记作业>英语词典>tion翻译和用法

tion

动作; 行为; 名词后缀

复数:tions 

Collins.4

柯林斯词典

双语例句

  • Modularization calcula tion of magnetic leakage field and stray losses in a power transformer
    电力变压器漏磁场及杂散损耗的模块化程序计算
  • This produces soft spots, and in some cases, severe unpredicted distor? tion. If the sampling frequency is less than this, we can expect a serious distortion of output frequency which is generally referred to as aliasing.
    这样一来就就有软点产生,有时,甚至会产生无法预料的严重畸变。如果取样频率小于此数,那么输出频率就要产生严重畸变,通常假频指的就是这种情况。
  • Training edu ca tion for higher post, which is for training talents;
    各类高层次岗位培训教育则是培养高级专门人才的教育形式;
  • Most believe that the Special Resolu ­ tion Regime for retail banks, included in a new Banking Act this year, should be extended to invest ­ ment banks.
    今年出台的新银行业法案为零售银行制定了一份特别决议制度。大多数人认为,该份制度应该也对投资银行推广。
  • This paper mainly discusses and analyzes the transforma ˉ tion of the classical theory of physics caused by the Special Theory of Relativity in this physics transformation.
    文章着重评析了这次物理学变革中狭义相对论对经典物理学的改造。
  • Furthermore, because man ­ agement access is often realized using a Web applica ­ tion or service, it often shares the vulnerabilities of the Web application layer and services/ API component.
    此外,因为经常使用Web应用或服务实现管理访问,它通常也会带来与Web应用层和服务/API组件同样的漏洞。
  • But happiness is an unpredictable creature that may not show up when it should. This produces soft spots, and in some cases, severe unpredicted distor? tion.
    然而,快乐是一种无法预料的东西,在该来的时候也许偏偏不会出现。这样一来就就有软点产生,有时,甚至会产生无法预料的严重畸变。
  • For two layers, the cloud software environment and the cloud software infrastructure, the model makes the layers 'three main service components-computa ­ tion, storage, and communication-explicit.
    对于云计算的软件环境和云软件基础设施这两层,这个模型明确了层中的三个主要的服务组件&计算、存储以及通信。
  • The result of the experiment shows that without any wavetable, this reconstruc-tion in frequency-domain copies the tone color of piano more appropriately.
    实验验证,这种频域的音色重构方法,不触发任何波表,更贴切地模仿了真实钢琴的音色。
  • Also, the authentication mechanisms 'implementa ­ tion might have weaknesses and allow, for example, credential interception and replay.
    身份验证机制的实现也可能有弱点并导致被攻击,例如凭证拦截和重播。