英语人>网络例句>criterion by comparison 相关的网络例句
criterion by comparison相关的网络例句

查询词典 criterion by comparison

与 criterion by comparison 相关的网络例句 [注:此内容来源于网络,仅供参考]

The models for calculating formation fracturing pressure are obtained on the basis of fracturing criterion, and the reliability of these models is proved by the comparison of the calculated formation fracturing pressures of several wells in an oilfield with the actu...

结果表明,运用断裂理论建立的破裂压力计算模型由于考虑了裂隙的存在,与地层的实际更为吻合,因而准确性更高,适用范围更广。其计算结果与现场实测值更为接近,从而也验证了模型的可靠性。

In the case of the continuous system, an algebraic criterion for the stability is established by using the comparison method and M-matrix.

第一部分先介绍了包括系统的可解性等结果在内的一些准备知识。

Taking the administrative villages as units, a comprehensive and detailed survey was made to attain the rich and reliable data, including the information about the status of the land use, the relationship of the land supply and demand, the living standards of farmers and the minimum of urban resident living guarantee and so on. Then the estimating system was established. Afterwards, basing the survey and the system, the character of each unit was transfer into data. And, utilizing the frequency law, the whole county was divided into four expropriation land blocks. The area was measured and the map, showing the differences between blocks, of the Arable Land Blocks for expropriation of Siyang was protracted by the method of GIS. Finally, the land expropriation price is calculated by agricultural land economical function compensate method and urban construction land criterion price avulse method, then the price was tested by expropriation case comparison method. It is beneficial not only for protecting farmers rights and interests, but also for link up with the current land compensate standard, so this way to calculate the land expropriate price is more reasonably.

以行政村为基本单元,对该地区的农用地利用现状、土地供求关系、农民生活水平扣城镇居民最低生活保障水平等情况进行了调查,建立征地区片价格评价体系,根据每个评价单元的综合评价分值,运用总分频率法将全县分为四个区片,并对各级区片进行面积量算,借助地理信息技术绘制了《泗阳县农用地征地区片价格分布图》,显化了农用地征地区片价格的空间分布及其差异,最后运用农用地经济功能价格补偿法和城镇建设用地基准地价剥离法综合测算农用地征地区片价格,并用征地案例比较法的测算结果加以比较验证,证明此测算结果相对更加科学合理,既有利于保障被征地农民的合法权益,又有利于与现行的征地补偿标准相衔接。

Using absorbed value feature of known mineral criterion for reference, utilizing Landsat 7 ETM remote images and features of altered mineral spectrum from USGS, valuable alteration mineralization information are extracted by comparison of spectrum similarity.

利用该区域的Landsat7 ETM遥感影像和标准光谱库中的特征蚀变矿物光谱为基本数据,借鉴已知矿物标准中的吸收谷特征,应用光谱特征匹配技术进行吸收谷谱区间和吸收谷深度对比,通过比较两者的相似性,达到提取蚀度矿物的目的,提取出许多有价值的似蚀变带遥感信息。

Furthermore, as stresses in the stress field influence the value of seepage coefficient k, which will results in the change of seepage field in the end, while on the other hand, the seepage field also has an effect on the stress field because of seepage forces. Based on the coupling model of seepage field and stress field, a program by finite element method is developed in this paper. And the comparison of results of the program and criterion method with that of test shows that the test results are reasonable, which can be referred to analyze the causes of dangers, evaluate degree of safety of the body and foundation, and design and optimize the measures of seepage control.

此外,考虑到应力场中的应力会改变土体渗透系数进而影响渗流场、而渗流场也因其产生的渗透力会导致应力场发生变化,两者之间存在耦合作用,本文基于渗流场应力场耦合分析的数学模型编制了渗流计算有限元程序CCOSAS1.0,其计算结果和采用规范方法所获得的解答与实测值的对比分析表明,该规律合理且具有一定的代表性,可用以分析险情发生原因、评价堤身堤基安全状况及设计与优化渗流控制措施。

Methods:Giving the research to the samples which were divided into CVA group and comparison group,including the items of age, stature,weight ,history of hypersusceptibility ,history of familys disease,and individual history.Dividing the children into different constitution types according to the established criterion.Statistical analysis was performed by SPSS/PC 10.05 system software.

通过对纳入研究的样本分为CVA组和对照组分别进行调查,对他们的年龄、出生时体重、现时体重、身高、过敏史和家族史、个人史等项目进行调查和检测,并按制定的标准对他们的体质进行分型,结果运用SPSS/PC10.05统计软件包进行分析处理。

It includes four parts: 1 Part I, it introduces the basic knowledge of computer viruses such as computer virus definition, history and important viruses events, features, behavior phenomena, difference with computer software and hardware troubles, damage behavior and capability, classification, naming, future trend, etc; 2 Part II, it introduces the corresponding knowledge of computer systems related to computer viruses such as the composing of software and hardware of the computer system, storage media and its working mechanism, interrupt technologies,.com/.exe/.pe file formats and their working mechanism, etc; 3 Part III, it introduces computer virus mechanism and theory such as computer virus structure, work flow, working mechanism of key modules, typical technologies used to design computer viruses including the corresponding traditional technologies (interrupt filching, memory resident, etc.), the corresponding new routine technologies (self-encrypting, Mutation Engine, etc.), and the corresponding new technologies used by some prevalence computer viruses such as macro viruses, e-mail viruses, worm, hacker, Trojan, mobile phone viruses, the working mechanism analysis of some kinds of typical and prevalence computer viruses such as file-type viruses, macro viruses, e-mail viruses, worm viruses, hacker, Trojan, mobile phone viruses, the analysis of some typical and prevalence computer viruses examples including BALL viruses, WORD macro viruses, WantJob viruses, Code Red viruses, BO Trojan, etc; 4 Part IV, it introduces the defense and killing technologies of computer viruses such as the aim and criterion of computer viruses defense and killing, prevention methods and corresponding technologies, detection technologies (comparison method, character code scanning method, behavior inspecting method, analysis method, etc.), manual and automatic killing technologies, immunity technologies such as IBM digital immunity system, new anti-viruses technology trends (real-time anti-viruses technologies, 32 kernel technologies, active kernel technologies, etc.), some typical virus defense and killing softwares (Symantec AntiVirus product, PC-Cillin AntiVirus product, etc.), the defense and killing method analysis of some kinds of typical and prevalence computer viruses (file-type viruses, macro viruses, worm viruses, hacker, etc.), for example, firewall and intrusion detection technologies for anti-hacker, the defense and killing of some typical and prevalence computer viruses examples including WORD macro viruses, Code Red viruses, BO Trojan, etc.

课程内容具体包括四大部分:1)第一部分,介绍计算机病毒基本知识,包括:计算机病毒定义、病毒发展史及重大事件、病毒特点、病毒表现现象及与软硬件故障的区别、病毒破坏行为及危害性、病毒的传播途径及媒介、病毒分类、病毒的命名及计算机病毒技术发展趋势等内容;2)第二部分,介绍与计算机病毒有关的计算机系统相关知识,包括:计算机系统软硬件组成、存储介质结构及工作原理、计算机系统引导机理及流程、中断技术、。com/。exe/。pe等文件格式及工作机理等内容;3)第三部分,讲解计算机病毒机理,包括:计算机病毒的组成结构、病毒工作流程、病毒引导/触发/感染/破坏等模块的工作机理、计算机病毒所采取的编制技术(包括中断窃取/内存驻留等传统编制技术、自加密/隐形/变形机等新的常规编制技术、宏病毒/电子邮件病毒/网络蠕虫/特洛伊木马/黑客/手机病毒等一些新的流行病毒所采取的编制技术等)、一些类型的典型或流行计算机病毒的工作机理分析(包括:引导型病毒、文件型病毒、宏病毒、电子邮件病毒、蠕虫病毒、黑客、特洛伊木马、手机病毒等)、一些典型或流行的计算机病毒实例剖析(包括:小球病毒、WORD宏病毒、求职信病毒、红色代码病毒、冰河木马等)等内容;4)第四部分,讲解计算机病毒防治技术,包括:计算机病毒防治目的、病毒防治策略及规范、病毒在管理和技术上的预防措施、病毒检查技术(包括:比较法/病毒特征码扫描法/行为监测法/虚拟执行法/分析法等)、手工和自动病毒清杀技术、病毒免疫技术(包括:针对某种一次性感染病毒的基于病毒标签的免疫方法/基于自我完整性检查的计算机病毒免疫方法/IBM的数字免疫系统等)、反病毒技术的新发展(包括:实时反病毒技术/32位内核技术/主动内核技术/以毒攻毒技术等)、诺顿/趋势/金山等公司的病毒防治软件产品、一些类型的典型或流行的计算机病毒(包括:引导型病毒、文件型病毒、宏病毒、蠕虫病毒、电子邮件病毒、手机病毒、黑客、特洛伊木马)的防治措施(其中,也包括介绍面向防范黑客攻击的防火墙、入侵检测技术)、一些典型或流行的计算机病毒防治实例剖析(包括:WORD宏病毒、红色代码病毒、冰河木马v1.1/v2.2等)、多层次病毒防护体系等内容。

By pairwise comparison with each criterion and comprehensive evaluation , the best scenario was selected.

通过成对比较和综合评价选出最优方案。

By study of the statistic characteristics of flood forecasting errors and their confidence intervals for Nushi watershed at Sanhuajian of the Yellow River and on the basis of a comparison of the precision criterion currently used for flood forecasting with the result of the error confidence interval method, it is concluded that the error of flood forecasting is of the characteristic of skew probability distribution, and that the evaluated results of forecasting errors are different by the above two methods.

因此,本文在三花间伊河卢氏流域洪水预报的基础上研究了误差置信限及误差置信限评定方法,并将误差置信限评定结果与现行水情预报精度标准[1]评定结果进行了比较。1 现行洪水预报评定方法流域洪水预报精度评定内容包括洪峰流量、峰现时间和洪量等。洪水预报误差指标有绝对误差、相对误差和确定性系数3种。预报误差小于许可误差时为合格预报。

For over half a century, on the lawmaking layer of the fundamental law, India gets rid of religion entirely, and establishes democracy system, which has been pushed for sure. In the lawmaking of the crime law and the civil law, on the whole, fulfill the construction of amending or reenacting law system, according to the modern criterion of the occident law system. In the lawmaking of personal relation, though still take on myriad tint of religion, yet by comparison with the Indian society before independent, it has made a huge progress, which is the successful part of the secularization. However, still some deficiency, such as a majority of Indian citizens have dotty law ideas, in the political and legal system can't get rid of religion thoroughly, the legal applicability of the judicial branch is still at the mercy of the religious power, which incarnate the bugs of the secularization.

半个多世纪以来,印度国家在根本大法的立法层面上完全脱离宗教影响的情况下确立了民主政治制度,并已得到确实推行;在刑事、民事立法中,基本上完成了按照西方现代法制的要求而进行了修改或重新制定的法律体系的建设过程;在人身关系立法方面,虽然仍有着种种的宗教色彩,但与独立前的印度社会相比较,已经有了长足的进步,这些都是印度法律世俗化的成功之处,但其中也不足,主要是印度大多数国民的法律观念仍然淡薄,政治法律制度上仍未能完全摆脱宗教的影响,司法部门的法律适用仍受宗教势力所左右等方面,都体现出印度法律世俗化的缺陷。

第1/2页 1 2 > 尾页
推荐网络例句

It goes back to what I told you...

现在回到我告诉过你的。。。

With a supporter in Mr Charest and an admirer in Mr Dumont, Mr Harper may be encouraged to call an election himself.

由于在沙雷那边有个支持者,杜蒙那边有个崇拜者,鼓励哈珀为自己举行一次选举。

Come to a "Chronicle" in.

来个"纪事"的。