.
随着相应理论模型的建立和完善,量化蛋白控制胞质分裂的过程将成为可能。
-
Industrial automation to the process of real-time control and data processing.
到工业自动化过程的实时控制和数据处理。
-
This paper is that dynamically demonstrates the six algorithms implementation auxiliary teaching software of the data structure It may adapt the different demand that the reader demands the algorithm data-in and the process execution control mode.
本论文是一个动态演示数据结构中六个算法执行过程的辅助教学软件,它可适应读者对算法的输入数据和过程执行的控制方式的不同需求,在计算机的屏幕上显示算法执行过程中,可以显现数据的逻辑结构或存储结构的变化状况或递归算法执行过程中栈的变化状况。
-
This paper is that dynamically demonstrates the six algorithms implementation auxiliary teaching software of the data structure It may adapt the different demand that the reader demands the algorithm data-in and the process execution control mode. During the demonstration of the algorithm implementation on the computer screen, it can appear the change status of the data logical organization or the memory structure change condition or the stack change condition in the recursion algorithm implementation.
本论文是一个动态演示数据结构中六个算法执行过程的辅助教学软件,它可适应读者对算法的输入数据和过程执行的控制方式的不同需求,在计算机的屏幕上显示算法执行过程中,可以显现数据的逻辑结构或存储结构的变化状况或递归算法执行过程中栈的变化状况。
-
According to using easy company network safe expert introduces: According to the frangibility of Web application process that OWASP organization released 2007 the statistical result of 10 big ranks makes clear, the flaw of the script that cross a station, infuse, request that cross a station is forged, information divulges the problem that waits for a respect to remain the hacker's at present popular attack way, and be atttacked with SQL infuse especially among them and cross station script attack to attach most importance to, the lawful sex that infuse of so called SQL is atttacked even if uses programmer to do not have pair of user data-in when writing code undertakes judging, bring about the person that inbreak to be able to command through insert and carrying out baleful SQL, obtain data to read the attributive; that take and revises and attack of the script that cross a station is join baleful code through be in the webpage, when the person that visit browses a webpage, the administrator of means prevail on that baleful code can be carried out or ceases through giving an administrator post a letter is browsed, win administrator limits of authority thereby, control whole website.
据动易公司网络安全专家介绍:根据2007年 OWASP 组织发布的 Web 应用程序脆弱性10大排名的统计结果表明,跨站脚本、注入漏洞、跨站请求伪造、信息泄露等方面的问题仍然是现在黑客流行的攻击方式,而其中尤以SQL注入攻击和跨站脚本攻击为重,所谓的SQL注入攻击就是利用程序员在编写代码时没有对用户输入数据的合法性进行判定,导致入侵者可以通过插入并执行恶意SQL命令,获得数据读取和修改的权限;而跨站脚本攻击则是通过在网页中加入恶意代码,当访问者浏览网页时,恶意代码会被执行或者通过给治理员发信息的方式诱使治理员浏览,从而获得治理员权限,控制整个网站。
-
In test software, database technology is used to control test process of cable net and save test result.
用数据库技术完成电缆网测试流程的控制和测试结果的保存和判断。
- 推荐网络例句
-
As she looked at Warrington's manly face, and dark, melancholy eyes, she had settled in her mind that he must have been the victim of an unhappy attachment.
每逢看到沃林顿那刚毅的脸,那乌黑、忧郁的眼睛,她便会相信,他一定作过不幸的爱情的受害者。
-
Maybe they'll disappear into a pothole.
也许他们将在壶穴里消失
-
But because of its youthful corporate culture—most people are hustled out of the door in their mid-40s—it had no one to send.
但是因为该公司年轻的企业文化——大多数员工在40来岁的时候都被请出公司——一时间没有好的人选。