英语人>网络例句>基于... 相关的搜索结果
网络例句

基于...

与 基于... 相关的网络例句 [注:此内容来源于网络,仅供参考]

This project studies the scale-dependent deformation behavior of the metal matrix composite, the void nucleation and void growth mechanisms at the micron/submicron scale. The main results are:(1) In prophase, growth and coalescence of the void embedded in the graded matrix are analyzed in detailed;(2) Based on the infinite solid model containing a micro-void, coupling effects of the void shape and the void size on the void growth are studied carefully, the results show that it seems to exist a critical equivalent void radius, which is associated with the material length. When radius of a microvoid is close to or smaller than the critical void radius, the micro-void growth rate is essentially eliminated;(3) The coupling effects of the particle shape and size on the mesoscopic stress fields within the particle and matrix are also investigated by introducing the conception of inclusion/matrix interfacial energy. The results show that the stress concentration factors within the particle and on the matrix/particle interface are also strongly size-dependent,so the void nucleation mechanism is size-dependent.(4) By employing a specific orthogonal curve coordinate frame and a 'kernel function' conception, a 'unified method'solving the spheriodal and spherical void problems is suggested; by this unified method, size-dependent plastic potentials of the porous materials containing the spheriodal or spherical voids are obtained, which extend the traditional Gurson model for the spherical void and GLD model for the spheriodal voids to the micron scale.(5) Based on the RVE model containing the spheriodal or spherical particles, the influences of the particle shape and size on the size-dependent mechanical behavior of metal matrix composite are studied.

中文摘要:本项目对金属基复合材料在微细观尺度下的尺度相关变形行为、孔洞形核及长大的机理和模型进行了研究,取得了如下主要结果:1)在前期研究中,探讨了基体的梯度分布对孔洞长大和聚合的影响;2)基于含孔洞的无限大体模型,探讨了孔洞形状和孔洞尺寸对其长大的耦合作用,结果表明:可能存在一个与材料特征长度相关的临界孔洞尺寸,当椭球孔洞的等效半径小于临界孔洞半径时,孔洞的长大受到明显抑制;3)通过引入基体/夹杂界面能的概念,分析了夹杂尺寸、夹杂形状对材料细观应力场的耦合影响,结果表明:颗粒内部和界面上的应力集中因子强烈地依赖于夹杂的尺寸和形状,因此,孔洞的形核机理是尺寸相关的;4)采用一种特殊的正交曲线坐标系和引入"核函数"的概念,"统一"地得到了含椭球和球形孔洞的材料的尺寸相关塑性势,它将传统的Gurson球形孔洞模型和GLD椭球孔洞模型推广到微尺度范围;5)基于含椭球和球形夹杂的体胞模型,初步研究了夹杂形状、夹杂尺寸对金属基复合材料尺寸相关力学行为的影响。

Generally speaking, the calculation methods of metaphor and metonymy can be divided into two categories: the methods based on induction

总体而言,隐喻和换喻的计算方法可以分为两类:基于约定的方法和基于推理的方法。

Secondly, contraposes the limitation of the traditional harmonic current detecting method based on neural network, presents the method that combines the neural network and auto adaptive harmonic current detecting method based on the principle of noise each other eliminating.As the characteristics that are small calculative quantity, fast converge, without local minimal point of Redial Basis Function, this dissertation forms a new harmonic current detecting method based on RBF.

其次,针对传统的谐波电流检测方法的缺陷,提出将神经网络与基于噪声抵消原理的自适应谐波检测相结合,利用径向基函数运算量小、收敛快、无局部极小值等优点,构造了一种基于径向基函数神经网络的谐波电流检测方法,仿真结果表明该检测方法具有很好的动态响应及畸变电流检测精度。

A new static image reconstruction method for EIT based on genetic algorithm is proposed in this dissertation. It is quite different from the traditional modified Newton-Raphson iterative method based on minimizing the object function.

本文提出一种基于遗传算法的静态EIT图像重建方法,它完全不同于传统的基于目标函数梯度或高阶导数信息的Modified Newton-Raphson优化迭代算法。

It considers establishment and connotations of campus emergency management capacity assessment index system; it proposes the method to determine index weight of campus emergency management capacity assessment based on research results and information entropy, and studies combination weights methods based on minimum deviation.

研究了高校应急管理能力评估指标体系的建立及其内涵;提出了基于调查问卷和信息熵的高校应急管理能力评估指标权重确定方法,研究了基于离差最小的组合赋权方法。

In order that media access slots MAS are allocated based on minimum latency requirements of, for example, not less than 4 ms, or on a medium utilization efficiency or power consumption requirement for a minimum reservation block length, both high-efficiency and low-latency schemes need to coexist within a superframe with fair support given to both.

为了基于最小等待时间要求,例如不小于4毫秒,或者基于最小保留块长度的介质使用效率或功耗要求来分配介质访问时隙MAS,需要在超帧内让高效率和低等待时间方案共存,给予这两者以平等支持。

Accordingly, an optimistic data consistency maintenance method based on key-attributes is proposed. In the method, the update of key-attributes is separated from user update requests. Key-Updates are propagated by latency-overlay update propagation model, that is, updates are always propagated to the nodes having maximum or minimum latency, and assured and uncertain propagation paths of updates are all taken into account. Based on classifying key-update conflicts, a double-level reconciling mechanism including buffer preprocessing and update-log processing is applied to detect and reconcile conflicts, and then conflicts are solved by policies as last-writer-win and divide-and-rule. Lastly, update-log management method and maintenance method brought by node failure and network partitioning are discussed for the above is deployed based on the information storied in update-log.

在该方法中,首先分离出用户提交的更新请求中关于关键属性的更新;然后采用基于延迟-覆盖的更新传播模型进行更新传播,即基于副本间的网络延迟选择具有最大和最小网络延迟的结点转发更新,并在传播过程中记录和综合考虑更新的确定传播和不确定传播两条路径;在对关键更新冲突分类的基础上,采用更新缓冲区和更新日志两层更新协商机制并结合最新写胜出和分而治之规则,优化关键更新冲突的发现和解决;更新日志信息是方法中各种策略开展的基础,讨论了更新日志中信息管理方法以及结点失效和网络划分发生时信息的维护方法。

The algorithm brought forward by this paper is based on minutiae of fingerprint.

本论文所提出的基于Delaunay三角剖分的匹配算法是基于指纹特征点进行的。

We do research on the transitions between states of network protocol,the protocol misusage detection model based on Markov chain,the framework of the IDS technology and protocol anormity after we discuss the current technology. The main research contents of this paper include: research on transitions between states of network protocol and session process, protocol misuage and the anomaly detection model based on Markov chain, the research of intrusion detection framework, more accurately model based on the characteristic of the network traffic and so on.

在分析了现有入侵检测系统的基础上,本文围绕典型网络协议状态转换、基于马尔可夫链的检测模型、入侵检测技术框架、以及协议异常等几个方面展开深入研究,主要工作内容包括:典型网络协议转换状态的分析和会话过程的研究;基于马尔可夫链的网络异常检测模型;分布式的检测架构;针对网络流量特征而提出了精确的检测模型等。

The penalty function method and modified Newton iteration method are adopted to solve the constrained nonlinear optimization problem.

基于截面特征的反求工程CAD建模方法已成功应用于基于特征的反求工程CAD建模系统RE-SOFT中,结合一个反求工程建模实例论证了该方法的可行性和适用性。

第82/100页 首页 < ... 78 79 80 81 82 83 84 85 86 ... > 尾页
推荐网络例句

And if officials on the take are not parroting the opinions of these companies, what can we suppose the money they receive is for?

如果受贿的官员不鹦鹉学舌般地复述这些公司的看法,那他们所接受的钱又能用于什么目的呢?

Love them, and love you too, Pitcher.

爱他们,也爱你,投手。

He was sent away to the island of Scyros,where he fell into sea from a cliff.

赶下了台。他被流放到塞库鲁斯岛。在那儿,他失足从悬崖上栽到了海里。