隱匿性的 的英文怎麼說
中文拼音 [yǐnnìxìngde]
隱匿性的
英文
latent-
When the form of aversive stimulation is unpleasant mental imagery the technique is known as covert.
當使用的厭惡性刺激是引起心理上不愉快的意象時,則稱為「隱匿性敏感法」。In this dissertation we make a study of subliminal channels that conclude the progress, the application, the model, the construction, the stego - key, the capacity, the security, the way to realize subliminal - freeness, and so on
本文對閾下通道技術進行了比較全面的總結和研究,包括閾下通道的發展狀況,應用前景,閾下通道的模型,構造方法,隱匿密鑰,容量,安全性以及封閉方法等。Then they have good opportunities to make choices between to remain perilous freedom in state of nature and to become safe servitude in a sovereign state. ( 2 ) hobbesian predicament existed in various kinds of human life with different scales and component of disorder
政治、主權者與國家的產生,源自無法消弭的人之恐懼和驕傲而起的沖突,只能以法律的威嚇與教育的情操養成和轉化,以掌控與隱匿其與人性上之因果。" extreme " can be meant to describe any of the following traits : music ( whether it ' s intended to be faster, more aggressive, abrasive or " heavier " than other metal styles ), lyrics ( dealing with darker, more salacious or sensational topics and themes ), vocals ( which often use guttural, harsh or abrasive singing ), or appearance and stage demeanor ( using corpse paint, satanic or occult imagery )
"極端"一詞可形容下列任何一種特質:音樂(不論它的用意是為了比其他金屬風格更快,更進取,磨料或"沉" ) ,歌詞(更黑暗,更淫穢或煽情的題材和主題) ,聲樂(經常使用喉嚨,苛刻或磨損的方式來歌唱) ,或形象和舞臺演繹(用屍體油漆,撒旦或隱匿性意象) 。The diagnosis of concealed septal accessory pathways and the exploration of method of radiofrequency catheter ablation
隱匿性間隔旁道的診斷及射頻消融方法學探討This fish has been sold erroneously under the name aristochromis christyi, which is really a very different fish
金頭藍孔雀體側有明顯的3個黑色斑塊,不過在雄性魚的變色后,這些板塊會隱匿在深藍色之下。This paper begins with the drawbacks of the traditional reading practice, emphasizes on the designing programs and principles of computers. such as " the discoloring design of characters " leaping - type ", " the hiding design of characters " leaping - type ", " the regulator ' s design of reading speed ", " the time - limited automatic page - turning design ", " sound - controlling design of characters " discoloration " etc. then makes further statements about the advantages of reading practice design with assistance of computer, namely, the arousal of students " reading interest using fresh reading materials with vital forms ; the efficient controls of reading procedure, the realization of reading individualization, the realization of sounds " visualization
本文從分析傳統閱讀訓練的缺陷入手,重點介紹計算機「文字躍進式變色的設計」 、 「文字躍進式隱匿的設計」 、 「閱讀速度調節器的設計」 、 「限時自動翻頁的設計」 、 「聲控文字變色的設計」等設計方案及其設計原理,進而闡述計算機輔助閱讀訓練的優勢,即用形式活潑的閱讀材料激發學生的閱讀興趣,有效地控制學生的閱讀過程,實現閱讀的個性化,實現朗讀聲音的可視化。Where a ship is expressly warranted “ neutral ” there is also an implied condition that, so far as the assured can control the matter, she shall be properly documented, that is to say, that she shall carry the necessary papers to establish her neutrality, and that she shall not falsify or suppress her papers, or use simulated papers
在船舶明文保證中立之情況下,亦存在一項默示條件,即在被保險人能控制的范圍內,該船舶應適當備齊各種證件;亦即,該船舶必須攜帶表明其中立性質的必要文件,並不得偽造或隱匿證件或使用假文件。Detection of micrometastasic tumor cells in lymphadenectomy specimens of patients with nsclc by real - time rt - pcr
技術檢測肺癌淋巴結的隱匿性微小轉移All otopharynx have three characteristic dark spots on the flank, but these eventually become completely masked by the dark blue breeding coloration of males
金頭藍孔雀體側有明顯的3個黑色斑塊,不過在雄性魚的變色后,這些板塊會隱匿在深藍色之下。The algorithm have the good one - way property, high sensitivity to initial values and good security due to the intrinsic characteristic of chaotic system and rijndael algorithm. the simulation experiment demonstrates the convenience and good hash performance ; 3 ) a new scheme of digital voice secure communication was proposed based on chaotic modulation without additional synchronization. the modulation sequence generated by chaotic logical mapping was used to encrypt the digital voice signal
混沌系統和rijndael演算法的固有特點使該演算法具有較好的安全性、對初值有高度的敏感性以及較好的單向性能,並且易於實現,是一種有效的單向hash函數; 3 )研究了一種無需同步的基於混沌調制的數字語音保密通信系統的方案,利用邏輯映射產生混沌調制序列,以該序列作為密碼對數字語音進行加密處理,為了更好的隱匿信號特徵,混沌調制在小波分解的基礎上,對不同的通道使用不同的參數進行,並借鑒混沌掩蓋對信息信號進行了限幅處理,使密文完全隨機化。Generally, the disassembly strategy can be divided into the liner - scanning strategy and recursion - scanning strategy based on control flow. through researching on the recursion - scanning strategy based on control flow and instruction sets of many processors, this essay proposes a kind of disassembly strategy based on the static program flow traversal graph, and makes use of six strategies to pick up the hidden program sections from the data sections, thereby raising the precision of the disassembly result
反匯編策略大體可以分為線性掃描策略和基於控制流的遞歸掃描策略,該文通過對基於控制流的遞歸掃描策略以及多款處理器指令系統的研究,提出了一種基於程序靜態流程遍歷圖的反匯編策略,使用6種策略將隱匿於數據段中的程序段提取出來,提高了反匯編結果的精確度。Lan gkk, garman wf, locownini sa. et al. treatment of chronic hepatitis b virus infection aslar - pacific perspective [ j ]. j gastroenterol hepatol, 1999, 14 : 3 - 2
焦栓林,申德林,王全楚.慢性乙型隱匿型肝炎抗病毒治療的初步探討[ j ] .臨床肝膽病雜志, 2005 ( 2 ) : 115Gender concealed cyberspace
性別隱匿的賽伯空間Indications for retransplant included initial non - function of a transplanted lier, recurrence of the underlying disease, rejection, blood clots in the main artery that carries blood to the lier, and ischemic - type - biliary - lesions ( itbl ), a complication of lier transplants
再次移植的適應癥包括移植肝原發性無功能,隱匿性疾病的復發,排斥反應,主要入肝血流動脈血栓和肝移植的並發癥之一- - - -缺血性膽管損傷( itbl ) 。Diagnosis of occupational acute chemical poisoning - part 2 : diagnostic guideline of occupational acute obscure chemical poisoning
職業性急性化學物中毒的診斷第2部分:職業性急性隱匿式化學物中毒的診斷規則When the form of aversive stimulation is unpleasant mental imagery the technique is known as covert
當使用的厭惡性刺激是引起心理上不愉快的意象時,則稱為「隱匿性敏感法」 。I stress on three requests to the objective aspects of the crime of evading taxes. the first is the illegality of the action, which includes the break of tax material law and the tax procedural law. the second is the statute of the actions and means, which is only within the circumstances that " the taxpayer obtains the taxation by the means of forging, altering, concealing or destroying account books and vouchers for the accounts without authorization, or overstating or omitting or understating incomes in account books, or refusing to file his tax returns after the tax authorities have notified him to do so or filing false tax returns or export declaration or by other deceptive means.
著重論述偷稅罪客觀方面的三項要求:一是行為的違法性,包括違反稅收實體法和稅收程序法;二是行為手段的法定性,即僅限於「偽造、變造、隱匿、擅自銷毀帳簿、記帳憑證,在帳簿上多列支出或者不列、少列收入,經稅務機關通知申報而拒不申報,進行虛假的納稅申報,以假報出口或者其他欺騙手段騙取」 ;三是行為量化標準的法定性,即必須同時滿足法律規定的絕對數和相對數兩條件。The newcastle university researchers demonstrate in the first paper the procedure of coating the surface of a protein, such as an antibody, with an organic oil which is photocleavable, a process called “ cloaking ”
紐卡斯爾大學的研究人員在第一篇論文中描述了包被蛋白程序的過程,如抗體,用一種具有光裂性的有機油包裹,這個過程叫做「隱匿」 。The reasons for this include infections following surgery, multiorgan failure, bleeding complications, recurrence of the underlying disease, and chronic rejections
其原因包括手術后的感染,多器官衰竭,出血,隱匿性疾病的復發和慢性排斥。分享友人