英语人>网络例句>process control 相关的网络例句
process control相关的网络例句

查询词典 process control

与 process control 相关的网络例句 [注:此内容来源于网络,仅供参考]

It is a generalization of the nonlinear diffusion equation proposed by Perona-Malik and the method presented by Cuesta, and interpolates between the nonlinear parabolic equation and the nonlinear hyperbolic equation, thus can effectively control the diffusion process so that noises can be removed and details of the image such as edges can be preserved as much as possible simultaneously.

提出了一种包含对时间的分数阶导数的非线性扩散方程,它是对Perona-Malik的非线性扩散方程和Cuesta提出的方程的推广,介于非线性抛物方程和非线性双曲方程之间,从而能有效地控制扩散过程,使得在去除图像噪声的同时能够尽可能地保留图像的边缘等细节信息。

This thesis is designed for using the general webcam, the information that acquired from the webcam and process after computer can imitate the movement of the cursor of the mouse , even the mouse event by clicking the icon that we want, it doesn't need to control mouse manually.

本论文主要在设计出利用一般的网路摄影机,加上经过电脑的运算后,即可模拟出滑鼠指标的移动,甚至是触发滑鼠的事件来点击我们想要的物件,也就是做出一个完全不需手动操控的滑鼠。

In order to process conveniently,we need to fit out with suitable style space curve usually in control processing.

在数控加工中,通常需要将空间曲线用合适的样条拟合出来,以方便加工。

A process for preparing cycloolefin features that in the presence of catalyst slurry containing metal Ru catalyst, water and metallic sulfate, the mononuclear aromatics is partially hydrogenated by hydrogen, and includes a step to control the activity of catalyst.

一种生产环烯烃的方法,该方法是在含有金属钌催化剂、水和金属硫酸盐的催化剂浆液存在下用氢部分加氢单环芳烃进行该方法,其中包括控制催化剂活性的步骤。

With the corresponding theoretical model established and perfected, it would be possible to provide a quantitative view of how proteins to control the process of cytokinesis.

随着相应理论模型的建立和完善,量化蛋白控制胞质分裂的过程将成为可能。

Industrial automation to the process of real-time control and data processing.

到工业自动化过程的实时控制和数据处理。

This paper is that dynamically demonstrates the six algorithms implementation auxiliary teaching software of the data structure It may adapt the different demand that the reader demands the algorithm data-in and the process execution control mode.

本论文是一个动态演示数据结构中六个算法执行过程的辅助教学软件,它可适应读者对算法的输入数据和过程执行的控制方式的不同需求,在计算机的屏幕上显示算法执行过程中,可以显现数据的逻辑结构或存储结构的变化状况或递归算法执行过程中栈的变化状况。

This paper is that dynamically demonstrates the six algorithms implementation auxiliary teaching software of the data structure It may adapt the different demand that the reader demands the algorithm data-in and the process execution control mode. During the demonstration of the algorithm implementation on the computer screen, it can appear the change status of the data logical organization or the memory structure change condition or the stack change condition in the recursion algorithm implementation.

本论文是一个动态演示数据结构中六个算法执行过程的辅助教学软件,它可适应读者对算法的输入数据和过程执行的控制方式的不同需求,在计算机的屏幕上显示算法执行过程中,可以显现数据的逻辑结构或存储结构的变化状况或递归算法执行过程中栈的变化状况。

According to using easy company network safe expert introduces: According to the frangibility of Web application process that OWASP organization released 2007 the statistical result of 10 big ranks makes clear, the flaw of the script that cross a station, infuse, request that cross a station is forged, information divulges the problem that waits for a respect to remain the hacker's at present popular attack way, and be atttacked with SQL infuse especially among them and cross station script attack to attach most importance to, the lawful sex that infuse of so called SQL is atttacked even if uses programmer to do not have pair of user data-in when writing code undertakes judging, bring about the person that inbreak to be able to command through insert and carrying out baleful SQL, obtain data to read the attributive; that take and revises and attack of the script that cross a station is join baleful code through be in the webpage, when the person that visit browses a webpage, the administrator of means prevail on that baleful code can be carried out or ceases through giving an administrator post a letter is browsed, win administrator limits of authority thereby, control whole website.

据动易公司网络安全专家介绍:根据2007年 OWASP 组织发布的 Web 应用程序脆弱性10大排名的统计结果表明,跨站脚本、注入漏洞、跨站请求伪造、信息泄露等方面的问题仍然是现在黑客流行的攻击方式,而其中尤以SQL注入攻击和跨站脚本攻击为重,所谓的SQL注入攻击就是利用程序员在编写代码时没有对用户输入数据的合法性进行判定,导致入侵者可以通过插入并执行恶意SQL命令,获得数据读取和修改的权限;而跨站脚本攻击则是通过在网页中加入恶意代码,当访问者浏览网页时,恶意代码会被执行或者通过给治理员发信息的方式诱使治理员浏览,从而获得治理员权限,控制整个网站。

In test software, database technology is used to control test process of cable net and save test result.

用数据库技术完成电缆网测试流程的控制和测试结果的保存和判断。

第100/100页 首页 < ... 92 93 94 95 96 97 98 99 100
推荐网络例句

Cynanchum Lingtai apricot production in the average weight 65 grams, the brightly-colored fruit, juicy rich, sweet-sour taste, sweet from the nucleolus, when the late Qing Dynasty famous Shaanxi, Gansu provinces, the Qing imperial court Tongzhi tribute for years.

灵台生产的牛心杏平均单果重65克,果实色泽鲜艳,汁多味浓,甜酸适口,离核仁甜,清末时就驰名陕、甘两省,清同治年间曾为朝廷贡品。

Chenopodium album,Solanum nigrum, and Amaranthus retroflexus were very susceptible to the herbicides. Polygonum persicaria and Abutilon theophrasti were relatively less susceptible to the herbicides, and Lycopersicon esculentum was not susceptible to it. The relationship between reduction rates of weed biomass and PPM values of weed leaves 2,4, and 6 days after treatment was established.

供试的6种杂草对该混剂的敏感性存在显著差异:红心藜Chenopodium album、龙葵Solanum nigrum和反枝苋Amaranthus retroflexus对该混剂最敏感,ED90值分别为47.65、71.67和29.17g/hm2;春蓼Polygonum persicaria和苘麻Abutilon theophrasti敏感,ED90值分别为96.91、114.20g/hm2;而番茄不敏感。

However, I have an idea.

不过,我有个主意。