個別敘述 的英文怎麼說

中文拼音 [biéshù]
個別敘述 英文
recount
  • : 個Ⅰ量詞1 (用於沒有專用量詞的名詞) : 一個理想 an ideal; 兩個月 two months; 三個梨 three pears2 ...
  • : 別動詞[方言] (改變) change (sb. 's opinion)
  • : Ⅰ動詞1 (說; 談) talk; chat 2 (記述; 敘說) narrate; recount; relate3 (評定等級、次第) assess...
  • : Ⅰ動詞(陳說; 敘述) state; relate; narrate Ⅱ名詞(姓氏) a surname
  • 個別 : 1 (單個; 各個) individual; separately; specific 2 (極少數; 少有) very few; one or two; rare; ...
  1. Then this paper concerns about the network packet intercepting technology of linux os and gives a thoroughly overview of network hacking methods and some application protocol criterion, including http, ftp, telnet, nntp, pop3, smtp etc. then the system design scheme of the transparent proxy has been discussed, this system can be divided to 4 modules below : establishment of transparent charnel, implement of proxy service, gui configuration and management application, accessory filter functions ( such as url filter, command filter and logger etc ). we explain key techniques in all 4 main parts of this system, define the interfaces of each module, what is more the main data structures and software implements codes are all illustrated

    首先,論文陳了防火墻的相關技術基礎,分析了透明代理作為一種先進易用的防火墻技術的原理,闡了linux操作系統網路數據包攔截技術和http 、 ftp 、 telnet 、 nntp 、 pop3 、 smtp等應用層協議的協議規范和具體的工作流程。接著了本透明代理服務器的系統總體設計方案,將系統分為以下幾部分:透明通道建立、代理服務實現、 gui配置管理程序以及過濾功能(如url過濾、命令過濾和日誌審計等) 。論文然後分介紹各關鍵部分的具體實現要點,解釋了相互間的介面關系,列出了主要數據結構和實現流程。
  2. We describe the clinical and radiologic presentation of the tumor in a 29 - year - old woman and discuss the histogenesis, imaging appearance, and differential diagnosis

    我們29歲女性病患的臨床和影像表現,並討論組織學來源、影像特徵與?診斷。
  3. Secondly, the course of transformation in china ' s grass - root shows that political integration by power exclusively uses national power as the main measure of political integration, that the state executes in a sovereignty capacity a simplex " reflexive monitoring " to societies within the " national boundaries ". in order to secure the national power to arrive quickly and effectively at each would - be integrated stage, the state eliminates those tanglesome characteristics of all the integration objects, and regard them as indistinctive abstract existence wanting technical treatment. thus, integration of this kind holds the political community externally, rather than internally and organically

    第二,以中國基層社會為場景的社會轉型歷程表明,國家權力支配型的政治整合排他性地將國家權力作為政治整合的主導手段,國家以主權者的身份對處于「國界」中的社會實施一元化的「反思性監控」 ,並為了保證國家權力能夠迅捷有效地抵達有待整合的各層面,而消除了一切整合對象的「雜多」性,將之視為有待技術化處理的無差的抽象存在,致使這種整合形式只能維系政治共同體的外在統一,而無法實現作為「共同體」應有之義的內在凝聚和有機團結。
  4. This mode of narrative adds in some way to the traditional bildungsroman : the differences between gender and narration, the restoration of historical actuality by " constructive imagination " as well as the promotion from social concern for the " individual " to individual ' s care of the self in bildungsromans, especially from the perspective of gender, those characters under assumptions and masks in previous literary works will be presented in a realistic manner

    這一形態對傳統意義上的成長小說具有某種意義上的增值:性事的差異性、 「建構想象力」對成長歷史真相的「還原」 ,以及成長小說對「人」由社會關懷推進到體自我的關懷,尤其是在性視閾下,以往文學作品中那些臆斷的和面具下的人物得以真實呈現。
  5. Neural network control is an important mode of intelligent control, and it is widely used in branches of control science, first, the architecture and the learning rule ( error back propagation algorithm ) of multiplayered neural network which is widely used in control system are presentedo especially, the paper refers to the architecture of diagonal recurrent neural network and its learning algorithm - - - - - recurrent prediction error algorithm because of its faster convergence with low computing costo next, before introducing the neural network control to the double close loop dc driver system, the controllers of current and velocity loop are designed using engineering design approach after analysis of the system, simulation models of the system are created

    神經網路控制是智能控制的重要方式之一,它廣泛應用於自動控制學科各領域。本文首先了控制系統中常用的多層前饋網路結構及演算法( bp演算法) ,特提及了能夠較好描系統動態性能的對角遞歸神經網路和在用遞推預報誤差演算法訓練drnn時取得了較快的收斂速度。其次,應用工程方法分析設計了tf - 1350糖分離機的電流、轉速雙閉環直流調速系統的控制器,作為引入神經網路控制的設計基礎,並建立了系統的模擬模型。
  6. This thesis explains the necessity of the character recognition technology of the computer at first, describe the meaning in which the handwritten numeral discerns ; pretreatment technology of handwritten numeral recognition, including two value, line segmentation, word segmentation smooth, removing noising, standardization and thinning are discussed two value concretely discusses whole threshold value, some threshold value, dynamic threshold value and utilize space information to carry on threshold, which are several kinds of common method of choosing threshold value, especially utilize space information to carry on threshold value is describe in detail ; adopting to the foundation of thinning based on mathematics morphology, thinning algorithm of serials same and thinning algorithm of protecting shape are discussed ; afterwards, according to principle ' s diagram of the on - line character recognition, by analyzing the structure feature of the handwritten numeral, this thesis has proposed the online recognition te chnology of the free handwritten numeral based on the stroke feature and the online recognition technology of the free handwritten numeral based on the multistage classifying device. detail narrated noise removing, stroke characteristic definition and discernment, distance criterion of whole word match ; then under the foundation of handwritten numeral segmentation, off - line handwritten numeral recognition is researched. especially minimum distance classifying device, tree classifying device and adaptive resonance ( art ) network classifying device is discussed at the same time, believes degree analyses are introduced to integrate a lot of classifying devices ; at the end, the typical application of the handwritten numeral recognition was briefly narrated, its application in extensive data statistics, financial affairs, tax, finance and mail sorting have been explored

    二值化時對整體閾值二值化、局部閾值二值化、動態閾值二值化和利用空間信息進行閾值選取幾種常用的閾值選取方法進行討論,特對利用空間信息進行閾值選取進行了詳細論;在對通過對基於數學形態學的細化的基礎上,討論序貫同倫形態細化演算法和保形的快速形態細化演算法;然後依據聯機字元識原理框圖,分析了手寫數字的結構特點,提出了基於筆劃特徵的任意手寫數字在線識技術和基於多級分類器任意手寫數字在線識技術,對其中涉及的筆劃識前的噪聲處理、筆劃間特徵量的定義及識、整字匹配的距離準則進行了詳細;繼而在對手寫數字的分割的基礎下對脫機手寫數字識進行了研究,對基於最小距離分類器字元識、基於樹分類器的字元識、基於自適應共振( art )網路的字元識進行了詳細討論,並引入置信度分析將多分類器進行了混合集成;最後簡單闡了手寫數字識的典型應用,對其在大規模數據統計、財務、稅務、金融及郵件分揀中的應用進行了探索。
  7. The thesis includes a rough description on the transition of the army system in late qing, and then gets the separated statistics and analysis of the military generals basing on the regional distribution. such as general, perfect, the commander and the new army generals

    本文首先對晚清軍制的變遷做了一大致的,然後以晚清軍事將領的籍貫地理分佈為切入點,對晚清將軍、提督、總兵、團練和新軍將領的籍貫分作了統計和分析。
  8. Mr heathcliff having overheard the conversation, as well as i, smiled when he saw him go ; but immediately afterwards cast a look of singular aversion on the flippant pair, who remained chattering in the doorway : the boy finding animation enough while discussing hareton s faults and deficiencies, and relating anecdotes of his goings - on ; and the girl relishing his pert and spiteful sayings, without considering the ill nature they evinced : but i began to dislike, more than to compassionate linton, and to excuse his father, in some measure, for holding him cheap

    希刺克厲夫和我一樣,也聽見了這番話,他看見他走開就微笑了可是馬上又用特嫌惡的眼光向這輕薄的一對瞅了一眼,他們還呆在門口瞎扯著這男孩子一討論到哈里頓的錯誤和缺點,並且他的怪舉動和趣聞時,他的精神可就來了而這小姑娘也愛聽他的無禮刻薄的話,並不想想這些話中所表現的惡意。
  9. According to the theory of differential inequality and the comparision theorem, we will establish some new and more practical criteria of the extinction, uniform persistence and globally asymptotical stability for partial species of the above system. since the narrate of the main theorem is long, we omit it. to see section 2 of chapter 3 for details

    通過利用微分不等式理論,比較定理及構造適當的lyapunov函數,得到了判種群持續生存、滅絕和全局漸近穩定性的三定理,這便是第三章的主要內容,由於定理較長,這里不作,詳見第三章第二節。
  10. On waking in the morning, she told the rostovs and all her acquaintances the details of count bezuhovs death

    翌日清晨醒來,她向羅斯托夫家裡人和各熟人祖霍夫伯爵辭世的詳細情節。
  11. In this paper, the writer explores to make it clear for people to understand the criminal offence in conspiracy by untypical underworld society in four aspects including the conception and basic features of the untypical underworld society, the component elements of the criminal offence in conspiracy by untypical underworld society, the affirmation of such criminal offence and the penalty upon it, in the light of theoretical research and positive analysis. the conception of the untypical underworld society in china is summarized in comparison with the notion of " society ", " untypical underworld society " and the " features " of the untypical underworld society in china. the writer elaborates, when describing the features of the untypical underworld society, such features as " highly - organized ", that " there exists a sphere of influence in a certain district, or in a certain trade or profession, and illegal control is executed within the sphere of influence ", " with actual economic strength in pursuit of economic benefits ", " political infiltration into governmental organs with antagonism ", " decaying culture " and " the compatibility in the measures of criminal offence "

    在論黑社會性質組織的概念時,結合「社會" 、 「黑社會」的特點和我國黑社會性質組織中「性質」的來源,最後概括出我國黑社會性質組織的概念;在論黑社會性質組織的特徵時,本文從黑社會性質組織所具有的「比較高的組織化程度」 、 「在某一地區或某些行業具有一定的勢力范圍,並在該范圍內形成非法控制」 、 「以追求經濟利益為主要目的,具有一定的經濟實力」 、 「對政府的滲透,政治上的對抗性」 、 「文化上的腐朽性」 、 「犯罪手段上的兼并性」等方面進行闡,特是在「對政府的滲透,政治上的對抗性」採用大篇幅論,並提出國家工作人員的「保護傘」既包括「包庇」又包括「縱容」 ,特是在「縱容」方面提出了一些新的觀點;在論黑社會性質組織犯罪構成特徵時,從犯罪的主體、侵害的客體、犯罪的客觀方面、主觀方面進行了詳細;在論黑社會性質組織犯罪的認定時,主要從黑社會性質組織與相關范疇的界限、黑社會性質組織罪的司法認定兩方面來進行的;在論黑社會性質組織犯罪的刑事處罰時,提出了對各種組織、領導、參加黑社會性質組織行為的處罰原則,並對提高該罪的量刑幅度及增設財產刑提出了立法建議。
  12. The first chapter states out three crucial opinions of mst theory : action - ontology, mechanism of control, and concept and classification of mst. the second chapter talks about the evolutionary opinions of turchin by introducing general evolution theories of k. popper and d. t. cambell. it also explains five stages of life ' s evolution which turchin used mst to describe : stage of simple reflex, stage of complex reflex, stage of high animal, stage of human being, and stage of social integration

    緊接著從四主體部分來闡釋這一理論:第一部分詳細了元系統躍遷理論的三核心要點,分是,把世界的終極實在看作是「行動」的行動本體論、多層次的控制機制論以及元系統躍遷的概念與分類;第二部分通過介紹波普爾和坎貝爾的廣義進化論思想來闡明圖琴關于進化的基本觀點,而重點在於解釋他用元系統躍遷描的生命進化的五階段:簡單反射階段、復雜反射階段、高級動物階段、人的階段以及社會的整合階段;第三部分通過把復雜性看作是系統的一種不可還原的性質,從而把復雜性與系統層次突現聯系起來。
  13. Also, the article deals with the official crime by juridical person and puts forwards the new proposals. the forth part discusses the relations between the crime and penalty. first, it outlines the basic principle of legality and balance between the crime and penalty

    首先,文章概要了罪刑關系原理及其兩基本原則? ?罪刑法定原則和罪刑均衡原則;然後,文章分對罪刑法定原則與我國職務犯罪立法的關系、罪刑均衡原則與我國職務犯罪立法的關系進行了研究。
  14. Therefore, this article takes the transformation of the joint management system as a clue, and elaborates separately by the progressives way about these questions : the development of the joint management system in the present situation and the issues of preserv ? tion and abolishment ; the issue of guarantee clause in the joint management ; the understanding of the behavior " what is the joint management nominally, was actually loan " in jurisprudence ; the issues of the behavior " what is the joint management nominally, was actually loan " in the regulations, which involves reciprocal loans between enterprises, in order to have a profound understandings about the dimensions of transformation of the joint management system and involved legal issues

    為此,本文以聯營制度的變革為線索,以遞進的方式對聯營制度發展現狀及存廢問題;聯營中的保底條款問題;明為聯營實為借貸行為在法理上的理解問題; 「明為聯營,實為借貸」規定中涉及的企業間互相借貸問題分予以論,以求對聯營及其所涉及法律問題在制度變革層面上有一較深刻的認識。一、本文引言部分簡要地了本文所要研究的聯營和保底條款及企業間借貸問題的研究背景、研究現狀和研究意義,以明確本文的研究方向及學術價值。
  15. During one session, pathiranage recalled being moved to tears when thevanayagam, who has two children, ages 4 and 1, described the wretched conditions endured by some of the tamil children on the island nation

    派內芝回憶在一次會議中,當沙瓦納亞加,他有」兩孩子分是4和1歲,在其島國上的坦米爾孩童遭遇的悲慘事情時不禁被感動的落淚。
  16. No. 3, basing on the former two, what is brought forward in the article is that the narration language and the description language are divided into six basic groups ( function, construction, technology and culture circumstance, nature circumstance, decoration ) and two derivative groups ( metaphor and new words ) respectively and some correlative clusters belonging to every group. consequently, a primary framework of the architecture language is built on the foundation of the groups and the clusters and the particular laws and goals of the eight groups are emphasized respectively

    第三,在上觀點的支持下,論文提出將性語言和描繪性語言分分為功能,結構,技術和文化環境,自然環境,裝飾六大基本語群和新語言,隱喻兩衍生語群,及包含在每語群內的若干語簇,從而形成由語群,語簇體系共同支持的建築語言初步結構框架,並強調了語群各自特有的「規律性」與「目的性」 。
  17. The vulnerability evaluation procedure of hazus99 which is widely adopted in the united states and world wide is introduced in briefly. then the general technical frame of the first part is illuminated as follows : by means of the form of hazus99, the earthquake action is expressed by demand spectra and the capacity of buildings is described by capacity curve

    在此基礎上,本文了「吸收hazus99的表達形式,以需求譜來表達地震作用、抗力曲線表達結構的抗震能力,用需求譜和抗力曲線的交點確定的譜位移和各震害等級對應的譜位移均值和標準差一起,分計算建築物對應各震害等級的超越概率,獲得易損性曲線」的一套完整的技術思路。
  18. Three contents, which are the analysis of thermal structures, the analysis and design optimization of heat conduction, the design optimization of thermal structures, are summarized in this section

    接著回顧熱傳導結構耦合系統分析和優化設計的研究工作。分熱結構分析,熱傳導分析和優化設計及熱結構優化設計三方面的現狀。
  19. Multiple problems recorded on the same problem report ( as in a problem report form or screen ) shall be counted separately, unless in the customer ' s view, these problems are all related to the same manifestation of failure experienced by the customer

    多種多樣的問題記錄在相同的問題報告上時(當作一問題的報告形式或銀幕)應分計算,除非在顧客看來這些問題全部的與顧客經歷的失敗相同。
  20. In this paper we analyzed the structure, function and characteristics of the private office network, discussed the primary threats to the office network security and common attack methods, based on the p2dr model, we distributed the office network security policy across three layers : network layer, system layer and application layer. the security principle, implement solution and the relationship among these three layers were illustrated in this paper, including physical access control, logical access control, vpn, data encryption, authentication, authorization, audit, ids ( intrusion detection systems ), system leak test and anti - virus protection

    本文中將辦公網路的安全策略由下至上劃分為網路層、系統層和應用層三層次,分了各層次上的安全原則和實現方式,以及各層之間的相互關系,詳細介紹了物理控制、邏輯控制、 vpn與數據加密、用戶認證和授權、審計與入侵檢測、漏洞掃描及病毒防護等方面的策略和實現方式。
分享友人