英语人>网络例句>使用 相关的搜索结果
网络例句

使用

与 使用 相关的网络例句 [注:此内容来源于网络,仅供参考]

Use of Chinese young learners is in the medium range;(2) among the six strategy categories metacognitive strategies are the most frequently used whereas compensation strategies are theleast frequently used;(3) there exists statistically significant difference between female and male young learners in language learning strategy use; and (4) there is a positive correlation between young learners' language learning strategy use and their language proficiency.

其中,元认知策略的使用频率最高,补偿策略的使用频率最低;(2)男、女生在学习策略的使用上存在显著差异,无论是在总体上还是六种策略的使用上,女生都比男生的使用频率高;(3)成功的英语学习者学习策略的使用频率最高,其次是水平一般的学习者,不成功的学习者学习策略的使用频率最低。

T; F, a '! D 老美们的使用心得: Ihave used this Mint Julep Masque for a good while now. The best thing about it is that if you have severe blackheads it will really clear them up; I am speaking from experience. My entire forehead, jaw line and nose had blackheads, and it cleared them up. My sister saw my results and got it too.

\9 T' I w! Q/ m 这段话的大意是:我用了这个产品一段时间了,如果你的黑头很严重的话,它能真正的把你的黑头完全去掉;我说的是我的经验之谈,我的整个额头,下巴和鼻子都有黑头,它可以把它们完全去掉了,我的姐姐看我使用后的效果这样好,她也买了。

The paper consists of following contents:(1)starting with a historicalreview of the use-of-force,this paper reveals a paradoxical evolvementof the two trends in use-of-force,compares the absolutization andinfinity with controllability and finity of the use-of-force,and clarifiesnew characteristics of the use-of-force in post-Cold War era;(2)bysystematically analyzing the era background from the viewpoints ofeconomic globalization,political multipole,military high tech,national separatism and the hegemonism,the paper clarifies factorslimiting and stimulating the use-of-force;(3)by analyzing the lawbackground mainly from the viewpoint of international laws,the paperespecially centralizes the discussion on restrictions made by moderninternational laws on the use-of-force and their limits,dissects thechallenges brought up by the high tech war to international laws;(4)the use-of-force by UN and other regional international organization;(5)refuting the theory of"humanitarian intervention"advocated bythe USA and certain western countries,the paper expatiates the rightrelations between human rights and sovereignty,and demonstrates therightness of the sovereignties and UN;(6)the basic guidelines of theuse-of-force in the post-Cold War era.

分别从经济全球化、政治多极化、军事高技术化以及民族分离主义的泛滥、霸权主义的恶性膨胀等方面系统分析冷战后武力使用的时代背景,揭示出冷战后时代同时存在的限制、约束武力使用的因素,以及诱发、刺激武力使用的因素。(3)主要从国际法的角度分析武力使用的法律背景,着重探讨现代国际法对武力使用的规范和制约作用以及这种作用的有限性,同时剖析现代高技术战争对国际法提出的挑战。(4)主要探讨联合国以及区域性国际组织在冷战后使用武力的实践以及存在的问题。(5)驳斥以美国为首的某些西方国家所鼓吹的&人道主义干涉&论,阐述人权与主权的正确关系,论证主权国家和联合国并没有过时,不能用非人道手段解决人道主义问题。(6)系统提出了冷战后国家间使用武力应遵守的基本准则。

Results indicated as follows:(1) both the preference of the Internet social service and the PIU among higher grade students were significantly higher than the lower grade ones;(2) the preference of the Internet social service had a direct effect on PIU;(3) the imaginary ...

结果表明在初中阶段:(1)互联网社交服务使用偏好和病理性互联网使用水平随着年级升高而呈直线上升的趋势;(2)互联网社交服务使用偏好可以直接正向预测其病理性互联网使用;(3)假想观众观念对于病理性互联网使用也有显著的直接预测作用;(4)假想观众和个人神话中的无懈可击成分通过对互联网社交使用的喜好间接预测病理性互联网使用水平。

For preparing for the researches of text digital watermarking and advantaging other researchers" development when using the Chinese mathematical expression theory, this paper designs and realizes a development platform of Chinese mathematical expression. It has been proved by experiments that the platform"s function, execution speed and stability can satisfy the requirements of conversion and operation of enormous data.This research found out that the structure information of Chinese have plenty redundant information that can be used by the Chinese mathematical expression for the digital watermarking, the data embedded can possess better robustness. Based on this finding, this paper designs a kind of text digital watermarking method of embedding watermarking by using Chinese structure, and realizes the method by using the Chinese mathematical expression platform.Considering the watermarking embedding algorithms importance to the robustness of the text digital watermarking, this paper makes fully use of the advantage of the Chinese mathematical expression theory to design a kind of layered text method, which has being realized by using the Chinese mathematical expression platform. The layered text method can handle the text as a solid structure, and the embedding data havepreferable robustness.Finally, based on the researches of the text digital watermarking method and the text layered method, this paper integrates the method of making use of the Chinese structure embedding watermarking with the robust algorithm based on text layered, and realizes a brand-new text digital watermarking method. Proved by lots of experiments, this brand-new method has good robustness and better invisibility.

为了为研究工作做准备和方便其他使用汉字数学表达式理论体系的人进行开发,本文基于汉字数学表达式理论设计实现了一个汉字数学表达式平台,实现了Unicode汉字集中的汉字、汉字数学表达式、汉字的Unicode码之间的相互转化、依据汉字数学表达式提取汉字的结构信息、由汉字数学表达式在非中文平台上不依赖字库显示汉字的图像等功能,使用复合文档技术和流压缩技术进行数据的存储,使用对汉字数学表达式进行二叉树拆分来处理汉字数学表达式中包含的信息,使用自定义哈希函数来提高运行速度,实验证明,该平台功能、速度和稳定性完全能满足大量数据的转化和运算要求;通过研究表明汉字的结构信息中存在大量可使用汉字数学表达式理论加以利用的水印加载空间,加载在该空间的数据可以具有较好的鲁棒性,基于此,本文设计了一种利用汉字结构加载水印的文本数字水印方法,并使用汉字数学表达式平台将其实现;由于水印嵌入算法对于文本数字水印的鲁棒性至关重要,本文充分利用汉字数学表达式理论的优点,设计了一种文本分层的方法,并使用汉字数学表达式平台将其实现,使文本成为一个立体的空间,使嵌入在其中的数据具有更好的鲁棒性;最后在基于汉字数学表达式的文本数字水印嵌入方法的研究和基于汉字数学表达式的文本分层方法的研究的基础上,结合利用汉字结构嵌入水印的方法和基于文本分层的抗攻击文本水印嵌入算法实现了一种全新的文本数字水印方法,经实验证明,该方法有良好的鲁棒性和较好的隐蔽性。

Correct正确使用: The judge knew the defendant -- she had been his third wife -- and he therefore recused himself.

用户出于自愿而使用本站资源,我们不承担任何因使用本站资源而产生的问题

Incorrect错误使用: The judge knew the defendant--she had been his third wife--and he therefore recused himself.

网站声明:本站文章来源于网络,只在为网友提供资料参考之用,本站无意侵犯其它网站或公司版权,同时本站不对其所提供的内容的准确性、时效性或完整性作任何保证,对于因使用这些资料或无法使用这些资料而导致的任何损害,教客网无须承担法律责任。

Incorrect错误使用: The judge knew the defendant--she had been his third wife--and he therefore recused himself.

本站资源均来自作品作者提供以及网友收集,仅供学习与研究使用

Using 使用 Tor Tor的 can help you anonymize web browsing and publishing, instant messaging, IRC, SSH, and other applications that use the TCP protocol.

可以帮你匿名浏览网页和发布,即时通讯,体育馆, SSH的,和其他应用程序使用TCP协议。

Using 使用 Tor Tor的 can help you anonymize web browsing and publishing, instant messaging, IRC, SSH, and other applications that use the TCP protocol.

能够匿名Web浏览与发布,即时通讯,IRC,SSH和其他应用程序使用TCP协议。

第1/100页 1 2 3 4 5 6 7 8 9 ... > 尾页
推荐网络例句

The difference between him and the others forced me to be less partial.

也这是因为这种区别,让我在他和其他孩子之间没有偏爱任何人。

I decided to be frank in rejecting the proposal.

他说,他准备直率地拒绝接受这个建议

One downside: the iPhone doesn't have a built-in slot for a stylus.

不过,还有一个问题:iPhone没有内置的手写笔槽。