鑒別式 的英文怎麼說

中文拼音 [jiànbiéshì]
鑒別式 英文
discriminant
  • : Ⅰ名詞1 (鏡子 古代用銅製成) ancient bronze mirror2 (可以作為警戒或引為教訓的事) warning; objec...
  • : 別動詞[方言] (改變) change (sb. 's opinion)
  • : 名詞1 (樣式) type; style 2 (格式) pattern; form 3 (儀式; 典禮) ceremony; ritual 4 (自然科...
  1. Exorcists have used tape recorders to authenticate the ritual

    驅魔儀就開始使用錄音磁帶來
  2. . . exorcists have used tape recorders to authenticate the ritual.

    …驅魔儀就開始使用錄音磁帶來
  3. Diagnostic characters for the recognition of species include the presence or absence of pectoral fin, the position of dorsal fin origin, gill opening, anus, nostril opening and eye, the cirri present or not, the dentition type, the body coloration, and the head pores or lateral line etc

    一般依據胸鰭的有無或發達程度,背鰭起點、鰓孔、肛門、鼻孔和眼等的相對位置,頜的發達程度和頜上是否具須,齒的形狀和排列方,身體的斑紋,以及頭部和體側的側線孔數目等進行
  4. Information technology. security techniques. entity authentification mechanisms. part 1 : general model

    信息技術.安全技術.實體機制.第1部分:一般模
  5. The traditional means, such as key, password, cryptogram, id card and even ic card, have fallen behind the needs of economic activity and social security. this is because that they would be forgeable, falsifiable, stolen or decodable

    傳統的個人身份手段如鑰匙、口令、密碼、身份證件,甚至ic卡等識,由於它們具有可假冒、可偽造、可盜用、可破譯的弱點,已不能完全滿足現代社會經濟活動和社會安全防範的需要。
  6. Guide for diagnostic field testing of electrical power apparatus - part 1 : oil filled power transformers, regulators, and reactors

    電力裝置現場試驗指南.第1部分:油浸電力變壓器,調節器和電抗器
  7. At present, the overall tendency of software development is constructing object - oriented, network based, distributed and heterogonous application system using distributed component technologies, and dividing the software system into independent components with different functions, which can be platform and programming language independent, and can communicate with each other for collaboration, handwriting - based identification recognition is an important research field of biometric identification, and also an active topic in computer vision and pattern recognition

    目前,軟體開發的整體趨勢是採用分散組件技術建立面向對象的、基於網路的、分佈的和異構的大規模應用系統,把整個軟體系統劃分為一個個相互獨立的組件,每個組件完成特定的功能,可以跨越多種操作平臺,獨立於程序設計語言,並且相互通信,協同完成工作。筆跡是人體生物特徵識中的一個重要研究領域,也是計算機視覺和模領域研究的熱點問題。
  8. Pki is a transparent and seamless platform for the network system provided the service of confidentiality, integrity, authentication and non - repudiation, while ca is a necessary and important component in pki, pki ' s modules, functions and its applications are firstly described in this dissertation, with specially emphases on the issuing certificates, issuance mechanisms of revoked certificates, message format and hierarchy of cas as well as the performance of the system

    Pki可以為網路上的各種應用提供機密性、完整性、身份和不可抵賴性的安全保障,簽證機關是pki系統中的重要組件。本文闡述了pki系統的模型、功能和應用,重點討論了簽證機關的證書發布、層次結構、消息格、撤銷證書的發布機制等問題,以及它們對系統性能的影響。
  9. Design of high - speed programmable reference voltage discriminator used in photon counting

    光子計數中一種高速可程控制參考電壓器的設計
  10. Digital binoculars are new products and so there are no data about the test of the resolution and field of view matching. in order to measure the resolution of digital binoculars, the method based on the combination of collimator and resolution chart is proposed

    為了檢驗數碼望遠鏡的解析度,提出了採用平行光管和率板的組合來測量的方,並對率板的離焦量、平行光管焦距與率板的匹配進行了理論推導。
  11. Official identification eartags for cattle - specification

    家畜正用的耳掛標簽.規范
  12. Based on the constructivism theory, following the suggestions and requests in the fully time compulsory education curriculum standards of chemistry ( experiment draft ), this thesis makes it clear that the experimental inquiry and the investigating inquiry are the main approaches in the inquiry learning activities. after analyzing these two approaches in detail, the author proposes some concrete learning in scientific inquiry activities according to the characteristics of these two inquiry approaches. they are inquiry experiments, observation, designing the experiment, deducing, differentiating and measuring which are based on the experiments ; visiting, reading, collecting materials, asking and investigation which are based on the investigation

    本文主要以建構主義理論為依據,以《標準》中對探究學習活動的建議和要求出發,明確了實驗探究和調查探究是開展探究學習活動的主要方,以及兩種探究學習方的特點;並深入分析了實驗探究和調查探究,提出了化學教學中具體的探究學習方,分為以實驗為基礎的探究實驗、觀察、設計實驗、推斷、、測定和以調查為基礎的參觀、查閱、收集及調查,使化學教學中對學生進行探究學習培養具有針對性。
  13. A concise representation method of between - class scatter matrix and population scatter matrix is proposed, which suits for all the applications of pattern recognition using fisher criteria

    提出了散布矩陣的一種簡潔表示方法,這一簡潔表示方法適合於一切使用fisher準則的模問題。
  14. The scientific nature means that the measures and equipments adopted in identifying are scientific, the explanatory basis and the standards of identifying and judging are scientific, besides, the principal parts who carry out the identification must be the experts mastering special scientific knowledge ; the legal nature refers to the administer justice identification must exist in the litigation process, its starting and carrying our procedures must conform to the requirement of law and also its conclusion is one of the legal evidence forms

    筆者認為,司法定的基本性質在於其科學性和法律性,科學性指定所採用的方法、設備是科學的,解釋的依據、和判斷的標準是科學的,並且實施定的主體必須是掌握專門科學知識的專家;法律性指司法定必須存在於訴訟過程中,其啟動和實施的程序必須符合法律的要求,並且其結論是法定證據形之一。
  15. Spectra from different tissue samples can be compared and common patterns of expression identified

    通過不同組織來源的樣本質譜圖的比較,出共同的表達模
  16. Where appropriate, the organization shall identify the product by suitable means throughout product realization

    適當時,組織于產品實現所有過程中應以適當的方產品。
  17. The parameters negotiated by ike include the arithmetic of encrypt and verification, the key used in encrypt and verification, the protecting pattern of communication ( transfers or tunnel pattern ) and the exist time of key

    Ike協商的安全參數包括加密及演算法、加密及密鑰、通信的保護模(傳輸或隧道模) 、密鑰的生存期等。
  18. The act or process of identifying or determining the nature and cause of a disease or injury through evaluation of patient history, examination, and review of laboratory data

    診斷通過評價病人的病史、體檢情況和閱讀試驗數據的方對人體機能進行檢驗或對人體引起病痛的原因進行的行為或過程
  19. Anti - counterfeiting banknote counting based on

    基於嵌入實時系統的智能偽鈔
  20. It does so using a combination of a top - down, business - driven manner of service identification coupled with a stream of work that conducts service identification through leveraging legacy assets and systems

    它通過聯合服務的自頂向下、業務驅動方和通過利用遺留資產和系統引導服務來實現這一點。
分享友人