• 分析检查过程时有一个关于两种检查过程各自弱点讨论

    Included in the analysis of the review processes is a discussion of the strengths and weaknesses of each.

    youdao

  • 分析指出一些弱点打印机分部那里消费者销售量较上年同期下降2%,虽然这个分部整体收入上升

    Analysts noted some weakness in the printer division, where consumer unit sales fell 2 percent, although overall revenue rose in the division.

    youdao

  • 分析自己弱点

    Analyze your own weaknesses.

    youdao

  • 基于聚类有效性分析VQ模型:VQ模型电码本训练算法有一个弱点:电码本大小人为指定

    VQ Model Based on Clustering Validity Analysis: it's the flaw for the codebook training algorithm that the size of codebook is choosed artificially.

    youdao

  • 虽然遗传分析英国白蜡树真菌抗性上带来了令人鼓舞的消息,但可能意味着一个弱点

    While the genetic analysis is encouraging news for the fungal resistance of British ash, it may have a downside, too.

    youdao

  • 分析试验暴露产品弱点从而提出进一步改进的方向。

    The weakness of product exposed in test was analyzed for further improvement.

    youdao

  • 本文揭示了模式匹配技术弱点分析一种新的、有效检测方法协议分析技术

    In this paper, the vulnerability of pattern matching is analyzed, and an effective detection method which is called protocol analysis is proposed.

    youdao

  • 计划放在棋势完全实在分析评估上,计算双方兵力和弱点以及所有威胁

    Base your plan on a thorough and honest analysis and evaluation of the position, noting strengths and weakness for both sides, and accounting for all threats.

    youdao

  • 运用认知语言学原型范畴理论分析文化定势一思维模式及其弱点,从而提出文化定势具有原型效应。

    This paper first discusses the weakness of cultural stereotype as a concept and then attempts to analyze cultural stereotype on the basis of prototype theory.

    youdao

  • 实际上SWOT分析可以提供一个框架用于识别分析优势弱点机会威胁

    Actually, SWOT analysis can provide a framework for identifying and analyzing strengths, weaknesses, opportunities, and threat.

    youdao

  • 分析在于证实力量弱点机遇风险

    The analysis seeks to identify the strengths, weaknesses, opportunities and threats.

    youdao

  • 详细分析了UMTS认证密钥分配协议过程以及协议的安全性,找出协议中存在弱点和可能的攻击,提出了公钥加密协议的改进方法。

    This paper analyzes authentication and key distribution protocol of the procedure and security of UMTS. The vulnerability and possible attack to this protocol are described.

    youdao

  • 资产弱点以及威胁可能性采取定性分析,对威胁影响分析采取定量化

    Analyzing assets, vulnerability and possibility of threaten adopt qualitative method, analyzing influencing degree of threaten adopt quantitative method.

    youdao

  • 分析连续制导体系()导弹武器系统难以攻击低速目标(武装直升机)空中目标(气球)的弱点,并从原理上进行了分析

    This paper analyzes the weakness of ground (ship) to air missile systems with CW guidance system to attack low speed targets (such as helicopters) and static air targets (balloon targets).

    youdao

  • 分析自己强项弱项强项上加重语气战胜弱点

    Analyze your strengths and weaknesses. Emphasize on your strengths to overcome the weaknesses.

    youdao

  • 文章通过聚合技术研究分析,把技术应用于基于ROLAP数据挖掘中,充分发挥了RO - LAP方法的优势克服了查询效率低最大弱点

    Though the research of aggregation table, and applied the techniques in data mining of ROLAP, not only fully displayed ROLAP superiority, but also overcome its biggest weakness of inquiry efficiency.

    youdao

  • 针对模糊图像弱点分析通过增强象素模糊属性对比度来提取边界特征的基本原理,实现了图像配准

    Aiming at the disadvantage of fuzzy image, by making some analysis about extracting edge feature based on fuzzy contrast enhancement algorithm, two images registration is achieved.

    youdao

  • 第五网络人员两个角度开放系统控制弱点风险进行分析讨论了系统的内部控制和外部控制策略。

    In the fifth chapter, controlling weakness and risk problems of open system are analyzed in network and personnel, and the interior controlling and exterior controlling strategies are discussed.

    youdao

  • 机遇外部环境威胁情景分析有助于出埃及记找出弱点内部环境的优势

    The situational analysis helped Exodus find out its weakness and strengths from internal environment, opportunities and threats from external environment.

    youdao

  • 文章介绍了入侵检测技术概念分类通用入侵检测模型分析入侵检测系统弱点局限性

    This paper introduces the concept of intrusion detection technology, classifications and general model, and analyzes the weaknesses and limitations of intrusion detection System.

    youdao

  • 工具采用称作突变分析”的科技找到验证情况中的弱点

    This tool USES a kind to call "choppy analysis" science and technology will find the weak point in environment of test and verify.

    youdao

  • 进一步研究了模式优点弱点主要分析实际合作中的困境

    Further we studied the pattern of strengths and weaknesses, mainly in its analysis of the practical difficulties in actual.

    youdao

  • 差中提取故障信息,实现推力器故障检测分离。提出采用模糊诊断方法分析差信号,克服值判断法弱点

    Fault information was obtained by analyzing residuals with fuzzy residual evaluation, which overcome a high rate of misinformation associated with the threshold evaluation method.

    youdao

  • 本文对基础阶段学生英语口语交流中存在障碍进行了简要分析,并针对学生的弱点难点,提出了有效提高学生口头交际能力对策

    In view of the students' weakness and difficulties, it states the practical measures to be taken to help the students improve their ability of oral communication.

    youdao

  • 基础分析MD5散列算法的弱点及其破译手段

    On this basis, it analyzes MD5 message digest encryption weaknesses and deciphering means.

    youdao

  • 提出基于弱点关联的目的驱动的事件生成方法通过一个实例证明算法的准确性高效性生存性分析系统进一步研究与设计奠定基础。

    This paper presents a purpose-driven approach for event generation based on vulnerability correlation and proves its correctness and efficiency by a case study.

    youdao

  • 提出基于弱点关联的目的驱动的事件生成方法通过一个实例证明算法的准确性高效性生存性分析系统进一步研究与设计奠定基础。

    This paper presents a purpose-driven approach for event generation based on vulnerability correlation and proves its correctness and efficiency by a case study.

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定