隱方式 的英文怎麼說

中文拼音 [yǐnfāngshì]
隱方式 英文
implicit mode
  • : Ⅰ動詞(隱瞞; 隱藏) hide; conceal Ⅱ形容詞1 (隱藏不露) hidden from view; concealed 2 (潛伏的; ...
  • : Ⅰ名詞1 (方形; 方體) square 2 [數學] (乘方) involution; power 3 (方向) direction 4 (方面) ...
  • : 名詞1 (樣式) type; style 2 (格式) pattern; form 3 (儀式; 典禮) ceremony; ritual 4 (自然科...
  • 方式 : way; fashion; pattern
  1. Alternating direction implicit scheme, adi scheme

    交替
  2. This paper explores and discusses the national implied cultural features of chinese argot jargon in naming motivation from the three aspects of concrete thought mode, totem and phallic psychology, orthodox cultural consciousness, to start with the relation between language and folklore

    摘要從語言與民俗文化的關系入手,從具象思維、圖騰與性生殖崇拜心理、正統文化意識等三個層面對漢語語行話在命名理據中所蘊含的民族型文化特徵進行了發掘與探討。
  3. The structure of this paper goes like this, the first chapter introduce the development of e - b / l in practice and in laws. and draw a conclution that the electrification of the b / l is a history tide. in the second chapter, on the basic of reseach the security trap in e - b / l running, 1 conclude six security elements of, e - b / l : the liability of the system, the authenticity of dealers ' identity. the integrity and secrecy of electronic data, and the validity and evidence effectiveness of electronic data. from the third chapter to the eighth, 1 reseach these elements one by one. the third chapter introduce the establishment of the e - b / l security system, and some related laws the fourth chapter introduce the certification authority of e - b / l. in the fifth chapter, 1 introduce the encrypt of electronic information and some countries ' control on use / import / export crytography. the sixth chapter introduce the concept and principle of digital signature, and reseach some related legal issues. the seventh chapter reseach the legal demand of validity, then come to a conclution that to establish a independent electronic information system is necessary. in the eighth chapter, 1 reseach some countries " regulation on the evidence effectiveness of electronic data

    第二章在分析電子提單運作中的安全患的基礎上,歸納出其六大安全要素,即系統的可靠性、交易者身份的真實性、數據電訊的機密性和完整性、數據電訊的合法有效性以及交易者行為的不可抵賴性。第三章到第八章分別對這六大要素進行分析:第三章介紹了電子提單網路安全體系的建立以及系統安全保護法規,第四章則介紹了電子提單的安全認證機構,第五章介紹了信息加密技術以及各國立法對密碼技術的進出口及使用的控制,第六章介紹了數字簽名的概念及原理,並以bolero為例介紹了數字簽名的技術,對有關法律問題作了論述;第七章首先論述了電子提單對有效性的法律需求,然後結合國內法和國際規則的規定論證了數據電訊制度產生的必然性;第八章通過對各國立法對電子證據的法律效力的規定,論述了對電子交易至關重要的數據電訊的不可抵賴性。
  4. In peel of citrus fruit, red cultivar " mantouhong " accumulated mainly p - citraurin component, whereas orange cultivar " owari satsuma mandarin " accumulated mainly p - cryptoxanthin component. 4. effects of shading fruit with opaque paper bag at the late stage of fruit enlargement on change in chlorophyll, carotenoid, sugar content and peel color in " hongshigan " citrus ( c. suavissima hort. ex tanaka x c. sinensis osbeck ) were examined

    與光照處理相比,遮光前期果皮糖含量下降不大,而後期下降明顯;若在後期去袋照光,果皮糖含量上升,與此相應,類胡蘿卜素,尤其是卜黃質的積累增加,顏色加深,這一結果表明光對果皮類胡蘿卜素合成尤其是卜黃質的積累有促進作用,其原因可能是光以環境信號的影響果皮的類胡蘿卜素形成。
  5. A longterm identification link between a donor and his or her unit of cord blood would be necessary, a prospect that has aroused privacy concerns among medical ethicists

    在臍帶血與捐贈者之間,長期的身分辨識是有必要的;但這樣也會引起醫學倫理學者對私權的關切。
  6. The article points out the importance and necessity of the information - security from its actuality in our country. the resources in the information system, for instance, hardware, software, data, document, operator, meterial and so on, are evaluated and gived safety grade firstly. and then, it analyses the menace including the nonauthorized access, the information leak, the refused sevice, the internal objection which the system will take. the following are the corresponding control police : confirm the users " rights and duties, including the mode of using account, the limit of accessing resource, the application of password, the building of backup ; confirm the administrators " right and duties, including physical safety, system configuration, account configuration and usufruct, password management, audit and control, backup and individual intimity ; run - of - mill measure of security defence, including access control, symbol and identification, integrality control, password technique, firewall system, audit and resumption, safety of operating system, safety of database system, defence of computers " virus and resisting - deny protocol. in the end, the article offers the strategies of disposing the safety - accident and analyse after ithow. to report it, how to solve it in phase, and how to avoid it happening again. in a word, the article presents a holistic resolvent about keeping away the information system ' s security, and supplies a essential frame for its configuration, management and application

    然後,對系統可能受到的威脅,包括非授權訪問、信息泄漏、拒絕服務和內部缺陷等進行分析,並提出了相應的控制策略:確定用戶的權力和責任,包括帳戶使用、資源訪問權限、口令應用以及建立備份等;確定系統管理員的權力和責任,包括物理安全、系統配置、帳戶設置及使用權限、口令管理、審計和監控、備份以及個人私等面;一般性的安全防護措施:存取控制、標識和認證、完整性控制、密碼技術、防火墻系統、審計和恢復、操作系統安全、數據庫系統安全、計算機病毒防護和抗抵賴協議等。最後,對事故處理和事後分析提供策略,如何報告安全事故,如何協調解決安全事故,如何避免安全事故再次發生。總之,本文對信息系統安全防範工作給出一個整體的解決案,為其在配置、管理和應用面提供了基本的框架。
  7. The mine geology disaster is an important branch of geology disaster, at present the mine geology disaster of our country has many characteristics, such as varied, widely distributed, great influence, conspicuous potential hazard, and the coal mine is heavier than being not, the metal mine is heavier than the metalloid mine ; the type of mine geology hazard relate to mine scale, way of exploitation, mineral type and the area

    摘要礦山地質災害是地質災害的一個重要分支,目前,我國礦山地質災害具有種類多,分佈廣,影響大,潛在災害患突出,且煤炭礦山重於非煤礦山,金屬礦山重於非金屬礦山;礦山地質災害類型與礦山規模、開采、礦產類型及所處地域相關等特點。
  8. In addition, many other problems also exist in hardware neural network, including error problem, learning mode, parallel architecture, and also neural network inner linking problem, hidden layer and the realization of the multiplicator and etc. for instance, error problem : hardware neural network employs the limited precision, and will inevitably bring limited precision error

    另外,硬體實現神經網路還存在誤差問題,學習,并行結構等面的問題,還有神經網路內部的連接問題,層及乘法器的實現等等。如誤差問題,硬體實現神經網路使用的是有限精度,不可避免的會產生有限精度誤差,選取合適的精度,才能既適合空間的要求,又避免對網路的實現產生一定的影響。
  9. He had such a fanciful, pictorial way of saying things.

    他有一種晦曲折、光怪陸離的表達
  10. " extreme " can be meant to describe any of the following traits : music ( whether it ' s intended to be faster, more aggressive, abrasive or " heavier " than other metal styles ), lyrics ( dealing with darker, more salacious or sensational topics and themes ), vocals ( which often use guttural, harsh or abrasive singing ), or appearance and stage demeanor ( using corpse paint, satanic or occult imagery )

    "極端"一詞可形容下列任何一種特質:音樂(不論它的用意是為了比其他金屬風格更快,更進取,磨料或"沉" ) ,歌詞(更黑暗,更淫穢或煽情的題材和主題) ,聲樂(經常使用喉嚨,苛刻或磨損的來歌唱) ,或形象和舞臺演繹(用屍體油漆,撒旦或匿性意象) 。
  11. During the procedure of system design and implementation, the author has made some innovative efforts such as : ( d establishing the user interest orientated model, the model receiving user interests continuously and conjecturing user interests by interaction with the user, accumulating user preferences in information demand, thereby achieving self - adaptive retrieval, ? roviding a feedback method which is based on the human - machine interaction, summarizing the user operations on the interface of result presentation, and designing an algorithm for capturing user operation behaviors, by which the changes in user interests and preferences can be learned potentially, ? ffering a method for user interest mining which can extract subjects of information confirmed by user, thereby conjecturing or predicting different kinds of expressions of the same interest or extracting the new interests or unexpressed interests, ? roposing a solution of personalized internet information retrieval based on the user interests in accordance with the above - mentioned work, the solution having very strong feasibility and practicality with taking user interest model as center, employing machine learning ( active learning and passive learning ) and data mining as tools, and being assisted with network robot,

    Piirs系統分析與設計過程中所做的創新性的嘗試主要有以下幾個面:實現了基於用戶興趣的用戶模型,該模型通過與用戶的交互(主動交互和被動交互) ,不斷地接收用戶的興趣和推測用戶的興趣,積累用戶信息需求的偏好,實現自適應的檢索;提供了一種基於人機交互的反饋法,對用戶在結果呈現界面上的操作進行了歸納總結,設計了用戶操作捕獲演算法, 「性地」學習用戶興趣和偏好的變化;提供了一種用戶需求挖掘的法,對用戶已確定的信息做進一步的主題挖掘,由此推測或預測用戶同一興趣的不同表述或者挖掘出用戶新的或未表達出來的興趣;在上述工作基礎上提出了一套完整的基於用戶興趣的個性化網路信息檢索的解決案,該案以用戶興趣模型為中心,以機器學習(主動學習和被動學習)和數據挖掘為手段,輔以網路機器人,具有很強的可行性和實用性。
  12. But there are also friends who can be bad for us in emotion, and sometimes subtler ways with sly insults, and competitive one - upmanship

    但是也有一些朋友會在感情上傷害我們,有時用蔽狡詐的侮辱,有時則是搶先一步的競爭。
  13. The e - commerce is based on internet network and pushing the economic globalization corresponding by the continuous development of computer, network and communication technique. the e - commerce influence on the tax theory and tax system that established on the traditional business deeply, involving vat, business tax, income tax for both enterprise and individual, tariff, stamp tax, etc because of the dummy, digital and confusable characteristic contrasting to the traditional business. and it also contributes to our economy development and tax base enlargement

    電子商務會給商家帶來巨大的發展機遇和豐厚利潤,但電子商務不同於傳統的貿易,由於其的虛擬化、數字化、匿化等特點,對建立在傳統的生產、貿易基礎之上的現行稅收理論、稅收制度和稅收征管影響廣泛,涉及到增值稅、營業稅、關稅、所得稅、印花稅等多個稅種,給我國稅收提出新的而且相當嚴峻的挑戰,同時也為我國促進經濟發展,擴大稅收來源提供新的機遇。
  14. To prevent them from being used outside of your class ; this technique is called data hiding, and is how customer information such as the account balance is protected

    以防止它們在類的外部使用;這種技術被稱為「數據藏」 ,是對帳戶余額等客戶信息的保護
  15. The implicit differencing scheme of nine points for solving the parabolic equations

    解拋物型程的九點
  16. Based on the comparison and analysis of the purpose, contents, curriculums and teaching methods of moral education at school in both china and the united states, this dissertation puts forward solutions and ideas in five aspects : how to improve the methods of patriotism education, strengthen socialism education, and develop our chinese spirit ; how to carry forward and creatively transform our chinese good moral traditions in a critical attitude, and to borrow and improve the worldwide advanced cultural achievements ; how to reform the rigid and dogmatical curriculums of moral education, and attach importance to indirect moral education in a way of influencing students " morality in every aspect ; how to achieve the goal of moral education imperceptibly through the social practice to strengthen student " personal experience ; and how to bring full play to student " subjectivity during the course of moral education so as to carry out moral - integrity - forming education aiming at personality modernization

    本文內容包括六個部分:導論;中美學校德育目標的比較;中美學校德育內容的比較;中美學校德育課程的比較;中美學校德育實施的比較;啟示與思考。論文通過對中美兩國學校德育的目標、內容、課程設置、實施面進行比較和分析,從五個面提出了我國德育的對策和思考:改進愛國主義教育形,強化愛國主義教育,努力培育民族精神;加強對中華民族道德傳統的批判繼承和創造性轉換,並借鑒和改造世界先進文化成果;改革僵化的「教條」德育課程,重視蔽的德育課程,以全位地對學生實施德育影響;通過社會實踐活動強化學生的情感體驗,在潛移默化中達到德育的目的;在德育過程中充分發揮學生的主體性,實施以人格現代化為目標的德性養成教育。
  17. Moreover, in order to promote socialization progress, and solve inefficient problem of moral education, we must bring forth new ideas on moral education mode, select equitable and effective mode for different students and different problems. when we use the basic and main mode ? nculcation, we can select and use penetrating mode, concealed mode, enculturation, and psychology consulting service, etc. moral education practice has proved, if we use all of the modes put forward above, we can achieve good results in moral education, and go a step further to promoter university students socialization progress

    同時,為推動當代大學生社會化發展,解決以往德育工作效率低下的問題,還必須在實踐中實現德育的創新,針對不同對象、不同問題,隨時選擇合理而又有效的德育,如:在實施灌輸教育這一最基本、最主要的德育的同時,可選擇滲透、文化環境熏染、心理咨詢等不同德育
  18. The nimble video frequency display mode, fixed time covers assigns the video channel, protects the user privacy

    靈活的視頻顯示,定時遮蓋指定視頻通道,保護用戶私。
  19. It s not far, only if we know how. the masters of old have passed away, but their teachings, their lineage of enlightenment, has always, somewhere, somehow, somewhat survived. it doesn t necessarily survive in jerusalem ; it doesn t necessarily survive in bodh gaya, in india

    過去的明師已經走了,但他們關于開悟的教理和法脈總是在某些地,以某種或顯地流傳下來,不一定是在耶路撒冷,也不一定是在印度的菩提道場才找得到。
  20. Master also stated : " the masters of old have passed away, but their teaching, their lineage of enlightenment, has always, somewhere, somehow, somewhat survived. it doesn t necessarily survive in jerusalem ; it doesn t necessarily survive in bodh gaya, in india. it goes deep into the ground of existence like a river

    師父並提到:過去的明師已走了,但?們的法脈則永續不斷長流世間,以某種,或或顯地流傳下來,不一定在耶路撒冷,也不一定在印度的菩提道場。
分享友人