首页 / 词典 / good

utm

  • 网络统一威胁管理;横轴墨卡托投影;安全网关
utmutm
  1. Preliminary Analysis of Application of UTM Equipment in Information System

    浅析UTM设备在信息系统中的应用

  2. Arithmetic research for the transformation from UTM reference frame to earth reference frame

    UTM坐标转换成大地坐标系的算法研究

  3. The UTM coordinate system is a grid-based method for specifying coordinates .

    UTM坐标系统使用基于网格的方法表示坐标。

  4. Use Multi-Core CPU realizes high performance UTM

    用多核CPU实现高性能UTM

  5. We 'll also touch on the Military Grid Reference System ( MGRS ), which is based on UTM .

    我们还要提到以UTM为基础的军事格网参考系(MGRS)。

  6. The essay is just based on NP hardware platform to design and implement a high performance and low cost UTM security gateway .

    本文正是基于NP硬件平台,设计实现了一个高性能,低成本的UTM安全网关。

  7. Conversion of Geodetic Coordinates to UTM Rectangular Coordinates in Processing the Multi-beam Bathymetric Data

    多波束数据处理中的UTM直角坐标与经纬度坐标转换技术

  8. Converting from UTM coordinates to latitude and longitude is a little easier than the reverse process .

    UTM坐标到经纬度坐标的转换要比相反的转换过程容易一些。

  9. The next section looks at the latitude / longitude and UTM conversions in more detail .

    下一节将进一步探讨经纬度与UTM之间的转换。

  10. Converting from latitude / longitude to UTM and vice versa

    在经纬度和UTM坐标之间进行转换

  11. As traditional optical metrological instrument , UTM ( universal tools microscope ) is high accuracy and stable . It was widely used in precise measurement .

    光学计量仪器,如万能工具显微镜(UTM),分度头等,具有应用广泛、测量精度高、稳定性好等优点,广泛应用于测量领域。

  12. Objective : To study clinical significance and level of plasma and urine thrombomodulin ( FTM and UTM ) in chronic glomerular disease .

    目的:研究慢性肾小球疾病的血浆和尿血栓调节蛋白(PTM和UTM)水平及其临床意义。

  13. Conversion from latitude / longitude to UTM

    将经纬度转换为UTM

  14. Conversion from UTM to latitude / longitude

    将UTM坐标转换为经纬度坐标

  15. The current system can be applied in automatic measuring in the field of liquid level measurement and some instrument measurement such as UTM ( universal tools microscope ) successfully .

    当前系统可成功应用于液位测量领域和万能工具显微镜等其他仪器的自动测量。

  16. The UTM conversion formulas are not presented here , but the source code in the following section provides some light , and Resources has links to provide more information .

    本文没有给出UTM转换公式,但是可从下面一节中给出的源代码中窥探一二,更多信息请参阅参考资料提供的链接。

  17. When grinding chrome to finish dimensions , overheating the base metal can create UTM and OTM formations under the chrome .

    恢复涂层设计尺寸而打磨部件的镀铬层时,本体金属的打磨过热会造成在镀铬层下形成UTM和OTM。

  18. The UTM ( Universal Transverse Mercator ) projection is finding a wide application because of its orthomorphic projection and few errors .

    由于通过横墨托(UTM)投影的应用日益广泛,由于它具有正形、投影误差小的特点,采用UTM投影以代替高斯&克吕格投影将是今后的发展趋势。

  19. Unlike decimal coordinates , which you can determine using a sextant and a chronometer , you cannot determine UTM coordinates without calculations .

    十进制坐标可通过一个六分仪和一个记时计确定,与此不同的是,必须通过计算才能确定UTM坐标。

  20. UTM ( Unified Threat Management ) solves this problem . Multiple defense functions are integrated into a uniform hardware platform which constructs an entire systematic protection for the internet safety .

    安全网关的出现解决了这一问题,其将原有多种安全防御功能整合到统一的硬件平台上,为网络安全提供全方位的保护体系。

  21. This paper also realized the inverse calculation of UTM projection using the programming of VB , according to UTM projection coordinate , could calculate the longitude and latitude coordinate .

    还使用VB编程实现了对UTM投影的反算,根据UTM投影坐标,反算出经纬度坐标。

  22. Overheating can result in over tempered martensite ( OTM ) or untempered martensite ( UTM ) formations in the base metal .

    过热会造成在本体金属中形成过回火马氏体(OTM)或者欠回火马氏体(UTM)。

  23. I needed to perform conversion between latitude and longitude , UTM , and MGRS , and so I did basic research and implemented the transformations in a Java class .

    我需要在经纬度、UTM和MGRS之间进行坐标转换,因此我做了些基础研究并使用Java类实现了转换。

  24. UTM ( Unified Threat Management ) which integrates many security functions , is capable of withstanding the attacks from network boundary effectively . It can not only protect the entire internal network , but also extend the security mechanism to the remote offices .

    UTM紧密集成了多种安全功能,能够在网络边缘有效防御攻击,不仅可以保护整个内部网络,还能将安全机制延伸到远程办公机构。