隱式的 的英文怎麼說
中文拼音 [yǐnshìde]
隱式的
英文
implicit-
Parallel algorithms of accelerative iteration for solving implicit difference equations
求解隱式差分方程的加速迭代并行演算法Cryptic species have been found in a wide range of marine organisms ; with majority of them are benthic invertebrates. in contrast, marine holoplanktons are thought to have lower diversity and slow speciation due to their strong dispersal potential. this paper reviewed studies on cryptic species and speciation in marine holoplankton. based on findings in 38 studied taxa, it was concluded that : 1 ) cryptic species are pervasive in marine holoplankton, suggesting holoplankton speciation was more active than previously thought ; 2 ) current morphospecies diversity is untenable to reflect true species diversity in marine holoplankton ; 3 ) geographic isolation may facilitate cryptic speciation of marine holoplankton. however, contribution of allopatric speciation is still questionable ; 4 ) ecological speciation may be the prevailing speciation mode in marine holoplankton. cryptic speciation in marine holoplankton is paradoxical, because rapid speciation under strong gene flow is countertuitive. solution of this paradox will help us gain deep insights of marine speciation and biodivesity
隱種廣泛存在於各類海洋生物中,尤其是底棲無脊椎動物.然而,海洋終生浮游生物由於具有較強的擴散能力,往往被視為生物多樣性低、物種形成慢.本文就海洋終生浮游生物隱種與物種形成的研究作一綜述.基於研究的38個種類,結果表明: 1 )海洋終生浮游生物普遍存在隱種,其物種形成要比想象得快; 2 )由於引種的廣泛存在,形態種生物多樣性無法反映海洋終生浮游生物真正的物種多樣性; 3 )地理隔離有助於海洋終生浮游生物隱種的形成,但異域物種形成的作用仍值得商榷; 4 )生態物種形成很可能是海洋終生浮游生物物種形成的主流模式.海洋終生浮游生物強基因流下快速的物種形成有悖于生物進化常理,解決該悖論將有助於我們對海洋物種形成和生物多樣性的理解The structure of this paper goes like this, the first chapter introduce the development of e - b / l in practice and in laws. and draw a conclution that the electrification of the b / l is a history tide. in the second chapter, on the basic of reseach the security trap in e - b / l running, 1 conclude six security elements of, e - b / l : the liability of the system, the authenticity of dealers ' identity. the integrity and secrecy of electronic data, and the validity and evidence effectiveness of electronic data. from the third chapter to the eighth, 1 reseach these elements one by one. the third chapter introduce the establishment of the e - b / l security system, and some related laws the fourth chapter introduce the certification authority of e - b / l. in the fifth chapter, 1 introduce the encrypt of electronic information and some countries ' control on use / import / export crytography. the sixth chapter introduce the concept and principle of digital signature, and reseach some related legal issues. the seventh chapter reseach the legal demand of validity, then come to a conclution that to establish a independent electronic information system is necessary. in the eighth chapter, 1 reseach some countries " regulation on the evidence effectiveness of electronic data
第二章在分析電子提單運作中的安全隱患的基礎上,歸納出其六大安全要素,即系統的可靠性、交易者身份的真實性、數據電訊的機密性和完整性、數據電訊的合法有效性以及交易者行為的不可抵賴性。第三章到第八章分別對這六大要素進行分析:第三章介紹了電子提單網路安全體系的建立以及系統安全保護法規,第四章則介紹了電子提單的安全認證機構,第五章介紹了信息加密技術以及各國立法對密碼技術的進出口及使用的控制,第六章介紹了數字簽名的概念及原理,並以bolero為例介紹了數字簽名的技術方式,對有關法律問題作了論述;第七章首先論述了電子提單對有效性的法律需求,然後結合國內法和國際規則的規定論證了數據電訊制度產生的必然性;第八章通過對各國立法對電子證據的法律效力的規定,論述了對電子交易至關重要的數據電訊的不可抵賴性。7 krishnan s, manocha d, gopi m, culver t, keyser j. boole : a boundary evaluation system for boolean combinations of sculptured solids
第二是它們是對偶表達的,一個參數化的表達一定與一個隱式的表達相對應。8 halperin d, overmars m h. spheres, molecules, and hidden surface removal. in proc
在這種情況下,每個溶劑分子將能顯式或隱式的表達。An abstract method is implicitly a virtual method
抽象方法是隱式的虛方法。We also compute naca0012 airfoil and certain three - foil flow field separately with explicit 4 - step runge - kutta scheme and the implicit lu - sgs scheme and results show the latter is much more efficient. in the end, the capability of the algorithm to deal with multi - bodies in relative movements is demonstrated by a dropping drank problem. it turns out that the unstructured overset grid is valuable and promising in practical application
同時為了驗證隱式lu - sgs格式的收斂效果,我們對基於單塊網格的naca0012翼型與某三段翼型在不同的來流條件下,分別用帶隱式的lu - sgs格式與顯式的四步runge - kutta格式的解算器進行了數值模擬。Objects cursors are closed when a commit operation is implicitly or explicitly performed
對象(游標)在提交操作得到顯式的或隱式的執行后被關閉。Objects cursors are not closed ; they are held open when a commit operation is implicitly or explicitly performed
對象(游標)沒有被關閉;它們在提交操作得到顯式的或隱式的執行以後仍保持打開的狀態。Using the approximation form of lumped mass matrix instead of the mass matrix in finite element discretization in space, backward differencing scheme in time, an implicit computational scheme is yielded, it proved the convergence estimate for this implicit scheme
對有限元離散中引起較大誤差的質量矩陣,採用了近似形式的集總質量矩陣來代替,時間項採用向後差分,得到了一個隱式的計算格式,證明了計算格式的收斂性及其收斂速度估計。In a floating - point representation, the numeral that is multiplied by the exponentiated implicit floating - point base to determine the real number represented
浮點表示法中的一個數字,該數字乘上隱式的浮點底數的冪就決定了所表示的實數。In this paper, a three - dimensional ( 3d ) program for the three - dimensional reactive flow fields of complicated geometric nozzle, which governed by the compressible full navier - stokes equations with realizable k - s turbulent model, has been upbuilt by using full implicit couple arithmetic and fvm ( finite volume method ) based on understanding and assimilation of a two - dimensional program group of cr ( chamber - radon ). the new program fulfils the urgent need of numerical tools for simulating three - dimensional reactive flow - fields of hylte ( hypersonic low temperature ) and other latest nozzles, for which cr is out of action in simulation, and can be applied to simulate other chemical laser system, such as chemical oxygen iodine laser ( coil ), overtone fluoride hydrogen, all - gas iodine laser, and so on. furthermore, some related topics about nozzles design and engineer ing also have been discussed
本文在二維cr ( chamber ? radon )程序研究的基礎上,採用有限體積方法和完全隱式的耦合演算法,通過求解帶realizablek -兩方程湍流模型的多組分、有反應的三維完全納維埃?斯托克斯( n ? s )控制方程,建立了一套能夠對復雜形狀的三維噴管和光腔進行數值模擬的三維程序,解決了連續波df hf化學激光器增益發生器設計缺乏三維數值模擬工具的問題,並用該工具解決了cr程序無法實現的hylte等復雜三維噴管流場的理論模擬問題。Jets use only two implicit variables
Jet只使用兩個隱式的變量:The conversion from an ordinary type to a nullable type, is implicit
從普通類型到可空類型的轉換是隱式的。Conversion operators can be implicit or explicit
轉換運算符可以是隱式的也可以是顯式的。The dependency between the table and its columns is implicit
表與其列之間的依賴關系是隱式的。Enumeration types are implicitly
枚舉類型是隱式的Keyword is used to declare an implicit user - defined type conversion operator
關鍵字用於聲明隱式的用戶定義類型轉換運算符。The symplectic rk methods are implicit for the non - separable hamiltonian systems
對不可分hamilton系統,辛rk方法是隱式的。Specifies that resource definitions are implicit within the files that comprise the assembly
指定資源定義在包含該程序集的文件中是隱式的。在分享友人