域完整性 的英文怎麼說

中文拼音 [wánzhěngxìng]
域完整性 英文
domain integrity
  • : 名詞(在一定疆界內的地方; 疆域) land within certain boundaries; territory; region
  • : Ⅰ形容詞1 (全部在內; 完整) whole; all; complete 2 (整齊) neat; tidy; orderly Ⅱ動詞1 (整理; 整...
  • : Ⅰ名詞1 (性格) nature; character; disposition 2 (性能; 性質) property; quality 3 (性別) sex ...
  • 完整性 : integrity; integrality; wholeness; completeness; perfection
  1. The who classification states that acute lymphocytic leukemia ( all ) should be classified by the pattern of reactivity of cell to a panel of lineage - associated antibodies and, where possible, genetic abnormalities. the expression of cd antigens on leukocytes is currently determined by flow cytimertry, which is expensive and labor - intensive, requiring 5 - 20ul quantities of fluores - cently labeled antibodies and allowing concurrent analysis for a limited number of cd antigens, usually three to four. from clinical point of view, an efficient method is required for analysis of a large number of samples in a single experiment

    我們設計了一種新型的細胞晶元,其原理是充分利用玻片的硬度高,透明好的特點,應用細胞膜表面不同的抗原物質,與包被在玻片上的不同抗體發生特異結合,通過一次實驗可以將被測細胞懸液中不同膜表型的細胞分離、固定在同一張玻片的不同特定區,保持了細胞的及活,又可通過簡單的操作一次將多細胞懸液進行免疫分群。
  2. If possible try to recover portions of the image that have been tampered without accessing the original image. in the past, several techniques and concepts based on data hiding or steganography have been introduced as a means for tamper detection in digital images and for image authentication - fragile watermarks, semi - fragile watermarks, and self - embedding watermarks. the research of this thesis mainly includes self - embedding and semi - fragile watermarks

    目前用於數字圖像驗證及自修復的數字水印方案主要有全脆弱水印、半脆弱水印、自嵌入水印等,本文主要研究自嵌入及半脆弱數字水印,分別從空及變換角度詳細分析當前國內外現有的各種演算法,指出其不足之處,並提出了相應的改進演算法,實驗結果表明本文演算法的有效與實用
  3. ( 2 ) with the increasing of settlement ' s size and strengthening of people ' s heterogeneity, polar - area ' s space and function will be more complicated and corresponding merger. with the higher merger degree of the function and space, the polar - area needs more significant expression to guarantee enough public character and keeps the settlement ' s integrality and stability

    2隨著聚落規模的增大和人口異質的增強,聚落的極在空間上和功能上就會更加復雜,並且需要進行相應的合。功能及空間合程度的增高,要求其物質要素具有更高的標志,以保證有足夠的公共和輻射力,使之確實可以實行保持聚落自身和穩定的功能。
  4. In this paper, the general structure of block cipher together with its related properties is firstly discussed, then the main non - linear component of s - boxes in block cipher is analyzed. as to the boolean function in binary field, we studied its non - linearity, linearity structure, output bit independence criterion ( big ), balance, completeness, strict avalanche criterion, propagation criterion, correlation immunity, linear approximation table and xor distribution table. we also discussed the pile - up lama used to compute the combination linear probability and showed an instance of its application

    本文首先討論了分組密碼的一般結構及其相關特,此外還有分組密碼主要的非線組成部分s盒。對於二元上的布爾函數主要討論了其非線、線結構、比特獨立準則、平衡、雪崩準則、傳播準則、相關免疫、線分佈表及異或分佈表等特。對計算組合線概率的迭加定理我們也進行了具體的討論,並給出了運用事例。
  5. Abstract : based on the basic principle of reflection and transmission in the process of the propagation of logitudinal wave, this paper recounts a new theory and method for the application of pile body completeness inspection data with reflection wave method to the quantitative determination of apparent reflection coefficients and the round travelling time of reflection wave

    文摘:從縱波傳播過程的反射和透射的基本原理出發,介紹了反射波法樁身檢測數據在頻率中定量確定視反射系數和反射波往返時間的一種新的理論和方法。
  6. Based on the basic principle of reflection and transmission in the process of the propagation of logitudinal wave, this paper recounts a new theory and method for the application of pile body completeness inspection data with reflection wave method to the quantitative determination of apparent reflection coefficients and the round travelling time of reflection wave

    摘要從縱波傳播過程的反射和透射的基本原理出發,介紹了反射法樁身檢測數據在頻率中定量確定視反射系數和反射波往返時間的一種新的理論和方法。
  7. You can enforce domain integrity to restrict the type by using data types, restrict the format by using check constraints and rules, or restrict the range of possible values by using foreign key constraints, check constraints, default definitions, not null definitions, and rules

    您可以強制域完整性限制類型(通過使用數據類型) 、限制格式(通過使用check約束和規則)或限制可能值的范圍(通過使用foreign key約束、 check約束、 default定義、 not null定義和規則) 。
  8. At present, the numerical control bend tube obtains the widespread application in the aviation manufacture domain. it ’ s design and manufacture quality have very important influence to the integrity, the reliability of airplane and the engine organization. the nc bend tube welding jig is the key of the nc bend tube ’ s quality

    數控導管在航空製造領中得到了廣泛的應用,其設計製造質量對飛機機和發動機結構、可靠具有重要影響,而數控導管焊接夾具是保證數控導管質量的關鍵因素。
  9. ( 3 ) resolving the symbolization check and presentation of the map attribute data based on the visual variants and visualization technology ; automatically checking the range of the value of the attributes and logic consistency and integrity based on the attribute template technology. the users can evaluate, improve and optimize the precision of the attributes according to the checking results and print the map of the checking results as well as the resulting map consistent with the specification requirements

    ( 3 )採用基於視覺變量、可視化技術解決了地圖屬數據的符號化檢查和表示;用屬模板技術,對屬的值、邏輯一致進行自動檢查;用戶可根據檢查結果對屬精度進行評價、改進和優化。
  10. Domain integrity is the validity of entries for a specific column

    域完整性指特定列的項的有效
  11. This is referred to as domain integrity

    這稱為域完整性
  12. In sql server, a subset of the storage engine that is referenced in some error messages

    指明表中可以存儲的值。這被稱為域完整性
  13. Is a constraint that enforces domain integrity by limiting the possible values that can be entered into a column or columns

    一個約束,該約束通過限制可輸入一列或多列中的可能值來強制實現域完整性
  14. For the above reason, new security mechanism for wlan is necessary to make sure the data in transmission confidential, complete and undeniable. at the same time, it should provide identity certification and access control. the 802. 1x fulfils all the above requirements, which provides an upgraded certification and authentication method for controlling lan users ’ access through port - based certification

    然而常規的無線局網安全措施如wep等都已被證明不再安全,人們已經認識到必須專門為wlan設計新的安全防護機制,以保護在wlan中傳輸數據的機密和不可否認,同時對請求接入wlan的用戶進行身份認證和訪問控制。
  15. Thus, it was evident that, as in embryonic mice, the proteins play a crucial role in the maintenance of cells in the region, and revealed a previously unknown function for them in assuring ependymal layer integrity

    因此,它證實了,在胚胎小鼠,該蛋白在維持這個區的細胞扮演著重要的角色,同時揭露了先前無人知曉的確保室管膜層的功能。
  16. It can be learned that in the core area scale the fragmentation degree of each element is not very big, yet the difference among them is fairly big, while for the whole researching area, a rather high integrity is manifested

    從斑塊的基本特徵上可以看出,在核心區尺度上,各景觀要素的破碎化程度不高,但差異較大,而個研究區則表現出較高的
  17. First, this paper applied the mature security technology ( digital signature. etc ) to solve the security of electronic check in theory. in another word, how to meet the request of secrecy, integrity, identity identification, resisting denial by using electronic check in internet shopping

    首先,本文運用計算機領成熟的安全技術(數字簽名等) ,從理論上解決電子支票的安全問題,也就是怎樣用電子支票滿足網上購物環境中對交易的保密、身份認證、抗否認等安全要求。
  18. In this dissertation, author has analyzed several dominating interconnect noises by fem - vfm, and summarized many ways and means of reducing these noises, which will provide reference with high - speed pcb design of our country

    希望該方法會給信號工程師提供一種新的思路,而開發出的這些規則會對國內歷史還不到十年的高速數字pcb設計領有一定的指導意義。
  19. Through using si analyse in the hardware design of a dtv set top box ( stb ), the main contribution of this paper is to give a series of solutions for si problems according to theoretically analyse and real works. advanced measuring systems have also been shown in the paper. with the help of this paper, the stb system of a world famous corporation has successfully get wide using of ddr sdram

    本文的主要工作是在針對消費類電子( consumerelectronics )領中的數字電視接收機頂盒進行硬體設計的過程中,引入信號分析的設計方法進行高速數字電路的設計,利用理論分析作為設計指導,通過測量、模擬和實際布板的結果進行驗證,得出一系列針對信號問題的解決方案和設計流程,成功地解決了某世界著名企業的機頂盒系統中ddr存儲器工作頻率無法提高的問題,在新一代的機頂盒產品中廣泛使用ddr存儲器,在很大程度上提高了系統的能,滿足了市場的需求。
  20. Integrity, multiplicity, dependency, and inheritance, in which the characteristic dimension " integrity " is to describe the integrity status of objects, and then the integral definition of our model is presented

    針對該模型的不足,本文增加了一個新的描述實體狀態的特徵? ?特徵,並提出了它的形式化定義。
分享友人