i.e., namely, that is区别

本文介绍了科研写作中常用的拉丁文缩写e.g.、i.e.和namely的区别及用法。i.e.用作同位语,表示“即”;namely用作插入语,表示列举,“也就是”;thatis用作解释,意为“换句话说”。此外,文章还提到了科学编辑理事会对于一些传统拉丁文缩写的使用建议。

摘要生成于 C知道 ,由 DeepSeek-R1 满血版支持, 前往体验 >

i.e. 用作同位语,“即”

To buy the car that I really want (i.e., a Tesla), I will have to work a lot of overtime.

namely 用作插入语,表示列举,”也就是”

The present paper evaluates the effect of major weather variables, namely precipitation, temperature, and relative humidity, on crop growth.”

这里 namely 明确指出该论文只有三项天气变量评估

that is 用作解释,"换句话说“

Jim didn't go to the party. That is to say, he hadn't forgive Tom yet. 吉姆没有去参加聚会。 也就是说,他还没有原谅汤姆。

科学网—论文写作技巧:e.g.、i.e.和namely的差别 - Editage意得辑的博文拉丁文缩写在现今的科研写作中越来越罕见:科学编辑理事会建议使用“and others”而不是et al.,还有用于引用来源的 op. cit. 和 loc. Cit 等以前常见 ... ,科学网icon-default.png?t=M85Bhttps://blog.sciencenet.cn/blog-769813-1273931.html

Unlike the classical encryption schemes,keys are dispensable in certain PLS technigues, known as the keyless secure strat egy. Sophisticated signal processing techniques such as arti- ficial noise, beamforming,and diversitycan be developed to ensure the secrecy of the MC networks.In the Alice-Bob-Eve model, Alice is the legitimate transmitter, whose intended target is the legitimate receiver Bob,while Eve is the eavesdropper that intercepts the information from Alice to Bob.The secrecy performance is quantified via information leakagei.ethe dif ference of the mutual information between the Alice-Bob and Alice-Eve links. The upper bound of the information leakage is called secrecy capacity realized by a specific distribution of the input symbols, namely,capacity-achieving distribution.The secrecy performance of the diffusion-based MC system with concentration shift keying(CSK)is analyzed from an informa- tion-theoretical point of view,providing two paramount secrecy metrics, i.e., secrecy capacity and secure distance[13].How ever, only the estimation of lower bound secrecy capacity is derived as both links attain their channel capacity.The secrecy capacity highly depends on the system parameters such as the average signal energy,diffusion coefficientand reception duration. Moreover, the distance between the transmitter and the eavesdropper is also an important aspect of secrecy per- formance. For both amplitude and energy detection schemes secure distance is proposed as a secret metricover which the eavesdropper is incapable of signal recovery. Despite the case with CSK,the results of the secure metrics vary with the modulation type(e.g.pulse position,spacetype) and reception mechanism(e.g.passive,partially absorbingper fectly absorbing).For ease of understanding,Figure 3 depicts the modulation types and the corresponding CIRs with different reception mechanisms. Novel signa processing techniques and the biochemical channel properties can further assist the secrecy enhancement in the MC system.The molecular beam forming that avoids information disclosure can be realized via the flow generated in the channel.Besidesnew dimensions of diversity, such as the aforementioned molecular diversity of ionic compounds, can beexploited. Note that the feasibility of these methods can be validated by the derived secrecy metrics.
06-13
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包

打赏作者

软件工程小施同学

你的鼓励将是我创作的最大动力

¥1 ¥2 ¥4 ¥6 ¥10 ¥20
扫码支付:¥1
获取中
扫码支付

您的余额不足,请更换扫码支付或充值

打赏作者

实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值