隱域性的 的英文怎麼說

中文拼音 [yǐnxìngde]
隱域性的 英文
intratelluric
  • : Ⅰ動詞(隱瞞; 隱藏) hide; conceal Ⅱ形容詞1 (隱藏不露) hidden from view; concealed 2 (潛伏的; ...
  • : 名詞(在一定疆界內的地方; 疆域) land within certain boundaries; territory; region
  • : Ⅰ名詞1 (性格) nature; character; disposition 2 (性能; 性質) property; quality 3 (性別) sex ...
  • : 4次方是 The fourth power of 2 is direction
  1. Cryptic species have been found in a wide range of marine organisms ; with majority of them are benthic invertebrates. in contrast, marine holoplanktons are thought to have lower diversity and slow speciation due to their strong dispersal potential. this paper reviewed studies on cryptic species and speciation in marine holoplankton. based on findings in 38 studied taxa, it was concluded that : 1 ) cryptic species are pervasive in marine holoplankton, suggesting holoplankton speciation was more active than previously thought ; 2 ) current morphospecies diversity is untenable to reflect true species diversity in marine holoplankton ; 3 ) geographic isolation may facilitate cryptic speciation of marine holoplankton. however, contribution of allopatric speciation is still questionable ; 4 ) ecological speciation may be the prevailing speciation mode in marine holoplankton. cryptic speciation in marine holoplankton is paradoxical, because rapid speciation under strong gene flow is countertuitive. solution of this paradox will help us gain deep insights of marine speciation and biodivesity

    種廣泛存在於各類海洋生物中,尤其是底棲無脊椎動物.然而,海洋終生浮游生物由於具有較強擴散能力,往往被視為生物多樣低、物種形成慢.本文就海洋終生浮游生物種與物種形成研究作一綜述.基於研究38個種類,結果表明: 1 )海洋終生浮游生物普遍存在種,其物種形成要比想象得快; 2 )由於引種廣泛存在,形態種生物多樣無法反映海洋終生浮游生物真正物種多樣; 3 )地理隔離有助於海洋終生浮游生物形成,但異物種形成作用仍值得商榷; 4 )生態物種形成很可能是海洋終生浮游生物物種形成主流模式.海洋終生浮游生物強基因流下快速物種形成有悖于生物進化常理,解決該悖論將有助於我們對海洋物種形成和生物多樣理解
  2. However geological information is fully recorded in the remote sensing image, which made it possible for the choosing of this area as a dissection point to extract complex structural information of orogenic belt in west china. taking fully advantage of multi - band image richly bearing concealed geological information in combination with remote sensing analysis and structure analysis, to anatomy the supracrustal composition and structure of orogenic belt with the regional linear structures and their partitioned block and schistous geological masses as the macro - frame ( in corresponding to structure units and structure segments ) and with the rock masses, structure - rock assemblages, line - featured and belt - featured structures as well as penetrative and non - penetrative foliation ( primary stratum and trans position layering ) and folds as the texture and structure elements. the methods of how to distinguish granulite > ductile - shear zone, imposed fold, different deformed belts -

    因而,本文選擇這一地區作為我國西部地區從遙感圖像上提取造山帶復雜結構構造信息解剖區,充分利用遙感圖像多波段反映物質屬特點和圖像處理提取含信息優勢,採用遙感解析?構造解析相結合研究方法,以區線狀構造及由它劃分塊狀、片狀地質體為宏觀骨架(對應于構造解析劃分構造單元、構造均勻區段) ,以地質體中巖石巖體、構造巖石組合,線狀、帶狀構造,透入、非透入面狀(原始層理、新生面理)和褶皺等構造作為用於解析結構構造要素,進行造山帶表殼組成和結構構造解析研究。
  3. Stegnoraphy are widely used in many domains. the very challenging problem, which has n ' t been paid enough attention, is data hiding in binary images

    信息藏技術已在多個領獲得應用,但研究較少、具挑戰工作是二值圖像信息藏。
  4. In the research realm of the target identify, an important topic is to minish the laser radar cross section of the space target for target stealth. the laser radar probes a target is based on the target under the laser, the space and time distribute characteristic of the strength ? polarization and phasic of the laser scattering etc. to identify a target

    在目標識別研究領有一個重要課題是減小空間目標激光雷達散射截面便於目標身。激光雷達探測目標是根據目標在激光照射下,激光散射強度、偏振和相位等空間和時間分佈特徵來識別目標,目標表面粗糙度是影響目標激光散射特重要影響因素。
  5. At the beginning of 60 years, laser radar whose primary function is to measure distance appeared. developping for nearly half century, laser rader have been widely applied in many areas, especially in military application because of its particular merits such as high angle - solution, high - speed - solution, high - ditance - solution, nice - anti - jamming ability and good consealment. recently, in iraq war, the precision control and guide weapons depend on laser radar techniques embodied their powerful abilities. the laser radar technique is a very important part in u s military system

    歷經半個多世紀以來,激光雷達以其高角解析度,高速度解析度,高距離解析度,強抗干擾能力,好,以及出色全天候工作能力在很多技術領尤其是軍事領中得到廣泛應用。最近伊拉克戰爭中,以激光雷達為依託精確制導武器顯示出了其強大作戰能力,激光雷達技術在美軍作戰系統中扮演著重要角色。
  6. The operator and zuji properties do not warrant the accuracy, completeness, currency or reliability of any of the content or data found on this site and, subject to the statutory warranties below, expressly disclaim all warranties, terms and conditions, including all implied warranties, terms and conditions of merchantability, satisfactory quality, fitness for a general or particular purpose and non - infringement of proprietary rights, and those arising by statute or otherwise in law or from a course of dealing or usage of trade to the fullest extent permitted by the laws of the territories

    在盡地法律準許范圍內,該經營商及zujiproperties概不保證本網站出現任何內容或數據準確、齊全、有效或可靠,而在受以下法定保證規限下,明確免除一切保證、條款及細則,包括商售、合格品質、適合普遍或特定用途及不侵害專利權利、藉成文法或其他法例、交易過程或運用貿易而產生權利等一切含保證、條款及細則。
  7. First, enacting a " biosafety law " as a framework for the laws of the biosafety management ; second, making special laws on the biosafety management, or supplying with the existing laws which are in connected with biosafety problems ; third, making laws on genetically modified organisms environmental impact and safety assessment, cross - border transfer of the management of biotechnology, genetically modified organisms labelling management, and other areas of laws and regulations to face biosafety problems recently ; then, giving some suitable advices on the main issues of biotechnology that damage the legislation and the disputes of procedures legislative ; last, pointing out other

    首先,應當制定一部《生物安全法》作為框架生物安全管理法律;其次,制定各領生物安全專項管理法律,或對原有有關法律進行補充;再次,提出制定轉基因生物環境影響和安全評價、生物技術成果越境轉移管理、轉基因生物標簽管理等方面法律、法規,應對目前生物安全主要問題,並對生物技術損害法律責任承擔和糾紛處理程序立法提出建議;最後,指出其他部門立法中有關生物安全方面應當進行修改,包括知識產權法中基因專利方面,民法中有關基因私權方面,刑法中基因犯罪方面,等等。
  8. Through the non - locality of the quantum entanglement, teleportation schemes of arbitrary two - particle and three - particle states are proposed

    通過量子糾纏非局,提出了實現任意二粒子和三粒子量子態形傳送方案。
  9. The mutation, contrast and heterogeneity of ecological interface between oasis and desert ecosystem increased. rare natural or non - regional mosaic of patch show obvious sensitivity to spatial scale, the change ratios of theirs area and perimeter are greater than large patch

    同時通過測度敏感檢驗,表明在尺度變換中,稀少自然或斑塊鑲嵌體對空間尺度敏感大,面積、周長等變化率大於大斑塊,隨尺度中度干擾則合併成較大斑塊,隨尺度強烈干擾或隔離加強后最先消失。
  10. De compwi the above proving, we ffo tw thest hav the are logical struan and none of them hav inequaies, bo the m h between m is that the cabello " s idethod has the statisthal natur just as beli inequalities, the the htw " s edd is the noredshal one. twly the incompatibitw of quantal theory and lotal hidden variable theory has ben proved the rnore - - state, le

    在haray定理邏輯結構基礎上用更簡潔方式證明定變量理論不可能重現量子力學結果,對比表明這兩種邏輯結構類似且都是不涉及不等式方法根本不同之處在於:前者實質上與不等式形式bell定理一樣均為「統計證明,而後者則是「非統計方法。
  11. Such designing idea is different from the way knowledge of problem solving is implied in the program in the existing program of the game of go, but it separate the knowledge of go field to consist of the entity of repository separately. by doing this it is convenient for the improvement and modification of knowledge and will make the system easy to expand and maintain

    這樣設計思路不同於現有圍棋程序中把問題求解知識含地編在程序中方法,而是將圍棋領知識單獨分開組成一個知識庫實體,便於知識完善和修改,使系統具有良好擴充和維護
  12. [ note : 3. 5 discusses linkage issues. the notions of scope, point of declaration and name hiding are discussed in 3. 3

    注: 3 . 5討論連接問題。作用,聲明點和名字概念在3 . 3中討論。
  13. Firstly, in this paper, we review the histories of xml and xml database, and all kinds of data models used widely now. then we review traditional access control policies and policies specially used on xml, and present a new expression method of access set on xml based on child tree of w3c data model. and we bring rbac model into xml database and present a new xml access model x - rbac. because the usage of data in databases has high frequency, we present an ids model based on access set density to logging the potential security threats. and then we introduce the design and implementation of a prototype of our native xml database nhx and its access control system. finally, we draw a conclusion for this paper and the future work

    本文首先回顧了xml及xml數據庫歷史,並總結了目前廣泛使用xml數據模型,在分析了各種傳統數據庫訪問控制策略,以及xml專有訪問控制策略優缺點后,基於w3cxml數據模型,提出了一種基於子樹具有高彈便於實現訪問區表示法,並將rbac模型引入進來,提出了一種適用於xml數據庫訪問控制模型x - rbac ,同時為了區分xml數據庫訪問中合法訪問和合理訪問,我們根據數據庫訪問具有頻繁這一特徵,提出了一種基於區訪問密度入侵檢測模型( ids ) ,以對藏在正常訪問中潛在安全威脅進行報警和日誌。
  14. It ’ s an autonomic working manner not depending on external information. it has the character of security and immunity to the outside interference such as weather and electron so is widely used in the field of spaceflight and aviation

    它是一種自主工作方式,不依賴于外界信息,好,不受氣候、電子等外界因素影響,因此廣泛應用於航空航天等領
  15. Civil air defense alarm system was a system to dispense antiaircraft alarm sig - nal, hand hostile air attack informational communication to urbanite at wartime. it is a particular informational communication system of the civil air defense depart - ment, and can not be taken place. at the development trend of digitaliza - tion, unitization, integration of civil air defense communication, the civil air defense alarm system is developing too, for adaptation to the require of both future war and peaceful dual, and enhancing civil air defense communication system ' s directing automation. in recent years, development of different kinds of communication technology infuses new clearly energy into communication, especially spread spectrum communication, because of its strongly interference - free feature, invisibility best, realizable code division multiple access and antimultipath wane and so on merit, gets extensive use at wireless region ; the corresponding spread spectrum chips emerge as the times and get boom, which provides advantag e to realization of the circuit of spread spectrum communication. at the same time, in company with the advance of electronics level, the single chip microcomputer has a great development, world renowned chip manufacturer pushout respective products one after another, the kinds of which are too many to statiste

    在人防通信數字化、一體化、綜合化必然發展趨勢下,人防警報系統也不斷發展,以適應未來戰爭和和平時期雙重需要,提高人防通信系統指揮自動化。近年來,各種通信技術發展給通信注入了活力,擴頻通信更因其抗干擾能力強、好、可實現碼分多址和抗多徑衰落等優點在無線領得到了廣泛應用;其相應擴頻處理晶元應運而生並得到迅速發展,這為擴頻通信電路實現提供便利。同時隨著微電子工藝水平提高,單片微型計算機有了飛躍發展,世界上著名集成電路晶元製造商紛紛推出各自產品,單片機型號之多,已達到難以統計地步。
  16. A culture - sensitive comparison is any comparison that explicitly or implicitly uses a

    區分區比較是顯式或式使用
  17. In this thesis, the preparation and measurement of bell states of two particles are introduced. a scheme for teleportation an arbitrary three - particle state is proposed, which is possible to extend for teleporting an arbitrary n - particle state. in terms of the basic logic gates, the quantum logic circuit for teleporting a qubit and an arbitrary two - particle state are also presented

    本文從量子糾纏非局討論出發,給出了兩體糾纏四個正交完備基及其測量方法,從未知量子態形傳送基本原理出發,討論了三粒子任意量子態形傳送過程,並討論了推廣到多粒子任意量子態形傳送可能
  18. Data mining is a collection of engineering methods proposed for solving large practical problems of machine learning, pattern recognition, database technology etc. the purpose of data mining is to discover the implicit knowledge or rule, and to help human expert to make decision. frequent pattern mining ( fpm ) and bayesian network learning ( bnl ) are two useful technologies of data mining

    數據挖掘技術是解決機器學習、模式識別、數據庫技術等各種領大型實際應用問題而提出一些工程方法集合,主要是為了從大型數據庫中高效地發現含在其中知識或規律,並為人類專家決策提供支持。
  19. Unlike the implicit example previously, you do not need to maintain a resource file for each. aspx page ; instead, you can maintain a single series of files for each language or culture you support

    與前面介紹式示例不同,您無需為每個. aspx頁維護一個資源文件;相反,您可為支持每種語言或區維護一系列文件。
  20. In the third part, the essences of steganography and disadvanges of common visual perception evaluation, such as psnr and wpsnr are studied. based on analysis local error that is introduced by embedding information, combining hvs, three objective perception evaluation method for steganography performance are proposed, which are based on human visual systems and local statistic error distribution respectively. in the steganalysis part, a steganography security statistic attack model and methods for some steganography methods are presented

    在信息能評價方面,研究了常用峰值信噪比,加權峰值信噪比等前人提出感知能評價準則,指出針對信息能評價不能單純從視覺特出發,提出從信息數據特和感知特出發,結合局部特來考察失真誤差變化思想,並據此提出基於局部區誤差統計分佈和視覺掩模方法評價信息方法。
分享友人