上模
- 与 上模 相关的网络例句 [注:此内容来源于网络,仅供参考]
-
Firstly, a systematic study of lots of paper is made, modal analysis method that accord to frequency response function is introduced.
本文首先在综述大量相关文献的基础上,系统总结了根据系统频响函数进行模态分析的方法。
-
Figure 3 shows the frequency response function determined by the help of a modal analysis based on the impact hammer method.
图3显示频率响应函数确定的帮助下模态分析的基础上,冲击锤的方法。
-
Focal cerebral ischemia rats with right middle cerebral artery occlusion using a thread block technique had some degree behavior disorder to some degree, with Powerless palpebra frontalis, levo- circling objective signs, and their left forefoot flection couldnt expand thoroughly.
结果 1。大鼠经过栓塞右侧大脑中动脉造成脑缺血后,均出现不同程度的行为异常,表现为上眼睑无力,左侧前肢和后肢屈曲不能充分伸展,或出现向左侧转圈等体征,表明造模成功。
-
This paper explores ways to prove fundamental theorem of algebra with mathematical analysis.
该证明从复变多项式无非零最小模引入,并在此基础上简单证明了代数学的基本定理。
-
We prove the Fundamental Theorem of the entwined modules and give a necessary and sufficient condition for the R-twisted product of two bialgebras to be a bialgebra.
主要证明了缠扭模上的基本定理;给出了两个双代数的R-扭积是双代数的一个充要条件。
-
In this paper, normalized cubic Gauss sums distribution at unit circle is studied by analytical methods.
本文运用解析的方法,研究模为算术级数中素数的正规化三次高斯和在单位圆周上的分布。
-
And then a struct model of security storage system and relative security mechanism is designed, in witch a grade-accessing control sheme and a data-encrypted key distributing arithmetic based on common module general linear congruent equation class are designed to realize that storage data is accessed safely and shared by grade.
在此基础上,详细给出了iSCSI-SAN存储系统安全机制的设计方案,重点设计了基于权限证书的访问控制机制和基于共模p的线性同余方程组的数据加密密钥分配算法,实现了存储数据的安全访问与分级共享。
-
And with these results, I delve further into the theoretical issues of MSP and the concentration is on a special class of MSP-Doob skeleton processes. Generalized limit distribution, limit distribution of these processes and conditions and the expressions for the existence of invariable measure of such processes are provided. Finally, these new results are then applied to queueing theory, reliability theory and inventory theory. A detailed study of GI/G/1 queuing model, parallel connection system model, water reservoir model and perishable inventory model is discussed. These models have already been investigated to some degree. In particular, as mentioned above, some scholars have already successfully applied the transient behavior theory of MSP to these models and transient distributions of main variables in such models have been obtained. However, the limit behavior has not been addressed. In this thesis, limit behavior of main variables in the above-mentioned models is established.
在这个基础上,对马尔可夫骨架过程的理论进一步进行了探讨,将注意力集中于一类特殊的马尔可夫骨架过程Doob骨架过程,给出了这类过程的广义极限分布、极限分布以及不变测度存在性条件和表达式,并应用这些结论于排队论、可靠性理论和存储论等领域-具体分析了GI/G/1排队论系统模型、并联系统模型、水库储水模型、易腐烂物品库存模型——这些模型都不同程度地被许多学者研究过,特别,如前面提及,已有人成功地应用马尔可夫骨架过程的瞬时性态理论,获得了上述各模型中的主要参量过程的瞬时分布,但是,却并没有探讨它们的极限性态——建立了若干关于上述各模犁的主要参量过程的极限性态的结果。
-
Methods]Trichophyton mentagrophytes were scrubbed tightly on the back skin of guinea pigs,and the experimental animal models were set up .The ginger oleoresin gel were used in infective part,and alteration of skin lesions and pathologial changes were observed.
方法] 采用砂纸造模法将须癣毛癣菌接种在豚鼠上,建立动物模型,观察药物对动物皮损的改变及病理改变。
-
The algorithms of basic operations for large integer,addition,subtraction and comparison,are presented based on mixed radix representation,the algorithms of multiplication,division, modulo ,and greatest common divisor are conveyed from addition machins.
将大数采用混合基表示,对大数的加法、减法与比较运算给出相应的算法,并对加法机器上的乘法、除法、模运算以及求最大公因子的算法进行了移
- 推荐网络例句
-
This one mode pays close attention to network credence foundation of the businessman very much.
这一模式非常关注商人的网络信用基础。
-
Cell morphology of bacterial ghost of Pasteurella multocida was observed by scanning electron microscopy and inactivation ratio was estimated by CFU analysi.
扫描电镜观察多杀性巴氏杆菌细菌幽灵和菌落形成单位评价遗传灭活率。
-
There is no differences of cell proliferation vitality between labeled and unlabeled NSCs.
双标记神经干细胞的增殖、分化活力与未标记神经干细胞相比无改变。