真息法 的英文怎麼說

中文拼音 [zhēn]
真息法 英文
genuine breathing method
  • : Ⅰ形容詞(真實) true; genuine; real Ⅱ副詞1 (的確; 實在) really; truly; indeed 2 (清楚確實) cl...
  • : Ⅰ名詞1 (呼吸時進出的氣) breath 2 (消息) news 3 (利錢; 利息) interest 4 [書面語] (子女) on...
  • : Ⅰ名詞1 (由國家制定或認可的行為規則的總稱) law 2 (方法; 方式) way; method; mode; means 3 (標...
  1. The structure of this paper goes like this, the first chapter introduce the development of e - b / l in practice and in laws. and draw a conclution that the electrification of the b / l is a history tide. in the second chapter, on the basic of reseach the security trap in e - b / l running, 1 conclude six security elements of, e - b / l : the liability of the system, the authenticity of dealers ' identity. the integrity and secrecy of electronic data, and the validity and evidence effectiveness of electronic data. from the third chapter to the eighth, 1 reseach these elements one by one. the third chapter introduce the establishment of the e - b / l security system, and some related laws the fourth chapter introduce the certification authority of e - b / l. in the fifth chapter, 1 introduce the encrypt of electronic information and some countries ' control on use / import / export crytography. the sixth chapter introduce the concept and principle of digital signature, and reseach some related legal issues. the seventh chapter reseach the legal demand of validity, then come to a conclution that to establish a independent electronic information system is necessary. in the eighth chapter, 1 reseach some countries " regulation on the evidence effectiveness of electronic data

    第二章在分析電子提單運作中的安全隱患的基礎上,歸納出其六大安全要素,即系統的可靠性、交易者身份的實性、數據電訊的機密性和完整性、數據電訊的合有效性以及交易者行為的不可抵賴性。第三章到第八章分別對這六大要素進行分析:第三章介紹了電子提單網路安全體系的建立以及系統安全保護規,第四章則介紹了電子提單的安全認證機構,第五章介紹了信加密技術以及各國立對密碼技術的進出口及使用的控制,第六章介紹了數字簽名的概念及原理,並以bolero為例介紹了數字簽名的技術方式,對有關律問題作了論述;第七章首先論述了電子提單對有效性的律需求,然後結合國內和國際規則的規定論證了數據電訊制度產生的必然性;第八章通過對各國立對電子證據的律效力的規定,論述了對電子交易至關重要的數據電訊的不可抵賴性。
  2. This dissertation is dedicated to the algorithm research of image registration applied to navigation. information such as attitude angle of aircraft is used to emendate the large - geometry - distorted image, so the research of this dissertation is based on the hypothesis that images used have small geometry distortion

    針對圖像匹配在導航中的應用,提出了對于存在大的幾何失的圖像利用飛行器本身信進行幾何校正的方,所以本文演算的研究都是基於小的幾何失這一假設的。
  3. In allusion to its blemish, we can see clearly that consists in two sides : inefficient as well as nullification. as a tentative schedule, uphill - gathering method was born. no other than put the axe in the helve, uphill - gather method was designed to enhance the efficiency of creating the combined financial statement and the quality of accounting information

    針對工作底稿在實際工作中效率低、效果差的弱點,筆者嘗試性地提出編制合併會計報表的一種全新的方:向上匯總,試圖在保證會計信實性和提高合併報表編制效率等方面提出自己的思路。
  4. This news, false as it was following so singularly in the train of the two similar misfortunes which had so recently occurred, evidently astonished the auditors, and they retired without a word. during this time valentine, at once terrified and happy, after having embraced and thanked the feeble old man for thus breaking with a single blow the chain which she had been accustomed to consider as irrefragable, asked leave to retire to her own room, in order to recover her composure. noirtier looked the permission which she solicited

    這個消雖然是編造的,但是緊跟著那兩件同樣的不幸事件之後宣布出來的,顯然把聽的人驚呆了,他們一言不發地告退了,此時此刻,瓦朗蒂娜是又驚又喜,她擁抱著那個衰弱的老人,感謝他這么一下子就解除了那條她以前一直認為無擺脫的枷鎖,然後請求讓她回到自己的屋裡去休一下諾瓦蒂埃表示他可以答應她的要求。
  5. The basic concept of terrain information content is proposed after an overall review of existing research achievement. applying a series of analysis and data processing method, like math - analysis, mathematical statistics, comparative, error visualizing, this paper carefully investigated the terrain information content characteristic of dems of 1 : 50000 map scale of loess plateau area

    本文在對前人已有研究成果進行系統總結的基礎上,首先明確了dem地形信容量的基本概念,並運用數學分析、數理統計、比較分析、誤差地圖等方,以海拔高程與等高線為研究對象,以1 : 1萬比例尺dem為參考值,探討了黃土丘陵溝壑區1 : 5萬dem的地形信容量特徵。
  6. His observations of fungi in their natural habitat and his methods of culturing them enabled him to work out their developemt and life cycles, thus laying down the foundations of modern mycology

    他在菌的天然棲地觀察菌,並通過培養菌的方來獲得有關它們發育和生活史的相關知識,繼而建立了現代菌學的基礎。
  7. Different algorithms were compared in the numerical simulation and model experiment of concrete velocity inversion the results showed that, compared with the least - square solutions and the damped least - square solutions, the damped and natural weighted least - square solutions reflected the inner defections of the tested object more reliably and exactly due to the usage of correct priori information, which benefited the suppression of noises and made the iterations of inverse stable and convergent

    結果表明,相對于最小二乘和阻尼最小二乘,基於自然權的加權阻尼最小二乘演算,由於利用了正確的先驗信,不但使反演過程收斂,而且具有數值穩定、抗噪能力強的優點,其成像結果能實有效地反映對象內部缺陷,因此更適用於混凝土的超聲波速度反演。
  8. Two new ways to patch the oddments together and distinguish genuine from false information are reported this week

    本周,科學家報道了兩種可以將這些零碎的信整合起來,同時,能夠從錯誤信中篩選出實信的新方
  9. Along with the growth of the building industry for lease, the progress of the mechanical equipment management is not the same with it. the traditional methods - keeping business records manually, lease ( giving back ) records, calculating rent charge sum, counting rent things, ca n ' t meet the needs of the develop of business. the general headquarters of the company can only exchange information with their branches through telephone, fax or post

    隨著建築租賃業的發展,其機械設備管理並沒有得到同步發展,傳統的方? ?採用手工記帳、出租(歸還)登記、計算租費金額以及統計出租情況,已完全不能滿足企業業務發展的需要,加之公司總部同地處異地的分公司信交流只能通過電話、傳或郵寄等方式進行,無及時準確地了解分公司的業務情況,有的建築設備租賃公司已開始使用設備管理軟體,但也只是剛剛起步,還存在許多問題。
  10. Point out that the major causes of the problem are followings : the decline of social integrity ; the imperfection of law, accounting system, cpa auditing system and corporation governance in the fourth part, the author puts forward to some measurement and suggestion for administrating accounting information distortion

    第三部分:分析會計信系統的各個環節,得出會計信的原因,把整個原因分為:社會誠信水平下降、律不健全、會計制度不完善、注冊會計師制度不合理及公司治理結構不完善。
  11. The d - s rule of the information fusion of rockmass mechanical parameters is presented. meanwhile, the basic probability assignments, belief functions, plausibility functions, and similar probability functions are given. this method is applied to an example of analysis and selection for rockmass mechanical parameters of the rock engineering, and the satisfactory results are obtained

    構造了巖體力學參數的識別框架,建立了巖體力學參數的基本可信度分配的應用模型,定義了巖體力學參數的信度函數、似度函數、以及類概率函數,提出了巖體力學參數的d - s信融合則,明確了巖體力學參數d - s信融合方武漢理工大學博士學位論文的實施步驟。
  12. Mignon swore that the piece would never finish, and when fauchery and la faloise left them in order to go up to the foyer he took steiner s arm and, leaning hard against his shoulder, whispered in his ear : " you re going to see my wife s costume for the second act, old fellow. it is just blackguardly.

    米尼翁斷言戲演不到底,在福什利和拉盧瓦茲離開他們去樓上休室時,他挽起斯泰內的胳膊,把身子靠在他的肩膀上,對他耳語道: 「親愛的,你去看看我妻子在第二幕里穿的服裝吧是下流的服裝! 」
  13. Jim harper, director of information policy at the cato institute, estimates the cost of implementing the real id program at $ 23 billion, and says there is little evidence it would boost security

    吉姆?哈珀是加圖研究所的信政策理事,他估計執行《實身份案》將會花費230億美元,他還說即使這樣也不見得能增加多少安全性。
  14. Abstract : the eassay supply some pratical measures and method about selecting material, manufacturing applicating and inspecting on safety sign. making the enterprise to standardise their manufacture inspection and application with aim of turning the safety sign into the carrier which can transmit safety messages in enterprise

    文摘:就國內企業在安全標志的選材、製作、檢驗使用中存在的一些問題,提出了一些針對性較強同時具備可操作性的措施和方,以便於生產企業和使用單位進一步規范其製作和使用安全標志的標準,使安全標志正成為為企業傳遞安全信的載體。
  15. From the utilizing surround of music algorithms, we can sure the resolution and doa estimated accuracy of music algorithms must be effected by the sea clutter

    從music演算的應用背景環境可知,海雜波的存在必將影響music演算的精度和分辨力,甚至可能是music演算檢測目標的實方位信,在某一方位出現虛假目標。
  16. In the brief introduction to geographical information system ( gis ), this dissertation proves that by combining reliable management with gis technology, presents a method which built the power structure model and math calculation model by using spatial data in a good interface between computer and user. this dissertation makes a number of target for calculating the distribution system, mainly aimed at circumstances which have an effect on power station repair, switch breaker, type of t connection, and double lines supply via the usage of system reliability calculation. at the same time, it provides the projected estimatio n when power station or transmission line will be added into the power system, and furnishes the theoretical information that the professional needs for power structure programming, design and equipment management

    通過建立輸變電設施管理信系統( mis ) ,實地反映出油田電網輸變電設施的運行管理現狀,為網路可靠性計算提供可靠的計算依據;在簡述地理信系統( gis )技術的基礎上,論證了可靠性管理與電力gis技術結合的可能性,創立了在簡潔的人機圖形界面下利用空間數據建立網路結構模型及可靠性計算模型的方;通過建立網路可靠性計算系統,進行了計及變電所檢修影響、切換開關、 t接點及雙回線供電情況下的可靠性指標計算分析,對油田電網及變電所(線路)的改(擴)建方案、增強性措施及接入系統的可靠性給予了工程評估,為電網規劃、設計及日常的設備管理提供分析決策依據。
  17. The new accounting law and administration of false accounting information

    新會計與會計信的治理
  18. First, resistance to geometrical distortion was obtained by using moment normalization ; second, we focus on the phase of fourier - mellin transform. before detecting watermark, synchronization could be retrieved by using the phase information. to eliminate the influence of pixel value distortion generated during print / scan process, a dft - based robust watermark algorithm was designed, which could successfully detect watermark from a severe distorted image

    另一種思路是根據圖像經過旋轉、縮放、平移后,其傅立葉?梅林變換域只有相位受到影響的特點,從其相位中提取幾何失,然後再進行相應的失補償,從而消除幾何失的影響;對于列印掃描過程產生的像素值失,本文也提出了一種基於dft的魯棒性演算,能在較嚴重的圖像失情況下,成功檢測水印。
  19. The facility, which was completed at frankfurt airport in germany in december 2004, is over 19, 000 square feet large and features a cigar lounge with leather armchairs

    位於蘭克福機場的頭等艙休廳於2004年12月竣工,佔地面積超過1 . 9萬平方英尺,其中的"雪茄"休廳全部裝備了皮扶手椅。
  20. The advent of the internet and the wide availability ofcomputers, scanners and printers make digital data acquisition, exchange and transmission a simple task. however, making digital data accessible to others through networks also creates opportunities for malicious parties to make salable copies of copyrighted content without permission of the content owner. digital watermarking is likely to be a potential solution to this problem. digital watermarking has been proposed as a solution to the problem of copyright protection of multimedia documents in networked environments. it makes possible to embed a watermark ( such as identification data, serials number, text or image etc. ) to multimedia documents allowing copyright protection, secret communication, document authentication and so on. in this paper, we present a new digital image watermarking method based on svd ( singular value decomposition ), and then give some theoretical analysis about the algorithm. extensive experimental results show that this method is much more robust than other methods presented before

    隨著計算機和網路技術的飛速發展,數字圖像、音頻和視頻產品愈來愈需要一種有效的版權保護方,另外通信系統在網路環境下的信安全問題也日益顯露出來.數字圖像水印技術為上述問題提供了一個潛在的解決方案.所謂水印技術就是將數字、序列號、文字、圖像標志等版權信嵌入到多媒體數據中,以起到版權保護、秘密通信、數據文件的偽鑒別和產品標志等作用.本文提出了一種新的基於奇異值分解的數字水印演算並且對該方的理論基礎給出分析.實驗結果表明這種方要比目前提出的流行演算魯棒
分享友人