隱生機體 的英文怎麼說

中文拼音 [yǐnshēng]
隱生機體 英文
cryptobiote
  • : Ⅰ動詞(隱瞞; 隱藏) hide; conceal Ⅱ形容詞1 (隱藏不露) hidden from view; concealed 2 (潛伏的; ...
  • : Ⅰ動詞1 (生育; 生殖) give birth to; bear 2 (出生) be born 3 (生長) grow 4 (生存; 活) live;...
  • : machineengine
  • : 體構詞成分。
  • 機體 : 1. [生物學] (有機體) organism 2. [航空] airframe
  1. The structure of this paper goes like this, the first chapter introduce the development of e - b / l in practice and in laws. and draw a conclution that the electrification of the b / l is a history tide. in the second chapter, on the basic of reseach the security trap in e - b / l running, 1 conclude six security elements of, e - b / l : the liability of the system, the authenticity of dealers ' identity. the integrity and secrecy of electronic data, and the validity and evidence effectiveness of electronic data. from the third chapter to the eighth, 1 reseach these elements one by one. the third chapter introduce the establishment of the e - b / l security system, and some related laws the fourth chapter introduce the certification authority of e - b / l. in the fifth chapter, 1 introduce the encrypt of electronic information and some countries ' control on use / import / export crytography. the sixth chapter introduce the concept and principle of digital signature, and reseach some related legal issues. the seventh chapter reseach the legal demand of validity, then come to a conclution that to establish a independent electronic information system is necessary. in the eighth chapter, 1 reseach some countries " regulation on the evidence effectiveness of electronic data

    第二章在分析電子提單運作中的安全患的基礎上,歸納出其六大安全要素,即系統的可靠性、交易者身份的真實性、數據電訊的密性和完整性、數據電訊的合法有效性以及交易者行為的不可抵賴性。第三章到第八章分別對這六大要素進行分析:第三章介紹了電子提單網路安全系的建立以及系統安全保護法規,第四章則介紹了電子提單的安全認證構,第五章介紹了信息加密技術以及各國立法對密碼技術的進出口及使用的控制,第六章介紹了數字簽名的概念及原理,並以bolero為例介紹了數字簽名的技術方式,對有關法律問題作了論述;第七章首先論述了電子提單對有效性的法律需求,然後結合國內法和國際規則的規定論證了數據電訊制度產的必然性;第八章通過對各國立法對電子證據的法律效力的規定,論述了對電子交易至關重要的數據電訊的不可抵賴性。
  2. This commensal organism is part of the gastrointestinal tract flora and can become extremely virulent, often in the setting of immuno - suppression such as neutropenia, occult malignancy ( commonly caecal ) and poorly controlled diabetes

    這種(與人類)共物是胃腸道菌群的一部分,可以變得毒性巨大,通常發免疫受抑制,如中性粒細胞減少癥,蔽的腫瘤(一般如盲腸) ,或者控制不佳的糖尿病。
  3. Staphylinidae is one of the largest family in coleoptera, they occupy a wide variety of habitats and have a wide range of food - habits. they are essentially carnivorous ( insect feeder ), but some groups have become evolved as mycophagous, coprophagous, coprophagous, carpophagous, pollinophagous and so on. some species have adapted to a parasitism of mammals

    翅蟲是一類廣泛分佈於農田、森林和山區的鞘翅目昆蟲,它們境多樣,有的為肉食性種類,是捕食農林害蟲的重要天敵,也有藥用種類和衛害蟲,還有取食動植物有、促進自然界物質循環、保持態平衡的種類,與人類的關系密切,是一類不可忽視的自然資源。
  4. Of the eons of geological periods recorded in the stratifications of the earth : of the myriad minute entomological organic existences concealed in cavities of the earth, beneath removable stones, in hives and mounds, of microbes, germs, bacteria, bacilli, spermatozoa : of the incalculable trillions of billions of millions of imperceptible molecules contained by cohesion of molecular affinity in a single pinhead : of the universe of human serum constellated with red and white bodies, themselves universes of void space constellated with other bodies, each, in continuity, its universe of divisible component bodies of which each was again divisible in divisions of redivisible component bodies, dividends and divisors ever diminishing without actual division till, if the progress were carried far enough, nought nowhere was never reached

    藏在大地的洞穴里和能移動的石頭底下蜂巢和土墩子中那無數微小的昆蟲類的有物:微物病菌細菌桿菌精子憑著分子的親和之凝聚力而粘在一根針尖上那幾萬幾億幾兆個多不勝數肉眼看不到的微小顆粒人類的血漿是一個宇宙,群集著白血球和紅血球,每個血球又各自形成一個空虛的宇宙空間,群集著其他球各個球連續性地也是由可分割的構成形成的宇宙,各個構成又可以分割成為幾個能夠進一步分割的構成。就這樣,分子與分母實際上在並未分割的情況下就不斷地減少了。如果這個過程延續到一定時候,就永遠在任何地方也不會達到零。
  5. The article points out the importance and necessity of the information - security from its actuality in our country. the resources in the information system, for instance, hardware, software, data, document, operator, meterial and so on, are evaluated and gived safety grade firstly. and then, it analyses the menace including the nonauthorized access, the information leak, the refused sevice, the internal objection which the system will take. the following are the corresponding control police : confirm the users " rights and duties, including the mode of using account, the limit of accessing resource, the application of password, the building of backup ; confirm the administrators " right and duties, including physical safety, system configuration, account configuration and usufruct, password management, audit and control, backup and individual intimity ; run - of - mill measure of security defence, including access control, symbol and identification, integrality control, password technique, firewall system, audit and resumption, safety of operating system, safety of database system, defence of computers " virus and resisting - deny protocol. in the end, the article offers the strategies of disposing the safety - accident and analyse after ithow. to report it, how to solve it in phase, and how to avoid it happening again. in a word, the article presents a holistic resolvent about keeping away the information system ' s security, and supplies a essential frame for its configuration, management and application

    然後,對系統可能受到的威脅,包括非授權訪問、信息泄漏、拒絕服務和內部缺陷等進行分析,並提出了相應的控制策略:確定用戶的權力和責任,包括帳戶使用方式、資源訪問權限、口令應用以及建立備份等;確定系統管理員的權力和責任,包括物理安全、系統配置、帳戶設置及使用權限、口令管理、審計和監控、備份以及個人私等方面;一般性的安全防護措施:存取控制、標識和認證、完整性控制、密碼技術、防火墻系統、審計和恢復、操作系統安全、數據庫系統安全、計算病毒防護和抗抵賴協議等。最後,對事故處理和事後分析提供策略,如何報告安全事故,如何協調解決安全事故,如何避免安全事故再次發。總之,本文對信息系統安全防範工作給出一個整的解決方案,為其在配置、管理和應用方面提供了基本的框架。
  6. Cultural character aesthetics induces the notion of " you - i " relationship from the fusion of chinese and western arts, which not only provides a steady ideaistic foundation for the uniformity of ontology and originatology in the philosophy and aesthetics relationship, but also reveals the most ambiguous generating mechanism in all kinds of aesthetic activities and artistic creativities

    摘要文化人格美學從中西璧合的背景上拈出「我你」關系概念,不僅使哲學美學上的關系一般獲得了本論與本源論相統一的堅實思想基礎,還深刻地揭示出一切審美活動和藝術創造最秘的發制。
  7. Abstract : the hidden perils and troubles of safety existing in the interlocking circuit between the tipper in the raw material area and the railway signal system in wisco have been analyzed one by one and causes to their occurrence found out and the technological theory and counter measures to solve those problems comprehensively expounded and better working performance and reliability on the improved interlocking circuit achieved

    文摘:針對武鋼原料區原翻車與鐵路信號聯鎖電路存在的安全患和缺陷,一個一個地進行剖析,找出它們產的根源,全面系統地論述了解決這些問題的專業技術理論及其具的改進措施,使改進后的翻車與鐵路信號聯鎖電路性能良好、工作可靠。
  8. Through discussion of scenarios that are derived from current real life cases, they can see for themselves and gain insights on the hidden risks and their consequences, and appreciate how the force s shared values can help anchor them on the right track.

    透過討論取材自現實活個案中的情節,他們可以身歷其境,洞悉藏的危及其後果,並會到警隊價值觀怎樣可以幫助他們堅守正軌。
  9. Taoism provides ontological foundation for chinese ethics and therefore, makes up for the lack of noumenon in confucian moral philosophy ; taoist seclusiveness provides a withdrawal mechanism for the ethics of entering the world so that it is possible to build a flexible base for living ; taoism provides a series of life wisdom to sublimate life and ethical conflicts besides confucian ethics

    道家為中國倫理提供本論基礎,彌補了儒家道德哲學系中本缺失的不足;道家的世避世為入世的倫理提供了一個退出制,使富有彈性的安身立命基地的建構成為可能;道家在儒家的人倫原理之外提供了一套揚棄人和人倫矛盾的人智慧。
  10. In this paper, chroma dc coefficients are selected as the carrier data because chroma dc coefficients are robust. also, alterable steps are used to select one part of the coefficients, so the watermark is imperceptible ; before watermark embedding, the watermark is divided into many parts, every part is individually embedded into one gop of the video, even if a gop is destroyed, the watermark can be extracted correctly, this methods promotes the robustness of the watermark ; in addition, in order to promote the security of the watermark, the user ' s id and password are used to generate chaos sequence by the chaos system which is created in this paper, later, watermark is mixed by the chaos sequence. also, the embedding position of the watermark bit is modified by one chaos sequence, so, unauthorized person can not extract or remove the watermark, since the embedding position is unknown

    本文認為,色度dc系數是魯棒性非常好的參數,因而選擇色度dc系數作為水印信息載,同時,採用可變的步長選擇部分系數,保證了水印的形性;在嵌入水印時,本文採用水印信息「網格劃分」 、各子塊獨立嵌入視頻的方案,由於水印信息子塊是相對獨立的嵌入視頻中的每一相對獨立的圖組當中,即使某一圖組收到一定破壞,也能夠恢復水印信息,使水印的健壯性得到提高;此外,為了提高水印信息的安全性,在嵌入水印信息時,根據用戶輸入的id號和密碼,利用本文構造的混沌系統產的混沌序列對水印信息進行變換,同時,對每一水印信息比特的嵌入位置也採用了偽隨序列進行調整,這樣,未授權用戶不能提取水印信息,也難以擦除其中的水印信息,因為嵌入的位置是未知的。
  11. After expounding vr concept and its characters, the necessity and rationality of vr existence and its application in cad / cam, several other aspects are studied : first, the three kinds of stereoscopic display theory are set forth and the research is focused on the theory which is based on parallax and discussed from the aspects such as the physical basis of the third dimension production, the influencing factors of third dimension, the theory and arithmetic of drawing stereoscopic figures etc ; second, the difference among vr, other interaction methods and vr ' s status are studied from the perspective of human computer interaction development, the cognitive psychology model of vr interaction is analyzed and a classification study on vr is done according to different operation missions and metaphors ; third, the concept of virtual design is given out based on the research on its other concepts, then the difference among vr, cad and the realization of virtual design are studied

    在闡述虛擬現實的基本概念與特性、存在的必要性與合理性,以及在cad / cam方面的應用的基礎上,本文深入研究了: 1 .虛擬現實的三種立顯示原理,著重於基於視差方式的立顯示,從以下幾個方面進行了多角度的探討:產感的理基礎,立感影響因素,立圖繪制原理與演算法等。 2 .虛擬現實的交互原理,從人交互的發展角度研究了虛擬現實與其它交互方式的異同以及它所處的地位,分析了虛擬現實交互的認知心理學模型,並按作用於對象的任務不同和交互喻方式的不同對虛擬現實的交互方式進行了分類研究。 3 .虛擬設計,在研究虛擬設計的各種定義方式的基礎上定義了本文中虛擬設計的概念,研究了它相對于傳統cad的不同之處,以及虛擬設計的實現規劃。
  12. By this way the mechanism of cooperation within each group and the competition among groups would come into reality, so the passive effect of " label effect " would be decreased. to the ranking of teaching goals, the paper insist on the stimulating principals. during the teaching process, it is important to integrate individual teaching, group teaching and collective teaching according to different teaching goals, tasks and student ' s features. besides the article summarizes the steps of effiently organizing the teaching activity to make the whole teaching system function best

    在主分層中實行顯性分組,性分層,形成組內合作,組間競爭的運行制,減少「標簽效應」的負面影響;在教學目標分層中提出目標的激勵性原則;在教學過程中,根據教學目標、任務和學認知特點的不同,把課堂的主渠道與課外的輔助延伸相結合,將個別輔導、分組教學、集教學等進行多元化的優化組合,力爭使課堂教學效果最佳。
  13. Answering one of the oldest questions in human physiology, researchers at dana - farber cancer institute hae discoered why the body ' s immune system - perpetually on guard against foreign microbes like bacteria - - doesn ' t attack tissues in the small intestine that harbor millions of bacteria cells

    2007年1月9日戴納.法伯癌癥研究所的研究人員對人類理學的最古老問題之一作出了回答,他們解釋了終身保持對外來微物的入侵起保衛作用的免疫系統為什麼不攻擊居了數以百萬計的細菌的小腸組織。
  14. In the process of building and using the mass concrete structures, because of the effect of out - side condition and themselves, some faults will form in the structure, these faults will effect the bearing capability and endurance using nondestructive testing method to test the concrete ' s quality and diagnose its healthy, which has the significant sense in assessing the safety stability and research of the administering diseases this dissertation mostly researched the testing methods in the mass concrete structure, discussed the principles, methods, features, sphere of application of the ultrasonic testing in the mass concrete structure with faults, used dynamic fem to simulate the testing process, discussed when the concrete structure with cracks is under the effect of the pulse, how the elastic waves propagate and what are their changing feature, researched the principles of the first - arriving waves " phase when the cracks " depths are not same, obtained the relation between the inversion point and the cracks " depth, which has the direction sense in the application of projects, the second part of this dissertation is ct, which used the ultrasonic wave running through the tested - substance to get arriving - time of the ultrasonic wave, then inverse the image this dissertation drawed one ct program which can well present the different little cells " ultrasonic wave velocity profiles of the substance, thereby to diagnose the quality of the part of the tested - substance, ct has the better using foreground.

    在混凝土結構的施工及使用過程中,由於受其自身及外界各種因素的影響,常常會產一些缺陷,對結構物的承載能力和耐久性造成嚴重影響,採用無損檢測技術進行質量檢測和健康診斷,這對混凝土結構開展安全、穩定性評估以及病害患治理研究具有重要意義。本論文主要針對大積混凝土結構缺陷的檢測方法展開研究工作,重點討論了超聲波法檢測混凝土結構裂縫的基本原理和方法及其特點、適用范圍,運用動力有限元數值模擬其檢測過程,探討了有裂縫缺陷的混凝土結構在脈沖荷載作用下彈性波的傳播及其變化特徵,研究了不同裂縫深度下首波相位變化規律,得出了反轉臨界點與裂縫深度之間的關系,這對實際工程應用具有指導意義。聲波ct是一種新的無損檢測技術,它是利用聲波穿透被檢測獲取聲波接收時間,來進行計算反演成像的技術。
  15. Civil air defense alarm system was a system to dispense antiaircraft alarm sig - nal, hand hostile air attack informational communication to urbanite at wartime. it is a particular informational communication system of the civil air defense depart - ment, and can not be taken place. at the development trend of digitaliza - tion, unitization, integration of civil air defense communication, the civil air defense alarm system is developing too, for adaptation to the require of both future war and peaceful dual, and enhancing civil air defense communication system ' s directing automation. in recent years, development of different kinds of communication technology infuses new clearly energy into communication, especially spread spectrum communication, because of its strongly interference - free feature, invisibility best, realizable code division multiple access and antimultipath wane and so on merit, gets extensive use at wireless region ; the corresponding spread spectrum chips emerge as the times and get boom, which provides advantag e to realization of the circuit of spread spectrum communication. at the same time, in company with the advance of electronics level, the single chip microcomputer has a great development, world renowned chip manufacturer pushout respective products one after another, the kinds of which are too many to statiste

    在人防通信的數字化、一化、綜合化必然的發展趨勢下,人防警報系統也不斷發展,以適應未來戰爭和和平時期的雙重需要,提高人防通信系統指揮自動化。近年來,各種通信技術的發展給通信注入了活力,擴頻通信更因其抗干擾能力強、蔽性好、可實現碼分多址和抗多徑衰落等優點在無線領域得到了廣泛應用;其相應擴頻處理晶元應運而並得到迅速發展,這為擴頻通信的電路實現提供便利。同時隨著微電子工藝水平的提高,單片微型計算有了飛躍發展,世界上著名的集成電路晶元製造商紛紛推出各自的產品,單片型號之多,已達到難以統計的地步。
  16. Based on the exploration of lending pricing behaviors of banks during the historic process of the interest rate system reform, the paper mainly discusses the genesis mechanism of lending price and the interrelated implicit interest rate under the condition of financial regulation, analyses the external and internal factors which influence the lending pricing decision - making process of the microeconomic bodies ( banks and enterprises ). and based on the contrast of the lending pricing modes which are popular at home and abroad now, the paper designs a lending pricing model of compound interest rate, which can be applied to the market - oriented interest rate circumstance

    本文將銀行的貸款定價行為置於利率制變革的歷史進程中加以考察,重點討論了金融管制條件下貸款價格的制及與此相關的性利率,分析了影響微觀經濟主(銀行和企業)貸款定價決策的內外部因素,並在對比國內外當前普遍採用的貸款定價模式的基礎上,設計了適用於利率市場化環境的貸款復利定價模型。
  17. And then it lucubrates the system actuality of modern urban base establishment construct, points out the huge demand of financing thought civilization and the great abuse of financing system to base establish construction, such as the lack of transforming private money to it, the larger debt risk among the ulterior local government obligation

    然後深入研究中國城市基礎設施建設融資制現狀,指出我國的城市化將產龐大的資金需求,但是現行的基礎建設投融資制存在重大的弊端,如缺乏引導社會資本投入城市基礎設施建設的制,蔽的地方政府債務系蘊含較大風險等等。
  18. Based on the mental space theory provided by fauconnier, this paper is an exploration of the working mechanism of the generation and comprehension of oxymoron

    本文試圖從心理空間理論入手來探尋反比的成及理解制,旨在說明反比同喻一樣在某種程度上的人類認知心理和驗的結果。
  19. This research starts from layered class moral education system to research on hidden moral education field, inquiring into power structures, social relationships, systematic norms, management environment, teaching processes, hidden moral education factors of evaluation for management and hidden influences to a student ' s morality in a class. i further advance the theory " culture management " and " ambiguity management " hi hidden moral education of a class and also clearly bring to light the view that the proper melting between rational management methods of manifest moral education and culture management methods and ambiguity management methods of hidden moral education is the developing tendency

    本論文的研究就從具有層次性的班級德育系統的整著眼,從性德育場入手,探討班級組織權力結構、社會關系、制度規范、管理環境、教學過程、管理評價中存在的性德育因素及其對學品德的性影響,提出對班級性德育實行「文化管理」和「模糊管理」的理論構想,明確闡述顯性德育的理性管理方式與性德育的文化管理方式、模糊管理方式之間的有融合是現代班級德育管理的發展趨向的觀點。
  20. According to this hypothesis, the author analyses the ability of company and the knowledge about market, then combines the two factors into the strategic analysis model of acer company. based on the model, the author divides the formulate process of international business strategy of acer company into three stages : first of all, the management fellow of acer company must know the elements, which hinder the development of the company, and set up the effective optional process to design the international business strategy after having known the former. next, they could use the combination of the ability of company and the knowledge about market

    於是,作者對企業能力和市場知識做了具化分析,以此為基礎,將企業能力與市場知識進行組合,產了宏?公司的戰略分析模式圖,聯系此戰略模式圖對宏?公司國際化戰略的制定分為三個步驟進行分析:首先,充分認識阻礙企業發展的蔽要素,然後通過建立有效選擇程序設計企業國際化經營戰略;其次,充分利用企業能力和市場知識的戰略組合;而後,將組織規劃與會進行有結合制定出合適的國際化經營戰略。
分享友人