源碼表 的英文怎麼說

中文拼音 [yuánbiǎo]
源碼表 英文
source listing
  • : 名詞1. (水流起頭的地方) source (of a river); fountainhead 2. (來源) source; cause 3. (姓氏) a surname
  • : Ⅰ名詞(表示數目的符號或用具) a sign or object indicating number; code Ⅱ量詞1 (指一件事或一類的...
  • : Ⅰ名詞1 (外面;外表) outside; surface; external 2 (中表親戚) the relationship between the child...
  • 碼表 : stop watch
  1. Methods : an artificial gene for fl extracellular domain cdna was synthesized by using favored genetic codons of pichia pastroris. by inserting human fl extracellular domain cdna coding 156 amino acid resi dues into pichia pastoris expression vector ppic9k containing aox1 promoter and the sequences of alpha secreting signal peptides, a recombinant expression plasmid ppic9k - fl was constructed, and integrated into the alcohol oxidase region of the host genome

    為了提高外基因的達量,我們根據畢赤氏酵母偏愛密子人工合成了編fl胞外區156個氨基酸的cdna序列,目的序列被定向克隆到酵母分泌型達載體ppic9k質粒上,構建ppic9k - fl達質粒。
  2. You might think of a source control binding as representing the single data line created for the house

    您可以將管理綁定看作示為房子創建的單一的數據線。
  3. In this paper, first strand cdna of 3abc gene was synthesized using template rna extracted from cells infected with fmdv. the complete 3abc gene about isoobp was amplified by pcr and ligated into pgem - t easy vector. after transforming e. coli dh5 a, ampicillin resistant colonies were isolated and plasmid dna was prepared and analyzed by restriction analysis and pcr. presence of the full length 3abc gene was verified by nucleotide sequence analysis and the plasmid containing the expected sequence was named as pgem - 3abc. comparing the aquired sequence of 3abc with that of reference strains, the homology is more than 99 percent. the pgem - 3abc was digested with sal i and bgl ii and ligated into xho i and bgl ii - digested expression vector ptriex - 4 neo. lt was identified by restriction analysis and pcr and sequencing that this fragment had a 17bp deletion hi the nucleotide sequence 708bp of 3abc gene, which happened to form a terminator codon behind 3ab gene, but it contained the complete open reading frame ( orf ) of 3ab gene. positive clones were selected and induced with lmmol / l isopropyl - d - galactoside ( iptg ), bacteria were detected by sds - page and western blotting after properly treated. the results showed that the 3ab gene expressed successfully in e. coli and 33. 5ku fusion protein can be recognized by the positive bovine serum of fmdv. the amount of target protein is over 26 % of the total bacteria protein by gel thin layer scanning analysis

    擴增產物連接到pgem - teasy載體中,轉化大腸桿菌dh5菌株,篩選氨芐青霉素抗性菌落,提取質粒經酶切鑒定、 pcr分析以及確證性測序證明,所克隆的1500bp左右的片段含有完整的3abc基因,與國外參考序列相比,同性在99以上。將重組質粒pgem - 3abc和達載體ptriex - 4neo分別用sal和bgl與xho和bgl消化后,亞克隆3abc基因至原核達載體ptriex - 4neo中,通過酶切鑒定、 pcr擴增以及序列分析,發現克隆到ptriex - 4neo載體上的片段於3abc基因708bp處出現了17bp的缺失,碰巧在3ab基因后形成一終止密子,但3ab基因的閱讀框架完整,選出含有3ab基因完整閱讀框架的陽性克隆,用iptg誘導達,收集菌液進行sds - page電泳、 westernblotting分析,結果明, 3ab基因在大腸桿菌中成功達,其達產物為分子量33 . 5ku的融合蛋白,並能被口蹄疫病毒陽性血清識別。經薄層掃描分析,達量占總蛋白量的26以上。
  4. Homology analysis blast analysis showed that the amino acid sequence of the asf gene cloned from cotton was significantly homologous with adp - ribosylation factor ( asf ) of mammalian, plant and yeast, etc. the amino acid sequence of the gene shows 99 % ( 179 / 180 ), 98 % ( 177 / 180 ), 96 % ( 174 / 180 ) and 92 % ( 168 / 180 ) identity to arabidopsisthalianaarfl, triticum aestivum, solatium tuberosum and bos taurus, respectively

    棉花arf基因的同性分析應用ncbi進行dna序列的相似性分析,結果明:棉花arf基因與其它植物、動物和酵母的arf基因具有較高的同性。棉花arf基因編的氨基酸序列與擬南芥,小麥、馬鈴薯、牛的同性分別達到99 ( 179 / 180 ) 、 98 ( 177 180 ) 。 96 ( 174 180 )楊花腸p核符吞fi曰手谷回伽皿的夭險和92 ( 168ill ) 。
  5. It makes use of resource of the chip, realizes the development of every module, achieves distilling of telegraphese, builds up new frame, calculates the position and provides external interface. in the section of calculating the position, the author combines the two measures of carrier phase position and code position. finally, in the platform of matlab, the author completes the function simulation of main modules

    概述了接收機的設計原理;詳細描述了基於ti公司的tms320c6713dsp晶元的系統程序設計中各模塊的實現,利用該晶元的資,實現各模塊的調度,完成對導航電文的提取,重新組幀,定位解算以及對外介面;在解算部分,把載波相位定位與測距定位相結合,利用載波相位對偽距的平滑來提高定位精度;在matlab平臺下進行了各模塊的功能模擬測試,以模擬結果的圖來分析說明了載波相位平滑偽距的兩種演算法能使定位精度有一定的提高。
  6. Is a uri that identifies a resource webify solutions home page and implies that a representation of that resource such as the home page s current html code, as encoded characters is obtainable through http from a network host named

    是一個uri ,標識了一個資( webify solutions的主頁) ,還代這個資示形式(例如主頁目前的html代,作為編字元)是可以從名為
  7. Applications that use regular expressions in the. net compact framework are not binary compatible with applications that use regular expressions in the full. net framework, but they are source - code compatible

    使用. net compact framework的正則達式的應用程序與使用. net framework全功能版的正則達式的應用程序的二進制代不兼容,但它們的兼容。
  8. A database search revealed that the putative sequence of the red gene shows 40 - 50 % identity with those of uroporphyrinogen iii methyltransferase ( encoded by coba gene ) from various kinds of bacteria. an over - expression of the coba gene in e. coli was reported to lead to an accumulation of trimethylated derivative of porphyrin termed trimethylpyrrocorphin and factor ii, which emit strong red fluorescence under uv

    在ddbj中搜索到多種細菌來的coba基因(編uroporph仰nogenhmethyltransferase )與redsene有40 50的同性,並據報道,其中一個來於pmpboibaclerilllaslldelll切chit的coba的基因,轉人大腸桿菌、酵母菌及動物細胞后能使達載體在紫外線下發射紅色熒光。
  9. Cryptogrammic chip introduced in this paper has been tested on the altera ' s apex20ke fpga. the main clock frequency reached 40mhz. the chip includes 30, 000 les. in order to utilize esb resource in altera ' s chip, we adopted embedded rom and ram and can realize the function of whole system with only one chip. lt is the embodiment of methodology and notion of sopc ( system on a programmable chip ). the simulation of this cryptogrammic chip proves the correctness of function of the chip, which shows that the important ideology based reconfigurable architecture has special significance in designing of cryptogrammic chip

    本文所闡述的密晶元在altera公司的apex20kefpga上進行了測試。工作頻率達到了40mhz ,佔用了3萬個le . ,利用altera器件的esb資,採用內置ram和內置rom設計方法,用一片晶元即可實現整個系統的功能,充分體現了sopc的設計方法和理念,對晶元的模擬和測試均證明晶元功能正確,明基於可重組體系結構這一重要思想在密晶元設計中具有特殊的意義。該晶元的設計遵循hdl設計方法學的一般方法。
  10. Positive and negative assertions have been made about the security of open source software. both views carry similar weights

    開放軟體是否安全,正反雙方一直都各自述,而雙方的論據均不相伯仲。
  11. The main contributions of this dissertation are as follows : 1 ) forms a scheme of network maintance as well as realiztion of the problem testing software after a thorough analysis of the regular network problems and a pertinent comment on the merits and demerits of the network detection and maintainance methodology. 2 ) presents approaches to the realization of principles of network health testing, network resources list and connectivity testing in the network problem testing software, and gives a in - depth analysis of the key issues in design process with vivid flow charts and convincing testing results. 3 ) ponits out possible problems and offers feasible solutions in the migration and development of the embedded software from six aspects, touching upon byte order, semaphore, coding optimization, etc. 4 ) discusses the exception handling mechanisms and debugging process for the sake of improving software robustness

    本文的主要工作如下: 1 )研究了以太網常見故障並對網路探測維護方式的優缺點進行了詳盡分析,根據項目要求確定了本系統的網路維護方案,並對故障測試軟體的總體實現方案進行了設計; 2 )闡明了網路故障測試軟體中網路健康測試、網路資、連通性測試的原理,提出了相應的實現方案,分析了設計過程中的關鍵問題,並給出軟體流程圖和測試結果; 3 )從位元組序、信號量、代優化等六個方面談論了嵌入式軟體在移植開發中的注意事項; 4 )為提高軟體的健壯性,討論了本嵌入式系統軟體採用的異常處理機制以及軟體調試過程中的。
  12. Shanghai, china, sept 2005, n1208. 16 dong j, wang j, yu l. entropy coding scheme for 4tm 4 residues and improvement for cbp

    效率的提高來於多匹配了局部概率分佈的變化,並且的自動切換省去了編side information信息的額外開銷。
  13. We derived theory for abstraction of bandwidth resource and characterization of system capacity for multi - class fading system. bandwidth resources allocated to a user can be abstracted as effective bandwidth, determined by the user ’ s source data rate and target bit error rate. system capacity can be characterized by a theoretical bound. simulations show that actual system capacity is close to the theoretical bound

    為一個用戶所分配的帶寬資示為有效帶寬,用戶對數據速率和比特誤率的要求決定了對有效帶寬的要求。利用有效帶寬的概念來描述系統的用戶容量並給出了系統容量的理論界限,進一步地,還得到了系統存在發射功率限制時的容量界限。
  14. Linux is a well known os of its open source code and better security. after the deep analysis of network and traffic control mechanism in linux kernel, we finally design and implement a prototype of vpn gateway based on diffserv under linux using unified modeling language ( uml ) from object - oriented perspective. at last, we construct an actual test environment, and the test results indicate that our prototype can not only implement the main functions of ipsec family, but also support the qos of vpn based on the application with good functions of shape and bandwidth traffic control

    Linux是一個基於開放的操作系統,也是目前認為比較安全的操作系統,本文最後在對linux內核中的網路和流量控制機制進行深入分析和研究的基礎上,從面向對象的角度,運用標準建模語言uml ,設計和實現了一個基於區分服務的vpn網關原型,並且構建了一個實際的實驗和測試環境,對系統進行了測試,測試結果明:原型系統在實現ipsec協議族主要功能的基礎上能夠給予用戶基於應用的qos保證,具有較好的流量整形和帶寬控制功能。
  15. Group a task or resource list by outline code

    按大綱代為任務或資分組
  16. To group a task or resource list by outline code

    如果要按大綱代為任務或資分組:
  17. The c / s pattern can be used in the limited - ranged operations which are characterized by high security, high frequency of data processing, heavy transmission of data, good mutual - communication and fixed - places, such as the input and maintenance of graduate information, the management of code table, data backup and recovery. whereas, the b / s pattern can be used in the wide - ranged operations, which are characterized by low security requirement and mutual - communication, and flexible places, such as the release of requirement, the query of graduate information, on - line registration of graduate data and all kinds of query and statistic

    在安全性要求高、數據處理頻繁、數據傳輸量大,交互性強、地點固定的小范圍內的業務,如畢業生信息錄入及維護、代管理、數據備份和恢復等模塊採用c s模式實現;而在安全性和交互性要求不高、地點靈活的廣域范圍內的業務,如需求信息發布、生信息查詢、畢業生詳細資料在線登記和各種查詢、統計等模塊採用b s模式。
  18. " closed source means only the bad guys get to find the security holes

    「封閉源碼表示只有壞傢伙才能查找安全性漏洞。
  19. The article includes advice for installing open - source libraries on windows, unix, and linux, plus a brief glossary of key xml terms

    本文包括了關于在windows 、 unix和linux上安裝開放庫的建議,還有關鍵xml術語的簡要詞匯
  20. With weak market presence, jdo needs better presence in the open source community

    由於疲弱的市場現, jdo需要在開放社區中更好地現。
分享友人