| 1. | Effects of losses and nonideal behavior on cf are considered later . 下面我们再讨论各种损失及非理想特性对CF的影响。 |
| 2. | In the foregoing example, the voltage source is nonideal and hence presents no difficulty . 在上面的例子中,电压源是非理想的,所以没有发现什么困难。 |
| 3. | In this paper , we do research about the nonideal scattering centers 本文的研究围绕各种非理想散射现象而展开。 |
| 4. | Effects of losses and nonideal behavior on cf are considered later 下面我们再讨论各种损失及非理想特性对cf的影响。 |
| 5. | Those nonideal scattering centers make the imaging blur , but they also contain the feature of target 这些非理想散射中心造成了图像的模糊,但它同时也包含了目标的重要特性。 |
| 6. | Nonideal focusing caused by some mechanical factors will affect measuring accuracy of a laser granulometer and thus a corresponding mathematical model for scattering light intensity is established 摘要因机械因素产生的非理想聚焦对激光粒度测量精度会产生影响,对此建立了相应的散射光强数学模型。 |
| 7. | In practical design , not only nonideal factors from noise , mismatch , offset etc . are taken into consideration , but also the desired sub _ adc performance is achieved with reduced power dissipation 在具体电路设计中,不仅充分考虑了噪声、失调和失配等非理想因素,而且在实现系统对子adc的指标限制前提下,降低了功耗。 |
| 8. | The nonideal routing in figure 11 . 29 has another drawback , the large area enclosed by the conductor produces extensive external magnetic fields , which may interact with other circuits and cause unwanted coupling 图11 . 29中“不理想的形状”还有另外一个缺点:由于电路环路面积大,会形成较强的电磁场,可能会干扰其他电路并产生有害的耦合。 |
| 9. | To comply with the low - power - consumption application , low - voltage design is taken into account by using some special circuit structures . . besides there are many nonideal effects in pll which degrade the loop performance badly , some efficient solutions have been put forward to suppress the undesired ones 此外论文还讨论了若干制约环路性能的非理想效应,并在借鉴国外相关理论成果的基础上,成功设计了克服这类效应的一些改进电路。 |
| 10. | Immune clone strategy is introduced into c - means algorithm , which can effectively tackle those problems of nonstability , slow convergence and nonideal clustering that exist in ids with the traditional c - means . the experimental results reveal that the system can detect variety of unknown abnormal intrusions , and demonstrate that our combined clustering algorithm has good performance 实验结果证明该上述两种算法有效地克服了传统c -均值聚类算法在解决入侵检测问题中的稳定性差、收敛性不好和聚类效果不理想等问题,并能在一定程度上检测到未知的异常入侵行为。 |