標記所有文本 的英文怎麼說

中文拼音 [biāosuǒyǒuwénběn]
標記所有文本 英文
mark all text
  • : Ⅰ名詞1 [書面語] (樹梢) treetop; the tip of a tree2 (枝節或表面) symptom; outside appearance; ...
  • : Ⅰ動詞1 (把印象保持在腦子里) remember; bear in mind; commit to memory 2 (記錄; 記載;登記) writ...
  • : 有副詞[書面語] (表示整數之外再加零數): 30 有 5 thirty-five; 10 有 5年 fifteen years
  • : Ⅰ名詞1 (字) character; script; writing 2 (文字) language 3 (文章) literary composition; wri...
  • : i 名詞1 (草木的莖或根)stem or root of plants 2 (事物的根源)foundation; origin; basis 3 (本錢...
  • 標記 : (標志; 記號; 貨物標記) tab; sign; stamp; peg; label; mark; flag; blip; notation; fleck; track; ...
  • 文本 : text; version
  1. Displays all text between the tags in bold face

    將這兩個之間的加粗。
  2. Please be reminded that if you your indemnifier witness mark " copy " in the photocopies of the hkid cards submitted, the " copy " mark should be made across the image of the hkid card and the names in chinese and english, identity card number, date of birth and resident status symbols printed on the hkid cards should be legible and not obliterated from sight

    如你你的彌償人見證人在香港身分證影印上加上副字眼,該字眼應加在橫跨整個身分證的影像上,身分證影印需清晰顯示及不會遮蓋持證人的中如適用和英姓名身分證號碼出生日期及持證人居留身分
  3. At first, the text is segmented to words and converted to a sequence of part - of - speech tags ; then based on the pos tags sequence parameters and phrase - break distance information from training, markov model is used to get the most likely phrase break sequence

    首先,進行分詞,並轉換為一列由詞性組成的序列;然後使用馬爾可夫模型,利用人工注數據庫訓練詞語連接處詞性注序列的概率分佈和連接類型序列的距離信息,得到輸入的詞性序列對應的具最大似然概率的連接類型序列,最後利用后處理規則進行適當的糾錯。
  4. The basic thought of the csapfba algorithm is : the edge routers perform the state management per flow, and the edge routers differentiate between the marked flows and the non - marked flows, and the edge routers insert the relevant information into the packet header by using dynamic packet state ; the core routers divide the output link bandwidth into two parts in the light of the state information of the packet header by using class - based queueing, and the core routers allocate proportionally the bandwidth to the marked flows according to their service profiles and the current network load, and the core routers allocate the bandwidth to the non - marked flows according to the principle of max - min fairness, and the csapfba algorithm can adaptively dynamically adjust the bandwidth allocation between the marked flows and the non - marked flows

    在csfq演算法的基礎上,提出了一種核心無狀態的自適應的成比例公平帶寬分配csapfba ( core - statelessadaptiveproportionalfairbandwidthallocation )演算法。 csapfba演算法的基思想是:在邊界路由器完成基於每個流的狀態處理,將的流分成流和非流兩種類型,採用dps技術將關信息編碼進分組頭;在核心路由器根據分組頭中攜帶的狀態信息採用cbq策略,將輸出鏈路帶寬分成兩部分,對流根據當前的網路負荷按照服務規格成比例地分配帶寬,對非流按照最大最小公平性原則分配帶寬,並且能自適應地動態調整帶寬分配的比例。
  5. Toggles all previously marked hidden text sections between hidden and display states

    在隱藏和顯示狀態之間切換以前被為隱藏的部分。
  6. The table will write down all about the electronic records during their life period. the content noted in the table will be the only basis on original and reality " testing of electronic records ". the major task of the second levels is to build the tight filing rules, moreover, combined the " life cycle table ", to build the test system to assure the original and the reality of the information during filing ; the assignment of the third level is to build testing and restoring measures of the original and the reality. by maintaining the media of electronic archives or building information file of electronic archives etc, electronic archives can maintain their available ^ visuak understandable during their deadline ; meanwhile, to build the safe control of the system through the workers dispersed authorization and deterring skills, to formulate the standards of the protective system, such as the standard of the basic structure of united electronic records ^ electronic archives. all of this is important to protect the original and the reality of electronic records and electronic archives

    「生命周期表」錄的內容將作為電子件歸檔時檢驗原始性、真實性的唯一依據;電子件歸檔管理層中的主要任務是要建立起嚴密的歸檔制度,同時結合「件生命同期表」建立檢驗措施保證電子件在歸檔過程中信息內容的原始性、真實性;電子檔案保管層中主要任務是建立電子檔案數據原始性、真實性檢驗及原始數據恢復管理措施,通過對電子檔案載體的維護、建立電子檔案維護管理的信息檔等工作,確保在保管期限中的電子檔案保持其可用性、可存取性、可理解性:建立電子件與電子檔案原始性、真實性保護體系安全控制,通過對系統工作人員授權分散化、建立用戶識與認證技術等措施確保「保護體系」安全運行;加強「保護體系」涉及的準與規范的制定工作,如建立統一的歸檔電于件、電子檔案基結構等準對保護電子件、電子檔案信息原始性、真實性著重要意義。
  7. 1 all copyright and all other intellectual property rights in all text, images, sound, software, service marks, logos and other materials ( " the content " ) on the pages of the site are owned by itf and affiliated companies or are reproduced on the site with permission of the relevant rights owner

    的2 . 1版權和另外的知識產權權利,圖象,發出聲音,軟體,服務,這個地點的頁上的識語和另外的材料( 「內容」 )被itf擁並且加盟了公司或與相關權利主人的允許在這個地點上被復制。
  8. Abstract : biological invasions are a continuous feature of a non - equilibrium world, ever more so as a result of accidental and deliberate introductions by mankind. while many of these introductions are apparently harmless, others have significant consequences for organisms native to the invaded range, and entire communities may be affected. here we provide a survey of common models of range expansion, and outline the consequences these models have for patterns in genetic diversity and population structure. we describe how patterns of genetic diversity at a range of markers can be used to infer invasion routes, and to reveal the roles of selection and drift in shaping population genetic patterns that accompany range expansion. we summarise a growing range of population genetic techniques that allow large changes in population size ( bottlenecks and population expansions ) to be inferred over a range of timescales. finally, we illustrate some of the approaches described using data for a suite of invasions by oak gallwasps ( hymenoptera, cynipidae, cynipini ) in europe. we show that over timescales ranging from 500 10000 years, allele frequency data for polymorphic allozymes reveal ( a ) a consistent loss of genetic diversity along invasion routes, confirming the role of glacial refugia as centres of genetic diversity over these timescales, and ( b ) that populations in the invaded range are more subdivided genetically than those in the native range of each species. this spatial variation in population structure may be the result of variation in the patchiness of resources exploited by gallwasps, particularly host oak plants

    摘:生物入侵是不均衡世界的一個永恆話題,尤其是當人類意或無意地引入物種后.很多引入顯然是無害的,但另外一些則著嚴重的後果,會給入侵地的生物以至於整個生物群落造成影響.總結了分佈區擴張的常見模式,概述了它們對遺傳多樣性和種群結構式樣造成的影響.描述了如何根據以一批遺傳得到的遺傳多樣性式樣來推斷入侵途徑,來揭示伴隨擴張選擇和漂變在形成種群遺傳樣式中的作用.對日益增多的群體遺傳學方法進行了總結,這些技術可以用來在不同的時間尺度上推斷種群規模發生的巨大變化(瓶頸效應及種群擴張) .最後,我們以歐洲櫟癭蜂(膜翅目,癭蜂科,癭蜂族)一系列入侵的數據為例對一些方法進行了說明.從500 10000年的時間尺度上,多態的等位酶位點上等位基因頻率的數據表明: 1 )遺傳多樣性沿入侵路線呈不斷下降的趨勢,支持了冰河期避難作為遺傳多樣性中心的作用; 2 )入侵地區的種群與該物種原產地的種群相比,遺傳上的分化更為強烈.這種種群結構在空間上的變異可能是被櫟癭蜂開發的資源尤其是櫟樹寄主在斑塊上出現變異的反映
  9. Twenty - six species in the genus begonia were recorded for different purposes as medicine, food, beverage and pig feed in china ( ornamental uses excluded ). among these twenty - six species recorded for different uses, twenty - four species are used as medicine, eight species are used as food ( vegetable ) or beverage, and five species are used as pig feed. three species are commonly used for making beverage in the areas of their natural distribution. nine species have multiple uses, either for medicine, for food, beverage or pig feed. our study also indicated that some species are becoming rare and endangered owning to over collection and other factors

    秋海棠屬植物除了具較高的觀賞價值外,在中國還作為藥用、食用、飲料和飼料等被利用.應用民族植物學研究方法,通過野外調查、獻和收集整理和研究,共載了中國產26種秋海棠屬植物被作為藥用、食用、飲料和飼料加以利用.在載的26種國產秋海棠屬植物中,24種作藥用, 8種作食用(蔬菜)或飲料, 5種作飼料. 3種作飲料的種類在其自然分佈地被廣泛利用. 9種秋海棠作為多種用途加以利用,其中8種既被作為藥用、食用和飲料,也被作為飼料加以利用.研究還表明,國產秋海棠屬植物中,些種類由於過度採集利用或其它因素已變得稀或瀕危.由此提出,合理開發利用和效保護應成為今後中國秋海棠屬植物研究的重要內容
  10. Note : you have to work with the hidden text displayed ( tools ? options ? view - formatting marks ? all checkbox must be selected, then click the show / hide button in the standard toolbar ) as the source segments and some coding are formatted as hidden text

    說明:須使用隱藏顯示方式(工具-選項-流覽-格式化-的復選框必須選中,然後在準工具欄中點擊顯示/隱藏按鈕)因為源始段與一些代碼格式化為隱藏
  11. Based on the mfc ( multicast forwarding cache ) formed by multicast protocol such as dvmrp ( distance vector multicast routing protocol ), pim ( protocol independent multicast ), we can build special lsp ( lable switch path ) for certain source group couple to transport multicast data flow using ldp ( lable distribute protocol ) or cr - ldp. based on the zxb10 switching router of zte co. we can now support dvmrp within the context of mpls networks

    主要研究mpls網路對ip組播業務的支持,根據現的ip組播協議如dvmrp 、 pim等生成的組播轉發表(轉發樹) ,利用mpls網路的ldp (分發協議) cr - ldp (顯式路由分發協議)為特定的源組對確立lsp (交換路徑) 。
  12. Based on the collections of the dissertations, works and documents related to these bamboo slips, this article gives a research review on the retrospection of excavation and research history, the discussion and practice of the adjustment of the bamboo slips order and joint, the interpretation of the complicated words, the compilation of the bamboo slips words and the identifiers of the bamboo slips documents in order to provide reference for the related research

    盡量搜羅關這兩批竹簡的研究論、論著及相關資料,分發掘與研究?史的回顧、編聯與綴合的方法論的探討及其實踐、疑難字的釋讀、字編以及識符號的錄等項目作了述評,以期對今後的研究助益。
  13. In this dissertation, we tried to improve the fairness of bandwidth sharing from two aspects : marking algorithm in diffserv and the implementation of tcp protocol. in summarize, this dissertation includes the following outcomes : 1 ) made a summarization that covers several models of quality of service ( qos ) provided in the internet, which include intserv, diffserv and mpls etc. this dissertation analysed the architecture and technological characteristics of each model. after an introduction of each model, the dissertation summarized what qos requests they can fulfil and how they implement them

    具體來說,的主要成果包括如下幾個方面: 1 )對當前qos的幾個典型服務模型進行了綜述,指出了它們各自的優缺點,在此基礎上了,提出了一個端到端的qos體系結構,將現的幾種服務模型集成起來,對網路資源進行效地管理,使qos系統在核心網路具很好的擴展性,同時在用戶網路或訪問網路能提供較精細的qos保證; 2 )在演算法方面,指出了影響帶寬共享公平性的幾個因素,分析了現演算法在公平性方面存在的不足,在此基礎上,提出了一種自適應的公平數據包演算法( adaptivefairmarker , afm ) 。
  14. It uses plain unicode text rather than binary encoding, and all the structures are declared with predictable - looking tags

    它使用普通unicode而不是二進制編碼,並且其結構都是由看起來可預見的聲明的。
  15. 4, finished : you can check facie plans to contrast two different finished versions of the green marker that is more perfect, red box is optimized signs such as a bluetooth version of this test is optimal, vdisk already in a computer link, telephone, table functions, screen snapshots, and appman fileman, online collection of a chinese version of operating a telephone table functions, as well as screen snapshots appman ; in addition, the version of the documentation and configuration files appman will be transferred to the e site, c plate to further reduce the occupier, i suggest you install this software in the e site. and the c disk may be installed in the wrong operation ; the procedure used a new icon

    您可以看下圖來查看兩個不同漢化版的對比,綠色處是更完美的修正,紅色方框是優化的志測試優化是此版開啟藍牙vdisk已經于電腦連接電話功能表屏幕快照fileman以及appman ,網上收集的漢化版運行了電話功能表屏幕快照以及appman同時已經將appman的件和配置件轉移到了e盤,進一步減小對c盤的佔用,以我建議您將此軟體安裝在e盤,而其安裝在c盤可能會出現運行錯誤程序使用了新的圖
  16. This example converts a string with white space, text and markup into typed xml and removes all insignificant white space boundary white space between nodes

    此示例將包含空格、的字元串轉換為類型化的xml ,並刪除無用空格(節點之間的邊界空格)
  17. Since the domain name has the interest of intellectual property, which appears under the network circumstance, it should be regarded as a kind of discriminating earmark influence different from those creative production rights, and it can be collected to a sort of intellectual property in extensive meaning

    許多專家、學者從不同角度論證了域名的屬性。作者認為域名具知識產權權益的屬性,但域名是在網路環境下產生的知識產權權利,以它是一種區別于創造性成果權的識別性權,屬于較寬泛意義上的知識產權。
  18. Writes extensible hypertext markup language xhtml - specific characters, including all variations of xhtml modules that derive from xthml, to the output stream for an asp. net server control for mobile devices

    將特定於可擴展超語言( xhtml )的字元(包括從xthml派生的xhtml模塊的變體)寫入移動設備的asp . net服務器控制項的輸出流。
  19. Then, the article explores respectively the justifications and applications of both substantive priority rules and conflict priority rules provided in the convention. it is pointed out that such priority rules characterized by publicity and predictability could fundamentally helps to avoid conflicts of rights between the assignor and third parties, as well as establish a standard to determine priority between competing claimants. finally, the article advocates that ‘ substantive priority rules based on registration ’ and ‘ conflict priority rules that the law of the assignor ’ s residence governs effects of assignment toward third parties ’ should be established in china

    章綜合運用歷史研究方法、比較研究方法和價值分析方法,在簡要介紹國際貿易應收款轉讓特點的基礎上,分析了優先權規則形成的背景,繼而分別闡述了《公約》中優先權實體規范和沖突規范的理論基礎和運作機制,指出公示性和可預見性是《公約》優先權規則的兩項基原則,其不僅提供了決定受讓人和第三人受償次序的準,更重要的是助於從根上預防權利沖突的發生,據此,章提出完善我國優先權規則的建議,認為我國應當確立「以轉讓登時間為準」的優先權實體規范和「轉讓對第三人的效力適用轉讓人住地法」的優先權沖突規范。
分享友人