隱域性的 的英文怎麼說
中文拼音 [yǐnyùxìngde]
隱域性的
英文
intratelluric-
Cryptic species have been found in a wide range of marine organisms ; with majority of them are benthic invertebrates. in contrast, marine holoplanktons are thought to have lower diversity and slow speciation due to their strong dispersal potential. this paper reviewed studies on cryptic species and speciation in marine holoplankton. based on findings in 38 studied taxa, it was concluded that : 1 ) cryptic species are pervasive in marine holoplankton, suggesting holoplankton speciation was more active than previously thought ; 2 ) current morphospecies diversity is untenable to reflect true species diversity in marine holoplankton ; 3 ) geographic isolation may facilitate cryptic speciation of marine holoplankton. however, contribution of allopatric speciation is still questionable ; 4 ) ecological speciation may be the prevailing speciation mode in marine holoplankton. cryptic speciation in marine holoplankton is paradoxical, because rapid speciation under strong gene flow is countertuitive. solution of this paradox will help us gain deep insights of marine speciation and biodivesity
隱種廣泛存在於各類海洋生物中,尤其是底棲無脊椎動物.然而,海洋終生浮游生物由於具有較強的擴散能力,往往被視為生物多樣性低、物種形成慢.本文就海洋終生浮游生物隱種與物種形成的研究作一綜述.基於研究的38個種類,結果表明: 1 )海洋終生浮游生物普遍存在隱種,其物種形成要比想象得快; 2 )由於引種的廣泛存在,形態種生物多樣性無法反映海洋終生浮游生物真正的物種多樣性; 3 )地理隔離有助於海洋終生浮游生物隱種的形成,但異域物種形成的作用仍值得商榷; 4 )生態物種形成很可能是海洋終生浮游生物物種形成的主流模式.海洋終生浮游生物強基因流下快速的物種形成有悖于生物進化常理,解決該悖論將有助於我們對海洋物種形成和生物多樣性的理解However geological information is fully recorded in the remote sensing image, which made it possible for the choosing of this area as a dissection point to extract complex structural information of orogenic belt in west china. taking fully advantage of multi - band image richly bearing concealed geological information in combination with remote sensing analysis and structure analysis, to anatomy the supracrustal composition and structure of orogenic belt with the regional linear structures and their partitioned block and schistous geological masses as the macro - frame ( in corresponding to structure units and structure segments ) and with the rock masses, structure - rock assemblages, line - featured and belt - featured structures as well as penetrative and non - penetrative foliation ( primary stratum and trans position layering ) and folds as the texture and structure elements. the methods of how to distinguish granulite > ductile - shear zone, imposed fold, different deformed belts -
因而,本文選擇這一地區作為我國西部地區從遙感圖像上提取造山帶復雜結構構造信息的解剖區,充分利用遙感圖像多波段反映物質屬性的特點和圖像處理提取隱含信息的優勢,採用遙感解析?構造解析相結合的研究方法,以區域線狀構造及由它劃分的塊狀、片狀地質體為宏觀骨架(對應于構造解析劃分的構造單元、構造均勻區段) ,以地質體中的巖石巖體、構造巖石組合,線狀、帶狀構造,透入性、非透入性面狀(原始層理、新生面理)和褶皺等構造作為用於解析的結構構造要素,進行造山帶表殼組成和結構構造解析研究。Stegnoraphy are widely used in many domains. the very challenging problem, which has n ' t been paid enough attention, is data hiding in binary images
信息隱藏技術已在多個領域獲得應用,但研究較少、具挑戰性的工作是二值圖像的信息隱藏。In the research realm of the target identify, an important topic is to minish the laser radar cross section of the space target for target stealth. the laser radar probes a target is based on the target under the laser, the space and time distribute characteristic of the strength ? polarization and phasic of the laser scattering etc. to identify a target
在目標識別研究領域有一個重要的課題是減小空間目標的激光雷達散射截面便於目標隱身。激光雷達探測目標是根據目標在激光照射下,激光散射的強度、偏振和相位等的空間和時間分佈特徵來識別目標,目標表面粗糙度是影響目標激光散射特性的重要影響因素。At the beginning of 60 years, laser radar whose primary function is to measure distance appeared. developping for nearly half century, laser rader have been widely applied in many areas, especially in military application because of its particular merits such as high angle - solution, high - speed - solution, high - ditance - solution, nice - anti - jamming ability and good consealment. recently, in iraq war, the precision control and guide weapons depend on laser radar techniques embodied their powerful abilities. the laser radar technique is a very important part in u s military system
歷經半個多世紀以來,激光雷達以其高角解析度,高速度解析度,高距離解析度,強抗干擾能力,好的隱蔽性,以及出色的全天候工作能力在很多技術領域尤其是軍事領域中得到廣泛的應用。最近的伊拉克戰爭中,以激光雷達為依託的精確制導武器顯示出了其強大的作戰能力,激光雷達技術在美軍作戰系統中扮演著重要的角色。The operator and zuji properties do not warrant the accuracy, completeness, currency or reliability of any of the content or data found on this site and, subject to the statutory warranties below, expressly disclaim all warranties, terms and conditions, including all implied warranties, terms and conditions of merchantability, satisfactory quality, fitness for a general or particular purpose and non - infringement of proprietary rights, and those arising by statute or otherwise in law or from a course of dealing or usage of trade to the fullest extent permitted by the laws of the territories
在盡地域內的法律準許的范圍內,該經營商及zujiproperties概不保證本網站出現的任何內容或數據準確、齊全、有效或可靠,而在受以下法定保證規限下,明確免除一切保證、條款及細則,包括商售性、合格品質、適合普遍或特定用途及不侵害專利權利、藉成文法或其他法例、交易過程或運用貿易而產生的權利等一切隱含保證、條款及細則。First, enacting a " biosafety law " as a framework for the laws of the biosafety management ; second, making special laws on the biosafety management, or supplying with the existing laws which are in connected with biosafety problems ; third, making laws on genetically modified organisms environmental impact and safety assessment, cross - border transfer of the management of biotechnology, genetically modified organisms labelling management, and other areas of laws and regulations to face biosafety problems recently ; then, giving some suitable advices on the main issues of biotechnology that damage the legislation and the disputes of procedures legislative ; last, pointing out other
首先,應當制定一部《生物安全法》作為框架性的生物安全管理法律;其次,制定各領域的生物安全專項管理法律,或對原有的有關法律進行補充;再次,提出制定轉基因生物環境影響和安全評價、生物技術成果越境轉移管理、轉基因生物標簽管理等方面的法律、法規,應對目前生物安全的主要問題,並對生物技術損害法律責任的承擔和糾紛處理程序立法提出建議;最後,指出其他部門立法中有關生物安全方面應當進行的修改,包括知識產權法中的基因專利方面,民法中有關基因隱私權方面,刑法中的基因犯罪方面,等等。Through the non - locality of the quantum entanglement, teleportation schemes of arbitrary two - particle and three - particle states are proposed
通過量子糾纏的非局域性,提出了實現任意二粒子和三粒子量子態的隱形傳送的方案。The mutation, contrast and heterogeneity of ecological interface between oasis and desert ecosystem increased. rare natural or non - regional mosaic of patch show obvious sensitivity to spatial scale, the change ratios of theirs area and perimeter are greater than large patch
同時通過測度敏感性檢驗,表明在尺度變換中,稀少的自然或隱域性斑塊鑲嵌體對空間尺度敏感性大,面積、周長等變化率大於大斑塊,隨尺度中度干擾則合併成較大的斑塊,隨尺度強烈干擾或隔離加強后最先消失。De compwi the above proving, we ffo tw thest hav the are logical struan and none of them hav inequaies, bo the m h between m is that the cabello " s idethod has the statisthal natur just as beli inequalities, the the htw " s edd is the noredshal one. twly the incompatibitw of quantal theory and lotal hidden variable theory has ben proved the rnore - - state, le
在haray定理邏輯結構的基礎上用更簡潔的方式證明定域隱變量理論不可能重現量子力學的結果,對比表明這兩種邏輯結構類似且都是不涉及不等式方法的根本不同之處在於:前者實質上與不等式形式的bell定理一樣均為「統計性」的證明,而後者則是「非統計性」的方法。Such designing idea is different from the way knowledge of problem solving is implied in the program in the existing program of the game of go, but it separate the knowledge of go field to consist of the entity of repository separately. by doing this it is convenient for the improvement and modification of knowledge and will make the system easy to expand and maintain
這樣的設計思路不同於現有圍棋程序中把問題求解的知識隱含地編在程序中的方法,而是將圍棋領域內的知識單獨分開組成一個知識庫的實體,便於知識的完善和修改,使系統具有良好的擴充性和維護性。[ note : 3. 5 discusses linkage issues. the notions of scope, point of declaration and name hiding are discussed in 3. 3
注: 3 . 5討論連接性的問題。作用域,聲明點和名字隱藏的概念在3 . 3中討論。Firstly, in this paper, we review the histories of xml and xml database, and all kinds of data models used widely now. then we review traditional access control policies and policies specially used on xml, and present a new expression method of access set on xml based on child tree of w3c data model. and we bring rbac model into xml database and present a new xml access model x - rbac. because the usage of data in databases has high frequency, we present an ids model based on access set density to logging the potential security threats. and then we introduce the design and implementation of a prototype of our native xml database nhx and its access control system. finally, we draw a conclusion for this paper and the future work
本文首先回顧了xml及xml數據庫的歷史,並總結了目前廣泛使用的xml數據模型,在分析了各種傳統數據庫訪問控制策略,以及xml的專有訪問控制策略的優缺點后,基於w3c的xml數據模型,提出了一種基於子樹的具有高彈性的便於實現的的訪問區域表示法,並將rbac模型引入進來,提出了一種適用於xml數據庫的訪問控制模型x - rbac ,同時為了區分xml數據庫訪問中的合法訪問和合理訪問,我們根據數據庫訪問具有頻繁性這一特徵,提出了一種基於區域訪問密度的入侵檢測模型( ids ) ,以對隱藏在正常訪問中的潛在安全威脅進行報警和日誌。It ’ s an autonomic working manner not depending on external information. it has the character of security and immunity to the outside interference such as weather and electron so is widely used in the field of spaceflight and aviation
它是一種自主性的工作方式,不依賴于外界的信息,隱蔽性好,不受氣候、電子等外界因素的影響,因此廣泛的應用於航空航天等領域。Civil air defense alarm system was a system to dispense antiaircraft alarm sig - nal, hand hostile air attack informational communication to urbanite at wartime. it is a particular informational communication system of the civil air defense depart - ment, and can not be taken place. at the development trend of digitaliza - tion, unitization, integration of civil air defense communication, the civil air defense alarm system is developing too, for adaptation to the require of both future war and peaceful dual, and enhancing civil air defense communication system ' s directing automation. in recent years, development of different kinds of communication technology infuses new clearly energy into communication, especially spread spectrum communication, because of its strongly interference - free feature, invisibility best, realizable code division multiple access and antimultipath wane and so on merit, gets extensive use at wireless region ; the corresponding spread spectrum chips emerge as the times and get boom, which provides advantag e to realization of the circuit of spread spectrum communication. at the same time, in company with the advance of electronics level, the single chip microcomputer has a great development, world renowned chip manufacturer pushout respective products one after another, the kinds of which are too many to statiste
在人防通信的數字化、一體化、綜合化必然的發展趨勢下,人防警報系統也不斷發展,以適應未來戰爭和和平時期的雙重需要,提高人防通信系統指揮自動化。近年來,各種通信技術的發展給通信注入了活力,擴頻通信更因其抗干擾能力強、隱蔽性好、可實現碼分多址和抗多徑衰落等優點在無線領域得到了廣泛應用;其相應擴頻處理晶元應運而生並得到迅速發展,這為擴頻通信的電路實現提供便利。同時隨著微電子工藝水平的提高,單片微型計算機有了飛躍發展,世界上著名的集成電路晶元製造商紛紛推出各自的產品,單片機型號之多,已達到難以統計的地步。A culture - sensitive comparison is any comparison that explicitly or implicitly uses a
區分區域性的比較是顯式或隱式使用In this thesis, the preparation and measurement of bell states of two particles are introduced. a scheme for teleportation an arbitrary three - particle state is proposed, which is possible to extend for teleporting an arbitrary n - particle state. in terms of the basic logic gates, the quantum logic circuit for teleporting a qubit and an arbitrary two - particle state are also presented
本文從量子糾纏的非局域性的討論出發,給出了兩體糾纏的四個正交完備基及其測量方法,從未知量子態的隱形傳送的基本原理出發,討論了三粒子任意量子態的隱形傳送過程,並討論了推廣到多粒子任意量子態的隱形傳送的可能性。Data mining is a collection of engineering methods proposed for solving large practical problems of machine learning, pattern recognition, database technology etc. the purpose of data mining is to discover the implicit knowledge or rule, and to help human expert to make decision. frequent pattern mining ( fpm ) and bayesian network learning ( bnl ) are two useful technologies of data mining
數據挖掘技術是解決機器學習、模式識別、數據庫技術等各種領域中的大型實際應用問題而提出的一些工程性方法的集合,主要是為了從大型數據庫中高效地發現隱含在其中的知識或規律,並為人類專家的決策提供支持。Unlike the implicit example previously, you do not need to maintain a resource file for each. aspx page ; instead, you can maintain a single series of files for each language or culture you support
與前面介紹的隱式示例不同,您無需為每個. aspx頁維護一個資源文件;相反,您可為支持的每種語言或區域性維護一系列文件。In the third part, the essences of steganography and disadvanges of common visual perception evaluation, such as psnr and wpsnr are studied. based on analysis local error that is introduced by embedding information, combining hvs, three objective perception evaluation method for steganography performance are proposed, which are based on human visual systems and local statistic error distribution respectively. in the steganalysis part, a steganography security statistic attack model and methods for some steganography methods are presented
在信息隱藏的性能評價方面,研究了常用的峰值信噪比,加權峰值信噪比等前人提出的感知性能評價準則,指出針對信息隱藏的性能評價不能單純從視覺特性出發,提出從信息隱藏的數據特性和感知特性出發,結合局部特性來考察失真誤差的變化的思想,並據此提出基於局部區域誤差統計分佈和視覺掩模方法評價信息隱藏性能的方法。分享友人