您要查找的是不是:
- The connection of separate parts of a branching system to form a network, as of leaf veins, blood vessels, or a river and its branches. 并接,联结分支系统的不同部分结合后形成一个网络,如叶脉,血管,或河流及其支流
- Fault-tree model is the graphical expression of connection of basic events which result in system fault, and used in qualitative and quant itative analysis of system fault model. 故障树模型是导致系统失效的基本事件之间逻辑关系的图形表示,应用于系统失效模型的定性和定量分析。
- The connection of separate parts of a branching system to form a network,as of leaf veins,blood vessels,or a river and its branches. 并接,联结分支系统的不同部分结合后形成一个网络,如叶脉,血管,或河流及其支流。
- This paper discusses the detailed expatiation about the principle of design and the connection of system interfaces.Finally, test result of the throughout of packets transmitted on the Ethernet is... 就该系统的设计原理及接口连接关系进行了详细论述,最后给出了网络传输流量测试结果。
- The connection of our telephone took several hours. 我们用了好几个小时才接通了电话。
- The capacity of a physical system to do work. 能量,能物理系统做功的容量能力
- He is a distant connection of my wife's. 他是我妻子的一个远亲。
- Then upgrade the rest of the system to Woody. 然后升级剩下的系统到Woody。
- In Series/1, the assignment or connection of resources or objects to a task set. This occurs before task set execution. 在IBMSeries/1中,把系统资源或目标程序分配或联接到某个任务集的过程,在这之后方可执行该任务集。
- Moreover, cEAP BPM develpped by TBCommerce Technology Inc. is used to perform the transformation of system procedure to system objects automatically in this architecture. 因此,传统的套装软体,已无法因应日益扩大的企业功能及随时变化的企业模式,亦无法令一般企业满足其功能需求。
- They use a computer system to organize their data. 他们利用一个电脑系统整理数据。
- The morphology of system was analysed by polarized microscope, and the result showed that adding compatilizcr to system the dispersion was better, the size... 还通过偏光显微镜对体系进行了形态分析,证实了加相容剂的体系分散更均匀,分散相颗粒尺寸变小,增容效果明显。
- The connection of the house pipes to the water supply. 房屋水管与水源的连接。
- Qin enfeoffment system to system for counties across the country designated as 36-gun, an east county. 秦改分封制为郡县制,全国划为36郡,属河东郡。
- It was applied to all application-layers of system to protect the resources in different layers. 它将RBAC合理实施到系统的各个应用层,管理位于不同应用层的系统资源权限。
- The using of the mail system to defraud the public. 利用邮政系统诈骗公众的行为。
- Unlike many other threats, a computer virus can spread from program to program and from system to system, without direct human intervention. 不象很多其它威胁的是,计算机病毒可以在没有人的直接干预下,从一个程序传播到另一个程序,从一个系统传播到另一个系统。
- It’s the core of the system to get the minutiae. 细节点特征的提取是整个系统的核心部分。
- Individual users can hence roam from system to system transparently, while maintaining communications with members of their home system, if needed. 因此,每个用户可以透明地在系统间漫游,同时在需要时与原系统成员保持通信。
- The connection of our telephone took hours. 我们用了好几个小时才接通了电话。
