英语人>网络例句>拓扑结构 相关的搜索结果
网络例句

拓扑结构

与 拓扑结构 相关的网络例句 [注:此内容来源于网络,仅供参考]

At the end of the paper, the emulation results and analyses are shown.

文章最后给出了主电路拓扑结构的仿真结果和分析。

We present some new topologies of components and devices, embedded passive circuits and interconnections with good EM properties which can meet development of microwave and millimeter wave LTCC technology and domestic state of arts and crafts inland. These algorithms are applied to optimization of LTCC circuits by using relevant production and applicable techniques in SM study, i.e. optimizing and designing various LTCC capacitors and inductances by original space mapping, LTCC transitions by aggressive space mapping and equivalent lumped-element LTCC filters by knowledge-based aggressive space mapping and neural space mapping.

并且针对微波、毫米波LTCC技术发展需要和国内加工水平,探索具有良好电磁特性的新型组件拓扑结构及其内嵌无源电路、互连实现形式,利用在空间映射研究中取得的成果和开发的实用技术,实现LTCC电路的优化,主要是采用初始空间映射方法优化设计了LTCC电容电感、采用主动空间映射方法LTCC过渡、采用基于知识主动空间映射方法与神经网络空间映射方法优化设计了LTCC等效集总元件滤波器等。

Security analysis for two quantum key distribution protocols was presented by using EPR pair and complete Bellstate measurements. It is also shown that those two protocols are totally equivalent from the point of view of the topological structures on how to measure the corresponding qubits at random.

对两个使用EPR对和Bell测量基的量子密钥分配协议的安全性进行了分析,从测量不同位置的量子比特的拓扑结构出发,证明了这两个协议的等价性。

Security analysis for two quantum key distribution protocols was presented by using EPR pair and complete Bell-state measurements. It is also shown that those two protocols are totally equivalent from the point of view of the topological structures on how to measure the corresponding qubits at random.

对两个使用EPR对和Bell测量基的量子密钥分配协议的安全性进行了分析,从测量不同位置的量子比特的拓扑结构出发,证明了这两个协议的等价性。

To address this failure, only to upgrade the router to expand the memory and so on, or re-planning of network topology.

解决这种故障,只有对路由器进行升级、扩大内存等,或者重新规划网络拓扑结构

Accomplishing system topological structure design, off-chip memory space was expanded, CAN bus and distributed control network was realized.

在系统拓扑结构设计的基础上,实现了DSP片外存储单元的扩展,实现了通过CAN总线与整车分布式控制网络的通讯。

ABSTRACT With the entry of commerce in 1995, Internet has grown explosively both in size and topological complexity.

自1995年商业进入到Internet以来,Internet的规模及其拓扑结构的复杂性均呈爆炸性增长。

And resolve the fault, only to upgrade to the router, such as extended memory, or re-planning of the network topology.

而解决这种故障,只有对路由器进行升级、扩内存等,或者重新规划网络的拓扑结构

Firstly, time synchronization packet, produced by the root node, is transmitted along two-layer topology from the father node to child node. Secondly, the dominated nodes adjust their local time according to their received packet, and at the same time update the time of packet, then send it to next node.

首先,通过根节点发送时间同步报文,沿二层拓扑结构从父节点到子节点传递时间同步报文;其次,支配节点根据同步报文到达时刻调整本地时间,更新并发送同步报文;最后,非支配节点根据同步报文到达时刻调整本地时间。

According to the relationships among main parts of artillery,degrees of freedom are discussed based on the analysis of the topology of field artillery.

根据地火炮的主要部件的连接关系,在分析了火炮拓扑结构的基础上,讨论了火炮各体的自由度。

第22/69页 首页 < ... 18 19 20 21 22 23 24 25 26 ... > 尾页
推荐网络例句

According to the clear water experiment, aeration performance of the new equipment is good with high total oxygen transfer coefficient and oxygen utilization ratio.

曝气设备的动力效率在叶轮转速为120rpm~150rpm时取得最大值,此时氧利用率和充氧能力也具有较高值。

The environmental stability of that world - including its crushing pressures and icy darkness - means that some of its most famous inhabitants have survived for eons as evolutionary throwbacks, their bodies undergoing little change.

稳定的海底环境─包括能把人压扁的压力和冰冷的黑暗─意谓海底某些最知名的栖居生物已以演化返祖的样态活了万世,形体几无变化。

When I was in school, the rabbi explained everythingin the Bible two different ways.

当我上学的时候,老师解释《圣经》用两种不同的方法。