• The polarographic wave of benzophenone-12 was studied by linear sweep polarography in different kinds of buffer systems.

    线性扫描极谱研究了雷公藤内酯酮不同缓冲体系和氧化剂作用下极谱催化波。

    youdao

  • The polarographic behaviors of triptophenolide at different buffer systems and oxidants were studied by linear sweep polarography.

    线性扫描伏安法研究了雷酚内酯不同缓冲体系氧化剂作用下极谱行为

    youdao

  • Several important factors are discussed, such as buffer systems, terminating ions, column effective length and injection time of sample and terminating solution.

    详细讨论了影响富集的缓冲体系尾随离子种类、毛细管有效长度进样时间等速电泳时间重要因素

    youdao

  • Ion exchange equilibrium of neutral amino acids on 732 strong acid cation exchange resin in non buffer systems were studied and an equilibrium model was proposed.

    研究了缓冲体系中性氨基酸732型酸性阳离子交换树脂离子交换平衡提出了平衡模型

    youdao

  • Methods: Based on several reported SDS-PAGE systems for low molecular weight protein, the buffer systems, concentrations of separating gel and stacking gel, electrophoresis procedures were optimized.

    方法:比较以往报道各种分子量蛋白电泳分离方法,对电泳缓冲液系统、分离浓缩胶的浓度、电泳程序进行了优化。

    youdao

  • Most of the file systems communicate through a buffer cache, which is a cache that optimizes access to the physical devices by caching recently touched data.

    大多数文件系统通过缓冲区缓存来相互通信这种缓存通过缓存最近使用数据优化物理设备的访问。

    youdao

  • The default size of the log buffer (LOGBUFSZ) below is normally too small for database systems with many update workloads.

    对于具有许多更新工作负载数据库系统而言,下面日志缓冲区默认大小(LOGBUFSZ)通常太小

    youdao

  • So far, all our examples of buffer overflow exploits have been for UNIX systems.

    目前我们举的所有利用缓冲区溢位范例针对UNIX系统的。

    youdao

  • After developing exploits, you can determine whether your applications and systems are vulnerable to exploits such as buffer overflows and holes such as SQL injections.

    漏洞攻击开发出来可以确定应用程序系统是否能够经受缓存溢出攻击和SQL注入漏洞的威胁。

    youdao

  • The buffer cache buffers requests between the file systems and the block devices that they manipulate.

    缓冲区缓存会缓存文件系统相关设备之间请求

    youdao

  • Journaling file systems use a journal to buffer changes to the file system (which is also used in crash recovery) but can use different strategies for when and what is journaled.

    日志文件系统使用日志缓冲文件系统修改(同时也可以应用紧急故障恢复)的,可以根据记录的时间内容采取不同策略

    youdao

  • A buffer overflow in a program such as find is likely to be a risk to a great number of systems.

    诸如find这样的程序中的缓冲区溢出可能大量的系统带来风险。

    youdao

  • DB2 systems performance would include such factors as installation options, sizing buffer pools, dispatching priorities for DB2-related address Spaces, and so on.

    DB 2系统性能可以包括诸如安装选项缓冲大小设置、DB 2相关地址空间调度优先级等等之类的因素

    youdao

  • Why do most systems take a significant amount of time to write characters to an output device? What is this buffer and why do we require it? Why do we require flushing buffers?

    为什么大多数系统需要大量时间字符输出设备?什么缓冲我们为什么需要?为什么我们需要冲洗缓冲?。

    youdao

  • First reactor of reactors systems play the buffer role, therefore the dynamic influent conditions do little harm to two reactors systems.

    对于二级反应器系统第一个反应器缓冲作用所以浓度动态变化对二级反应器系统危害

    youdao

  • In several buffer allocation schemes, the analysis of self-similarity on performance of queuing systems provides evidence for the dynamic buffer allocation.

    几种缓冲区分配方案中分析相似程度排队系统性能影响,进行缓冲区动态分配提供依据

    youdao

  • The queuing characteristics of the MIMO-AMC systems under the conditions of unsaturated traffic and finite-length buffer are investigated.

    分析业务随机到达以及链路层缓冲区长度有限条件,MIMO-AMC系统分组排队特性

    youdao

  • The semiconductor devices are transferred among the test tray, the buffer tray and the customer tray by first and second picker systems.

    通过第一及第拾取器系统在测试、该缓冲用户之间传送半导体器件

    youdao

  • As a safe protector, buffer has been widely applied to all sorts of mechanical systems.

    缓冲器作为一种安全保护装置广泛用于各种机械系统中

    youdao

  • In many application systems, using the buffer storage technology is an effective approach for improving the function of data inquiry.

    许多应用系统中使用缓存技术提高数据库查询性能有效途径

    youdao

  • Then how to use a computerized chemical equilibrium model to estimate and predict buffer capacity and susceptibility to acid precipitation of water systems are discussed.

    然后讨论如何计算机处理化学平衡模式估计预测水体缓冲容量以及沉降敏感性

    youdao

  • Network security has been paid more attention to and hackers often take advantage of buffer overflow to attack other systems or spread virus.

    网络安全日益引起人们重视,而利用缓冲区溢出进行攻击是黑客病毒较为常用的手段。

    youdao

  • By solving we can get some parameter index about the two queueing systems, for example, buffer contents, unfinished work and cell delay.

    通过数值求解我们分别得到两个系统一些衡量指标平均队长,系统未完成工作时间以及积极顾客的逗留时间。

    youdao

  • By solving we can get some parameter index about the two queueing systems, for example, buffer contents, unfinished work and cell delay.

    通过数值求解我们分别得到两个系统一些衡量指标平均队长,系统未完成工作时间以及积极顾客的逗留时间。

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定