英语人>网络例句>taxonomy 相关的网络例句
taxonomy相关的网络例句

查询词典 taxonomy

与 taxonomy 相关的网络例句 [注:此内容来源于网络,仅供参考]

He taxonomy and distribution of several poisonous plants of Quercus Linn.

itle 栎属有毒植物的分类分布及其对家畜的危害。

Linnaeus ' s most famous contribution to taxonomy was his system of BINOMAL NOMENCLATURE, in which he gave plants two Latin names.

林奈最主要的贡献是建立了植物分类学上的双名法,规定植物用拉丁文命名。

Their taxonomy of mutants paralleled the Linnean system of natural species: every monstrosity was assigned a class, order, family, genus, and even species.

他们关于变异体的分类体系和林奈的自然物种体系是平行的:每一个怪物都有纲、目、科、属甚至种。

DODGE J D The Prorocentrales:Ⅱ.Revision of the taxonomy within the genus Prorocentrum Botanical Journal of the Linnean Society , 1975,2

陆斗定%齐雨藻%Jeanette Goebel%邹景忠%高亚辉东海原甲藻修订及与相关原甲藻的分类学比较应用生态学报, 2003,7

This paper extracted and analysed 11Math-Mophological Features such as Area, Perimeter, X-Length, Y-Length, Shape-Parameter, Lobation, Sphericity, Circularity, Roundness, Eccentricity and HoleNumber. Based on 40 species of insects which belonging to 8 Orders, 25 Families. And then ranks the accountability of 11 features each in insect identification while assessing their implication to insect taxonomy on levels of Order, Superfamily, Family and Species. More than those, also describes the kinship among the insects of various categories within the same level from the perspective of mathematical morphology through cluster analyses.

论文对隶属于8个目25科的40种昆虫利用计算机视觉技术进行了自动鉴别研究,从昆虫图像中提取和分析了这些昆虫的面积、周长、横轴长、纵轴长、形状参数、叶状性、球状性、圆形性、似圆度、偏心率、亮斑数等11项数学形态特征,并分别探讨了在目、总科、科及种分类阶元上这些数学特征在昆虫分类中的应用可能性和可靠性,利用聚类分析从数学形态学角度对所涉及到的同阶元昆虫类群的亲缘关系做了描述。

It well informs the research advances in all aspects of mammalogy,including anatomy, morphology, palaeontology, taxonomy, molecular biology, physiology, neurobiology, ethology, genetics, reproduction, development, evolutionary biology, domestication, ecology, wildlife biology and conservation biology etc.

该杂志全面提供了哺乳动物学各方面的研究进展,包括解剖学、形态学、古生物学、分类学、分子生物学、生理学、神经生物学、动物行为学、遗传学、繁殖、发育、进化生物学、驯养、生态学、野生动植物生物学以及保存生物学等等。

As a result of analysis to many of the results of experiment, checked up on specimens, field investigation and combining with the theories of palaeobotany, comparative morphology, evolutional morphology of vascular plants and taxonomy, it can be concluded as following: the primitive sorts of Cycadaceae are the sorts that pinnate leafs are dichotomy; among these, the sort that pinnate leafs are tripinnate-dichotomy is most primitive, from this sort gradually evolve to bipinnate-dichotomy, to only for monopinnate-dichotomy, from this sort evolve to the sorts that pinnate leafs are simply pinna; among the sorts of simply pinna, the species that segments of megasporophyll possess much more triplicate to monodichotomy are most primitive.

经过大量的实验结果分析、查阅标本和野外调查,结合古植物学、比较形态学、演化植物学和分类学等理论进行分析,认为苏铁科原始的类型为羽叶呈二歧状分叉的种类,其中最原始的又是羽叶呈三回二歧状分叉的种类,从这个羽叶类型逐渐演化出一回二歧状分叉的羽叶类型,再演化出羽叶为单羽状的类型;而单羽状叶的类群中,又以大孢子叶侧裂片具三回、二回及一回二歧状分叉数量多的种类为最原始,而侧裂片二歧状分叉数量少的为较进化,侧裂片无二歧分叉的如拳叶苏铁类为最进化的种类。

The security of PKI system itself is especially emphasized during the system design and implementation process, which is in accordance with the pervasive characteristic of PKI. Second, the concept of a Trusted Key Management Center is introduced for the first time. This technology greatly strengthens key management practices and allows for smooth transition from PKI to Key Management Infrastructure. Third, certificate status mechanisms are investigated in depth, and a certificate revocation performance simulation system is devised. All these work will provide guides to practice and employment of PKI applications. Based on time constraints, a new taxonomy for authenticated dictionaries is proposed. Fourth, formal analysis ofOCSP protocol is carried out; then an efficient and scalable OCSP system is developed. Fifth, the special requirements caused by the working environments of Wireless PKI are analyzed. Based on communicative hashing and dynamic Merkle hash tree, an efficient certificate status validation method suitable for WPKI is presented. Sixth, one important kind of fair exchange protocols is studied, and a new CEMBS based on RSA cryptosystem is proposed. Afterwards, a novel fair exchange protocol totally based on RSA signature scheme is devised.

在系统设计和实现的过程中,考虑到PKI作为普适性安全基础平台的特点,特别强调PKI系统自身的安全性;第二,首次在PKI系统的设计中提出了"可信密钥管理中心"的概念,这一独特设计大大地强化了密钥管理功能的实施,为PKI向密钥管理基础设施的平滑过渡提供了良好的技术准备;第三,对证书状态验证机制进行了深入研究,设计了证书状态模拟系统,以指导PKI系统和应用的部署和实施;在此基础上,基于时间约束首次给出了认证字典的一种新的分类方法;第四,对OCSP协议进行了形式化分析,设计和实现了一种高效、可扩展的OCSP系统;第五,分析了WPKI工作环境对设计安全基础平台提出的特殊要求,结合无线移动设备的具体特点,基于可交换杂凑函数和动态Merkle杂凑树设计出了一种适用于WPKI环境的高效证书状态查询机制;第六,对一类公平交换协议进行了深入的研究,从设计公平交换协议的密码基础结构出发,提出了一种新型的基于RSA密码体制的高效CEMBS;在此工作的基础上,设计了一种基于RSA密码体制的最优化公平交换协议。

The security of PKI system itself is especially emphasized during the system design and implementation process, which is in accordance with the pervasive characteristic of PKI. Second, the concept of a Trusted Key Management Center is introduced for the first time. This technology greatly strengthens key management practices and allows for smooth transition from PKI to Key Management Infrastructure . Third, certificate status mechanisms are investigated in depth, and a certificate revocation performance simulation system is devised. All these work will provide guides to practice and employment of PKI applications. Based on time constraints, a new taxonomy for authenticated dictionaries is proposed. Fourth, formal analysis of OCSP protocol is carried out; then an efficient and scalable OCSP system is developed. Fifth, the special requirements caused by the working environments of Wireless PKI are analyzed. Based on communicative hashing and dynamic Merkle hash tree, an efficient certificate status validation method suitable for WPKI is presented. Sixth, one important kind of fair exchange protocols is studied, and a new CEMBS based on RSA cryptosystem is proposed. Afterwards, a novel fair exchange protocol totally based on RSA signature scheme is devised.

在系统设计和实现的过程中,考虑到PKI作为普适性安全基础平台的特点,特别强调PKI系统自身的安全性;第二,首次在PKI系统的设计中提出了"可信密钥管理中心"的概念,这一独特设计大大地强化了密钥管理功能的实施,为PKI向密钥管理基础设施的平滑过渡提供了良好的技术准备;第三,对证书状态验证机制进行了深入研究,设计了证书状态模拟系统,以指导PKI系统和应用的部署和实施;在此基础上,基于时间约束首次给出了认证字典的一种新的分类方法;第四,对OCSP协议进行了形式化分析,设计和实现了一种高效、可扩展的OCSP系统;第五,分析了WPKI工作环境对设计安全基础平台提出的特殊要求,结合无线移动设备的具体特点,基于可交换杂凑函数和动态Merkle杂凑树设计出了一种适用于WPKI环境的高效证书状态查询机制;第六,对一类公平交换协议进行了深入的研究,从设计公平交换协议的密码基础结构出发,提出了一种新型的基于RSA密码体制的高效CEMBS;在此工作的基础上,设计了一种基于RSA密码体制的最优化公平交换协议。

Tell me it is a new species we are foreign to And it metamorphoses like an extraterrestrial butterfly, beyond taxonomy.

你可以越过我的双肩透过我的脑袋看着远天,看西下的夕阳正为流浪者设定黑暗的闹钟。

第10/31页 首页 < ... 6 7 8 9 10 11 12 13 14 ... > 尾页
推荐网络例句

Plunder melds and run with this jewel!

掠夺melds和运行与此宝石!

My dream is to be a crazy growing tree and extend at the edge between the city and the forest.

此刻,也许正是在通往天国的路上,我体验着这白色的晕旋。

When you click Save, you save the file to the host′s hard disk or server, not to your own machine.

单击"保存"会将文件保存到主持人的硬盘或服务器上,而不是您自己的计算机上。