实现生物多样性和陆地食物供应目标的一种选择是用更少的土地生产更高的产量,从而腾出土地用于保护目的。
One option for moving toward both biodiversity and terrestrial food supply goals is to produce greater yields from less land, thereby freeing land for conservation purposes.
欧盟出资赞助的这一“小行星防护盾”项目从柏林起步,目标是寻找一种能保护地球免遭太空巨石撞击的方法,该项目预期将耗时三年完成。
Run out of Berlin with funds from the EU, the NEO Shield project, which will look for a way to protect earth from the space rocks, is expected to take three years to complete.
你看,虚拟集体记忆成为了一种动力,这也是我们的目标——保护和鼓励创造性。
You see, it is, or rather it could be, a stimulating process. This is our aim: to safeguard and to encourage creativity.
保护祝福更名为保护之触,每个圣骑士在同一时间内只能给目标施加一种触类法术。
Blessing of Protection renamed Hand of Protection. Only one Hand spell can be on the target per paladin at any one time.
目标代码混淆技术是对软件进行保护的一种有力手段,能够有效地阻挡对软件的恶意分析。
As a powerful means to protect software, object-code obfuscation can obstruct malicious software analysis effectively.
我现在计划达到的目标就是将书法作为一种艺术来推广和保护,同时也将书法作为我生活的一个指南与方式。
Through Chinese calligraphy, I found my philosophy of life: to plan before I act. The goal I now plan to achieve is to promote and preserve calligraphy as an art, and as an approach to life.
世界遗产地和国家级风景名胜区是一种保护性资源而不是开发性资源,其经营目标应该是增进社会福利。
World heritages & national scenery in China is a kind of protection resources rather than exploiting resources. Its aim of management is to increase social welfare.
提出了一种基于图像分解的敏感目标区域自动提取与保护的SAR图像压缩策略。
This paper proposed a SAR image compression strategy which extracts and protects target regions based on image decomposing technology.
在这两种情况下,把东西和关闭的象征,但在后者,关键是要明确协会是一个以密码保护区,这不是影响我们希望达到的目标。
In both cases, turning something on and off is symbolized, but in the latter, a key is going to be a clear association to a password protected area, which is not the effect we were hoping to achieve.
分析了隐私资源保护的安全目标,提出了一种基于标识的保护方案。
The target of security about privacy preservation was analyzed, and then an identify based privacy preservation scheme was proposed.
分析了隐私资源保护的安全目标,提出了一种基于标识的保护方案。
The target of security about privacy preservation was analyzed, and then an identify based privacy preservation scheme was proposed.
应用推荐