定义的
- 与 定义的 相关的网络例句 [注:此内容来源于网络,仅供参考]
-
On the basis of the definition of the range, the distinction of non-tolerable area and neglectable area and the risk evaluation of tolerable area are performed.
在范围定义的基础上,进行不可容忍区辨识、可忽略区辨识,以及对可容忍区的风险估计。(4)法律风险价值链管理模型的建立。
-
Similarly, the nonstatic member functions in the enclosing class have a this pointer that points to an object of the enclosing type. That object has only the members defined in the enclosing class.
同样,外围类中的非静态成员函数也具有 this 指针,它指向外围类型的对象,该对象只具有外围类中定义的成员。
-
The OAM performance management function defined by ITU T, however, simply monitors network performance and reports performance information. It can not give QoS management an enough support.
但是 ITU - T定义的 OAM性能管理功能只简单地监视网络性能、产生报告信息,而不能对 Qo S的管理提供足够的支持。
-
The algorithm directly imports the core into each solution constructed by ants and reduces the problem scale. The new state transition rule and pheromone updating rule reflects the orderless characteristic among attributes, and benefits the search in the neighborhood of good solutions.
该算法将属性核直接引入到蚂蚁构造的每一个解中,降低了问题规模,新定义的状态转移规则和信息素更新规则体现了约简中属性间的无序性特点,有利于在优解邻域内搜索。
-
Hierarchy for Pattee was the product of differential connectedness within one system.
派蒂定义的层级是系统内的连接性差异化的产物。
-
Hierarchy for Pattee was the product of differential connectedness within one system.
派提定义的层级是系统内的连接性差异化的产物。
-
The software also supports gene expression analysis of data produced using commercial assays, including QuantiGene Plex kits, automatic outlier detection based on standard deviation within a replicate group, and support for customizable reports.
这套软件还支持使用商业检测方法获得的基因表达分析,包括QuantiGene Plex试剂盒、根据重复组标准差自动进行的无关项检测,并支持进行拥护自定义的报告。
-
All functions and methods defined in this module are equivalent to the C functions with "AL" prefixed to their name.
本模组所定义的所有函数及方法和 C 中以&AL&前缀的同名函数是等价的。
-
Law, an Elliptic Curve Cryptography based Secure and efficient authenticated key agreement protocol - SEAK protocol are proposed.
为此,按照L.Law所定义的认证密钥协商协议的安全特性,提出一种基于椭圆曲线密码体制的安全高效认证密钥协商协议——SEAK协议。
-
So conforming to the authenticated key agreement security attributes defined by L. Law, an Elliptic Curve Cryptography based Secure and efficient authenticated key agreement protocol - SEAK protocol are proposed.
为此,按照L.Law所定义的认证密钥协商协议的安全特性,提出一种基于椭圆曲线密码体制的安全高效认证密钥协商协议——SEAK协议。
- 推荐网络例句
-
As she looked at Warrington's manly face, and dark, melancholy eyes, she had settled in her mind that he must have been the victim of an unhappy attachment.
每逢看到沃林顿那刚毅的脸,那乌黑、忧郁的眼睛,她便会相信,他一定作过不幸的爱情的受害者。
-
Maybe they'll disappear into a pothole.
也许他们将在壶穴里消失
-
But because of its youthful corporate culture—most people are hustled out of the door in their mid-40s—it had no one to send.
但是因为该公司年轻的企业文化——大多数员工在40来岁的时候都被请出公司——一时间没有好的人选。