問路範文 的英文怎麼說

中文拼音 [wènfànwén]
問路範文 英文
asking the way
  • : Ⅰ動詞1 (請人解答) ask; inquire 2 (詢問; 慰問) question; ask about [after]; inquire about [aft...
  • : 1 (道路) road; way; path 2 (路程) journey; distance 3 (途徑; 門路) way; means 4 (條理) se...
  • : 名詞1 [書面語] (模子) pattern; mould; matrix 2 (模範; 榜樣) model; example 3 (范圍) boundar...
  • : Ⅰ名詞1 (字) character; script; writing 2 (文字) language 3 (文章) literary composition; wri...
  • 問路 : ask the way
  1. In combination with the rapid development of highway construction and the present severe situation of tilled land and land resource, effects on economy, society and resource produced by highway construction are approached from three different angels : the improvement to the economy and society development, the peculiarities and the severity of occupation of land resource and the bad effects on land use caused by soil and water loss, thus arousing the people to pay high attention to the occupation of land resource in highway construction. a method of cost - benefit analysis is approached to evaluate the economic rationality of occupation of land in highway construction and the social benefits produced by highway construction are analyzed qualitatively ; at last, these methods are tested and verified through a concrete engineering in yangling agricultural hi - tech demonstrational zone and effective technological and systematic measures are put forward in order to settle the problem onto a compatibly developmental path

    本研究從公建設迅速發展的實際和土地、耕地資源面臨的嚴峻形勢著手,在實地調研的基礎上,結合相關的獻和資料,從公建設對經濟、社會發展的促進作用,公建設佔用土地資源的特點,公建設造成的水土流失對土地資源利用的危害等三個方面系統地分析總結了公建設活動對經濟、社會與資源的影響,以引起社會各界對公建設與土地資源佔用題的重視;用成本-效益分析法對公建設佔用土地資源的經濟合理性進行評價,並對公建設佔地的社會效益進行分析,通過楊凌農業高新技術產業示區三一橋工程驗證它們的實用性。
  2. First it gives a general economic explanation on this problem, using the basic methods such as cost - effect analysis, equilibrium analysis, the framework of the new institutional economies ; then mainly utilizing the popular games models, offers a theoretical verification to all kinds of normalizing possibilities ; finally it explores the financial reporting on the internet, and designs a structural model for the normalizing entities

    將在這些研究的基礎上,結合經濟學的基本分析方法(成本效益分析、均衡分析)和新制度經濟學式,首先對規范財務報告題給予一個一般意義上的經濟學解釋;然後著重利用已被社會學廣泛應用的博弈模型(張維迎1999 )對財務報告的各種規范可能性給予理論上的證明;最後探討了網財務報告題,並提出規范主體結構模式。
  3. The thesis divides into five parts. from several groups of basic conceptions, we use the method of cost - income and structure - institution to deduct the logical ideas from one layer to another. the progress of the forming and evolving an inter - firm network is abstracted to the problem of the adaptability and the stability of an organization system respectively

    共分五個部分,以成本-收益以及結構-制度的剖析式,從幾組基本概念入手,邏輯推演層層展開,將企業網的形成和演變過程分別抽象為組織系統的適應性和穩定性題,構建了一個比較全面的分析框架。
  4. In addition, risk preventions for bidding documents and contract execution are proposed. in view of the weak awareness of risk by the contractors, basic concept of the contractors on credit risk management is also put forward based on the successful experience and technology of credit risk management in the foreign countries and in china

    又對招標中的合同件到合同履約的風險題提出風險防的對策,針對承包商風險意識非常淡泊的現狀,借鑒國內及國際上成功的信用風險管理的經驗及技術,提出了承包商信用風險管理的思的基本構想。
  5. Including the main body of the subgrade, protecting and supporting engineering. drainage equipment of road, culvert and the transition zone between the road and the bridge. through investigating the types of diseases, the author discusses the existing problems and causes of producing diseases, puts forward the protective measures in design and construction, and raises the treatment measures in highway maintenance, which makes it more scientific and perfect for highway construction and maintenance in the loess areas

    首先對黃土的工程特性及其影響因素進行了分析,然後對黃土地區基病害及其防治技術進行了研究,具體包括基主體、防護與支擋工程、公排水設施、涵洞及橋過波段等部分,對病害類型進行了調查,分析了使用中存在的題與病害產生的原因,提出了在設計與施工中應採取的防措施,給出了養護中的處治對策,使我國黃士地區公建設與養護更加科學和完善。
  6. The technology is not only safe and trustiness, but also easy to integrate with other identifying technology. moreover, we discuss the encryption of data. at last this papers show us a system of stock jobbing using bank book

    還對網數據傳輸的加密題以及證券系統內部的加密防措施進行了分析,本系統的雙層加密方案解決了網數據傳輸的加密及對系統內部人員的保密題。
  7. This paper firstly summarizes the traditional network information security techniques, the common intrusion methods and their countermeasures. then it discusses the intrusion detection system ' s evolution, classification, detection methods, standardization and etc. aiming at the new encountered problems about intrusion detection, this paper brings forward a design project of the intrusion detection system

    在概述傳統網信息安全技術,黑客常用入侵手段與防對策,入侵檢測系統的發展、分類、檢測方法以及標準化等題的基礎上,針對目前入侵檢測遇到的一些新題,提出了一個入侵檢測系統的設計方案。
  8. And through the contrast with lau si gun ' s method of primordial question, this paper tries to manifest the main character of quian mu ' s methodology of confucianism lying in xia xue er shang da, so that we can make a right judgment to show his valuable revelation to the academic development of modern chinese thought

    主要透過與勞思光基源題研究法的對比,希望藉此揭示錢穆的孔學研究典與學術類型主要在下學而上達的進,並對其對當代中國學術思想的啟發提出較完整的評價。
  9. This paper introduces some questions of network security and corresponding steps at present. in all these steps, firewall technology is introduced especially

    介紹了目前主要存在的一些網安全題及相應的防措施,並重點介紹了防火墻技術。
  10. Fortunately, ipsec provides us security services for ip layer and higher layers, such as access control, connectionless integrity, data origin authentication, rejection of replayed packets ( a form of partial sequence integrity ), confidentiality ( encryption ), limited traffic flow confidentiality, and so on. the thesis gives a type of network security architecture based on ipsec system, it includes the following contents : 1 analyzing the security problem in tcp / ip protocol stack, current main network attack methods and regular defense methods. 2 studing the overall architecture, main security protocols, application environments, and working mechanism of ipsec

    所提出的新一代網安全體制就是建立在ipsec體系基礎上的,在本的撰寫過程中,我主要進行了如下一些工作: 1深入分析了由tcp ip協議棧本身帶來的安全題、當前主要的網攻擊方法以及常採用的防對策; 2研究了ipsec標準的總體結構、主要安全協議、應用場合以及其工作機制; 3研究了當前常用的各種數據加解密機制以及密碼演算法,深入分析了它們各自的特性和具體的使用方式; 4閱讀了大量關于混沌密碼的獻資料,了解目前混沌密碼的研究動態和成果,研究混沌密碼體制的工作機理,然後利用vc + + 6 . 0作為開發平臺對一類混沌密碼體制進行了實現,並為它編寫測試代碼評估其性能。
  11. It concludes four parts. in the first part, i expound and analyze marx and engels " theory of needs and the application and development of it, and clarify that marx and engels " theory of needs is the scientific methodology and the theory guide for us to study the issue of people ' s spiritual and cultural needs ; in the second part, i expound the relationship between people ' s spiritual and cultural needs and cultural and ideological progress, introduce the definition and intention of spiritual and cultural needs and the significance for cultural and ideological progress, and clarify that spiritual and cultural needs is the starting point and foothold of cultural and ideological progress ; in the third part, i mainly introduce the new change, characteristics and tendency of people ' s spiritual and cultural needs in contemporary china since practicing reform and opening up policies and analyze the economic, political and cultural reason ; in the forth part, i put forward some countermeasures and proposals on the problem of how to more efficiently satisfy and guide people ' s spiritual and cultural needs such as upholding and developing marxist theory, strengthening lofty ideal and faith and socialism morality construction, developing education and science undertakings, quickening development of culture industry, flourishing socialism culture and art to satisfy people ' s spiritual and cultural needs, and raising people ' s quality and accomplishment of ideology, culture and art, guiding culture consumption, standardizing the culture market and purifying cyber culture, etc to guide people ' s spiritual and cultural needs

    分為四個部分,第一部分闡述和分析了馬克思恩格斯的需要理論,以及後人對馬克思恩格斯需要理論的運用和發展,闡明了馬克思恩格斯的需要理論是我們研究人的精神化需要題的科學的方法論和理論指南;第二部分論述了精神化需要與化建設的關系,介紹了精神化需要的定義、內涵,精神化需要題對化建設的重要意義和作用,闡明了精神化需要是化建設的著眼點和立足點;第三部分重點介紹了改革開放以來,當代中國人的精神化需要呈現出來的新變化、新特點、新動向,分析了其中的經濟、政治和化原因;第四部分對于如何正確滿足和引導當代中國人的精神化需要提出了對策,指出滿足人的精神化需要,要堅持和發展馬克思主義理論,加強理想信念和社會主義道德建設,要發展教育科學事業,要加快發展化產業,要繁榮社會主義化藝術;引導人的精神化需要,要從提高人的思想化素質和化藝術修養,引導化消費,規化市場和凈化網化等幾個方面做出努力。
  12. Among them are historical factor ( which shows that fiscal difficulties exist every year in our country and are the result of reform in each historical stage ) ; fiscal system factor ( which means that the current fiscal system in our country is not so perfect ) ; pressure factor ( from how to tackle and remove the bad effect brought about by the fiscal policy and how to boost economic development ) ; the transferred problems from the state - owned commercial problems from the state - owned commercial banks ( which is an inseperable factor connected with fiscal risk ) ; and problems of local debt. chapter four main suggestion and countermeasures for guarding the fiscal risk in our country. they are as follows : 1

    章認為,財政不能走以往大包大攬的老,風險的防要充分發揮市場機制的積極作用,從而可以減少財政的部分壓力,同時,我國的財政支出結構,要適應政府職能轉變發展市場經濟的要求,作出適當調整,進而在我國建立公共財政的基本框架;章對債務風險的防主要是從國債和地方債務兩方面出發,提出了自己的一些建議;對于赤字風險的防章指出,提高國家財力的集中程度,把控制赤字作為中長期財政發展規劃,調整支出結構,是解決題的重要途徑;最後,章還提出,基於我國政策環境的轉變,以及宏觀經濟發展的需要,及時調整積極財政政策的作用方向和方式顯得十分必要,有利於減少各種誘發風險產生的因素,更好地防財政風險。
  13. This paper explores the research work on how to design a giga - bit firewall based on intel ' s network processor ixp1200, which presents both high - performance and security functionality. during the developing period, the author and his friends solved many critical problems, including multiple layer architecture, working modes, allocation of micro - engine, attack defence policies and web uuser interface. also new ideas of improvement on both future network processors and firewall products have been well presented

    的核心是設計和實現基於ixp1200網處理器( networkprocessor , np )的千兆硬體防火墻,在開發過程中,解決了多層體系結構、防火墻工作模式、微引擎分配、攻擊防策略、圖形用戶界面等多方面的題,在今後網處理器應用的推廣和防火墻產品開發方面都提出了獨特的見解。
  14. Based on this, this paper provides a security strategy related on network, and gives the security measures for the network in pangang automation company, they are management measure, organization vlan, data backup, limiting authority of access, the self - protection of legal user, prevention and cure of virus, and the emergency process plan

    在此基礎上,本提出了計算機網的安全策略,提出了攀鋼自動化公司計算機網的安全措施,即管理措施、組建vlan 、數據備份、訪權限控制、合法用戶自我防、病毒防治以及制定應急處理方案,取得了較好的實際效果。
  15. This paper analyzes the architecture of distributed firewalls based on comparing with the traditional firewalls : network firewalls and personal firewalls. it brings forward a new design about the distributed firewalls in which some host firewalls and a control center constitute the whole distributed firewalls with reserving the old network firewalls. a host firewall is a packet - filtering firewall that filters the network packets come from inside the network based on the information of network application program, ip address, tcp or udp port and so on

    在與傳統的網防火墻、個人防火墻技術對比的基礎之上,結合計算機網安全的本質與要求,對分散式防火墻這一全新的防火墻體系結構進行了分析,提出一種充分利用現有技術和投資的分散式防火墻系統的設計方案,即在保留傳統網邊界防火墻的同時,設計一種駐留在內部網終端的主機防火墻及其控制中心,將防火墻延伸到內部網的終端,從而有效防來自網內部的非法訪與惡意破壞。
  16. Therefore, this essay emphasizes the government and its action, analyzes how the irrational government action brings about the risk ’ s forming and accumulation and offers new ideas and perspectives for studying the chinese bank - industry risks to precaution

    因此,本選取政府及政府行為作為題研究的著力點,分析了非理性政府行為是如何直接或間接誘致了銀行業風險的形成,為研究中國銀行業的風險防與規避提供了新的思和視角。
分享友人