正式域名 的英文怎麼說

中文拼音 [zhēngshìmíng]
正式域名 英文
fqdn fully qualified domain name
  • : 正名詞(正月) the first month of the lunar year; the first moon
  • : 名詞1 (樣式) type; style 2 (格式) pattern; form 3 (儀式; 典禮) ceremony; ritual 4 (自然科...
  • : 名詞(在一定疆界內的地方; 疆域) land within certain boundaries; territory; region
  • : Ⅰ名詞1 (名字; 名稱) name; appellation 2 (名聲; 名譽) fame; reputation 3 (名義) name 4 (姓...
  • 正式 : formal; official; regular
  • 域名 : dn domain name
  1. The author considers the legal system of intellectual property right is opening so that the domain name should be included as a kind of independent right. in the following parts of the essay, the author explores the fundamental causes of conflict and re - classifies the types of conflict between domain name and trademark, reanalyzes the similarity and the difference between domain name and trademark, makes comparison between the three major domain name dispute resolutions that have already been provided ( udrp, acpa and the domain name disputes solution of china ), it can provide ground for an effective method for solution. at last, the thesis baldly points out that it should stand an independent legal status in ip law

    故,筆者欲突破在商標及商標法框架下研究的思維定勢,重新審視法律地位、分析其法律屬性;以與商標沖突為典型,研究導致沖突的原因;從平等中立的角度,以貫穿經典案例的方法重新劃分沖突分類:以橫向比較分析的研究方法評介全球具有代表性的沖突解決方案和我國新的政策以及司法解釋,為確提出解決方案建立基礎;探討爭議解決的主要原則,分析在我國的立法模;最後,筆者將在全文分析的基礎上,嘗試提出權利問題,以期能從根本上尋求解決的法律保護以及沖突的公平解決的合理機制。
  2. Borrowing ideas from the solving models on conflicts between trade mark and domain name privileges in international community, we provide favourable legal system environment for the development of traditional conomy and cybereconomy by establishing valid domain name registration review mechanism 、 reasonably restricting rights of trademark obligees 、 forbidding reverse cyber - squatting conducts 、 citing the law of against unfair competition 、 and by establishing specialized agency solving conflicts on domain name 、 perfecting dissidence system and regarding whether “ malice ” as requisite important subjective document

    在借鑒國際社會商標權與權沖突解決模的基礎上,從確立有效的注冊審查制度、合理限制商標權人的權利、禁止反向搶注行為、援引反不當競爭法、建立解決沖突的專門機構、完善異議制度以及把是否「惡意」作為必備的主觀要件等方面解決問題,從而為傳統經濟和網路經濟的發展提供良好的法制環境。
  3. He sought to elaborate some new scheme of life that would have its seasoned philosophy and its ordered principles, and find in the spiritualizing of the senses its highest realization

    他希圖構思出一種以言順的哲理和精深奧博的理論為基礎的嶄新的生活方,夢幻依靠官感升華為精神,開掘此類生活的理想領
  4. Firstly, we generalize and analyze the advantages and present research of elliptic curve cryptography ; secondly, we study the basic theory of the ecc ; thirdly, we illustrate the safety of the ecc and discuss the elliptic curve key agreement scheme, elliptic curve encryption scheme and elliptic curve digital signature algorithm ; fourthly, we study fast algorithms of the multiplication and inversion multiplication of the element of in the underlying finite field f2m whose characteristic is two represented by the two basis of optimal normal basis and polynomial basis. we make improvements to the fast algorithm of the polynomial basis multiplication by hankerson and base on the experiments, we describe the properties and compare the advantages of the multiplication and inversion multiplication of the elements in f2m field under optimal normal bases and polynomial basis. results concluding from the study car be used as references in the realization of the elliptic curve cryptosystem ; fifthly, we overview the current fast algorithm of point multiplication, improve the fix base point comb algorithm, advance the speed of the whole system and remark the advantages and disadvantages of the popular algorithms based upon the experimental datas ; sixthly we realize the algorithm library of elliptic curve cryptography based on the f2m. only change slightly in our algorithm library can we realize the ecdh, eces, ecdsa based onf2m of anysize ; seventhly, we realize the ecc on two secure elliptic curves, including ecdh, eces, ecdsa

    本文首先介紹並分析了橢圓曲線密碼體制的優點及研究現狀;其次研究了橢圓曲線密碼體制的基本理論;第三,分析了橢圓曲線密碼的安全性並介紹了密鑰共享,加密,數字簽等橢圓曲線密碼體制;第四,深入研究了特徵為2的有限f _ 2m中的元素在多項基和最優規基表示下的乘法運算和乘法逆運算的快速演算法,並對hankerson等人提出的多項基下的乘法運算的快速演算法作了改進,而且在實驗的基礎上不僅分析研究了f _ 2m中元素在多項基和最優規基表示下的乘法和乘法逆運算的性能,還對這兩種基表示下的f _ 2m中元素運算效率的優劣作了比較和研究,所得的結論可供在實現橢圓曲線密碼體制時參考;第五,研究了目前流行的計算橢圓曲線標量乘法的快速演算法,同時改進了固定基點梳形法,提高了整個系統的速度,並在實驗的基礎上分析研究了流行演算法的優劣;第六,實現了基於f _ 2m的橢圓曲線密碼體制的演算法庫,在我們的演算法庫中只需稍微改變便能實現基於任意尺寸的f _ 2m上的ecdh , eces , ecdsa等橢圓曲線密碼體制;第七,實現了兩條安全橢圓曲線上的橢圓曲線密碼體制,包括ecdh , eces , ecdsa 。
  5. The u. s. board of geographic names does not recognize the bermuda triangle as an official name and does not maintain an official file on the area

    美國地理部不把認可的百慕大三角稱作為官方稱而且也沒有官方的文件涉及該區
  6. Shanghai nail electric equipment co, ltd. it is a professional corporation incorporates designing and developing automation engineering complete sets of control cabinets, and automation products trade into an organic whole. besides shanghai, " chengdu eurotherm electric drive equipment co, ltd. " with independent accountability has been officially established in chengdu. with 70 % of the staff having the professional ranks, the company possesses a powerful technical force. we deal in a full range of automation products. with the development of shanghai nail electric equipment co, ltd, we have gained the recognition and support of many well _ known international industrial factories. we enjoyed a very good reputation and credit standing in the field of industrial automation control both home and abroad

    上海南安機電設備有限公司是一家集研製開發自動化工程成套電器控制櫃及自動化產品銷售為一體的專業公司,已在成都成立了獨立核算的成都歐陸電氣傳動設備有限公司.公司70 %員工擁有技術職稱,技術力量雄厚,銷售產品齊全,在發展過程中博得了多家國際知工控廠家的重視與支持,在工業自動化控制領有著較高的品牌形象與良好的信譽
  7. And his thought on " internal view " achieved the original link to sociology. following and surpassing hart ' s study of paradigm, dworkin advanced his idea on " internal participant ". compared with him, hart was skilled in analysis and he introduced common linguistic philosophy into jurisprudent field in the consequences of transformation and new realm of legal research

    哈特提出了著的「最低限度內容的自然法」命題,標志著向自然法學的重大讓步; 「內在觀點」的思想完成了向社會學法學的最初溝通,德沃金是沿著並超越了哈特的範研究,提出了「內在參與者」的觀點;而哈特精於分析,將日常語言哲學引入法學領,完成了二十世紀法學研究的語言學轉向,開拓了法哲學研究的新境界。
  8. Over the western north pacific and the south china sea between 1947 and 1999, tropical cyclone names were assigned by the u. s. armed forcess joint typhoon warning center according to a pre - determined but unofficial list

    從一九四七年至一九九九年,北太平洋西部及南海區的熱帶氣旋非地採用美國軍方聯合臺風警報中心所編訂的單上的字。
  9. Over the western north pacific and the south china sea between 1947 and 1999, tropical cyclone names were assigned by the u. s. armed forces joint typhoon warning center according to a pre - determined but unofficial list

    從一九四七年至一九九九年,北太平洋西部及南海區的熱帶氣旋非地採用美國軍方聯合臺風警報中心所編訂的單上的字。
  10. In the 3rd section we introduce how to use mathematical model to study financial problems, whose assets running on mixed jump - diffusion process, first we get the famous non - linear feynman - kac formula by fbsde, then let the solution of the bsde be a investor ' s utility function, and it ' s the so - called recurse utility function. second, we can prove that this utility function is a continue viscosity solution of the variation inequality which we get above, and we get the comparison theory. third we can use the result to financial market to study the optimal consumption and portfolio problem or evaluate the american option

    第三章介紹了利用金融資產價格運行基於復合跳躍? ?擴散過程的數理模型來研究金融經濟問題,通過結合運用倒向隨機微分方程,推導得到著的非線性feynman - - kac公,並且將相應的倒向隨機微分方程的解記為投資者的值函數,這也就是通常所說的效用值函數;接著我們可以證明此效用值函數為某一偏微積分變差不等的連續粘性解,並且得到了比較原則;這些結果可以應用到金融領用於消費投資組合的選擇或是美期權的估值。
  11. The important research is about the theory and methods of the cluster analysis in view of statistical theory, the theory and methods of fuzzy cluster analysis, the fkn " s structure and the fkn ' s study algorithm ( fkn, fuzzy kohonen network ) - the organic fusion of the fuzzy c - means algorithm and self - organized feature map neural network. the paper proposes the ifkn ( improved fkn ) on the basis of the hard classification idea and the soft classification idea, then carries on the cluster analysis of the artificial synthetic control chart time series through matlab program and tt ? cluster result matches the cluster result of the famous dataengine " s software of the intellectual data analysis and data mining from german mit company. finally, the paper discusses the applying of the cluster analysis to the control process, which can be widely applied to the pattern recognition of the parameter " s changing trend during the control process and the image partition processing, and utilizes the ifkn to recognize the thermotechnical parameter " s changing trend based on the engineering of clinker sintering rotary kiln automatic control system of guizhou " s aluminium factory, through which good effect is obtained

    數據挖掘技術在商業領中已廣泛使用,然而在工業過程控制制中的應用卻極少,本文是在這種背景下,對數據挖掘中的聚類分析方法及其在工業過程控制制中的應用研究作了償試,重點研究了基於統計理論的聚類分析理論和方法,模糊聚類分析理論和方法及模糊kohonen網路( fkn )的結構與學習演算法,即模糊c ? ?均值演算法與自組織特徵映射神經網路( kohonen網路)的有機融合,並根據硬分類思想及軟分類思想提出了改進的模糊kohonen網路( ifkn ) ,通過matlab編程對人工合成控制時序圖數據集進行聚類分析,其聚類效果與當今廣泛使用的數掘挖掘軟體平臺,德國mit公司著的dataengine智能數據分析和數掘挖掘軟體的聚類效果相當,最後,論述了聚類分析在控制中的應用,它可以用於過程控制制中的參數變化趨勢的模識別及圖象分割處理等具體應用中,並以貴州鋁廠熟料燒結回轉窯自動控制系統為工程背景,利用ifkn識別其熱工參量變化趨勢,取得了較理想的效果。
  12. Until now, most inspection tools either tried to take on the very difficult problem of proving that a program is correct, or focused on superficial issues such as code formatting and naming conventions, or at best, simple bug patterns such as self - assignment, unused fields, or potential errors such as unused method parameters or public methods that could be declared private or protected

    到目前為止,大多數檢測工具要麼極力試圖證明程序是確的,要麼注重一些表面問題,如代碼的格編排和命規則,最多還關注一些簡單的bug模,如自賦值、未使用的或潛在的錯誤(如未使用的方法參數,或可以聲明為私有或保護的方法被聲明為公共的) 。
  13. The domain name of the suspected fraudulent website also resembles the official website address of fortis bank hong kong branch

    該懷疑欺詐網站的亦與富通銀行香港分行的網站地址相似。
  14. The domain entered is in an invalid format. do not include a subdomain as part of the domain name

    這句話的意思是:你添加的確,不能是的子
分享友人