簡單隱性 的英文怎麼說

中文拼音 [jiǎndānyǐnxìng]
簡單隱性 英文
simple recessive
  • : Ⅰ形容詞(簡單) simple; simplified; brief Ⅱ動詞1 (使簡單; 簡化) simplify 2 [書面語] (選擇人才...
  • : Ⅰ動詞(隱瞞; 隱藏) hide; conceal Ⅱ形容詞1 (隱藏不露) hidden from view; concealed 2 (潛伏的; ...
  • : Ⅰ名詞1 (性格) nature; character; disposition 2 (性能; 性質) property; quality 3 (性別) sex ...
  • 簡單 : 1 (不復雜) simple; uncomplicated; plain; simplicity 2 (平凡 多用否定式) commonplace; ordinary...
  • 隱性 : 1 [語言學] covert gender2 [遺傳學] recessivity; recessiveness隱性詞 opaque word; 隱性基因 recessi...
  1. It was buried far deeper than myth and the oral history had led us to expect and it emitted radiation and absorbed radiation to simulate the natural character of its surroundings, a mechanical mimesis which is not surprising of itself

    正如我們所猜想的,寶庫是藏著的,它比一個謎埋藏的還要深,只有口述的歷史指引我們去想象,他在釋放輻射的同時還吸收輻射,如同它附近物體的自然質一樣,使我們任何的的機械模仿都無法察覺它的存在。
  2. The structure is reasonable, adopt double hoisting devices, motor rotation, flexible coupler. the performance is stable, the upkeep and maintenance and simpler, and there ' s no problem of leakage

    該機結構合理,採用雙絲桿提升,電動回轉,柔軸聯更適合我國國情。能更穩定可靠;保養、維護更;杜絕了因泄漏造成的安全患,無后顧之憂。
  3. Muggle given a simple explanation of ( for example ) the hogwarts express, the ban on apparating in hogwarts, the apparent inability to link to the floo network, and the apparent inability to fly in by broomstick from long distances away will be in considerable confusion

    對一個麻瓜的解釋(比如說)霍格沃茨特快列車,在霍格沃茨禁止幻的規定,對他們來說似乎不可能的飛路網連接,似乎不可能的飛天掃帚長距離飛行,那麼,他將會感到相當混亂迷惑。
  4. A muggle given a simple explanation of ( for example ) the hogwarts express, the ban on apparating in hogwarts, the apparent inability to link to the floo network, and the apparent inability to fly in by broomstick from long distances away will be in considerable confusion

    對一個麻瓜的解釋(比如說)霍格沃茨特快列車,在霍格沃茨禁止幻的規定,對他們來說似乎不可能的飛路網連接,似乎不可能的飛天掃帚長距離飛行,那麼,他將會感到相當混亂迷惑。
  5. Parameter form becomes mainstream of geometric design because of characteristic such as : simple construction, easy computation, etc. while near 20 years research illustrates implicit form has advantage that parameter one has n ' t. in this paper only the application and properties of implicit curves in cagd have been researched

    參數形式以其構造,計算容易等特點而流行於世並成為幾何設計的主流,然而近20年的研究與使用經驗表明式形式也有參數形式無法比擬的優點,本文僅就式曲線在計算機輔助幾何設計中應用及質進行了分析和研究。
  6. Genetic algorithms are search algorithms based on the mechanics of natural selection and natural genetics. it is widely used in many kinds of fields because of its less - dependency of optimization problem, simplicity, robustness and implicit parallelism

    遺傳演算法是模擬遺傳學和自然選擇機理構造的一種搜索演算法,因其對優化問題的弱依賴、求解的和魯棒含并行等特點被廣泛應用於當前的各個領域。
  7. The fact is, nevertheless, that the three men ' s grave pains are hidden beneath the simple plot - the indian father ' s impairment of his dignity, the white doctor ' s forfeit of his authority, and the boy nick ' s psychic trauma when faced with death for the first time

    事實上,情節的背後,藏著三位男沉重的痛苦印第安男人尊嚴被踐踏的痛苦、白人醫生權威喪失殆盡的痛苦以及孩子尼克首次直面死亡問題的痛苦。
  8. This paper established the concept model and measuring model for coats of core - staff loss based on the brief comments to the existing measuring methods and models, and then, it measured the dominant costs one by one and the hidden costs with fuzzy assessment method

    在對已有員工流失成本的計算方法和計量模型進行了述評的基礎上,建立了核心員工流失成本概念模型與計量模型,對概念模型中的顯成本與易量化的成本逐項計量,並用模糊評價的方法將不易量化的成本定量化。
  9. The purpose of this thesis is to use artificial neural networks ( ann ) to identify the aerodynamic parameters. first introduced in this paper is the basic theory of ann and wind engineering in bridge, then ann is presented to identify the aerodynamic derivatives of ideal thin plate. a back - propagation ( bp ) ann is established and trained for many times to contrast the influences of some factors on the prediction results

    首先對人工神經網路和橋梁風工程的基本理論作了的介紹,接著採用人工神經網路識別了理想薄平板的氣動導數,並分析了數據處理方式、元數、訓練次數、隨機賦值次數、樣本數量對訓練結果的影響,討論了訓練的穩定
  10. From this simple premise, the tying interface has evolved into an object - oriented methodology in perl, hiding oop complexity behind a procedural interface

    如果從這個的前提出發,那麼綁定介面已經演變為perl中的面向對象方法了,它將oop的復雜藏在過程介面後面。
  11. 15 jakliu c a, solina f. moments of superellipsoids and their application to range image registration. ieee trans. systems, man, and cybernetics, 2003, 33 : 648 - 657

    而對于組合圖元所得的物體,其相關的保持微分屬函數,則通過使用r函數對其所屬的圖元的示表達進行組合來生成。
  12. Yesterday someone asked me how to remove the tabs from the personalized homepage. while there ' s an easy way to hide the tabs in firefox, this personalized homepage won ' t have tabs

    昨天有人問我如何去除個化主頁上的選項卡。現在有一種的方法可以在火狐中藏這些標簽,這種個化的主頁將不再含有選項卡。
  13. In the first chapter in this dissertation, the possibility and certainty of traditional letter of credit electronicsization have been discussed. in the second chapter, first of all simply introduced the model that electronic letter of credit preceeds. then according to this model, put forward the probably existing safe trouble : the systematic reliability ; secrecy and completeness of data telecommunications ; the social status authenticity of business person and the nature that business action cannot be denied ; the legal effectiveness of the data telecommunications as evidence

    本文第一章論述了傳統信用證電子化的可能與必然;第二章首先介紹了現在國際上電子信用證運做的模式,然後根據此運做模式提出可能存在的安全患;系統的可靠;數據電訊的機密和完整;交易者身份的真實及交易行為的不可抵賴;數據電訊作為證據的合法有效
  14. Bfm overcomes the weakness of sfm, but i also point out that bfm has a bigger problem. accordingly, sfm is approved to be a good model to solve stock price forecasting problem

    彈跳預測模型解決了預測模型很大的一個弊端,但是本文也同時提出了彈跳預測模型所含的更大的問題,因此從一個側面證實了,預測模型的優越
  15. Method for linear circuits with element tolerances are also presented. by this method, the double fault general characterization can be calculated by single fault general characterization which can be calculated by single fault feature. this method makes simulation before test more simple. according to the actual project requirements, practical bp algorithm is presented and realized on personal computer. after further optimization and improvements, a subhidden layer bpnn algorithm which support unlimited units is realized

    文中給出的線電路故障特徵可根據電路正常狀態下參數值來計算;給出的線電路雙故障特徵可由元件的故障特徵來獲得,化了測前模擬工作。根據實際項目的要求,在pc機上實現了實用的bp演算法。經過改進,實現了支持無限元的子層bp神經網路的核心演算法。
  16. Compared with the lsb algorithm, the robustness of this algorithm is stronger ; compared with the echo hiding algorithm, the detection watermarking of this algorithm is easier, the calculation is simpler ; compared with the time - domain algorithm based on psychoacoustic masking, the calculation complexity is relatively low, the transparency does not rely on experience value, and the embedding amount is larger

    與lsb演算法相比,該演算法具有較強的健壯;與回聲演算法相比,該演算法檢測水印容易,計算;與基於心理學掩蔽模型時域演算法相比,該演算法計算,透明不依賴經驗值系數,且嵌入量大。基於振幅比較的數字音頻水印(機密信息)藏演算法。
  17. Network attacks damaged networks and users, among which dos ( denial of service ) attacks become one of the common network attack techniques by the characteristics, such as extensive area, strong concealment, simpleness and efficiency, etc. dos attacks greatly affected the effective service of network and host systems, especially among which, ddos ( distributed denial of service ) attacks are greatly threatening internet, since they are difficult to recognize and defense due to their concealment and distribution

    隨著網際網路的迅速普及和應用的不斷發展,各種黑客工具和網路攻擊手段也隨之倍出,網路攻擊導致網路和用戶受到侵害,其中拒絕服務( dos , denialofservice )攻擊以其攻擊范圍廣、強、有效等特點成為常見的網路攻擊技術之一,極大地影響網路和業務主機系統的有效服務。其中,尤其是分散式拒絕服務( ddos , distributeddenialofservice )攻擊,由於其和分佈很難被識別和防禦嚴重威脅著internet 。
分享友人