查询词典 Des Moines
- 与 Des Moines 相关的网络例句 [注:此内容来源于网络,仅供参考]
-
A city of central Iowa on the Des Moines River north-northwest of Des Moines.
道奇堡美国衣阿华州中部城市,位于得梅因西北偏北的得梅因河附近。
-
The dissertation focuses on performance gradient estimation and SRO algorithm of DES aswell as other related topics,such as modeling of DES and discrete event simulation,performancemeasure Hessian matrix estimation,Stochastic Approximationand so on.General Semi-Markov Processis adapted to describe behaviour of DES and discrete eventsimulation.A general result is obtained and applied to analyze strong consistency of performancegradient Perturbation Analysisestimator.Conditions for effectiveness of InfinitesimalPerturbation Analysisare also discussed.New PA algorithms,such as server PA,PA usingDirac generalized function,job sequence PA etc.,are proposed to deal with discreteparameters.Furthermore,strategies of combining PA algorithms with certain iterative rules areanalyzed widely in order to optimize DES parameters and some SRO algorithms are constructed toslove DES optimization problems.
论文将DES性能分析领域中性能梯度估计和单运行仿真优化作为主要的研究对象,探讨了与性能梯度估计有关的DES和离散事件仿真过程建模、高阶导数估计以及随机逼近等理论和方法;建立了具有一般性的DES和离散事件仿真的广义半Markov过程模型;获得了分析性能梯度估计量强相合性的理论结果和无穷小摄动分析算法应用的条件;提出了诸如服务台数目的摄动分析、奇异摄动分析、串联生产线和加工车间中工件加工序的摄动分析等一系列摄动的思想和算法,对连续参数和离散参数都进行了深入的研究;对摄动分析算法同优化规则结合实现仿真优化的策略也进行了广泛的分析,构造了新型的变界截尾的随机逼近算法,并用于DES的单运行仿真优化研究;最后,给出了DES性能分析方法的实证性研究结果。
-
Yantai a organisé et fait la promotion de la Chine, au travers de quatre grandes activités APEC : l'Exposition Commerciale Internationale APEC, l'Exposition et la Communication des techniques des PMEs, l'Exposition des Investissements, et l'Exposition E-Business, une fois l'ASEM et huit fois l'Expositions des fruits et légumes dont l'UNESCAP prend la charge.
先后代表国家承办了APEC国际贸易博览会、中小企业技术交流暨展览会、投资博览会、电子商务博览会等四次重大AEPC经贸活动,1次亚欧会议旅游合作发展论坛及展览会以及8届由联合国亚太经社会主办的国际果蔬·食品博览会。
-
The scholars pursuing the researches of DES come from the fields of automatic control as well as computer, communication, manufacturing and management science and so on.The research of DES mainly consists of system performance analysis and control synthesis. The present dissertation uses Petri nets as tool to study the controller synthesis of DES with inequality constraint.
制造系统(尤其是柔性制造系统FMS、计算机集成制造系统CIMS)、系统调度、通信网络、交通控制系统、随机服务系统、计算机操作系统、军事上的C_3I系统以及其他一些对现代文明的发展至关重要的系统等都是DES的典型实例。
-
In general, the layered feature of electrical structure is analyzed first of all for defining preliminarily whether a DES exists in the target area or not. Then the contours of resistivity in resistivity tomogram are analyzed from the deep to the shallow part. If they extend upwardly from the deeper part to shallower one and shape into the integral dislocation, great flexure or gradient zone, it would indicate there exists the DES reflecting a buried fault. At last, horizontal tracking needs to be carried out for defining the trend of the DES reflecting a buried fault.
一般情况下,在分析时,首先分析电性结构的层状特征,以此初步判定探测区域中是否存在电性结构间断面;其次,要由深入浅分析电阻率等值线,如果它们能够从探测剖面的深部向上延伸到浅部,且存在等值线的整体性错断、强烈弯曲或梯度带,则表明存在表征隐伏断裂的电性结构间断面;最后需进行水平追踪分析,以确定表征隐伏断裂的电性结构间断面的空间展布。
-
MATERIALS AND METHODS: The newborn mice were divided into DES, urethan and U+ DES groups. U was given in 500 mg/kg dose ip on the 14th day after they were born. DES was administered by ip on 1 d, 8 d, 15 d in the doses of 1/7, 2/7 and 4/7 LD50 of the day of treated.
材料与方法:ICR新生鼠,分设DES、乌拉坦和U+DES组。U在14d以500mg/kg腹腔注射(intraperitoneal,ip);DES分别在1d、8d、15d ip,共3次,分别以注射日龄LD50的1/7、2/7、4/7为DES低、DES中、DES高组。
-
Along with the password attack method unceasing renewal, the computation ability unceasing enhancement as well as to the operating speed request, the tradition disperses row algorithm MD5, SHA has demonstrated their shortcoming and the insufficiency day by day, and thestructure of hash function is mostly based on block cipher algorithm DES, but the HASH function security is established above the grouping function security, because the DES operand is very big, the operating speed very slowly by and its itself some characteristics, therefore disperses a row function based on the DES algorithm to have potential unsecurity.
随着密码攻击手段的不断更新、计算能力的不断提高以及对运算速度的要求,传统的散列算法MD5,SHA已日益显示出它们的缺点和不足,并且过去hash函数的构造多是基于分组密码算法DES的,而hash函数的安全性是建立在分组函数的安全性之上的,由于DES运算量很大、运算速度很慢以及其本身的一些特性,因此基于DES算法的散列函数具有潜在的不安全性。
-
Along with the password attack method unceasing renewal,the computation ability unceasing enhancement as well as to theoperating speed request, the tradition disperses row algorithm MD5,SHA has demonstrated their shortcoming and the insufficiency day byday, and thestructure of hash function is mostly based on block cipheralgorithm DES, but the HASH function security is established above the grouping function security,because the DES operand is very big, the operating speed veryslowly by and its itself some characteristics, thereforedisperses a row function based on the DES algorithm to havepotential unsecurity.
摘要随着密码攻击手段的不断更新、计算能力的不断提高以及对运算速度的要求,传统的散列算法MD5,SHA已日益显示出它们的缺点和不足,并且过去hash函数的构造多是基于分组密码算法DES的,而hash函数的安全性是建立在分组函数的安全性之上的,由于DES运算量很大、运算速度很慢以及其本身的一些特性,因此基于DES算法的散列函数具有潜在的不安全性。
-
His awards include being the officier de l'Ordre de la Legion d'Honneur, chevalier de l'Ordre national du M~rite, oommandeur des Arts et des Lettres, and the member of the Institut de France Acad~mie des Beaux Arts
雅克·泰迪曾获得法国国家骑士荣誉勋章、骑士级国家勋章、法国文学艺术勋章、法兰西学会成员等荣誉奖项。
-
"In-stent restenosis of DES occurs in nearly 10% of all DES implanted oer time," senior inestigator Dr. Ron Waksman told Reuters Health."Although not diffuse as with bare metal stents, DES ISR still associated with late eents."
高级研究人员Ron Waksman博士告诉路透社健康版说:&10%的药物支架在植入一段时间后发生血管内支架再狭窄,虽然不像单纯金属支架的问题那样广泛,药物支架血管内支架再狭窄也与近期活动有联系。&
- 相关中文对照歌词
- Toujours
- J'ai Des Dettes
- Des Mots Qui Sonnent
- Sainte Anne
- Dans Mon Jardin
- Cascadé
- De Ceux
- Choqué
- Disque D'or
- Le P'tit Jardin
- 推荐网络例句
-
A major factor in deviation from optimal performance of the activated sludge secondary clarifier is the presence of density currents,resulting from the density difference and temperature difference.
异重流的形成是影响活性污泥系统二沉池水力学性能的主要因素,形成异重流的主要原因包括沉淀池内不均匀的污泥分布和温度分布。
-
You always nip it in the bud.
你总是有办法解决的。
-
Posterior vomer mucoperiosteal flap was designed by dissecting the posterior vomer, and then each side of PVMF was sutured with the same side mucosal flap and the levator veli palatini. Result: This method was applied in 55 cases with satisfactory results of extending and elevating soft palate, and achieving velopharyngeal closure.
55例先天性Ⅱ、Ⅲ度腭裂患者犁骨后缘正中纵向剖开,分别形成两犁骨后缘犁骨粘膜瓣,将腭帆提肌止点连同同部位软腭鼻腔侧粘膜一起缝合于犁骨后缘犁骨粘膜瓣顶点上,上提后推软腭,再缝合口腔侧粘膜。