追踪
- 与 追踪 相关的网络例句 [注:此内容来源于网络,仅供参考]
-
The results suggested that the DG might participate in the neural circuit important for the consolidation of trace eyeblink CRs, and that the granule cells might encode different information during the consolidation of trace eyeblink CRs.
这些结果提示:齿状回可能参与巩固追踪性眨眼条件反应所需的神经环路,其颗粒细胞在追踪性眨眼条件反应巩固过程中可能编码不同的信息。
-
In the key step of this method (the process of contour tracking), the paper puts forward the concept of grid right-correlation flag to determine the initial segment of tracking curve. In the tracking procedure, the trend of subsequent points are determined by the combinatorial values of neighborhood cells, and a method is designed to avoid contours crossing. In order to obtain high-quality contour line, it adopts it adopts the linear interpolative method to show a contour chart of accurate localization and better visual effect.
在该方法的关键过程中,提出栅格右关联标志的概念,并据此确定初始追踪段;追踪过程中依据邻域栅格值的组合特征确定后续点的走向,设计了避免等值线交叉的处理措施;为获得高质量的等值线图形,采用线性插值方法,得到准确定位和视觉效果较好的等值线图形。
-
METHODS: The spiral modiolar artery in guinea pig cochlea was exposed by microsurgery, then the fluorogold or horseradish peroxidase was given around the SMA for retrograde tracing.
在正常豚鼠单侧耳蜗螺旋蜗轴动脉局部滴加逆行追踪剂辣根过氧化物酶或荧光金,观察双侧交感颈上神经节、星状神经节内HRP或FG逆标神经元的分布;采用逆标与免疫组化相结合的双重标记方法观察追踪阳性神经元是否表达酪氨酸羟化酶、神经肽Y、钙基因相关肽或P物质。
-
Methods: the spiral modiolar artery in guinea pig cochlea was exposed by microsurgery, then the fluorogold or horseradish peroxidase was given around the sma for retrograde tracing. the bilateral superior cervical ganglia and stellate ganglia were observed to find retrogradely labeled neurons. the neurotransmitters of these sympathetic fibers around sma were ascertained by using retrograde tracing combined with immunohistochemical double labeled technique.
在正常豚鼠单侧耳蜗螺旋蜗轴动脉局部滴加逆行追踪剂辣根过氧化物酶或荧光金,观察双侧交感颈上神经节、星状神经节内hrp或fg逆标神经元的分布;采用逆标与免疫组化相结合的双重标记方法观察追踪阳性神经元是否表达酪氨酸羟化酶、神经肽y、钙基因相关肽或p物质。
-
All in all, they identified 797 cases of PABC, which they compared with 4177 cases of breast cancer that occurred during the same time period in age-matched, nonpregnant women.
研究团队统合汇整找出了797例为PABC,并与同时期的4,177名同龄未怀孕的乳癌患者作比较,追踪观察罹患PABC的患者平均为2297天,控制组的追踪观察平均时间则为2671天。
-
Currently RFID products international career prospects, such as factory automation, freight transportation, access control, fleet management, waste tracking, theftproof, medical management, retail distribution industry, air bags, library management, management of medical management, apparel, and animal husbandry of track, and so on.
目前RFID的产品应用广范,如工厂自动化、货物运输、门禁管制、车队管理、废弃物追踪、防盗、医疗管理、零售流通业、航空行李、图书管理、医疗管理、服饰管理、以及畜牧业之追踪等等。
-
Several other methods are compared with the LTI method in this paper, and the result shows that the LTI method is more precise and stable than other methods in calculating traveltime and ray path of first-breaks.
将LTI算法同其他几种算法的追踪结果进行的对比和分析表明,LTI算法在计算初至波走时和射线路径方面较其他算法更为精准、稳定,是一种有效的射线追踪方法。
-
We considered that the method of spherical surface waves raytracing basing on the grid combined the virtues of the grid method. It is precise and high efficient in calculating traveltime and raytrace. It is a perfect method of raytracing.
分析认为,基于网格的球面波波前射线追踪方法结合网格法的优点,在计算走时和射线路径时精确、高效,是一种理想的射线追踪方法。
-
In this paper, we have proposed a flexible encryption blocks selection buyer-seller watermarking protocol integrated the RSA asymmetric encryption system and homomorphism mechanism to protect the ownership of digital contents and fit real life. And consider the secondhand transaction in the real life. We also propose a buyer-reseller watermarking protocol based on the flexible encrypt blocks selection buyer-seller watermarking protocol to offer a solution of secondhand transaction. In our scheme, it's more light data transport requirement than other schemes. All roles in protocol will benefit by their participation. Our scheme can overcome various of the known attacks and security problems in the buyer-seller watermark protocol, such as buyer's right problem, unbinding problem, piracy tracing problem, conspiracy problem, buyer's participation in the dispute resolution problem, man-in-the-middle attack problem and anonymous problem. Furthermore, the seller and arbiter can verify the buyer's watermark without decrypting it in our scheme.
本文除应用RSA非对称式加密与秘密同态机制,提出了一个符合现实生活中买卖交易行为、可弹性调整加密范围数位内容买卖浮水印协定,强化了目前研究中对於数位内容买-卖浮水印协定的安全性,并进一步的考量二手商品交易行为,在可弹性调整加密范围数位内容买卖浮水印协定基础上,提出一个结合数位内容二手买卖与盗版追踪的二手数位内容买卖浮水印协定,达到让参予买卖的角色可以在安全的情形下完成二手数位内容所有权的移转并从中获取相对应利益的目标的数位内容转卖浮水印协定来增强了目前数位内容买卖浮水印协定研究中对於二手交易欠缺之处,解决了数位内容买卖浮水印协定中所可能遭遇的重要安全性议题,如:买方权益、盗版追踪、资讯不连结、共谋、买方需要参与仲裁、中间者攻击及匿名性问题。
-
When the trace window displays instructions, it disassembles instructions at the addresses stored in the trace buffer.
显示在追踪窗口的指令是编译存储在追踪缓冲器中的内容。
- 推荐网络例句
-
Do you know, i need you to come back
你知道吗,我需要你回来
-
Yang yinshu、Wang xiangsheng、Li decang,The first discovery of haemaphysalis conicinna.
1〕 杨银书,王祥生,李德昌。安徽省首次发现嗜群血蜱。
-
Chapter Three: Type classification of DE structure in Sino-Tibetan languages.
第三章汉藏语&的&字结构的类型划分。