实例的
- 与 实例的 相关的网络例句 [注:此内容来源于网络,仅供参考]
-
Specific instances of the conduct of a witness, for the purpose of attacking or supporting the witness' character for truthfulness, other than conviction of crime as provided in rule 609, may not be proved by extrinsic evidence They may, however, in the discretion of the court, if probative of truthfulness or untruthfulness, be inquired into on cross-examination of the witness (1) concerning the witness' character for truthfulness or untruthfulness, or (2) concerning the character for truthfulness or untruthfulness of another witness as to which character the witness being cross-examined has testified.
出于攻击或支持证人可靠性的目的,除规则609所规定的定罪判决外,关于证人行为的具体实例不得以外在证据予以证明。但若是为了证明证人可信或不可信,则根据法庭的自由裁量,可以通过对该证人交叉盘问以下两方面事项,予以调查关于证人行为的具体实例:(1)关于该证人可信与不可信的品格,以及(2)关于其他证人可信与不可信的品格,后者的品格在对该证人交叉盘问时曾得到证实。
-
This paper analyze and study the influence of the superimposition in depth based on the previous achievements and combined with the theoretical qualitative analysis and project instances. The main contents as follow:Chapter 1: Indicate the significance and objective of this paper, review the previous achievements of the transient process and superimposition, and then present the study purpose of this paper.Chapter 2: combined with the physic knowledge of the fluctuation and the superimposition, Indicate the physical essences and the influence of the superimposition phenomena that exist in the diversion pipe system, and take one hydraulic turbine owning only one diversion tunnel and two hydraulic turbines sharing one tailrace conduit for instance to study out the numerical calculation superimpose operations.Chapter 3: From the calculation theory of the parameter of the guaranty calculation of regulation of the hydro-turbine, qualitative analyze the influence of the superimposition on them and the superpose time, combined with some project instances, get the numerical value of the influence of the superimposition and the superpose time.Chapter 4: Based on the previous achievements of the calculation and theoretical analysis of the surge-chamber ground swell, analyze the influence of the superimposition on it and the superpose time.
本文在前人研究成果的基础上,结合理论定性分析及工程实例,对波动叠加带来的影响进行深入分析研究,其主要内容如下:第1章,指出本文研究的意义和目的,回顾前人对水电站过渡过程及波动叠加方面的有关研究成果,在此基础上提出本文的研究内容;第2章,结合物理学中有关振动与波动叠加方面的有关知识,阐述水电站引水发电系统中存在的波动现象的实质及其影响,并以两机一洞和一机一洞具有上游调压室或下游调压室的水电站拟定其数值计算叠加工况;第3章,从机组调保参数的理论出发,定性的分析波动叠加对机组调保参数的不利影响及叠加时间,结合几个工程实例,得到波动叠加带来的影响大小及叠加时间;第4章,在前人对调压室涌浪进行计算和理论分析的基础上,分析波动叠加对调压室涌浪的影响及其叠加时间。
-
First of all,we have given some of the basic concepts of differential equations, described the constant coefficient linear ordinary differential equation solution, for a class of second-order variable coefficient linear ordinary differential equation initial value problem, an approximate solution, the method is first unknown function of a definition for N sub-interval, and then in between each district within a constant coefficient ordinary differential equations similar to the replacement, the solution has been the problem as similar to the original analytical solution, and then gives a detailed second-order change order coefficient of linear homogeneous ordinary differential equation solution examples, the examples of the approximate method proposed in this paper is valid.
首先给出了微分方程的一些基本概念,讲述了常系数线性常微分方程的解法,针对一类二阶变系数线性常微分方程初值问题,提出了一个近似解法,本方法是先对未知函数的一个定义区间作N等分,然后在每一个小区间内用一个常系数常微分方程近似替换,所得到的解作为原问题的近似解析解,随后详细给出了一个求二阶变系数齐次线性常微分方程的解的实例,该实例说明本文提出的近似方法是有效的。
-
It includes four parts: 1 Part I, it introduces the basic knowledge of computer viruses such as computer virus definition, history and important viruses events, features, behavior phenomena, difference with computer software and hardware troubles, damage behavior and capability, classification, naming, future trend, etc; 2 Part II, it introduces the corresponding knowledge of computer systems related to computer viruses such as the composing of software and hardware of the computer system, storage media and its working mechanism, interrupt technologies,.com/.exe/.pe file formats and their working mechanism, etc; 3 Part III, it introduces computer virus mechanism and theory such as computer virus structure, work flow, working mechanism of key modules, typical technologies used to design computer viruses including the corresponding traditional technologies (interrupt filching, memory resident, etc.), the corresponding new routine technologies (self-encrypting, Mutation Engine, etc.), and the corresponding new technologies used by some prevalence computer viruses such as macro viruses, e-mail viruses, worm, hacker, Trojan, mobile phone viruses, the working mechanism analysis of some kinds of typical and prevalence computer viruses such as file-type viruses, macro viruses, e-mail viruses, worm viruses, hacker, Trojan, mobile phone viruses, the analysis of some typical and prevalence computer viruses examples including BALL viruses, WORD macro viruses, WantJob viruses, Code Red viruses, BO Trojan, etc; 4 Part IV, it introduces the defense and killing technologies of computer viruses such as the aim and criterion of computer viruses defense and killing, prevention methods and corresponding technologies, detection technologies (comparison method, character code scanning method, behavior inspecting method, analysis method, etc.), manual and automatic killing technologies, immunity technologies such as IBM digital immunity system, new anti-viruses technology trends (real-time anti-viruses technologies, 32 kernel technologies, active kernel technologies, etc.), some typical virus defense and killing softwares (Symantec AntiVirus product, PC-Cillin AntiVirus product, etc.), the defense and killing method analysis of some kinds of typical and prevalence computer viruses (file-type viruses, macro viruses, worm viruses, hacker, etc.), for example, firewall and intrusion detection technologies for anti-hacker, the defense and killing of some typical and prevalence computer viruses examples including WORD macro viruses, Code Red viruses, BO Trojan, etc.
课程内容具体包括四大部分:1)第一部分,介绍计算机病毒基本知识,包括:计算机病毒定义、病毒发展史及重大事件、病毒特点、病毒表现现象及与软硬件故障的区别、病毒破坏行为及危害性、病毒的传播途径及媒介、病毒分类、病毒的命名及计算机病毒技术发展趋势等内容;2)第二部分,介绍与计算机病毒有关的计算机系统相关知识,包括:计算机系统软硬件组成、存储介质结构及工作原理、计算机系统引导机理及流程、中断技术、。com/。exe/。pe等文件格式及工作机理等内容;3)第三部分,讲解计算机病毒机理,包括:计算机病毒的组成结构、病毒工作流程、病毒引导/触发/感染/破坏等模块的工作机理、计算机病毒所采取的编制技术(包括中断窃取/内存驻留等传统编制技术、自加密/隐形/变形机等新的常规编制技术、宏病毒/电子邮件病毒/网络蠕虫/特洛伊木马/黑客/手机病毒等一些新的流行病毒所采取的编制技术等)、一些类型的典型或流行计算机病毒的工作机理分析(包括:引导型病毒、文件型病毒、宏病毒、电子邮件病毒、蠕虫病毒、黑客、特洛伊木马、手机病毒等)、一些典型或流行的计算机病毒实例剖析(包括:小球病毒、WORD宏病毒、求职信病毒、红色代码病毒、冰河木马等)等内容;4)第四部分,讲解计算机病毒防治技术,包括:计算机病毒防治目的、病毒防治策略及规范、病毒在管理和技术上的预防措施、病毒检查技术(包括:比较法/病毒特征码扫描法/行为监测法/虚拟执行法/分析法等)、手工和自动病毒清杀技术、病毒免疫技术(包括:针对某种一次性感染病毒的基于病毒标签的免疫方法/基于自我完整性检查的计算机病毒免疫方法/IBM的数字免疫系统等)、反病毒技术的新发展(包括:实时反病毒技术/32位内核技术/主动内核技术/以毒攻毒技术等)、诺顿/趋势/金山等公司的病毒防治软件产品、一些类型的典型或流行的计算机病毒(包括:引导型病毒、文件型病毒、宏病毒、蠕虫病毒、电子邮件病毒、手机病毒、黑客、特洛伊木马)的防治措施(其中,也包括介绍面向防范黑客攻击的防火墙、入侵检测技术)、一些典型或流行的计算机病毒防治实例剖析(包括:WORD宏病毒、红色代码病毒、冰河木马v1.1/v2.2等)、多层次病毒防护体系等内容。
-
The paper commencing with analyses of the basic property of the hydrate, structure and sort, analyzes micro kinetics, formation condition, gas hydrate formation mechanism and influencing factor in high sulfur; also proceed analysis in depth for existent hydrate prediction model; according to gas dissolving, hydrate lattice deformation, synergistic action of inhibitor, carry out analytical study for existent error between normal forecast model and physical condition; introduce key parameter theory to establish and modify prediction model of hydrate formation condition to suit for high sulfur gas reservoir and inhibitor system, analyses different kinds of prevention and cure measures to influence of hydrate; finally, through field application in high sulfur gas reservoir hydrate.
本文从分析水合物的基本性质、结构与分类出发,分析了水合物生成过程中的微观动力学、生成条件、高含硫天然气水合物生成机理以及影响因素;并对现行的水合物预测模型进行了深入剖析,根据气体溶解、水合物晶格变形、抑制剂协同作用等因素对常规预测模型与实际条件之间存在的误差进行了分析研究;通过引入关键参数理论,建立并改进了适合高含硫气藏水合物生成条件预测模型及抑制剂体系的高含硫水合物生成条件预测模型,分析了各种防治措施对水合物的影响;最后通过高含硫气藏水合物实例计算,分析了含硫化氢、二氧化碳组分的天然气与常规气体对水合物生成条件的影响,并对各种水合物防治措施进行了实例计算。
-
In this thesis, the methods of surrounding rock masses stability classification on the basis of the geological documentation of muck and the boring parameters of TBM are approached, especially as follows:①The geological documentation of muck and the boring parameters of TBM in the Yellow River Diversion Project.of shanxi province is summarized systematically;②Based on the geological documentation of muck and the boring parameters of TBM, that whether the common methods of surrounding rock masses stability (the methods of regular factor classification) classification are feasible, is carried on the discussion;③According to the corresponding relation of muck and the boring parameters of TBM and the surrounding rock masses stability type, the extension assessment method of tunnel surrounding rock masses stability classification is set up, also the corresponding fortran calculation procedure worked out, and not only rational result in conformity with the reality can be obtained, but also the stability situation of surrounding rock masses in front of the working range can be predicted according to the change of the dependent value in the application instance of Yellow River Diversion Project;④Combining with the application instance of Yellow River Diversion Project, extension assessment method in the application of surrounding rock masses stability classification is compared and verificated in detail by applying fuzzy synthesis method by forefathers, and a certain degree discussion and summary about the application achievement of surrounding rock masses stability classification, which is assessed by extension assessment method and fuzzy synthesis method, are carried on.
本文基于渣料和TBM掘进参数的地质编录提供的地质信息进行了围岩稳定分类方法的探讨,重点进行:①对引黄工程中渣料和TBM掘进参数的地质编录的系统整理;②基于渣料和TBM掘进参数的地质编录获得的地质信息,对常用围岩稳定分类方法是否能够进行围岩稳定分类进行了探讨;③根据渣料和TBM掘进参数与围岩稳定类型的对应关系,应用可拓理论,建立了隧洞围岩稳定分类的可拓评价方法,还编制了相应的fortran计算程序,并在引黄工程的应用实例中不仅取得了与客观实际相符的合理结果,而且根据其关联度值的变化能够预测临近掌子面前方围岩的稳定情况;④结合引黄工程的应用实例运用模糊综合评判方法对可拓评判方法在围岩稳定分类中的应用进行了详细的验证、比较,并对前人在运用可拓学和模糊数学进行岩体稳定评判的应用成果方面,进行了一定的探讨、总结。
-
The features of automobile panel die have been analyzed and described with discussion about organizing method of the feature information in Teamcenter,a PDM system.Different similarity has been adopted according to different feature property,classified weights have been adopted to solve the problem of the influence of different feature upon the solution hence implementation of cases retrievement.
新闻摘要:有效地利用覆盖件模具开发过程中的经验知识,能够极大地提高模具开发的效率,本文对覆盖件模具的特征进行了分析并对特征进行了描述,对实例特征信息在PDM 系统Teamcenter中的组织进行了探讨,针对不同的属性域采用不同的相似度表示,通过分级权重的方法实现了不同特征对解决方案的影响,实现了实例检索。
-
If X is a subclass of Y, then every instance of X is also an instance of Y. The rdfs:subClassOf relation is transitive. If X is a subclass of Y and Y a subclass of Z then X isa subclass of Z.
如果X是Y的一个子类,那么X的每个实例同时也都是Y的实例。rdfs:subClassOf关系是可传递的,即如果X是Y的一个子类,而Y又是Z的一个子类,那么X就是Z的一个子类。
-
The only difference is in the attribute naming: the model that defines the ManyToManyField uses the attribute name of that field itself, whereas the reverse model uses the lowercased model name of the original model, plus '_set'(just like reverse one-to-many relationships).
唯一的不同在于属性的命名:定义了''ManyToManyField''的model的实例使用属性名称本身,另外一端的model的实例则使用model名称的小写加上''_set''来活得关联的对象集(就跟反向一对多关系一样
-
The only difference is in the attribute naming: the model that defines the ''ManyToManyField'' uses the attribute name of that field itself, whereas the reverse model uses the lowercased model name of the original model, plus '''_set''' (just like reverse one-to-many relationships).
唯一的不同在于属性的命名:定义了''ManyToManyField''的model的实例使用属性名称本身,另外一端的model的实例则使用model名称的小写加上''_set''来活得关联的对象集(就跟反向一对多关系一样) 356天前翻译
- 推荐网络例句
-
They go to town. Would you just ask them?
他们在城里你能问他们吗?
-
Ossein pretreated for a2 weeks period exhibited the maximum% yield incase of bone gelatin, while the yield from intact skin was higher than that realized incase of de-scaled skin.
预处理时间达2星期的骨胶原表现出最高的骨明胶百分产量,然而从未处理鱼皮中得到的产率比去鳞的鱼皮得到的要高。
-
Add in realistic voice acting, and you're about to get emotionally attached toa whole platoon of charactersEvery object on the battlefield is destructible - and once it's destroyed, it stays destroyedIn addition to the rich 1-player storyline, Pathway to Glory features the kind of multiplayer options that N-Gage was made for: go against another player using the same game deck with the Hot Seat option, or connect via Bluetooth technology and go head-to-head.
在现实的声音演戏方面增加,而且你正要拿个性的整个排给在情绪上附上的 toa在战场上的每个物体是可破坏的-而且一经资讯科技被破坏,它停留破坏发现你站着哪里:钮扣的推给你一个概览,如此你能很快地恢复一种不稳定的情形控制除了富有的 1个运动员的剧情之外,通往光荣的道路以可多人玩的选项类型为特色 N-规格被有益:去对抗和困境选项一起使用相同的游戏甲板的另外一个运动员,否则经由 Bluetooth 技术连接而且去头-到-头。