相关法
- 与 相关法 相关的网络例句 [注:此内容来源于网络,仅供参考]
-
In this paper, the investment planning of wireless network monitor system can provide a basis for decision-making for this technology industrializationIn this paper, according to advanced mature Payoff ability analytical method; rePay ability analytical method; sensitivity analytical method; Profit and loss balance analytical method, etc.
本文利用盈利能力分析法、偿债能力分析法、敏感性分析法、盈亏平衡分析法等相关方法,根据项目特点,结合调查分析资料,对目标顾客群进行细分,确定了该产品的目标市场及其营销模式;对原材料供应商进行地域和功能分析,结合国家产业导向,确定了该产品的生产组织模式;对投资规模、财务状况以及预期的投资风险进行预测,确定了该项目预期的收益和现金流,并为潜在风险提供了可行的规避办法。
-
Five main phenomena were found, firstly, the high plasticity clay could well suitable to large deformation, and had strain-hardening behavior obviously, as well as, the little dilatancy; secondly, there was no correlation between stress paths and shear strength but the stress-strain relations were influenced by stress paths; thirdly, the little stress increment ratio, the higher increase speeding of shear stress and breaking strength under the condition of same initial normal stress; the fourth, the relations between normal strain and normal stress in simple shear test was consistent with which in the single-direction compression test, if there was no dilatancy; the last, the curve of relation between stress ratio and shear strain could be well simulated by hyperbola.
试验结果表明,高塑性粘土能够较好地适应大变形,接触面剪应力与切向应变关系呈剪切硬化型曲线,法向剪胀不明显;接触面剪切强度与应力路径无关,应力应变关系与应力路径密切相关;初始法向应力一定,应力增量比越小,剪应力增长越快,对应的破坏剪应力也越高;无剪胀发生情况下,法向应变与法向应力关系曲线与单向压缩试验具有一致性;应力比与切向应变呈良好的双曲线关系。
-
The technique path of the research is : on the rules of obtainable of data, specialty, sensitivity, representative, characteristic of full-scale and perspicuity of indexes, used external statistic way which includes ways of a coefficient of variation, case cluster and relation analysis, variable cluster and subjective Delphi, sift from initial index system, and finally get a complete evaluation index system for labor relation which meet the external technique requirement and subjective theoretic and practical analysis.
本论文研究的技术路径为:以指标资料的可获得性,指标的特异性、敏感性、代表性、全面性和简明性为原则,运用包括变异系数法、样本聚类和相关分析法、指标聚类法等客观的数理统计方法和主观的德尔菲法,对初始的指标体系进行了筛选,最终确定了满足客观技术要求和主观理论经验的完整的劳动关系评价指标体系。
-
According to the results of comparison between these methods of spectrum evaluation, a new method of power spectrum evaluation of welding arc sound is advanced by means of association of wavelet packet analysis with the Welch average method .
对试验系统采集到的焊接电弧声进行了小波包多层分解,并利用周期图法、Welch 平均法及AR模型法,对各频段信号进行功率谱估计。根据不同谱估计方法的对比结果,提出小波包分解结合Welch 平均法对焊接电弧声进行功率谱估计的新方法。通过对几种规范与飞溅率下的电弧声功率谱的初步分析,发现其功率谱分布具有一定的规律性,并且不同频段谱峰值及其对应频率与焊接飞溅具有相关
-
Using the methods of Gallup, documentary reference, and comparative analysis, utilizing the economics, demotics, managerial theory and comparative theory, this dissertation researches the driving factors of Chinese university athletic sports, the relationship between human capital investment and innovation of system, and the development of university athletic sports in USA and China.
本研究采用文献资料法、问卷调查法、比较分析法、调查访问法,运用经济学、社会学、管理学、比较学等学科的相关理论,对我国高校竞技运动发展的驱动机制—人力资本的投资、制度的创新以及中美两国高校竞技运动发展状况进行了研究和比较,结论如下: 1。
-
Seven kinds of antijamming methods,such as time correlated choice and field-of-view shrinkage, inertial track,real-time memory criterion,amplitude discrimination, pulse-width discrimination, pulse-amplitude time sequence discrimination and pulse-width amplitude discrimination for Counter-Infrared-Interference-Missile with the cross-shaped detector array are given.
介绍了四元正交探测器以及红外干扰弹的工作原理,对四元正交探测器导引系统抗红外干扰的7种方法(即时间相关选择和视场收缩技术、惯性跟踪机制、实时记忆准则、幅值鉴别法、脉冲宽度鉴别法、脉冲幅值序列鉴别法和脉冲宽度幅值鉴别法)等进行了讨论。
-
Namely, the first, the beginning, end and length of growing season of every type of vegetation is estimated with threshold method and moving average method, and the beginning end and length of growing season of vegetation from 1982 to 1999 is fitted linearly, finally, linear trend of the beginning end and length of growing season of vegetation is analyzed. The second, phenological phase in different years and zones is estimated based on greatest changes of slope method and EOF analysis method, and the result monitored by the two methods is compared, as a result, trend of growing season change from 1982 to 1999 in different latitude zones is better acquired. The third, phenological phase of vegetation in different spatial location from 1982 to 1999 is fitted based on curve. Then, spatial difference rules of growing season of every year and average of multi-year is discussed in article. In the end, lag correlation and linear regress are used to study relation between phenological phase of different types of vegetation, different latitude zones, different spatial places and climate changes.
利用阈值法和滑动平均法逐年估测了每种植被类型的生长季的开始、结束日期及长度;对18年中植被生长季的开始、结束时间和长度进行一次线性拟合,分析了植被生长季的开始、结束日期和长度的线性变化趋势;基于最大变化斜率法和EOF分析法估计了不同年份、不同区域内植被生长季的开始、结束时间及其长度,并对这两种方法的监测结果作了比较,从而得到了较好的不同纬度区域1982~1999年植被生长季的变化趋势;基于曲线拟合了1982~1999年的不同空间位置的植被物候期,然后讨论了每年和多年平均的植被生长季的空间分异规律;最后利用时滞相关分析和线性回归研究了不同类型植被的物候期与气候变化的相互关系,不同纬度带的植被物候期与气候变化的相互关系,植被物候期与气候变化空间相互关系。
-
It includes four parts: 1 Part I, it introduces the basic knowledge of computer viruses such as computer virus definition, history and important viruses events, features, behavior phenomena, difference with computer software and hardware troubles, damage behavior and capability, classification, naming, future trend, etc; 2 Part II, it introduces the corresponding knowledge of computer systems related to computer viruses such as the composing of software and hardware of the computer system, storage media and its working mechanism, interrupt technologies,.com/.exe/.pe file formats and their working mechanism, etc; 3 Part III, it introduces computer virus mechanism and theory such as computer virus structure, work flow, working mechanism of key modules, typical technologies used to design computer viruses including the corresponding traditional technologies (interrupt filching, memory resident, etc.), the corresponding new routine technologies (self-encrypting, Mutation Engine, etc.), and the corresponding new technologies used by some prevalence computer viruses such as macro viruses, e-mail viruses, worm, hacker, Trojan, mobile phone viruses, the working mechanism analysis of some kinds of typical and prevalence computer viruses such as file-type viruses, macro viruses, e-mail viruses, worm viruses, hacker, Trojan, mobile phone viruses, the analysis of some typical and prevalence computer viruses examples including BALL viruses, WORD macro viruses, WantJob viruses, Code Red viruses, BO Trojan, etc; 4 Part IV, it introduces the defense and killing technologies of computer viruses such as the aim and criterion of computer viruses defense and killing, prevention methods and corresponding technologies, detection technologies (comparison method, character code scanning method, behavior inspecting method, analysis method, etc.), manual and automatic killing technologies, immunity technologies such as IBM digital immunity system, new anti-viruses technology trends (real-time anti-viruses technologies, 32 kernel technologies, active kernel technologies, etc.), some typical virus defense and killing softwares (Symantec AntiVirus product, PC-Cillin AntiVirus product, etc.), the defense and killing method analysis of some kinds of typical and prevalence computer viruses (file-type viruses, macro viruses, worm viruses, hacker, etc.), for example, firewall and intrusion detection technologies for anti-hacker, the defense and killing of some typical and prevalence computer viruses examples including WORD macro viruses, Code Red viruses, BO Trojan, etc.
课程内容具体包括四大部分:1)第一部分,介绍计算机病毒基本知识,包括:计算机病毒定义、病毒发展史及重大事件、病毒特点、病毒表现现象及与软硬件故障的区别、病毒破坏行为及危害性、病毒的传播途径及媒介、病毒分类、病毒的命名及计算机病毒技术发展趋势等内容;2)第二部分,介绍与计算机病毒有关的计算机系统相关知识,包括:计算机系统软硬件组成、存储介质结构及工作原理、计算机系统引导机理及流程、中断技术、。com/。exe/。pe等文件格式及工作机理等内容;3)第三部分,讲解计算机病毒机理,包括:计算机病毒的组成结构、病毒工作流程、病毒引导/触发/感染/破坏等模块的工作机理、计算机病毒所采取的编制技术(包括中断窃取/内存驻留等传统编制技术、自加密/隐形/变形机等新的常规编制技术、宏病毒/电子邮件病毒/网络蠕虫/特洛伊木马/黑客/手机病毒等一些新的流行病毒所采取的编制技术等)、一些类型的典型或流行计算机病毒的工作机理分析(包括:引导型病毒、文件型病毒、宏病毒、电子邮件病毒、蠕虫病毒、黑客、特洛伊木马、手机病毒等)、一些典型或流行的计算机病毒实例剖析(包括:小球病毒、WORD宏病毒、求职信病毒、红色代码病毒、冰河木马等)等内容;4)第四部分,讲解计算机病毒防治技术,包括:计算机病毒防治目的、病毒防治策略及规范、病毒在管理和技术上的预防措施、病毒检查技术(包括:比较法/病毒特征码扫描法/行为监测法/虚拟执行法/分析法等)、手工和自动病毒清杀技术、病毒免疫技术(包括:针对某种一次性感染病毒的基于病毒标签的免疫方法/基于自我完整性检查的计算机病毒免疫方法/IBM的数字免疫系统等)、反病毒技术的新发展(包括:实时反病毒技术/32位内核技术/主动内核技术/以毒攻毒技术等)、诺顿/趋势/金山等公司的病毒防治软件产品、一些类型的典型或流行的计算机病毒(包括:引导型病毒、文件型病毒、宏病毒、蠕虫病毒、电子邮件病毒、手机病毒、黑客、特洛伊木马)的防治措施(其中,也包括介绍面向防范黑客攻击的防火墙、入侵检测技术)、一些典型或流行的计算机病毒防治实例剖析(包括:WORD宏病毒、红色代码病毒、冰河木马v1.1/v2.2等)、多层次病毒防护体系等内容。
-
After analyzing the data which were collected through pilot survey using methods of response rate, variation degree, correlation analysis and asking experts, items were selected and made a formal questionnaire, and then formal questionnaire survey was conducted to 398 inpatients in 6 general hospitals graded differently in Taiyuan, Shanxi from Nov.18th, 2004 to Nov.
将预调查所得数据采用应答率法,变异度法,相关分析法,以及专家意见征求法进行项目的筛选,研制成正式量表,然后又于2004 年11 月18 日-24 日对山西省太原市6 所不同等级医院的398 名住院病人进行现场问卷正式调查。
-
This paper analyses Transient Energy Function from the viewpoint of dynamics and reaches some conclusions as follows:The TEF refering to stable equilibrium point of pre-fault is more reasonable than that refering to stable equilibrium point of post-fault.
引言 电力系统直接法暂态稳定分析的研究已经基本趋同于暂态能量函数法。势能界面法、相关不稳定平衡点法和扩展等面积法等诸种主导流派都以暂态能量函数为基础,差异是采取不同的方式求取临界能量。
- 推荐网络例句
-
Neither the killing of Mr Zarqawi nor any breakthrough on the political front will stop the insurgency and the fratricidal murders in their tracks.
在对危险的南部地区访问时,他斥责什叶派民兵领导人对中央集权的挑衅行为。
-
In fact,I've got him on the satellite mobile right now.
实际上 我们已接通卫星可视电话了
-
The enrich the peopling of Deng Xiaoping of century great person thought, it is the main component in system of theory of Deng Xiaoping economy, it is a when our country economy builds basic task important facet.
世纪伟人邓小平的富民思想,是邓小平经济理论体系中的重要组成部分,是我国经济建设根本任务的一个重要方面。