英语人>网络例句>using 相关的网络例句
using相关的网络例句

查询词典 using

与 using 相关的网络例句 [注:此内容来源于网络,仅供参考]

Variations: using pepper vodka, using chili powder rims, using port instead of sherry, using clamato juice instead of tomato juice, using beef bouillon instead of tomato juice or other liquors instead of vodka (sake = Tokyo Bloody Mary, gin = Red Snapper, tequila = Bloody Maria), or celery salt instead of regular salt.

可变配方:使用冰冻过的胡椒味伏特加酒,使用红葡萄酒替代雪利酒,用clamato果汁代替番茄汁,牛肉汤代替番茄汁或其他利口酒代替伏特加清酒=东京血腥玛丽,杜松子酒=红鲷鱼,龙舌兰酒=血腥的玛利亚),或芹菜盐代替平常用的盐。

The results show that the ingather of tungsten in the composites using internal feedstock injection is higher than that of the composites using external feedstock injection. For the composites using IFI method, the influence of input power on the copper oxidation is not evident, while more and more cuprite (Cu2O) is detected with the increasing of input power for the composites using EFI method. The thermal conductivity of WCu composite is lower than the theoretical value by ROM.

结果表明,在内部送粉条件下,复合材料中钨的收得率要高于外部送粉条件下复合材料中钨的收得率;在内部送粉条件下,功率对铜氧化的影响并不明显;而在外部送粉条件下,随着功率的提高,铜的氧化明显增多;由于氧化物和孔隙等的存在,利用大气等离子喷涂工艺制备的复合材料的导热率远远低于根据混合法则计算的理论值。

Vidicon collect simulate image in period of time and send to computer or DSP chip through video collection card digitlization,use computer to gain eyewinker and process digital image processing:using image area segment and boder measure to calculate area and perimeter;using image smoothness to wipp offthe infection of yawp;using dynamic background and image suited technology to overcome the infection of ray;calculation the parameter of eyewinker(area, perimeter,round measurement, proportion characer and invariant monent),using least norm to design the linearity classify parts,using image matching technologyto classify eyewinker,and to judge whether the eyewinker is harmful to diff background,if the eyewinker satisfy the character require of harmful object ,system will auto-stsrt alarm device. If there ia not have found any eyewinker, Vidicon will collect new simulate image and make processing.

本设计是将摄像机或高频头采集到的模拟图像经过视频采集卡数字化后送入计算机或DSP芯片,利用计算机对采集到的一定时间段内的图像进行异物获取,并对异物图像进行数字图像处理:利用图像区域分割和边缘检测以便进行面积和周长的计算,利用图像平滑去除噪声的影响,利用动态背景运动检测法和图像配准技术克服光线的影响,并通过异物的各类参数(如面积、周长、圆形度、比例特征和不变矩等)的计算,采用最小范数分类法设计了线性分类器,利用图像匹配技术对异物进行分类,从而判断异物是否有害,针对于不同的背景,若异物满足有害物体的特征要求,则认为物体有害,自动启动报警装置,如果没有发现有害异物则新摄入的图像将取代前一时间段的图像再进行图像处理。

After the analysis it was concluded that the mean velocity fluctuations of the strata under Jidike Group in this working area could be divided into three zones: the minor velocity fluctuation zone in southern Dalaoba tectonic belt, the steep velocity fluctuation zone of the foreslope in middle YK structure and the zone from the bowtype thrusting tectonic belt in northern Qiulige to the minor velocity fluctuation zone in YK tectonic zone. On the basis of a good command of the regular patterns of the velocities in vertical and horizontal dimensions in the investigating area, the stack velocity was interpreted in a interactive mode by using the Depthteam Express modelling package of the Landmark system, converting the stack velocity into mean velocity by means of Dix formula. Based on the well drilling layering data, the velocity correction was executied to get the final corrected velocity model by using the Kriging Correction. By using this velocity model, we did the time to depth conversion and obtained the final depth structural map. After mapping by using the variable velocities, we came in for the display of the tectonic map of the seismic data.

经研究认为本区的吉迪克组以下层位平均速度变化可分成三个变化区域:南部大涝坝构造带速度变化平缓区;中部亚肯构造前缘斜坡区速度变化强烈区;北部秋里塔格弧形逆冲构造带前缘至亚肯构造带速度变化平缓区,在撑握工区速度纵、横向变化规律基础上,应用Landmark解释系统Depthteam Express速度建模软件包对迭加速度进行交互解释,利用DIX公式把迭加速度转换成平均速度,根据区内钻井分层数据采用克里金校正方法进行速度校正,得到最终校正后的速度模型,用此速度模型进行时深转换,得到最终的深度构造图,此次变速成图后,得到地震资料构造图显示。

Widely developing biology prevention and cure, using the gypsy moth NPV control the larva of gypsy moth, it's effect can reach above 70%, and it can easily form epidemic, then it will have the effect of long period's controlling; using Bt control the gypsy moth, it's effect can reach above 80%; using the gypsy moth Grplure can also gain certain effect; firstly using self-produced plant insecticide control the gypsy moth, it's controlling effect of origin liquid can reach 82.3%, and has widely using foreground.

广泛开展生物防治,利用舞毒蛾NPV防治舞毒蛾幼虫,防治效果达70%以上,且易形成流行病,可起到长期控制的作用;利用Bt防治舞毒蛾效果在80%以上;利用舞毒蛾性引诱剂也能收到一定的效果;首次应用自制的植物性杀虫剂防治舞毒蛾,应用原液防治效果达82.3%,有广阔的应用前景。

The common ways are: using pun to translate pun, using substitute, using paronym to compensate pun, using shifting, preserving both the surface meaning and underlying meaning, preserving either the surface meaning or the underlying meaning, using explanatory translation, and the last choice is adding notes.

普遍的方法是:用双关译双关、替代法、用谐音来补偿双关、转移法、同时保留表层意思和隐含意思、保留表层意思或隐含意思、用解释翻译法、以及加注。

In chapter 4, basing theories and methods of scientific visualization, and artificial neural network BP algorithm, we integrate the Visual C++, OpenGL graphics library and Excel VBA technique to develop the program of artificial neural network and to make the BP algorithm visually, this program works can be divided into four parts: Using C language to develop program about BP algorithm; Using Visual C++, develop the GUI Interface, make input parameter visually; Using OpenGL graphic technique to display the training sample point in three dimension; at last using Excel DDE technique display the error graphic tables in Excel system In chapter 5, on the view of engineering application, we establish new method of surface reconstruction basing artificial neural network, develop interface program between module and commercial CAD/CAM system, meantime deeply discuss some key problems, for example, setting up the base plane, using the API technique, cutting and editing surface boundary, and also discuss the more compliant problem: how to intersect surface, at end we finish the work of translation from our surface reconstruction module to commercial CAD/CAM system, then make reverse engineering system basing artificial neural network more useful.

第四章基于科学计算可视化理论,依据人工神经网络BP算法理论模型,综合Visual C++,OpenGL图形库以及Excel VBA等多项软件开发技术,编制了人工神经网络程序,实现了BP算法的可视化映射。具体工作分为四部分:利用C语言实现人工神经网络BP算法;利用VisualC++的GUI技术开发图形用户界面,实现参数设置可视化;利用OpenGL图形技术进行三维映射,显示学习样本及训练样本点;利用微软电子表格DDE动态数据交换技术,在Excel上动态显示学习误差曲线图。第五章从工程应用的角度出发,提出了一种新的基于人工神经网络算法的曲面裁剪重构方法,完成了曲面重建模块与通用CAD/CAM系统的接口设计工作,对其中的若干关键问题进行了深入讨论,例如基平面设定、API技术的应用、边界裁剪等问题,同时,对曲面计算中较为困难的曲面相交问题也进行的专门探讨,最终完成了曲面重建模块向CAD/CAM系统的数据传输工作,使人工神经网络逆向工程系统趋向实用。

The design includes many new technologies in data exchange and data security, they are: Converting non-XML data to XML in order to apply the XML security technology to more data types; Using the technology of XKMS and PKI to manage the public key in order to overcome the shortage of complexity and difficulty in using PKI and improve the efficiency of the public key management; Using Diffe-Hellman algorithm combining with the public key technology to exchange secret key in order to furthest increase the security of the key; Using the technology of XML digital signature algorithm to ensure the integrity, message authentication and signer authentication of the data; Using the technology of XML encryption to ensure confidentiality of the data; Defining delegable access rules on the structure and content of the XML documents to provide fine-grained access control. According to the XML security framework, a XML security library is designed and implemented.

在对XML及其安全技术主要包括XML加密技术、XML数字签名、公钥管理、密钥产生和交换进行研究的基础上,结合传统密码技术和XML安全技术提出了一种基于XML的数据安全模型,模型中包含了目前网络数据交换和安全领域的一系列最新技术,主要有:将非XML格式数据转换为XML格式数据的方法,以保证现有的大部分网络数据能够应用XML安全技术;使用XML公钥管理技术结合PKI技术管理公钥,以克服PKI技术实施和部署复杂、难度大等问题,提高公钥管理的效率;使用Diffie-Hellman算法结合公钥技术交换密钥,以最大限度保证密钥的安全;使用XML数字签名技术保证数据的完整性、不可否认性和发送方身份认证;使用XML加密技术保证数据的机密性;根据XML文档的内容和结构定义授权访问规则进行良好的访问控制。

So, this thesis studied the intermediary banking business based on the background of the development of ICBC. Through using plenty of investigation combining much detailed data adopting the qualitative analysis and the quantitative analysis.using some knowledge of manage, we analyzed the general environment and by using Bauds five power model we thoroughly analyzed and forecasted the industry environment that influence the intermediary banking business development. Last we evaluated the external environment by using the exterior factor evaluation matrix; in the same way we evaluated the internal environment by using he interior factor evaluation matrix and BCG matrix drawing.

因此,本文以中国工商银行中间业务发展为背景,在充分调查研究的基础上,结合大量详实的数据,采用定性分析与定量分析相结合的方式,结合管理学的相关理论,分析了中间业务发展所面临的一般环境,运用波特的五种力量模型对工商银行中间业务发展所面临的行业环境进行了详细的分析和预测,并运用外部因素评价矩阵对外部环境进行了评价;同样地,运用BCG矩阵图和内部因素评价矩阵对内部环境因素进行了评价。

The data were analyzed in terms of the procedures, which were explicated by The Grounded Theory in the first stage and The Phenomenology in the second stage. The findings of this study were as follow:(1) The model of drug using was dynamic cycles, including initial drug using, continued using, addiction, reintegration, relapse, re-continued using and re-addiction to drugs. But not all cases entered into this cycle.(2) Some drug abusers may stop using drug because of some reasons, but it was hard to confirm that they didn't reenter this cycle again.

结果发现:进入用药行为的循环历程模式,吸毒者呈现出一个初尝、持续使用、成瘾、重整、再度用药、持续使用、成瘾的循环动态之过程,不过并非每个个案均完全进行循环,在每一个阶段中个案有可能随时因某些因素而中止,但中止并不代表个案即真正戒除毒品,视个案反思、自觉能力的强弱,有无进入深度的痛改而采取行动达到真正的戒除,若无则可能在某些条件的促进下又再度进入吸毒的循环中。

第2/100页 首页 < 1 2 3 4 5 6 7 8 9 ... > 尾页
相关中文对照歌词
Using Our Feet
Are You Using Me?
(Lord It's Hard To Be Happy When You're Not) Using The Metric System
Without Using Hands
推荐网络例句

They weren't aggressive, but I yelled and threw a rock in their direction to get them off the trail and away from me, just in case.

他们没有侵略性,但我大喊,并在他们的方向扔石头让他们过的线索,远离我,以防万一。

In slot 2 in your bag put wrapping paper, quantity does not matter in this case.

在你的书包里槽2把包装纸、数量无关紧要。

Store this product in a sealed, lightproof, dry and cool place.

密封,遮光,置阴凉干燥处。