Figure 3 shows UTM zones in Europe.
图3展示了欧洲的UT m区。
Conversion from latitude/longitude to UTM
将经纬度转换为UTM
Selectable Metric or US Standard units as well as UTM.
可选择公制或美国的标准单位,以及UTM。
The UTM coordinate system is a grid-based method for specifying coordinates.
UTM坐标系统使用基于网格的方法表示坐标。
Administrators can designate which UTM security features are used in each zone.
管理员可指定每个分区使用哪些安全特性。
We'll also touch on the Military Grid Reference System (MGRS), which is based on UTM.
我们还要提到以utm为基础的军事格网参考系(MGRS)。
For example, the UTM point 35 V 414668 6812844 is equivalent to the MGRS point 35VMJ1466812844.
例如,UTM点35V 414668 6812844等价于MGRS 点 35VMJ1466812844。
The UTM system divides the Earth into 60 zones, each based on the Transverse Mercator projection.
UTM系统将地球分为60 个区,每个区基于横轴墨卡托投影。
What counts most in deploying UTM technology is how fast the device works when all services are activated.
部署UTM技术最重要的是当所有服务都被激活的时候它工作起来有多快。
Converting from UTM coordinates to latitude and longitude is a little easier than the reverse process.
UT m坐标到经纬度坐标的转换要比相反的转换过程容易一些。
The Juniper UTM is designed to allow all traffic except for that defined by the administrator as being a threat.
设备允许除管理员定义为威胁以外的所有流量通过。
The UTM provides graphical historical and real-time reports and can send virus and attack information via e-mail.
厂家提供了历史和实时报表,并可通过邮件发送病毒和攻击信息。
Some of the administration interfaces were difficult to use and would likely inhibit effective UTM device deployment.
部分管理界面难以使用,可能会影响有效的部署。
The X 8500e tested came in a UTM bundle, a package that includes everything needed for comprehensive network protection.
所测的X 8500e来自一个UTM包中,该包涵括了全面网络保护所需的一切。
When grinding chrome to finish dimensions, overheating the base metal can create UTM and OTM formations under the chrome.
恢复涂层设计尺寸而打磨部件的镀铬层时,本体金属的打磨过热会造成在镀铬层下形成UTM和OTM。
This section introduces the source code of a library class that performs coordinate conversion between decimal degrees and UTM.
本节介绍了执行坐标转换(十进制角度和utm)的库类的源代码。
The area governed by each Meridian, also in contrast to UTM zones, is irregular in size and shape, but it frequently follows state lines.
同样与UT M分区不同的是,每条子午线引导的区域有不规则的大小和形状,但通常他跟随州线。
The invention also discloses a corresponding method for realizing the network access authentication, the transmission encryption and the UTM.
本发明还公开了相应的实现网络接入认证、传输加密、utm的方法。
UTM formations may be accompanied by heat-induced cracking within these overheated areas that, if left in place, can propagate while in service.
UTM的形成可能是由于过热区内热损伤裂纹造成的,如果裂纹没有被及时处理,就会在实际使用过程中扩展。
When you connect with help, stay calm and double-check allyour location details–such as elevation, UTM coordinates, and whichside of a ridge you're on.
当你与救助联系,保持冷静,复查所有你位置的细节–比如海拔UTM坐标和你在山脊的哪一边。
This article does not go into these details (see Resources if you want to know more). Instead, we'll assume that we already have coordinates in DD, DMS, or UTM format.
本文并未详细讨论这些细节(想要了解更多请参阅参考资料),相反,我们假设您已经具有DD、dms或utm格式的坐标。
The UTM conversion formulas are not presented here, but the source code in the following section provides some light, and Resources has links to provide more information.
本文没有给出utm转换公式,但是可从下面一节中给出的源代码中窥探一二,更多信息请参阅参考资料提供的链接。
When UTM coordinates on WGS84 ellipsoids are converted to Lambert ones on Clarke80, they are transformed to geographic coordinates at first, and then to Cartesian ones on WGS84;
在进行坐标转换时,WGS84椭球下的UTM 坐标首先被转换成地理坐标,然后被转换成笛卡尔坐标;
For example, the latitude/longitude coordinates 61.44, 25.40 are presented in UTM as 35 V 414668 6812844; the latitude/longitude coordinates -47.04, -73.48 are 18 G 615471 4789269 in UTM.
举例来说,使用UTM 表示经/纬度坐标 61.44,25.40 的结果就是35V 414668 6812844;而 经/纬度坐标 -47.04,-73.48的表示结果为18G 615471 4789269。
Meridian These are similar to UTM zones. Both apply to large areas based on a line of longitude, both are often left out of field data, and the position is not uniquely defined without them!
子午线与通用横向麦卡托分区相似,同样以一条经线为基础询问大区域,同样通常忽略现场数据,且位置不是绝对的。
Companies considering deploying unified threat management (UTM) technology have various offerings and approaches to consider, with many different products to address specific network requirements.
对于打算部署一体化威胁管理(utm)技术的公司来说,需要考虑的产品和方案有很多,不同的产品涉及特定的网络需求。
Companies considering deploying unified threat management (UTM) technology have various offerings and approaches to consider, with many different products to address specific network requirements.
对于打算部署一体化威胁管理(utm)技术的公司来说,需要考虑的产品和方案有很多,不同的产品涉及特定的网络需求。
应用推荐