隱極性的 的英文怎麼說
中文拼音 [yǐnjíxìngde]
隱極性的
英文
cryptopolar-
With the rapidly development of computer network technology and the widely use of network technology in every walk of life, people transmit data through computer network more and more frequently, including all kinds of secret information ( for example, military secret ; bussiness secret ; personal private information ). today, as a result of poor security of our network system, we can not prevent the transmittied information from stealing and modifying unlawful. thus, the computer network technology is applied to our daily life restrictedly. recently, many network applications with voip ( for example msn messenger ; dialpad ; distributed multipoint multimedia conferences ) take no measures to encrypt their data
隨著計算機網路技術的迅猛發展和網路技術在各行各業中的廣泛應用,人們通過計算機網路傳輸數據日益增加,其中包含了各種機密信息(例如軍事機密信息、商業機密信息、個人隱私信息等) 。由於目前的網路系統缺乏足夠的安全性,不能有效防止網路上所傳輸的信息被非法竊取和修改,因而極大地限制了計算機網路技術在日常工作中的應用。當前,基於voip技術的各種網路應用,如msnmessenger , dialpad ,以及一些分散式多媒體會議系統,竟然未採取任何加密措施3. taking use of wing - fuselage fusion lifting body design technology, which not only achieves good aerodynamic characteristic, but also is good to stealth and agility to system arrange. 4
採用翼身全融合?升力體設計技術,不僅獲得了優越的氣動性能,而且也將對隱身性能帶來好處,為總體布置和裝載帶來極大的靈活性。" extreme " can be meant to describe any of the following traits : music ( whether it ' s intended to be faster, more aggressive, abrasive or " heavier " than other metal styles ), lyrics ( dealing with darker, more salacious or sensational topics and themes ), vocals ( which often use guttural, harsh or abrasive singing ), or appearance and stage demeanor ( using corpse paint, satanic or occult imagery )
"極端"一詞可形容下列任何一種特質:音樂(不論它的用意是為了比其他金屬風格更快,更進取,磨料或"沉" ) ,歌詞(更黑暗,更淫穢或煽情的題材和主題) ,聲樂(經常使用喉嚨,苛刻或磨損的方式來歌唱) ,或形象和舞臺演繹(用屍體油漆,撒旦或隱匿性意象) 。Due to the high level of secrecy of the saudi arabian justice system, trials are invariably held behind closed doors
由於沙國司法體系極高的隱密性,審判總是不對外公開的。On the methodological bases of simpatico comprehension and positive rational criticism, this thesis combs and explains liang shuming ' s ideas of ultimate concern from multi - dimensions, especially from the three perspectives of confucianism, buddhism and taoism, analyzing his related practical activities and investigating the reasons for forming his ideas such as the influences of families, times, and social cultural traditions. thus, the ideas of ultimate concern of " the last confucian " and his latent worrying mentality are showed clearly, and his hard train of thought for pursuing for the confucian ideas, that is, the inside integrated personality and the outside activities reforming society, was returned to original condition
本文以同情的理解和(積極意義上)理性的批判為方法論依據,對梁漱溟終極關懷思想,特別是從儒釋道三方面資源進行了多角度梳理和闡釋,並系統分析了他的關實踐活動,考察了其思想形成的原因? ?包括家庭、時代、社會文化傳統等方面的影響,從而凸顯出這位「最後的儒家」的終極關懷及隱藏在背後的憂患意識,還原了他追求儒家「內聖外王」的艱難心路歷程。Behind this battle lies another one, in which the cme ' s competitors are fighting to persuade trustbusters that its bid, if successful, would create a monopolistic monster, whereas the exchange insists that the deal is about staying ahead of the pack, not price - gouging
在這場較量後面隱藏著另外一個斗爭,芝加哥商業交易所的競爭者正極力勸說反托拉斯者,如果這個投標取得成功,它會產生一個壟斷性的巨型公司,然而,芝加哥商業交易所堅持認為,這個交易是和領先行業競爭隊伍有關,而不是哄抬價格。Affirming inside dealing is extremely difficult on account of the concealment of the inside dealing of itself and the complication of our country ' s special social surrounding. in addition, owing to the deviation in the thoughts about the legislation of securities and corresponding vacancy in civil liability of compensation, the protection of investor ' s legitimate rights and interests has been ignored just like in a vacuum zone
由於內幕交易行為本身的「隱秘性」及我國特有的社會環境,使得實踐中內幕交易的認定極為困難;而且,證券立法思想的偏差以及因此導致的民事責任制度的缺位,使投資者合法權益的保護處於法律制度設計的真空地帶。The first section of this paper gives a brief introduction about the basic concepts, terminology and symboles which are used in this paper. in section 2, we give an accurate discussion about the structure of a kind of graphs in [ 6 ] and get the extremal graph. in the third section, we introduce a new concept - - - - implicit weighted degree and using it we give a condition on the existence of heavy cycles in weighted graphs
在本文的第一部分中,我們簡要介紹了論文中所涉及的一些概念,術語和符號;在第二部分中,我們對中圖的結構進行了精確的討論,給出了一個極圖;在第三部分,我們定義了一個新參數?隱賦權度,給出了賦權圖中重圈存在的隱賦權度條件;最後,在第四部分,我們給出了賦權圖中過兩點的重圈存在性的dirac型條件。In order to guide the masses lu actively join in this grand and spectacular movement, the leaders adopted the manner of political mobilization, which is fit for the national conditions of china, to fully arouse the masses " initiative and stimulate the political enthusiasm hidden in them. this provided a widespread and far - reaching mass basis for the leadership of cpc
為了引導群眾積極投身於這場「轟轟烈烈」的運動,領導者採用了適合中國國情的政治動員方式來充分調動群眾的積極性,激發隱藏在群眾中的政治熱情,並以此作為黨的領導的廣泛而深厚的群眾基礎。Therefore, the realization of the long - distance, high - resolution and shady infrared system is very important and has great economy benefits
因此,研製作用距離遠、解析度高、隱蔽性好的紅外成像系統有很大的現實意義和極大的經濟效益。At the same time, it effectively improves the responsibility, quality and science - study spirit of the teachers ". what more, it changes the teachers " role in teaching process the problem - based and bi - teaching concerned in this article not only has an active effect on the environment education, but also has good effects on the elementary education
本文提出的「問題為本」 、 「互動教學」 、 「情景強化」 ,不僅對開展環境教育起到積極的作用,而且對基礎教育改革也產生有益的影響,它所起到的或顯性或隱性的作用,是以往的「選修課、活動課」所不能比擬的。In the past fifty years or so, with the development of the under water acoustic engineering and shock absorption, the capabil ity of modern submarine is greater then ever before. now it has become the u1timate weapos for each country in the wor1d
在過去的五十年中,隨著水聲工程學和減振降噪技術的進步,潛艇的隱身性能得到了空前發展,在國家之間的對抗當中也成為極為重要的「殺手鐧」類的武器。6 the laws governing the internal faults are investigated. this has provided theoretic foundation to the configuration and optimization of protection for synchronous generator with internal armature winding faults
本文所討論的雖然是凸極同步發電機,但是其結構具有一定的代表性,隱極同步發電機可以作為特例用類似的方法分析。In training of back - propagation neural network, parameter adaptable method which can automatically adjust learning rate and inertia factor is employed in order to avoiding systemic error immersed in a local minimum and accelerating the network ' s convergence ; introduced the further optimization of the network ' s structure, it gives the research result of selection of the hidden layers, neurons, and the strategy of re - learning, compared the sums of the deviation square of this algorithm with conventional bp algorithm, as a result, the approach accuracy and the generalization ability of the network were extremely improved
在對前饋神經網路的訓練中,使用參數自適應方法實現了學習率、慣性因子的自我調節,以避免系統誤差陷入局部最小,加快網路的收斂速度;提出了優化bp網路結構的實驗研究方法,並給出了有關隱含層數和節點數選擇以及再學習策略引進的研究結果。將該演算法同傳統bp演算法的預測偏差平方和進行比較,結果證實網路的逼近精度及泛化能力均得到了極大的提高和改善。China s rigid currency regime is highly distortionary and poses risks to china s economy - - sowing the seeds for excess liquidity creation ; asset price inflation ; large speculative capital flows ; and over - investment
中國一成不變的貨幣制度具有極大的扭曲性,使中國經濟面臨風險埋下種種隱患,導致流動資產過渡積累,資產價格膨脹,巨額投機資本流動和過度投資。In the part six, gene weapon and the human beings peace. peace and development is two topics of world. gene weapons can make the human beings " peace suffer danger. owing to its concealment and convenientment, gene weapons have become some countries " secrety weapon. this dangers the human beings " tranquilment and peace
在第六章基因武器與人類和平中,指出和平與發展是當今世界的兩大主題,而基因武器則會使人類和平遭受威脅。由於其隱蔽性、方便性的特點,基因武器可能成為某些國家積極發展的戰爭利器,嚴重威脅到人類的安寧與和平。Without any restrictions on releasing the gene inheritance information, especially without voluntary and pre - required restrictions on ethic responsibility, it is quite possible that the research of the gene research group will not be able to improve its future study for protecting human security and health as well as the citizen ' s right to privacy and for bringing mankind happiness
如果對基因遺傳信息的解密不做任何限制,特別是不做自願的、具有前瞻性的責任倫理的限制,就極有可能使基因組的研究在後基因組時代無法更完善、更恰當充分地用於維護人類的生命健康及安全,以保護公民的隱私權,增進人類的福祉為目的。After designing the hidden - layer structure of network, the neural network data - mending program is developed with matlab, and with the contrast of results gained from single and double hidden - layer the number of hidden - layer is selected. after the training algorithm is studied, using the visual application - designing tool, visual basic, the application adopting the designed algorithm is developed. with plenty of experimental study, the node number of the hidden - layer is decided and the rational algorithm is designed, which can advance the speed of training network, and decrease the probability of running into the local teeny value
在研究網路隱層結構后,用matlab編制了神經網路修補程序,對比單雙隱層結構的修補結果,確定了修補用bp神經網路的隱層數;在研究網路訓練演算法后,利用可視化應用程序開發工具visualbasic ,編制了相應的應用程序,通過大量的實驗研究,確定了網路隱層節點數,設計了合理的網路訓練演算法,提高了網路的訓練速度,減小了網路訓練陷入局部極小的可能性。Network attacks damaged networks and users, among which dos ( denial of service ) attacks become one of the common network attack techniques by the characteristics, such as extensive area, strong concealment, simpleness and efficiency, etc. dos attacks greatly affected the effective service of network and host systems, especially among which, ddos ( distributed denial of service ) attacks are greatly threatening internet, since they are difficult to recognize and defense due to their concealment and distribution
隨著網際網路的迅速普及和應用的不斷發展,各種黑客工具和網路攻擊手段也隨之倍出,網路攻擊導致網路和用戶受到侵害,其中拒絕服務( dos , denialofservice )攻擊以其攻擊范圍廣、隱蔽性強、簡單有效等特點成為常見的網路攻擊技術之一,極大地影響網路和業務主機系統的有效服務。其中,尤其是分散式拒絕服務( ddos , distributeddenialofservice )攻擊,由於其隱蔽性和分佈性很難被識別和防禦嚴重威脅著internet 。The motion, to be proposed by hon andrew leung kwan - yuen, says : " that, as there are from time to time complaints about serious invasion of personal privacy by some media organisations and earlier on, peep photos of a female artiste changing her clothes had been taken and published by a magazine which seriously invaded the privacy of the artiste and trampled on women s dignity, thereby causing a great public outcry ; this council urges the government to expeditiously take measures, including
該項議案將由梁君彥議員提出,內容為:鑒于不時有投訴指部分傳媒機構嚴重侵犯個人私隱,早前更有雜志偷拍及刊登女藝人的更衣照片,嚴重侵犯當事人的私隱及踐踏女性的尊嚴,引起公眾極大不滿,本會促請政府盡快採取措施,包括:分享友人