標簽理論 的英文怎麼說

中文拼音 [biāoqiānlún]
標簽理論 英文
labeling theory
  • : Ⅰ名詞1 [書面語] (樹梢) treetop; the tip of a tree2 (枝節或表面) symptom; outside appearance; ...
  • : Ⅰ動詞1 (簽名) sign; autograph 2 (簽署意見) make brief comments on a document3 (粗粗地縫) ta...
  • : Ⅰ名詞1 (物質組織的條紋) texture; grain (in wood skin etc ) 2 (道理;事理) reason; logic; tru...
  • : 論名詞(記錄孔子及其門徒的言行的「論語」) the analects of confucius
  • 標簽 : label; tag; counter mark; pag; mark; tally; swatch (染布時用); reader; price tag
  • 理論 : theory
  1. Other commentators, inspired by james frazer ' s theories, have additionally labeled mithras a mystery religion with a life - death - rebirth deity, comparable to isis, the resurrected jesus or the persephone / demeter cult of the eleusinian mysteries

    其他評,受啟發于詹姆士的,加之又把密特拉教套上神秘宗教的,是生命?死亡?再生的神性,可與伊希斯,耶穌的復活或者古代希臘神秘的帕爾修斯/得墨忒耳的祭禮相比較。
  2. Firstly, the complex characteristics of the seal images caused in the process of producing conditions are analyzed. to solve these problems respectively, the circularity clusters and the ostu method are firstly used to realize the shape classification and threshold processing of different seal images. then the image denoise is performed well by scanning beam seed filling and labeling algorithm

    文中首先分析了印鑒圖像由於蓋印條件造成的圖像本身的一些復雜特點,提出了運用圓形度聚類和最大方差比演算法對圖像進行形狀分類和閾值處,隨后利用掃描線種子填充演算法和貼刪演算法進行噪聲的去除等預處
  3. My thesis is covered in four parts about analyzing the causes : in the first part, i analyzed the theories about the causes of terrorism by detailing some basic theories in the research realm of the causes of terrorism : such as frustration - aggression theory, intimidation - contagion theory, conflict - function theory, social label theory, cultural conflict theory, sub - culture theory, regime defects theory in international conflict theory, war theory and some opinions of marxism - leninism about terrorism

    文分四部分對恐怖主義產生的原因進行述:第一部分:恐怖主義產生原因的分析。這一部分是歸納國內外學者對恐怖主義產生原因的方面的研究,簡要闡述了目前恐怖主義研究領域的一些基本: 「挫折?攻擊」;模仿與傳染;失范;沖突功能;社會;文明沖突;亞文化;社會造反;國際沖突的制度缺陷;戰爭範式等;這些給我們研究恐怖主義提供了新鮮的角度。
  4. Firstly, we generalize and analyze the advantages and present research of elliptic curve cryptography ; secondly, we study the basic theory of the ecc ; thirdly, we illustrate the safety of the ecc and discuss the elliptic curve key agreement scheme, elliptic curve encryption scheme and elliptic curve digital signature algorithm ; fourthly, we study fast algorithms of the multiplication and inversion multiplication of the element of in the underlying finite field f2m whose characteristic is two represented by the two basis of optimal normal basis and polynomial basis. we make improvements to the fast algorithm of the polynomial basis multiplication by hankerson and base on the experiments, we describe the properties and compare the advantages of the multiplication and inversion multiplication of the elements in f2m field under optimal normal bases and polynomial basis. results concluding from the study car be used as references in the realization of the elliptic curve cryptosystem ; fifthly, we overview the current fast algorithm of point multiplication, improve the fix base point comb algorithm, advance the speed of the whole system and remark the advantages and disadvantages of the popular algorithms based upon the experimental datas ; sixthly we realize the algorithm library of elliptic curve cryptography based on the f2m. only change slightly in our algorithm library can we realize the ecdh, eces, ecdsa based onf2m of anysize ; seventhly, we realize the ecc on two secure elliptic curves, including ecdh, eces, ecdsa

    本文首先介紹並分析了橢圓曲線密碼體制的優點及研究現狀;其次研究了橢圓曲線密碼體制的基本;第三,分析了橢圓曲線密碼的安全性並介紹了密鑰共享,加密,數字名等橢圓曲線密碼體制;第四,深入研究了特徵為2的有限域f _ 2m中的元素在多項式基和最優正規基表示下的乘法運算和乘法逆運算的快速演算法,並對hankerson等人提出的多項式基下的乘法運算的快速演算法作了改進,而且在實驗的基礎上不僅分析研究了f _ 2m域中元素在多項式基和最優正規基表示下的乘法和乘法逆運算的性能,還對這兩種基表示下的f _ 2m域中元素運算效率的優劣作了比較和研究,所得的結可供在實現橢圓曲線密碼體制時參考;第五,研究了目前流行的計算橢圓曲線量乘法的快速演算法,同時改進了固定基點梳形法,提高了整個系統的速度,並在實驗的基礎上分析研究了流行演算法的優劣;第六,實現了基於f _ 2m的橢圓曲線密碼體制的演算法庫,在我們的演算法庫中只需稍微改變便能實現基於任意尺寸的f _ 2m上的ecdh , eces , ecdsa等橢圓曲線密碼體制;第七,實現了兩條安全橢圓曲線上的橢圓曲線密碼體制,包括ecdh , eces , ecdsa 。
  5. This article provides theory basis and experimental verified datas for making practical encoded bar code labels

    本文研究結果為製作實用型加密條碼提供了依據和實驗驗證數據。
  6. Whether the control progress of the project is effective, it will decide the final benefit of society and economy on the protection. however, it ' s the key of the success or failure whether we could valid and accurately fix the control goal and effectively command the project according to it during the project implementation. in the light of cybernetics, a works project is a goal system composed of many goals and inherent interaction, among which cost, progress, quality are three essential goals

    本文將工程項目管方法應用於數控銑床的改造項目,此項目在實施過程中採用工程項目管的控制方法進行全面控制,進行了項目成本的概預算以及項目實施中的各階段控制,在滿足要求的基礎上不斷完善;採用邀請招的方法,確定最終技術方案,訂技術合同;針對項目的具體情況進行了項目進程式控制制,使項目的周期縮至最短;採用全面質量管對項目的質量進行控制,使之達到預期的質量目;對項目的成本控制是此次項目最基本、最關鍵的,也是最難點,從招到項目結束,成本控制貫串始終,最終對項目需要驗收的內容進行檢驗。
  7. Antennas are feed by 50ohm coaxial cable and feed networks are unnecessary. and then, tag antennas are analyzed and designed, which include plate balanced dipole antenna, triangle balanced dipole antenna and inductively coupled feed meander - line antenna. theory analysis and simulations are given and optimal results are achieved

    然後,對天線進行了分析與設計,分別對片狀對稱振子天線、三角形對稱振子天線、感應耦合饋電折疊線天線等天線形式進行了研究,給出分析和模擬計算,得到滿足設計要求的各種形式的天線。
  8. The article builds up a reverse retrieval model for adhesive label, declares its feasibility, construction principles and main functions

    本文建立的不幹膠網路目市場逆向搜索模型,詳細述了這種逆向搜索的可行性,以及該模型的構建原和主要功能。
  9. The thesis is organized as below : in chapter 1, the background knowledge is given which is needed for study on bluetooth security mechanism and implementation. first bluetooth technology is overviewed including its develop history, radio interface, physical links, interference, network topology, core protocol, etc. next communication security is introduced according to the model of network security architecture from osi. finally some primary cryptographic techniques are discussed based on symmetric encryption, asymmetric encryption and advanced encryption standard published years ago

    本文研究了利用藍牙技術提供各種安全服務和實現的課題,並通過一些具體實現的實例進行闡述,具體安排如下:在第一部分,本文首先回顧了藍牙技術及發展情況,主要包括藍牙發展簡史、藍牙準的射頻介面、物鏈路、干擾情況、網路拓撲結構以及核心協議等;然後介紹了通信安全的基礎知識,討了osi系統中的四層網路安全結構模型;最後給出了各種加密技術的基本,包括對稱加密體制如des和blowfish 、非對稱加密體制( rsa公鑰演算法、數字名和身份證明等)以及新一代的高級加密準( advancedencryptionstandard , aes )等。
  10. In the first two letters of understanding, ann l. combs, assistant secretary employee benefits administration, and victoria a. lipnic, assistant secretary for employment standards, u. s. dol, signed with liu xu, director general for international affairs at the ministry of labor and social security ( molss ), prc. the letters of understanding establish a framework for the two countries to discuss the regulation, administration and oversight of pension programs through mutually agreed cooperative activities

    美國勞工部負責職工福利的助部長安?庫姆斯和負責就業管準的助部長維多利亞?利普尼克同中華人民共和國勞動和社會保障部國際合作司司長劉旭署的兩份諒解書,為兩國通過雙方同意的合作性活動就規范、管和監督退休金項目展開討建立了框架。
  11. We design a new algorithm - pmimd. the emphasis of the paper is to discuss the framework of the mpls network and the support for traffic engineering. i have learned several main topics about the traffic engineering based on mpls : how to map the data into lable ; how to map lable into fec. for the most important topicrhow to map traffic trunk into the actual topological network by lsp, i have designed a kind of adaptive traffic control mechanism called latc. the simulation expriments have proved the validity and the effect of latc

    本文還述了mpls (多協議交換)網路的架構及其對流量工程的支持,研究了基於mpls流量工程要解決的幾個主要問題:如何把數據包映射為轉發等價類,如何把轉發等價類映射為流量中繼等,並對其中最重要的一個:通過lsp (交換路徑)把流量中繼映射到實際網路拓撲,提出了一種自適應流量控制機制? latc ;通過相應的模擬,驗證了該機制實施的合性和有效性。
  12. On the basis of summarizing the common principle and method of selection of system structure and setting function and means of implementation, we research mainly on such subjects as follows : firstly, we studied the implementation of text extraction and digital signature by cad secondary development technology combine with database technique. secondly, based on method for pre - processing scanning images of drawings, finally, the application of artificial neural network in engineering drawing sign character recognition was researched. in this thesis, we presented the building model and implementation method has some references to the designing work of similar system

    述系統結構選取、功能構建以及實現技術的一般原和方法的基礎上,進行了以下幾個方面的研究:首先研究了cad二次開發技術同數據庫技術相結合實現系統圖紙文本信息西安工大學碩士學位文提取和電子會功能,然後研究了掃描圖紙的圖像處技術,為圖紙的矢量化和智能識別提供圖形表達準確、圖形要素和字元要素分離的數據源,最後研究了人} _神經網路技術在} _程圖紙識字元識別中的應用。
  13. Administrative law in civil law countries is derived from the west important concepts, along with the development of modern administrative and legal system in a special administrative phenomenon is the main administrative goals for the administration, and through mutual consultations between the chief relative and the government, then sign the contract after agreement.

    行政合同,是源於西方大陸法系國家行政法上的重要概念,是隨著近現代行政法制的發展而出現的一種特殊行政管現象,是行政主體為實現行政管,與行政相對人之間通過相互協商,意思表示一致所訂的公法上的協議。
  14. The major achievement of this dissertation is outlined in the following : 1. investigate the potential effect of switch routing on end - to - end service quality with both theoretical and experimental methods : it is found that service quality of lsp is better than that of ip routing if load on router is low or end - to - end bandwidth reservation is implemented, but lsp is more sensible to load on router. mpls must be used in company with policy based routing and packet classification to provide end - to - end qos service in internet ; 2

    使用分析和實驗測試相結合的方法詳細分析了交換路由對端到端傳輸質量的影響:研究表明,在鏈路輕載或預留帶寬的情況下,交換路由系統對數據流的服務質量優于傳統路由系統;只有綜合應用策略路由、數據報分類調度和交換才能有效實現internet環境下對端到端服務質量的控制; 2
  15. The paper through to analyse the background, meaning and necessity for implement bidding & tender of online architectural design, through to discript and compare with different mode of domestic and international of application for bidding & tender in network, to propose a unique opinion of solution system which is ndbs mode for bidding & tender of online architectural design, the mode is to submit the whole course of bidding & tender of online architectural design from planning for bid, information issue, pre - qualification, call for bid meeting, tender submit, tender evaluation and confirm the solution to sign the contract in internet. the paper through to structure a bidding platform ( bdb. cn ), to analyse the funcation procedure of bidding and tender system of online architectural design, from the sight of bid invitor, bidder and tender evaluated angle, to link them closely. the paper carry on system design to ndbs mode, input and outut, the information and keep them, safety and data stored, the paper combine with online architectural desigh wenzhou huameng building ( railway station road 1 - 2 massif ) as an example of ndbs mode finally, the result of study indicate, bidding and tender of online architectural design is not only feasible technically, the procedure of bidding and tender accord wigh the law, but also it is unanimous in traditional bidding way, this implement the scheme can improve working efficiency greatly, reduce the cost of bidding effictives, make it standard science further, to realize a pualitative leap in the building management level

    文通過對實施網上建築設計招的背景、意義及必要性進行分析,通過對國內外不同模式招網路應用的綜合敘述與比較,提出了具有獨特見解的系統的網上建築設計招解決方案? ? ndbs模式,該模式是對建築設計招全過程從招準備、信息發布、資格預審、招會議、書遞交、評到合同訂的網上解決方案,文從構建網上招平臺( bdb . cn )開始,對建築設計招系統的功能流程進行分析,從招人、投人和評人的角度出發,通過對其在整個招活動流程在網際網路中的無縫連接,使得通過bdb . cn招平臺,能夠達到建築設計招各參與方的一網打盡。文還對ndbs模式進行了系統設計,對輸入輸出、安全與數據加密和招資料儲存進行設計,從技術的層面對該系統提出了解決的方案。文最後還結合溫州華盟大廈工程(車站大道1 - 2 #地塊)的網上建築設計招的實例,對ndbs模式進行了實證,研究結果表明,實施網上建築設計招,不僅在技術上是成熟可行的,在工作流程上是符合法律法規的,與傳統的招方式也是一致的,而且能夠大大提高工作效率,有效降低招成本,使得招能夠更加規范、科學,實現建設管水平的一個質的飛躍。
  16. Then it demonstrated that layer 3 mpls vpn has high security, the ability of overloading multi - service, function of routing and can realize central management and configuration. it has mature and credible technology and is the most appropriate ip vpn technology for the development of telecom service provider. on the basis, it analyzed the security of mpls vpn and the characteristic of qos, and proved the high security of layer 3 mpls vpn, then by combing with technology of differ service and te ( transfer engineering ), it proved layer 3 mpls vpn can provide qos of low delay and high reliability to satisfy the need of telecom network

    文首先討了ipvpn的隧道技術及志交換技術,尤其結合當前最新的技術詳細討志交換中的三層mpls (多協議交換) vpn技術和各類二層mplsvpn技術,證了三層mplsvpn具有高安全性、多業務的承載能力、路由功能,可以實現集中管和配置,技術上成熟可靠,是當前最適合電信運營商發展的ipvpn技術;在此基礎上全面探討了mplsvpn的安全及qos特性,說明了三層mplsvpn具有很高的安全性能,同時通過結合differservice技術及流量工程技術, mplsvpn能夠提供低時延、高可靠的qos保障能力,滿足電信網路運行的需要;並且根據當前最新的雙平面組網技術和iptn技術跟蹤分析了mplsvpn當前的最新發展趨勢和動向。
  17. Inspiration drawn from the labeling theory

    標簽理論及其對思想轉化工作的啟示
  18. He shall be guilty of an offence, unless he proves that he did not know, and could not with reasonable diligence have ascertained, that the label was of such a character as aforesaid

    則不是否附於或印于包裹物或容器上,該人即屬犯罪,除非該人能證明其本人不知且即使已盡合的努力仍不能確定該具上述的性質。
  19. Is calculated to mislead as to its nature, substance or quality, he shall be guilty of an offence, unless he proves that he did not know, and could not with reasonable diligence have ascertained, that the label was of such a character as aforesaid

    則不是否附於或印于包裹物或容器上,該人即屬犯罪,除非該人能證明其本人不知且即使已盡合的努力仍不能確定該具上述的性質。
  20. For details below : 1 ) video changed from mpeg2 ps to mpeg2 ts 2 ) audio of ntsc format that can not be decoded by stb could be changed from dolby acs coding standard to mpeg1 / 2 layerll standard, and packed into mpeg2 ts format 3 ) well synchronized with audio and video by a new arithmetic " successive time stamp " this thesis made a introduction of mpeg2 standard in detail ; discussed the system timing model ; indicated the key during the transforming of video and audio ; especially explain how to deal with the pcr

    2 )針對目前機頂盒不能解碼的ntsc制式dolbyac3編碼演算法音頻信息,轉換成mpeg1 2layer編碼,並打成滿足mpeg2ts語法的信息包。 3 )提出了能使音視頻達到良好同步的繼承性時間打入演算法本文詳細介紹了mpeg2準的語法,討了mpeg2系統的時間模型從而指出視音頻處中的關鍵,對pcr的處進行了詳細的分析,提出了新的視、音頻同步演算法。
分享友人