可是到外面一看,您会发现明显不是这么回事,并且下面所示的程序将通过仅检测降水情况的特定阈值来修正此行为。
A quick look outside shows this is obviously not the case, and the program shown below will compensate for this behavior by only detecting precipitation events of a certain threshold.
这似乎可以很好地反映造成误报的反射率范围,因此下面介绍的程序将任何反射率高于该范围的情形视为可跟踪的降水事件。
This seems to correspond well to the reflectivity range of the false positives, so the program described below will consider anything of higher reflectivity to be a trackable precipitation event.
下面这个示例程序使用了 SIGTERM信号。
完成程序编译后,下面的清单2显示了两行命令。
After compilation of the programs come out clean, listing 2 below shows two lines of commands.
下面,使用Q程序在队列上放置 950条消息。
所有下面的ClearCase程序都应该进行阻止以避免安全警报的产生。
All of the following ClearCase programs should be unblocked to avoid the security alerts.
注意,需要以拥有在promiscuous模式下访问网络适配器的相应权限的用户身份运行Argus和 process_racluster.pl程序(下面列出)。
Note that the Argus and process_racluster.pl program (listed below) need to be run as a user with appropriate privileges for accessing the network adapter in promiscuous mode.
为了完成加密支持修改,需要根据下面的清单创建CalendarCrypt . pl程序。
To complete the encryption support modifications, the CalendarCrypt.pl program is created according to the listings below.
exec命令还可用于执行下面示例中所示的程序。
The exec command can also be used to execute procedures as shown in the example below.
带启用断言检查运行程序产生下面的错误报告
Running the program with assertion checking enabled produces the following error report
有了这个基础就很容易解释下面的DPML程序了,该程序通过两个请求从数据库中创建一个html页面。
From this foundation it is easy to interpret the following DPML program that creates an HTML page from a database in two requests.
布局和应用程序模式将在下面的应用程序组装上下文中讨论。
The layout and application patterns are discussed below in the context of application assembly.
成员变量下面是属性和单击处理程序。
Below the member variables are the properties and the click handler.
下面的应用程序屏幕截图在它的左边显示了这个域中的资源,从配置管理程序直到消息流。
The screenshot of this application below shows the resources of this domain, from the configuration manager all the way through to the message flow, displayed on the left.
下面,我们将确定应用程序需要的功能组件和依赖项。
Next we identify the functional components and dependencies required by our application.
这是一个虚构的URL,因此下面的应用程序示例只是演示一项技术,并不打算产生一个可以运行的CICS服务。
This is a fictitious URL, so the sample application below demonstrates a technique and is not intended to produce a working CICS service.
上一节介绍了两个JDBC提供程序,您可以在任意一个提供程序下面创建数据源,具体的使用取决于应用程序的需求。
You can create a data source under either of the two JDBC providers that are described in the previous section, depending on the application requirements.
下面我们还用虚拟校园应用程序示例说明ACL范围。
Let's illustrate ACL scope using the virtual campus application example.
下面是应用程序完成之后显示的消息示例。
The following is a sample set of messages that are displayed after the application has completed.
然后是另外一个协议无关层,提供了与各个设备驱动程序通信的通用接口,最下面是设备驱动程序本身。
Next is another agnostic layer that permits a common interface to and from the individual device drivers that are available, followed at the end by the individual device drivers themselves.
下面的程序片断说明了此种方法。
在下面的程序中,首先你要做的就是把利用下面这行代码将13脚初始化为一个输出脚。
In the program below, the first thing you do is to initialize pin 13 as an output pin with the line.
下面显示了扩展处理程序声明的示例。
Following shows an example of an extension handler declaration.
下面是说明应用程序如何运行的高级顺序图?
Here is a high-level sequence diagram of how the application functions.
现在已经完成了开发桥接应用程序,下面可以部署项目了。
Now that you have finished developing the bridged application, you can deploy the projects.
为运行应用程序,请执行下面步骤序列。
For running the application, execute this sequence of steps.
另外,除了以上的各种冲突,也要考虑下面的应用程序设计和开发问题。
In addition to the above conflicts, the following application design and development issues also need to be considered.
我们可以用下面的方程序为这个项目的迭代持续度定义一个度量。
We can define a metric for the project's iterative adherence with the following equation.
这个程序导入下面必要的程序包。
下面的代码将为应用程序创建所有的表。
The following section of code creates all of the tables for the application.
应用推荐