Примеры использования This topology на Английском языке и их переводы на Русский язык
{-}
-
Official
-
Colloquial
This topology requires three or more members.
The name of an integrated chip with this topology reduced and full.
This topology fits practically all process plants.
In the"To find the nearest analogue of this topology" is analogue, if any.
This topology is used to provide interesting examples and counterexamples.
The bases of emergence of the rights for this topology if the applicant isn't an author.
This topology shows the most common installation methods for fieldbus.
Author of topology shall be a physical person by whose creative work this topology has been made.
This topology works well when there are ten or fewer members in the replication group.
In the column"Name of an integrated circuit with this topology" the abbreviated and full name of the topology. .
In this topology, every member replicates with all other members of the replication group.
In the process, the function is assigned to a topology function according to its function definition, and this topology function is placed.
The open sets in this topology are exactly those sets which are open in every compatible linear order.
If there are several authors, you will need to fill the form CT/ MORE(Appendix 2),indicating the scope of the specific contribution of each author to the creation of this topology.
With this topology, a graph has a normal spanning tree if and only if its set of vertices can be decomposed into a countable union of closed sets.
In the latter case, in the column"Date and place of first use of topology for commercial purposes" indicates complete date(day, month, year) andthe country is the first use of this topology for commercial purposes.
The advantages of this topology are shown when using the active clipping mode for inductive voltage ejections on a switch during its shutdown Active Clamp.
Separate optic cable is routed toeach terminal(subscriber switch in the building) from the network core; this topology is called"star" and ensured no decrease in speed of connection with any number of subscribers, as well as high reliability.
In this topology, each of the n{\displaystyle n} users shares a secret with each of the m{\displaystyle m} trustees-but users share no secrets directly with other users, and trustees share no secrets directly with other trustees-resulting in an n× m{\displaystyle n\times m} secret sharing matrix.
In the"data holder to the date of the first use of this topology for commercial purposes," provides information about its legal owner on the date of first use.
For any ideal a, the sets D(a) and V(a) are complementary, and hence the same proof as before shows that the sets D(a) form a topology on Proj S. The advantage of this approach is that the sets D(f), where f ranges over all homogeneous elements of the ring S,form a base for this topology, which is an indispensable tool for the analysis of Proj S, just as the analogous fact for the spectrum of a ring is likewise indispensable.
The author or other right owner shall have an exclusive right to use this topology at his discretion in particular by the way of manufacture and distribution of IC with such topology including the right to prohibit the use of this topology to other persons without relevant permission, except for the cases provided for in Article 8 of this Law.
In order to identify the topology used for commercial purposes, prior to the date of application for registration, the application materials should be deposited further comprise samples of TIMS,including this topology, in the form in which it was used for commercial purposes, and in the abstract- contain information about the date the first commercial use, and the main characteristics of the sample TIMS.
After receipt of the appropriate notification from the right owner of topology, this person shall pay commensurate compensation for each IC or each article containing such IC;
This refers to topology of critically important DPC construction systems and its operational procedures.
Use only the Topology Editor for this purpose!
The topology recovered by this analysis is reproduced below.
Profile names must be unique and the application of this or that topology is performed through the command bset, bconfig.