zhòngyīngguànyònglìgōu:
  • zhìchǐ zhì chǐ zhù yào de gài zhì fēnzài láng zhì xià miàn suǐ zhōu wéizhí gēn chuáng de guǎn dào nèi
    The main, calcareous part of a tooth, beneath the enamel and surrounding the pulp chamber and root canals.
  • liàng xiàng guāng yàng róng fēn sànsuǒ néng chuān tòu lángbào chǐ jié gòu zhōng de biàn huà
    Heat does not scatter as readily as light, so the thermal energy can penetrate through the enamel, exposing changes in composition.
  • zhǒng fāng shì jiāng xuè hóng dàn bái bāo guǒ zài zhí jìng yuē wéi 0.2 wēi ( bǎi wàn fēn zhī ) de yóu zhī pào náng zhōngzhè xiàng shù hái néng gāo xún huán shí jiān
    One method is to encapsulate hemoglobin inside lipid vesicles about 0.2 microns (millionths of a meter) in diameter. This technique also increases the circulation time.
  • 19 6 niánshāng hángān yánliú nǎoliú gǎn děng 14 zhǒng chuán rǎn bìng de zǒng bìng shuài wáng shuài fēn bié 1991 nián xià jiàng 45.52 67.16%。
    In 1996 the overall incidence of and the mortality resulting from 14 infectious diseases, such as typhoid fever, hepatitis, epidemic encephalitis and influenza, dropped by 45.52 and 67.16 percent, respectively, compared with the 1991 figures.
  • yóu shù liàng shàng yōu shì de bīng duì cóng wài xiàn fēn shù xiàng qián jìn zhī cǎi zhàn zhàn dǒu de jìn gōng wài xiàn zuò zhàn de fāng zhēnjiù shǐ fēn jìn zhī de měi chǔyú zhī bāo wéi zhōng
    We on our part encircle each of the enemy columns advancing on us along separate routes, because we apply the policy of the offensive and of exterior-line operations in campaigns and battles by using numerically preponderant forces against these enemy columns advancing on us from exterior lines.
  • yóu shù liàng shàng yōu shì de bīng duì cóng zhàn lüè shàng de wài xiàn fēn shù xiàng qián jìn zhī cǎi zhàn zhàn dǒu shàng de wài xiàn zuò zhàn fāng zhēnjiù fēn jìn zhī de huò fàng zài zhī bāo wéi zhōng
    We on our part can encircle one or more of the enemy columns advancing on us along separate routes, because we apply the policy of fighting campaigns and battles from tactically exterior lines by using numerically preponderant forces against these enemy columns advancing on us from strategically exterior lines.
  • 'èr jiē duàn chéng liè bāo wéi rén zhī rèn bìng què shí kòng zhì zhè gàn xiàn duànduàn tuì sān jiē duàn fēn bié jiān miè bāo wéi zhī wán chéng quán zhàn
    during the second stage, divide and encircle the enemy and bring a section of the Zhejiang-Jiangxi Railway under our absolute control in order to cut off the enemy's retreat and, during the third stage, wipe out the encircled enemy forces one by one to bring the campaign to a close.
  • měi jiān miè de rén duì quán guò shì fēnrán 'ér wéi jiǎo shì liǎo
    The forces annihilated in each campaign constituted only part of his total strength, and yet all these "encirclement and suppression" campaigns were smashed.
  • gōng lún dūn fēn gōng xiàng guì gōng kāi chū miàn 'é 300, 000 yuán de huì piào zhāng tóng hán fèng shàngqǐng chéng duì hòu hái wéi
    Enclosed we hand you a draft,$300,000, draw on you by our london house. kindly accept same and return.
  • shuǐ tán piàn shǎo liàng huò fēn bèi wéi de shuǐ
    A small enclosed or partly enclosed body of water.
  • suí hán shàng 'èr shí fēn de yóu biāo zhāng
    Enclosed herewith is an tewnty-fen stamp.
  • suí hán shàng 'èr shí fēn de yóu biāo zhāng
    Enclosed herewith is an twenty-fen stamp.
  • tōng guò shù huò gōng shì jiě jué wèn de fāng shì tóngzhè zhǒng wēi xíng suàn de shù shū shū chū tǒng ruǎn jiàn dōushì yóu dna fēn zhì chéng, dna fēn zài shēng nèi cún chǔ chǔlǐ xìn dài
    Instead of using figures and formulas to solve a problem, the microscopic computer's input, output and software are made up of DNA molecules -- which store and process encoded information in living organisms.
  • suàn jué dìng shǒu jiāngfàng zài pán de xiē wèi zhì shàng cái néng shǐ zhè xiē " " xiāng gōng xué jiā ràng měi tiáo rna fēn liàn dài biǎo zhǒng néng chū xiàn dezài pán shàng de
    " The computer must determine in which positions a chess player can place the knights on the board so that none can attack another The scientists encoded each stfand of RNA to represent a p0ssible confguration of knights.
  • yòng zhǒng chēng zuò 8 14 tiáozhì (efm) 8- 16 tiáozhì (efmplus) de shù fēn bié zài cd dvd shàng wán chéng biān
    The encoding is done using a technique referred to as eight-to-fourteen modulation (EFM) in CDs and eight-to-sixteen modulation (EFM Plus) in DVDs.
  • mp3 biān ruǎn jiàn shí biān zhì mp3 yīnyuè wén jiàn de yìng yòng chéng zuò wéi yīnyuè zuì qiáng liè yào biàn rèn de shēng yīn yàng běn de fēn gěi bǎo liú xià láiér duì zuì zhōng zhì liàng sǔn hài shì hěn de fēn gěi pāo diào
    MP3 encoding software -- the application that actually builds the MP3 music file -- saves parts of the sound sample most strongly recognized as music;what's discarded doesn't detract too much from the final quality.
  • huó bāo nèi hán yòu fēi cháng shén de fēn men duì dna rna xìn biān fēn de cāo zuò fāng shì suàn yuán xiāng 。” yán zhì chū dna suàn de yán jiū xiǎo zhù rèn shā luó shuō,“ yóu men shàng zhī yòu xiào xiū gǎi zhè xiē fēn huò chuàng zào xīn de fēn jiě jué jié jìng jiù shì cóng yòu fēn shàng xún zhǎo xiē jīng guò hòu néng jìn xíng yùn suàn de fēn 。” chōng shuō
    "The living cell contains incredible molecular machines that manipulate information? encoding molecules such as DNA and RNA in ways that are fundamentally very similar to computation," said Shapiro, the head of the research team that developed the DNA computer." Since we don't know how to effectively modify these machines or create new ones just yet, the trick is to find naturally existing machines that, when combined, can be steered to actually compute," he added.
  • yòng mǒu xiē fēn lèi zhōngbāo hán bèi gāng jié dòng gōng qián shì bāo hán x zōng gāng de lèixiàn zài duō chāo lèi tōng cháng yòng zuò duō chāo lèi tóng qiě jǐn xiàn bèi gāng jié dòng
    used in some classifications to encompass the millipedes (Diplopoda) and centipedes (Chilopoda); formerly a large taxon including also the Pauropoda and Symphyla; the term Myriapoda now usually used synonymously with Diplopoda and limited to the millipedes.
  • zhōu jìn zài jīng fāng miàn xiē shì jiàn lìng rén shí fēn zhèn fèn
    Recent events on the economic front in Asia are encouraging.
  • shì chǎng duì zài sān yuè tuī chū de shì yàn jìhuà fǎn yìng shí fēn liè
    Market response to the Pilot Scheme we launched in March has been very encouraging.
  • hǎi shuǐ zhōng de yán fēn zài qián zào de shā shàng jié chéng yìng .
    Salt from the sea had encrusted on the dry sand.
  • hǎi shuǐ zhōng de yán fēn zài qián zào de shā shàng jié chéng yìng
    Salt from the sea have encrust on the dry sand.
  • zhī xiāng fǎnmíng yào tǒng de yòng fēn pèi gōng kāi yàoshì ràng rén duì bào wén jiā ér zhè zhǒng bào wén zhǐ néng yòng zhuān yòng de yàoshì chū
    In contrast, users of public-key systems can distribute their public keys to allow others to encrypt messages that can then be read only with the private key.
  • wtls ssl lèi bìng shǐ yòng liǎng zhǒng zhèng shū guǎn jiā rèn zhèng héng héng wtls zhèng shū ( dìng wéi wap1.1 de fēn ) yòng xiàng wtls duān rèn zhèng wtls bìng wéi jiàn yòng lái jiā ( tīng tǒng ) de yào gōng chǔér wtls duān zhèng shū ( dìng wéi wap1.2 de fēn lái de ) yòng lái xiàng wtls rèn zhèng wtls duān
    WTLS is a close relative of SSL and uses two kinds of certificates to manage encryption and authentication -WTLS server certificates (defined as part of WAP 1.1) are used to authenticate a WTLS server to a WTLS client and to provide a basis for establishing a key to encrypt (a handset); and WTLS client certificates (defined as part of WAP 1.2) are used to authenticate a WTLS client to a WTLS server.
  • yóu měi bāo shì fēn bié jiā dejiā yào shí shàng néng xiàn zhì de shù jiā gǎi biàn
    Because each packet is encrypted individually, encryption keys can be changed with virtually unlimited frequency.
  • yóu 21 shì de wēi xié hái wēi dào men zài shì jiè de yǒu bāng méng guóyīn men gòng tóng zuò duì men gōng fáng shì shí fēn yào de
    Because the threats of the 21st century also endanger our friends and allies around the world, it is essential that we work together to defend against them.
  • wèile yòu zuì fàn de gǎi zàozhōng guó tóng shì jiè shàng duō shù guó jiā yàngduì xiē fàn zuì qíng jié qīng wēirèn zuì tài jiào hǎoqiě zhì zài wēi hài shè huì de fàn zuì fēn shí xíng huǎn xíng
    To help reform criminals, China, like most other countries in the world, suspends sentence for criminals who have committed a minor crime, have pleaded guilty and are not likely to further endanger society.
  • xīzàng zhì mén yán zhào xiàn bǎo xīzàng zhì gōng mín de xiàng běn quán yóu xiàng quán bǎo gōng gòng cái chǎn gōng mín rén suǒ yòu de cái chǎn chéng chù zhǒng wēi hài shè huì de fàn zuì fēn wéi shè huì zhì
    Strictly in accordance with the Constitution and laws, the judicial departments of the Tibet Autonomous Region protect the basic rights and freedoms, and other legal rights and interests of the citizens of all ethnic groups in Tibet. They also protect public property and the lawful private property of the citizens, punish those law-breakers who endanger society, and maintain social order according to law.
  • zhèng huà yàn suǒ xié zhù hǎi guān nóng rán shǔ zhí nián nèihuà yàn suǒ jiǎn yàn liǎo bīn wēi zhǒng de chéng fēn zhì chéng pǐn bié shì huái hán yòu xióng dǎn ? xiāng de yàng pǐn
    The departments are assisted in their work by the Government Laboratory, which during the year examined parts and products of endangered species, in particular those containing suspected bear gall bladder and musk grains.
  • gòng tóng zhōng de fēn
    any one of a number of individual efforts in a common endeavor.
  • dàn shì cóng xiàn zài kāi shǐ cóng fēn kāi shǐ men de shì jiù huì tuō xià jiù méi yòu wàng liǎo
    If we fail in this endeavour, our goals will be slow to achieve and may become hopeless.
  • sānyào chōng fēn diào dòng rén mín xíng céng de xìng
    and (3) stimulate the initiative of the people and of the grass-roots units in all fields of endeavour.