在分析检查过程时有一个关于两种检查过程各自优弱点的讨论。
Included in the analysis of the review processes is a discussion of the strengths and weaknesses of each.
分析家指出一些弱点,打印机分部,那里的消费者销售量较上年同期下降2%,虽然在这个分部整体收入上升。
Analysts noted some weakness in the printer division, where consumer unit sales fell 2 percent, although overall revenue rose in the division.
分析自己的弱点。
基于聚类有效性分析的VQ模型:VQ模型电码本的训练算法有一个弱点:电码本大小是人为指定的。
VQ Model Based on Clustering Validity Analysis: it's the flaw for the codebook training algorithm that the size of codebook is choosed artificially.
虽然遗传分析在英国白蜡树的真菌抗性上带来了令人鼓舞的消息,但它也可能意味着一个弱点。
While the genetic analysis is encouraging news for the fungal resistance of British ash, it may have a downside, too.
分析了试验中暴露的产品薄弱点,从而提出进一步改进的方向。
The weakness of product exposed in test was analyzed for further improvement.
本文揭示了模式匹配技术的弱点,分析了一种新的、有效的检测方法,即协议分析技术。
In this paper, the vulnerability of pattern matching is analyzed, and an effective detection method which is called protocol analysis is proposed.
把你的计划放在对棋势完全实在的分析和评估上,计算双方的兵力和弱点,以及所有的威胁。
Base your plan on a thorough and honest analysis and evaluation of the position, noting strengths and weakness for both sides, and accounting for all threats.
运用认知语言学的原型范畴理论分析文化定势这一思维模式及其弱点,从而提出文化定势具有原型效应。
This paper first discusses the weakness of cultural stereotype as a concept and then attempts to analyze cultural stereotype on the basis of prototype theory.
实际上,SWOT分析可以提供一个框架,用于识别和分析的优势,弱点,机会和威胁。
Actually, SWOT analysis can provide a framework for identifying and analyzing strengths, weaknesses, opportunities, and threat.
本分析在于证实力量、弱点、机遇和风险。
The analysis seeks to identify the strengths, weaknesses, opportunities and threats.
详细分析了UMTS认证和密钥分配协议的过程以及协议的安全性,找出协议中存在的弱点和可能的攻击,提出了公钥加密协议的改进方法。
This paper analyzes authentication and key distribution protocol of the procedure and security of UMTS. The vulnerability and possible attack to this protocol are described.
对资产、弱点以及威胁可能性采取定性分析,对威胁的影响分析采取定量化。
Analyzing assets, vulnerability and possibility of threaten adopt qualitative method, analyzing influencing degree of threaten adopt quantitative method.
分析了连续波制导体系的地(舰)空导弹武器系统难以攻击低速目标(武装直升机)和空中静目标(气球靶)的弱点,并从原理上进行了分析。
This paper analyzes the weakness of ground (ship) to air missile systems with CW guidance system to attack low speed targets (such as helicopters) and static air targets (balloon targets).
分析自己的强项和弱项,在强项上加重语气来战胜弱点。
Analyze your strengths and weaknesses. Emphasize on your strengths to overcome the weaknesses.
文章通过对聚合表技术的研究和分析,把该技术应用于基于ROLAP的数据挖掘中,既充分发挥了RO - LAP方法的优势,又克服了其查询效率低的最大弱点。
Though the research of aggregation table, and applied the techniques in data mining of ROLAP, not only fully displayed ROLAP superiority, but also overcome its biggest weakness of inquiry efficiency.
针对模糊图像的弱点,分析了通过增强象素模糊属性对比度来提取边界特征的基本原理,实现了两幅图像的配准。
Aiming at the disadvantage of fuzzy image, by making some analysis about extracting edge feature based on fuzzy contrast enhancement algorithm, two images registration is achieved.
第五章从网络和人员两个角度对开放系统的控制弱点和风险进行了分析,并讨论了系统的内部控制和外部控制策略。
In the fifth chapter, controlling weakness and risk problems of open system are analyzed in network and personnel, and the interior controlling and exterior controlling strategies are discussed.
机遇和外部环境的威胁下情景分析出有助于出埃及记找出它的弱点和内部环境的优势。
The situational analysis helped Exodus find out its weakness and strengths from internal environment, opportunities and threats from external environment.
文章介绍了入侵检测技术的概念、分类和通用入侵检测模型,并分析了入侵检测系统的弱点和局限性。
This paper introduces the concept of intrusion detection technology, classifications and general model, and analyzes the weaknesses and limitations of intrusion detection System.
该工具采用一种称作“突变分析”的科技来找到在验证情况中的弱点。
This tool USES a kind to call "choppy analysis" science and technology will find the weak point in environment of test and verify.
进一步研究了该模式的优点和弱点,主要分析其在实际合作中的困境。
Further we studied the pattern of strengths and weaknesses, mainly in its analysis of the practical difficulties in actual.
从残差中提取故障信息,实现推力器故障的检测与分离。提出采用模糊诊断方法分析残差信号,克服了阈值判断法误报率高的弱点。
Fault information was obtained by analyzing residuals with fuzzy residual evaluation, which overcome a high rate of misinformation associated with the threshold evaluation method.
本文对基础阶段学生在英语口语交流中存在的障碍进行了简要的分析,并针对学生的弱点和难点,提出了有效提高学生口头交际能力的对策。
In view of the students' weakness and difficulties, it states the practical measures to be taken to help the students improve their ability of oral communication.
在此基础上分析MD5散列算法的弱点及其破译手段。
On this basis, it analyzes MD5 message digest encryption weaknesses and deciphering means.
提出一种基于弱点关联的目的驱动的事件生成方法,通过一个实例证明算法的准确性和高效性,为生存性分析系统进一步研究与设计奠定基础。
This paper presents a purpose-driven approach for event generation based on vulnerability correlation and proves its correctness and efficiency by a case study.
提出一种基于弱点关联的目的驱动的事件生成方法,通过一个实例证明算法的准确性和高效性,为生存性分析系统进一步研究与设计奠定基础。
This paper presents a purpose-driven approach for event generation based on vulnerability correlation and proves its correctness and efficiency by a case study.
应用推荐