被人們所應用 的英文怎麼說
中文拼音 [bèirénmensuǒyīngyòng]
被人們所應用
英文
be used by most people-
In this bill of lading the word " ship " shall include any substituted vessel, and any craft, lighter or other means of conveyance owned, chartered or operated by the carrier used in the performance of this contract ; the word " carrier " shall include the ship, her owner, master, operator, demise charterer, and if bound hereby the time charterer, and any substituted carrier, whether the owner, operator, charterer, or master shall be acting as carrier or bailee ; the word " shipper " shall include the person named as such in this bill of lading and the person for whose account the goods are shipped ; the word " consignee " shall include the holder of the bill of lading, properly endorsed, and the receiver and the owner of the goods ; the word " charges " shall include freight and all expenses and money obligations incurred and payable by the goods, shipper, consignee, or any of them
二、本提單中的「船舶」一詞指任何替代船舶、任何小船、駁船或其他為承運人所擁有,並用於履行本合同的運輸工具; 「承運人」一詞是指船舶、船東、船長、操作人員、光船租船人、本提單限定的定期租船人、以及任何實際承運人,不論是船東、操作人員,租船人或船長代理而被視為承運人或受託人; 「發貨人」一詞是指本提單上所列的發貨人,貨物為其而裝運; 「收貨人」一詞是指正式背書提單的持有人,貨物的接收者和所有人; 「費用」一詞是指運費和因貨物、發貨人、收貨人、或因他們任何一個而發生且應由其支付或了結的一切費用和金錢義務。Meanwhile, cmos technology, due to its mature application in base band uses, draws more and more attentions in rf area
由於cmos工藝在基帶電路的成熟應用,其在射頻中的地位也逐漸被人們所重視。With the rapidly development of computer network technology and the widely use of network technology in every walk of life, people transmit data through computer network more and more frequently, including all kinds of secret information ( for example, military secret ; bussiness secret ; personal private information ). today, as a result of poor security of our network system, we can not prevent the transmittied information from stealing and modifying unlawful. thus, the computer network technology is applied to our daily life restrictedly. recently, many network applications with voip ( for example msn messenger ; dialpad ; distributed multipoint multimedia conferences ) take no measures to encrypt their data
隨著計算機網路技術的迅猛發展和網路技術在各行各業中的廣泛應用,人們通過計算機網路傳輸數據日益增加,其中包含了各種機密信息(例如軍事機密信息、商業機密信息、個人隱私信息等) 。由於目前的網路系統缺乏足夠的安全性,不能有效防止網路上所傳輸的信息被非法竊取和修改,因而極大地限制了計算機網路技術在日常工作中的應用。當前,基於voip技術的各種網路應用,如msnmessenger , dialpad ,以及一些分散式多媒體會議系統,竟然未採取任何加密措施Anyone watching the television could see that as soon as any united fans made a move they were battered and beaten with truncheons
所有看電視的人都應該發現,就在曼聯球迷開始移動的時候,他們被用警棍猛擊毆打。At first, 1. 67 u g per well mcab all was coated on three wells of a plate, and then 1. 5 x 1011 phage virion was diluted and added, after incubating with the target, wash away unbound phage by tbst ( 0. 1 % tween - 20 ), the bound phage was eluted with ph 2. 2 tris - gly buffer and amplified, the specially bound phage was enriched by taking through addition binding / amplification cycles. ln the following cycles, the stringency of panning can be increased by raising the concentration of tbst or decreasing that of mcab all, collecting and titering the washing phage of last time and output phage in each round, the selective ratio and the false positive rate of each round were worked out, the gradually increasing of selective ratio and decreasing of positive rate shows that the panning was effective. after 4 rounds of panning, 11 phage clones were selected after competitive - ellsa, the dna samples of 8 positive clones and 1 negative clone were sequenced and all the foreign peptides inserted was also deduced, a clear consensus binding sequence emerged
在本實驗中,利用隨機12肽庫對抗豬瘟病毒( classicalswinefeverviruscsfv )糖蛋白me2的單抗a11進行表位篩選,經過四輪篩選以後,隨機挑取11個克隆作競爭- elisa檢測,結果表明,所挑11個克隆中,有9個克隆能對me2蛋白和a11反應產生抑制作用,抑制率最高可達64 ; dna測序以後經過dnastar軟體分析,發現它們的核心序列為anwralsl ,該核心序列與豬瘟病毒e2蛋白的28 - 35位氨基酸ttwkeysh具有同源性;夾心- elisa檢測和western - blotting試驗均證明所挑陽性克隆能被a11所識別;人工合成含核心序列的多肽經間接elisa試驗證實,也能被a11識別。Since the introduction of high - power short - pluse lasers well, there has developed a strong interest in the high - density high - temperature plasmas produced by the interaction of intense laser light with matter
自從高能短脈沖激光被很好地應用以來,人們對激光作用在物質上所產生的高密度熱等離子體表現出了強烈的興趣。This agreement is made and entered into on this date and shall obligate the undersigned parties and their partners, associates, employers, employees, affiliates, subsidiaries, parent companies, any nominees, representatives, successors, clients and assigns hereinafter referred to as “ the parties ” jointly severally, mutually and reciprocally to the terms and conditions expressly stated and agreed to below and this agreement may be referenced from time to time in any document ( s ), or written agreements and the terms and conditions of this agreement shall apply to any exchange of information written or oral involving financial information, personal or corporate names, contracts initiated by or involving the parties and any addition, renewal, extension, rollover amendment, renegotiations or new agreement hereinafter referred to as “ the transaction ” ( project / transaction ) for the purchase of all commodities, products and equipment
這項協議已經進入了議程,並應責以下簽字的當事各方和他們的合作夥伴公司,聯營公司,僱主,雇員,分支機構,子公司,母公司,和任何被提名人,代表,繼承人,客戶,並為其指定以下簡稱"各方"共同分開,可相互對等,以條款及條件明文規定,並獲通過下面這個協議可以參照,不時在任何文件,或書面協議和條款及條件本協議適用於任何信息交流,以書面或口頭方式,涉及的財務資料,個人或公司的名字,合同發起或參與的各方及加建,重建,擴建,滾動修正,重新談判或新的協議以下簡稱為"該交易" (工程/交易)用於購買所有商品,產品和設備。Abstract : biological invasions are a continuous feature of a non - equilibrium world, ever more so as a result of accidental and deliberate introductions by mankind. while many of these introductions are apparently harmless, others have significant consequences for organisms native to the invaded range, and entire communities may be affected. here we provide a survey of common models of range expansion, and outline the consequences these models have for patterns in genetic diversity and population structure. we describe how patterns of genetic diversity at a range of markers can be used to infer invasion routes, and to reveal the roles of selection and drift in shaping population genetic patterns that accompany range expansion. we summarise a growing range of population genetic techniques that allow large changes in population size ( bottlenecks and population expansions ) to be inferred over a range of timescales. finally, we illustrate some of the approaches described using data for a suite of invasions by oak gallwasps ( hymenoptera, cynipidae, cynipini ) in europe. we show that over timescales ranging from 500 10000 years, allele frequency data for polymorphic allozymes reveal ( a ) a consistent loss of genetic diversity along invasion routes, confirming the role of glacial refugia as centres of genetic diversity over these timescales, and ( b ) that populations in the invaded range are more subdivided genetically than those in the native range of each species. this spatial variation in population structure may be the result of variation in the patchiness of resources exploited by gallwasps, particularly host oak plants
文摘:生物入侵是不均衡世界的一個永恆話題,尤其是當人類有意或無意地引入物種后.很多引入顯然是無害的,但另外一些則有著嚴重的後果,會給入侵地的生物以至於整個生物群落造成影響.本文總結了分佈區擴張的常見模式,概述了它們對遺傳多樣性和種群結構式樣所造成的影響.描述了如何根據以一批遺傳標記所得到的遺傳多樣性式樣來推斷入侵途徑,來揭示伴隨擴張選擇和漂變在形成種群遺傳樣式中的作用.本文對日益增多的群體遺傳學方法進行了總結,這些技術可以用來在不同的時間尺度上推斷種群規模所發生的巨大變化(瓶頸效應及種群擴張) .最後,我們以歐洲櫟癭蜂(膜翅目,癭蜂科,癭蜂族)一系列入侵的數據為例對一些方法進行了說明.從500 10000年的時間尺度上,多態的等位酶位點上等位基因頻率的數據表明: 1 )遺傳多樣性沿入侵路線呈不斷下降的趨勢,支持了冰河期避難所作為遺傳多樣性中心的作用; 2 )入侵地區的種群與該物種原產地的種群相比,遺傳上的分化更為強烈.這種種群結構在空間上的變異可能是被櫟癭蜂開發的資源尤其是櫟樹寄主在斑塊上出現變異的反映However because of the our country market economy system still not mature, the taxpayer follows a level obviously lower, the taxpayer is very easy only from the oneself the economic benefits set out, for the revenue from tax that reduces the tax to take not follow the behavior inseparable, cause revenue from tax run off this revenue from tax advertises for the tube in of big hard nut to crack
隨著數據庫技術的成熟和數據應用的普及,在稅務系統每天所接收和處理大量的數據,人們保存如此大量的數據,一是因為計算機技術的發展使之變得方便可行,二是因為這些數據具有巨大的潛在作用。數據挖掘被認為是解決「數據爆炸」和「數據豐富」以及「知識缺乏」的一種有效方法。6 sas institute inc. data mining and case for sampling : solvingbusiness problems using sas enterprise miner software. sasinstitute white paper, 1998. 7 chen b, haas p, scheuermann p. a new two - phase sampling basedalgorithms for discovery association rules
但與之相關的一個關鍵問題:取樣誤差的量化模型和快速估計方法的研究被人們所忽視,同時已有結果的效率和真實適用性還需要人們進一步的改進以適應日益增長大規模數據庫處理的需求。Because of strong nonlinear constitute relation, the response calculation methods are noticed by many scientists. incremental harmonic balanced method ( ihb ) is one of the widely used methods
干摩擦隔振系統由於具有強非線性本構關系,它的響應計算問題被人們所關注,目前應用較多的是增量諧波平衡法( ihb ) 。Since this kind of technology appeared, people have paid close attention to it all the time. among the technology, remote data acquiring technology based on pstn, with the characteristics of flexibility and practicality ^ favoured by many developers and widely used in the fields of remote - checking - meter, ttm and remote - monitoring etc. this thesis has put forward a practical scheme for remote data acquiring system based on pstn
這種技術自出現以來,就一直為人們所關注。在遠程數據採集技術中,基於公眾電話網的遠程數據採集技術以其靈活、實用的特點為廣大開發人員所青睞,被廣泛應用於遠程自動抄表、心電電話監護和遠程監測等領域。本文提出了一種實用的基於公眾電話網的遠程數據採集系統的方案。For instance, a program may need to be told the list of users that can use it and what privileges each one should be given the sudo program is an example of such a program - sudo has to keep track of users and groups, on what machines they are allowed to use sudo, and what privileges they can reach
例如,程序也許需要告訴用戶列表,他們可以使用它了,以及每個人所應該得到的特權( sudo程序就是這樣程序的一個示例sudo必須了解用戶和組,他們在哪些機器上被賦予了使用sudo的特權,以及他們可以利用哪些特權) 。With the phenomenal prevalence of the intelligent communities and the rapid development of broadband access technologies, a variety of broadband technology based applications are becoming familiar to people day by day. video on demand system is the typical case among those applications
隨著智能化住宅小區的普及和寬帶網路接入技術的發展,各種基於寬帶技術的應用服務也日益被人們所熟悉, vod視頻點播是目前最關鍵的應用之一。On the one hand, the traffic system has hybrid dynamic property of discrete event and continuous time, high nonlinearity, non - stationary randomness with unknown distribution, fluctuating system parameters according to environmental conditions and people ' s travel demand, and strong - coupling adjacent intersections. therefore, the states of a traffic system are difficult to measure, predict or control. on the other hand, several kinds of control action are taken on the urban traffic system, such as signals at intersections, guiding information and etc. signals are the most commonly used control action
一方面,從系統動力學角度分析,具有離散事件一連續時間混合動態特性、高度非線性、非平穩未知分佈的隨機性、系統參數經常隨環境條件和人們出行需求發生漂移以及交叉口之間具有強耦合特性等,所以系統狀態難以準確測量、預測和控制;另一方面,交通系統的控製作用有很多種,如信號燈、誘導信息等,信號燈是當前被廣泛應用的主要控製作用。Rutile single crystal has been strongly interested because of its variability of physcal properties and particularity of photochemical characteristics afer it was artificially grown by c. h. moore in 1949. it has been applied in opt - communication, solar light energy conversion and jewels
Moore博士利用焰熔法首次人工合成了金紅石單晶體以後,其多樣的物理性質和獨特的光化學性能逐漸被人們所認識,在寶石裝飾、光通信以及光能轉換等領域已經有了廣泛的應用。分享友人