利用不足
- 与 利用不足 相关的网络例句 [注:此内容来源于网络,仅供参考]
-
The deficiency of direct connection theorem is analyzed, and a novel algorithm based on both simple connection theorem and root search theorem is presented. Since standard information in Management Information Base is only used, the algorithm is independent of any special product families.
分析了直接连接定理的不足,给出了一种新的基於简单连接定理和根搜索定理的算法,由於只利用标准的管理信息库,所以该算法不依赖於特定产品类别。
-
Shortcomings of Tikhonov regularization model in Sobolev space for image zoom in are analyzed and a digital total variation model with image inpainting for noisy image zoom-in is presented.
分析了利用Sobolev空间Tikhonov正则化模型对带噪图像进行放大的不足,基于图像的修复模型,提出带噪图像放大的数字全变差模型。
-
To promote a rigid and synergic corporate culture, exercise the combined effects of the team, and
业文化,发挥团队的组合作用,利用团队的互补性来弥补个体的不足。
-
Floods,the shortage of water resources,water pollution has become our safety in the use of water resources faced by the three main issues.
中文摘要:摘要洪涝灾害、水资源不足、水环境污染已成为我们在水资源安全利用方面所面临的三大主要问题。
-
Aimming at the shortcoming in precision measurement of artillery adjusting, a kind of three-ply intersection measurement method based binocular stereo vision is proposed. CCD is used to capture images of the sign object attached on gun barrel, and three-dimensional coordinates is calculated by geometrical projection relation of the sign object image.
针对火炮调炮精度检测中存在的不足,提出了一种基于双目立体视觉的三重交会测量方法,在炮身管上附加球状标志物,利用CCD摄像机获取标志物图像,通过标志物成像的几何投影关系计算球心的三维坐标。
-
In order to make up for the shortage of paper "Tide Table",stable curves and TotalTide which are practically applied onboard, through collecting whole data on "Tide Table", an electronic tide diagram is developed using Windows+Visual Studio 2005 as a development platform.
中文摘要:为弥补纸质"潮汐表"、静态曲线图和TotalTide等产品在船舶驾引等实际应用中的不足,通过采集"潮汐表"上的整点数据,利用Windows+Visual Studio 2005开发平台,开发出电子潮汐图表。
-
In chapter 1, an up to now synthetically evaluation is given on the research ways and conclusions about jet in cross-flow. Considering the shortage of previous research ways and techniques (the instantaneous flow field and vortices field can not be properly get), in addition to the deficiency of corresponding conclusion (mainly concentrate on the analysis of time-average but little on structures of flow and action of vortex), the research way and content is draft out in this part. Though PIV, the time-average, instantaneous flow field and vortices field can be get, that will unveil the coherent vortex and its course of generation, development and evolvement, with the assistance of K-ε model and Hybrid Finite Analytic Method , which will proof-test the experiment result and bring some complementary, more profound research about the 3-D characters can be done. Using some fundamental topological theory and principle on flow analysis, with anglicizing of vortex structure, a reasonable description is the topological characteristic of near field in JICF given.
首先在第一章中对横流中湍射流的以往研究方法和研究成果给予了综合的评述,针对横流中湍射流旋涡结构以往研究中研究方法的局限性(不能很好得到流动的瞬态流场及涡量场)和相应研究成果中存在的不足(大都集中在时均特性的分析,对流动的内部结构和旋涡的运动阐述很少),明确了本文的研究方法和研究内容:通过PIV流动测量显示技术得到流动的时均及瞬态流场、涡量场,来揭示横流中湍射流的时均、瞬态流场、涡量分布特性,和各种具有拟序结构性质的复杂涡系的产生、发展及演化过程;结合湍流k-ε双方程模型及相应的HFAM计算方法,对于实验进行相互验证和补充,从而更为充分地研究各种旋涡的三维特性;利用拓扑分析的一些基本原理及相关规则,依据对各种旋涡结构的分析,做出对射流近区流场拓扑性质的合理描述。
-
In order to improve the existing generic service oriented intrusion tolerant system in aspect of architecture and function, this paper presents an improved adaptive intrusion tolerant system with improved architecture, functional modules and key techniques. From an overall consideration of the system, mixed with firewall, intrusion detection and other traditional technologies, IAITS combines redundancy, diversity and various fault tolerant techniques, thus enhancing reliability through active replication and secure multicast, reaching tradeoff between system complexity and intrusion tolerance ability by redundant design only in most vulnerable components, and supporting data protection on the basis of architecture with only a little extra cost in software and hardware by making use of topological coherence between application servers group and key share servers group.
本文针对目前面向通用服务的容忍入侵系统在架构和功能上的不足,提出了一种改进的自适应容忍入侵系统,在系统结构、功能模块以及关键技术上做出了改进的设计:从整体上考虑系统结构,将防火墙、入侵检测等传统的安全技术融合到容忍入侵系统的设计中;综合了以冗余与多样性为主的多种容错技术,采用主动复制与安全多播,增强了系统的可靠性;仅在最易受攻击的部件上采用冗余设计,兼顾系统复杂性与容侵能力;利用应用服务器组和密钥服务器组在拓扑结构上的一致性,在基本不增加软硬件开销的情况下,从架构上支持数据保护的功能。
-
In order to make up the deficiency of ordinary trigonometric polynomial curves in aspect of shape adjustment, then in view of polynomial spline cannot represent some transcendental curves, a new kind of parametric trigonometric polynomial spline with a shape parameter is constructed by linear singular blending technique.
为了弥补普通三角多项式样条曲线在形状调整方面的不足,同时又考虑到多项式样条曲线不能精确表示一些超越曲线,我们利用奇异混合的思想构造了一种新的带有形状控制参数的三角多项式样条曲线。
-
It can be concluded that it is available and efficacious by applying the micro-seismic monitoring technique to prevent from robbing the field culture relic such as tumulus through building the alarm system of micro-seismic monitoring through the two years monitoring experiment, and this method can make up the deficiency of the safeguarding technique for monitoring the underground activity.
近两年时间监测结果表明,利用对盗墓时产生的微震动信号的监测,是古墓等田野文物防盗保护的较为有效的技术途径,弥补了现今安防技术对于地下活动监控的不足。
- 推荐网络例句
-
This one mode pays close attention to network credence foundation of the businessman very much.
这一模式非常关注商人的网络信用基础。
-
Cell morphology of bacterial ghost of Pasteurella multocida was observed by scanning electron microscopy and inactivation ratio was estimated by CFU analysi.
扫描电镜观察多杀性巴氏杆菌细菌幽灵和菌落形成单位评价遗传灭活率。
-
There is no differences of cell proliferation vitality between labeled and unlabeled NSCs.
双标记神经干细胞的增殖、分化活力与未标记神经干细胞相比无改变。