深入地
- 与 深入地 相关的网络例句 [注:此内容来源于网络,仅供参考]
-
However,the meaning of the law in international private international law,international society and the effect of international private international law,observation of international private international law under the anarchical society and limitations of international private international law in protecting international order have not been analyzed ...
然而,在国际私法学界和国际政治学界对国际性国际私法中"法"的含义,在国际社会与国际性国际私法的效用、无政府状态下国际性国际私法的遵守和国际私法对维护国际秩序的局限性等问题上的分析尚不够全面、深入,本文拟对上述问题进行深入探讨和分析,以便能够正确地把握国际性国际私法在当代国际关系中的效用问题。
-
However , the meaning of the law in international private international law , international society and the effect of international private international law , observation of international private international law under the anarchical society and limitations of international private international law in protecting international artier have not been analyzed comprehensively and deeply in private international law circles and international politics circles , so the article try to discuss and analyze the issues mentioned above deeply , in order lit grasp the issues of the effect of international private international law on contemporary international relations correctly
然而,在国际私法学界和国际政治学界对国际性国际私法中"法"的含义,在国际社会与国际性国际私法的效用、无政府状态下国际性国际私法的遵守和国际私法对维护国际秩序的局限性等问题上的分析尚不够全面、深入,本文拟对上述问题进行深入探讨和分析,以便能够正确地把握国际性国际私法在当代国际关系中的效用问题。
-
The study has focused on: 1 The research background and the current state of the power measurement were analyzed systematically, and then wavelet-based power measurement algorithm was certified feasible for astable signals; 2 We developed a new method of RMS and power measurement based on Dmeyer wavelet. After that three other wavelet measurement approaches were compared with Dmeyer wavelet-based measurement approach. Then the impact on measurement errors of amplitude frequency property and energy leakage of wavelet filter banks were deeply researched, and some measures were proposed to reduce it; 3 We developed a new strategy of power measurement algorithm based on lifting wavelet, which had calculation advantage compared with the first wavelet, so that it was more suitable for the realization of hardware; 4 The running system of wavelet-based power measurement algorithm based on DSP was proposed, and then it was realized on ICETEK-VC5416-A EVM board; 5 Existing problems and the further research direction of wavelet-based power sub-band measurement algorithm was discussed.
本文对基于小波变换的功率测量算法展开深入的分析研究,主要内容有:1)系统地分析了功率分解测量的研究背景、国内外的研究现状,并从能量守恒的角度验证了小波功率分频带测量算法在非平稳信号条件下的可行性;2)首次提出了Dmeyer小波变换有效值与功率的测量方法,进而通过对该方法与3种已经提出的小波测量方法的对比分析,深入研究了小波滤波器组的幅频特性和能量泄漏特性对测量误差的影响,并针对电网谐波的特点提出了减小影响的相关措施;3)首次提出了二代小波功率测量算法,对比一代小波功率分频带测量算法,它大大减少了算法实现的运算量及内存的需求量,从而更适合于硬件的实时实现;4)提出了小波功率分频带测量算法的DSP实现方案,并在ICETEK-VC5416-A EVM板上进行了实现;5)探讨了小波功率分频带测量算法目前仍存在的问题,并提出了进一步的研究方向。
-
We used Reactionary Regionalism from Beeson as the core basis and used test method to deeply analyze East Asian regional development and address a case study to observe and analyze the following regional development of East Asian countries to extend and add interpretation of the difference of Reactionary Regionalism and address a more complete point of view. We expected to bring up more detailed point of view deeply and precisely to study East Asian regional integration development.
以Beeson所提出的回应性区域主义为核心基础,采用验证方式深入分析东亚区域发展并提出个案研究,观察分析东亚各国后续的区域发展,并延伸与补充回应性区域主义的不足之处并整理出更加完备的分析观点,以期能更深入、更细致地提出更有解释力观点来研究东亚的区域整合运作发展,提供东亚区域发展更为清晰与完整的研究。
-
We not only must overcome the impetuous phenomenon, about grasps jointly and manage concertedly, moreover must unceasingly renew the idea, strengthens the flow management, with the home education modernization, the scientific idea instructs the work, thorough, careful, is concrete, arrives completes the topic experiment, can truly support a piece for them to be allowed the free ballooning blue sky.
研究农村留守孩子,重点是要研究父母双双外出打工的留守孩子。我们不但要克服浮躁现象,上下齐抓共管,而且要不断更新观念,加强流程管理,用家庭教育现代化、科学化的理念来指导工作,深入、细致、具体、到位地做好课题实验,才能真正为他们撑起一片可以自由翱翔的蓝天。留守孩子;教育研究;齐抓共管;深入实验
-
Based on the analysis of the current state of research on data deduplication technologies, this paper makes several conclusions as follows: a How to mine data characteristic information in data deduplication has not been completely solved, and how to use data characteristic information to effectively eliminate duplicate data also needs further study; b From the perspective of storage system design, it still needs further study how to introduce proper mechanisms to overcome the reliability limitations of data deduplication techniques and reduce the additional system overheads caused by data deduplication techniques.
通过对重复数据删除技术当前研究现状的分析,得出如下结论:a 重复数据删除中的数据特性挖掘问题还未得到完全解决,如何利用数据特征信息有效地消除重复数据还需要更深入的研究;b 从存储系统设计的角度,如何引入恰当的机制打破重复数据删除技术的可靠性局限并减少重复数据删除技术带来的额外系统开销也是一个需要深入研究的方面。
-
In this paper, the concept of network security and security structures of OSI and Internet is introduced, and various threats confronting the computer network are also discussed. Several kinds of network information security technologies, including firewall technology, virtual private network, intrusion detection system, data encryption technology, identity authentication and security protocol etc. are also examined. The security of internal network is the biggest problem in the construction of each network. The solution to this problem lies in setting up a firewall. The theory of a firewall and the approach to its actualization is studied. Intrusion detection system, an important part of the computer network security system, has gained extensive attention. IDS monitors the computer and network traffic for intrusion and suspicious activities. It not only detects the intrusion from the extranet hacker, but also the intranet users. The emergence of virtual private network paves the way for realizing secure connection of LAN quickly and at a relatively low cost. The concept, function, key techniques, including the tunnel technology, and the ways to realize VPN are expounded in this paper. Also introduced is the data encrypt network technology, which is called the soul of computer network security, such as digital digest, digital signature, digital certificate, digital encrypt arithmetic and so on. At the same time, the principle and the process of implementing network security by digital certificate and digital signature, the basic principle and characters of security protocols, and finally, three of the security protocols, concerning the security problems in network, IPsec, SLL and SET are analyzed in detail Computer network system should be a system of dynamic defence, both dynamic and static, passive as well as active, and even offensive, combined with management and technology.
本文系统地介绍了网络安全的概念、OSI及Internet的安全体系结构,并讨论了计算机网络面临的各种安全威胁;内部网络的安全问题是每个建网单位面临的最大问题,可以认为防火墙技术是解决网络安全的一个主要手段,本文研究了防火墙的原理及其实现手段;作为一种主动的防御措施,入侵检测系统作为网络系统安全的重要组成部分,得到了广泛的重视,TDS对计算机和网络资源上的恶意使用行为进行识别和响应,不仅检测来自外部的入侵行为,也监督内部用户的未授权活动;虚拟专用网技术的出现,为实现网络间的连接提供了快速安全但又相对便宜的手段,本文较深入的探讨了实现VPN的隧道技术,并对VPN的概念、功能、实现途径、基本构成、关键技术及发展前景等问题进行了全面论述;数据加密技术是网络安全核心技术之一,本文从数据加密算法、数字摘要、数字签名及数字证书等几方面简要介绍了数据加密技术,并分析用数字证书和数字签名实现网络安全的原理和过程;对安全协议的基本原理、主要特点进行了较为深入的研究,并就网络的安全性问题剖析了三种安全协议:IPsec协议、SLL协议和SET协议。
-
The work characteristics of Air Traffic Control have been researched and the demands have been analyzed deeply in this paper. And the functions of digital flight strip system have been defined accurately.
本文深入研究了航空管制的工作特点,深入详尽地进行了需求分析,并且在此基础上对电子进程单系统进行了准确的功能定义。
-
Whether we put those questions seriously or flippantly or casually - if the questions are put seriously, a problem that is really disturbing one's mind and one's heart then those questions are worthwhile answering, or enquiring into those questions.
我们是严肃认真地还是轻浮随意地提出这些问题-如果是严肃认真地提出问题,这个问题深深地困扰一个人的头脑和内心,那么这样的问题是值得回答的,或者值得深入探讨这些问题。
-
The history consciousness is very important and essential to understand Jameson s critique of culture.
詹姆逊的文化批评理论对中国文化批评有相当重要的意义,只有深入研究其理论中的"历史意识"才能够深入理解他的理论,从而更好地发展我们自己的文化批评以及文艺理论。
- 推荐网络例句
-
The split between the two groups can hardly be papered over.
这两个团体间的分歧难以掩饰。
-
This approach not only encourages a greater number of responses, but minimizes the likelihood of stale groupthink.
这种做法不仅鼓励了更多的反应,而且减少跟风的可能性。
-
The new PS20 solar power tower collected sunlight through mirrors known as "heliostats" to produce steam that is converted into electricity by a turbine in Sanlucar la Mayor, Spain, Wednesday.
聚光:照片上是建在西班牙桑路卡拉马尤城的一座新型PS20塔式太阳能电站。被称为&日光反射装置&的镜子将太阳光反射到主塔,然后用聚集的热量产生蒸汽进而通过涡轮机转化为电力