隱目 的英文怎麼說

中文拼音 [yǐn]
隱目 英文
cryptostomata
  • : Ⅰ動詞(隱瞞; 隱藏) hide; conceal Ⅱ形容詞1 (隱藏不露) hidden from view; concealed 2 (潛伏的; ...
  • : Ⅰ名詞1 (眼睛) eye 2 (大項中再分的小項) item 3 [生物學] (把同一綱的生物按彼此相似的特徵分為幾...
  1. As an accidental species, big salamander andias davidians ( amphibia vrodtle cryptobrahidae andias ) is the biggest amphibian in the world

    大鯢( andiasdavidianus )俗稱娃娃魚,屬兩棲綱,有尾鰓鯢科,是世界上最大的珍稀兩棲動物和國家二級保護動物。
  2. The cherishing and training of some trees ; the cautious pruning of others ; the nice distribution of flowers and plants of tender and graceful foliage ; the introduction of a green slope of velvet turf ; the partial opening to a peep of blue distance, or silver gleam of water ; ? all these are managed with a delicate tact, a pervading yet quiet assiduity, like the magic touchings with which a painter finishes up a favorite picture

    欹斜之樹須正,修枝去葉,刪繁就簡,所得可謂奉若至寶;枝葉婆娑,花葉相映,令人賞心悅;坡草青青,宛若天鵝絨地毯,光滑細膩;茂林之中偶露一隙,遠處藍天約可見,或現一池春水,碧波蕩漾? ?凡此種種,皆為人工造化,潤物無聲,猶如畫師當其畫稿殺青之際得一神來之筆,渾然天成。
  3. In algorithms, classification algorithms are divided into two cases : one for known statistical distribution model and the other for unknown statistical distribution model. four classification algorithms, the bata - prime statistic model fusing quadratic gamma classifier, based on sar image rcs reconstruction and space position mode, on the mixed double hint layers rbfn ( mdhrbfn ) model and on the self - adapt fuzzy rbfn ( afrbfn ) model, are derived. the problems, including how to further improving the class ratio of the bayes decision, decreasing the dependence on the statistical model and directly providing the adapted algorithm with samples, are solved

    提出了基於徑向基函數神經網路( rbfn )的雙層混合網路( mdhrbfn )模型,解決了標準神經網路在具體sar圖像地物分類中分類類別數不夠和分類精度差的問題;提出了基於模糊推理系統的自適應模糊rbfn分類( afrbfn )模型,兼顧通用性與精確性,增強人機交互能力,進一步提高了演算法分類率。
  4. Staphylinidae is one of the largest family in coleoptera, they occupy a wide variety of habitats and have a wide range of food - habits. they are essentially carnivorous ( insect feeder ), but some groups have become evolved as mycophagous, coprophagous, coprophagous, carpophagous, pollinophagous and so on. some species have adapted to a parasitism of mammals

    翅蟲是一類廣泛分佈於農田、森林和山區的鞘翅昆蟲,它們生境多樣,有的為肉食性種類,是捕食農林害蟲的重要天敵,也有藥用種類和衛生害蟲,還有取食動植物有機殘體、促進自然界物質循環、保持生態平衡的種類,與人類的關系密切,是一類不可忽視的自然資源。
  5. This contribution contains both the files that can be dropped in on a clean copy of osc2. 2m2 as well as instructions for manually applying this contribution for those who have already tinkered with the original files

    這個外掛可以讓你在不輸入商品價格時,藏價格欄位及馬上買的按鈕,用來取代前臺顯示為$ 0 . 00 ,當你的項是一項服務或純粹作為商品錄是非常好用的。
  6. The constant search for a more effective infantry weapon led in the 1990s to the concept of small - calibre high - explosive fragmentation grenade shells designed to burst over the heads of their targets, thereby permitting the attack of troops in defilade, ie hiding behind cover

    源於上世紀八十年代的對更加有效的步兵武器的不斷研究得出了小口徑高爆破片手榴彈的外殼設計用於殺傷標頭部的概念,從而形成了對藏於工事及掩體的部隊進行攻擊的手段。
  7. A language user can exploit these features to implement pragmatic strategies via conversational implicatures or indirect language generated from the choice and use of deictic expressions to achieve his communicative goal

    說話人可以藉助這一性質實施語用策略,即利用指示詞語產生的會話含義達到交際的。
  8. The circumstance of bilk of your issue out of the question, bilk is to point to with dummy fact or the method that hide the fact, it is a purpose with detinue other belongings, executive a few behavior, state from you in light of, just get him due worth just, not be what bilk behavior

    你的問題談不到詐騙的情況,詐騙是指以虛構事實或瞞真相的方法,以非法佔有他人財產為的,實施的一些行為,從你表述來看,只是領自己應得的財產而已,不是什麼詐騙行為。
  9. With the rapidly development of computer network technology and the widely use of network technology in every walk of life, people transmit data through computer network more and more frequently, including all kinds of secret information ( for example, military secret ; bussiness secret ; personal private information ). today, as a result of poor security of our network system, we can not prevent the transmittied information from stealing and modifying unlawful. thus, the computer network technology is applied to our daily life restrictedly. recently, many network applications with voip ( for example msn messenger ; dialpad ; distributed multipoint multimedia conferences ) take no measures to encrypt their data

    隨著計算機網路技術的迅猛發展和網路技術在各行各業中的廣泛應用,人們通過計算機網路傳輸數據日益增加,其中包含了各種機密信息(例如軍事機密信息、商業機密信息、個人私信息等) 。由於前的網路系統缺乏足夠的安全性,不能有效防止網路上所傳輸的信息被非法竊取和修改,因而極大地限制了計算機網路技術在日常工作中的應用。當前,基於voip技術的各種網路應用,如msnmessenger , dialpad ,以及一些分散式多媒體會議系統,竟然未採取任何加密措施
  10. " at present, most hong kong people s perception and approach towards privacy is still fairly egocentric. after all, it is a relatively new law

    前大部份香港人對私的觀念和出發點仍是偏向以自我為中心,畢竟,這是一個較新的法例。
  11. The task at hand center on using the technology for beneficial purposes, while at the same time preventing intrusio of privacy and use of the electronic highway for deceitful purposes

    手頭的任務主要是利用技術達到有意的的,同時,防止侵犯私或者出於欺騙的的利用電子高速路。
  12. The task at hand center on using the technology for beneficial purposes, while at the same time preventing intrusions of privacy and use of the electronic highway for deceitful purposes

    手頭的任務主要是利用技術達到有意的的,同時,防止侵犯私或者出於欺騙的的利用電子高速路。
  13. Rthk held a press conference together with the office of the privacy commissioner of personal data yesterday ( 10 may ), announcing details of the programme. attending guests included stephen lau, privacy commissioner for personal data, cheung man - sun, controller, etv of rthk, artistes such as nicolas tse, chiu wun, lee tze - hung, lo hing - fai, kwok siu - wan and au sin - yee

    香港電臺電視部昨日(五月十日)聯同個人資料私專員公署舉行記者會,公布節事件簿的詳情,出席嘉賓包括個人資料私專員劉嘉敏、香港電臺教育電視臺長張文新、演藝人士謝霆鋒、焦媛、李子雄、盧慶輝、郭少蕓及區倩怡。
  14. Wang bo andy lau and wang li rene liu should have made the perfect bonnie and clyde : the former a seasoned con mean and master pickpocket from hong kong, the latter a grittier femme fatale from taiwan

    以偷竊及詐騙為生的扒手情侶王薄劉德華和王麗劉若英,因王麗厭倦此種生活意欲退,兩人因此反
  15. 1, cut over a head : bring up to combine the applied technique most and early for the toshiba, and is also current usage to is the most extensive. he adopts a laser head, and prepare the different slice of 2 focal distances the sony for cut over, passing the conversion differently focusing the coming respectively reading dvd with cd, its shape looking with double head to resemble respectively, because can see two sets focuse the, laser head to interiorly can t see. he reads the signal quantity is higher, but because of want the conversioning to focuse the, therefore the cost belong to the inside and so forth of level, and recognize the dish speed slow, same the implicit mechanical trouble rate is high

    1切換雙鏡頭:為toshiba最早提出並應用的技術,也是前使用最廣泛的。他採用一個激光頭,分別準備2個焦距不同的鏡片切換,通過轉換不同的聚焦鏡來分別讀取dvd和cd ,它的外形看起來與雙頭的sony相似,因為只能看到二組聚焦鏡,激光頭在內部看不見。他讀取信號質量較高,但由於要轉換聚焦鏡,所以成本屬于中等水平,認盤速度較慢,同樣含的機械故障率比較高。
  16. Once they ve tossed austin into the disco fever of 1975 where he s sent to rescue his father, gamely played by michael caine, myers and director jay roach seem vaguely adrift with old and new characters, including verne troyer s mini - me and pop star beyonc knowles as pam grier - ish blaxpo - babe foxxy cleopatra

    回到1975年,包話事見到老豆,重遇舊情人發電妹,合力再戰邪惡,而藏多年的包話事身世之謎更有點眉。包話事使出無敵變身術,一時相撲手一時油脂飛,實行玩串party
  17. Implicit in this behaviour for me is the notion that what they are moving between are not so much programmes, as fragments of programmes ? gobbets of information or entertainment, and, as such, incomplete messages or experiences

    對我來說,含在這一行為里的是這么回事,與其說他們在換節看,不如說是穿梭在一些節片段里;這是些零星信息和娛樂節,同樣還有不完整的消息和經驗。
  18. Hawk both feet stress one number of people each, number of people eyebrow is it erect to take place or after the vertical brain, this pattern, theme any meaning, is it study to worth also, to chisel engineer to be very much ingenious even jade wearing this, hawk eye, body, tail with latent to get up pair collude open line tick outline, feather is it adorn to carve with overcast line, seem vivid

    雄鷹氣宇不凡,雙眼瞪圓,昂首引頸,展翅欲飛,頭上的肉冠極長,一直披到翼。鷹雙腳各抓一個人頭,人頭眉發豎立或垂直腦后,這一圖案,主題是什麼涵義,還值得研究,此玉佩的琢工也很巧妙,鷹身尾用起雙勾陽線勾出輪廓,羽毛用陰線刻飾,顯得生動。
  19. This paper has studied the development of setting & model of the overthrust, which is distributed over the plane & section, and its belting character in the northern margin region of chaidamu basin, and described the character of the main overthrust sheet belt and lower strain area in great details. moreover, it has pointed out a best target for oil / gas exploration on the imbricate fan belt and hidden overthrust forward belt through surveying the developing evolution model and its formation mechanism of the overthrust in the field and structure inversion indoor 6figs., 8refs

    研究了柴北緣地區逆沖推覆構造的發育背景、發育模式,平面、剖面展布特徵及其分帶性,並對主幹逆沖斷裂帶及其間的推覆體帶、逆沖席帶和低應變區的特徵進行了詳細描述,同時通過野外觀察和室內構造反演來研究推覆構造的發展演變模式及其形成機理,指出其逆沖疊瓦扇帶和伏逆沖前緣帶是最有利的油氣勘探標.圖6 ,參8
  20. The substantial purpose and value behind the norm doctrine meet the requirement of substantial fairness

    規范說背後隱目著實體的和價值,符合實體公正的要求。
分享友人