控制權標包 的英文怎麼說

中文拼音 [kòngzhìquánbiāobāo]
控制權標包 英文
control token packet
  • : 動詞1 (告發;控告) accuse; charge 2 (控制) control; dominate 3 (使容器口兒朝下 讓裏面的液體慢...
  • : Ⅰ動詞1 (製造) make; manufacture 2 (擬訂; 規定) draw up; establish 3 (用強力約束; 限定; 管束...
  • : Ⅰ名詞1 [書面語] (秤錘) counterpoise; weight (of a steelyard)2 (權力) power; authority 3 (...
  • : Ⅰ名詞1 [書面語] (樹梢) treetop; the tip of a tree2 (枝節或表面) symptom; outside appearance; ...
  • 控制權 : command
  • 控制 : control; dominate; regulate; govern; manage; check; cybernate; manipulate; encraty; rule; rein; c...
  1. The article points out the importance and necessity of the information - security from its actuality in our country. the resources in the information system, for instance, hardware, software, data, document, operator, meterial and so on, are evaluated and gived safety grade firstly. and then, it analyses the menace including the nonauthorized access, the information leak, the refused sevice, the internal objection which the system will take. the following are the corresponding control police : confirm the users " rights and duties, including the mode of using account, the limit of accessing resource, the application of password, the building of backup ; confirm the administrators " right and duties, including physical safety, system configuration, account configuration and usufruct, password management, audit and control, backup and individual intimity ; run - of - mill measure of security defence, including access control, symbol and identification, integrality control, password technique, firewall system, audit and resumption, safety of operating system, safety of database system, defence of computers " virus and resisting - deny protocol. in the end, the article offers the strategies of disposing the safety - accident and analyse after ithow. to report it, how to solve it in phase, and how to avoid it happening again. in a word, the article presents a holistic resolvent about keeping away the information system ' s security, and supplies a essential frame for its configuration, management and application

    然後,對系統可能受到的威脅,括非授訪問、信息泄漏、拒絕服務和內部缺陷等進行分析,並提出了相應的策略:確定用戶的力和責任,括帳戶使用方式、資源訪問限、口令應用以及建立備份等;確定系統管理員的力和責任,括物理安全、系統配置、帳戶設置及使用限、口令管理、審計和監、備份以及個人隱私等方面;一般性的安全防護措施:存取識和認證、完整性、密碼技術、防火墻系統、審計和恢復、操作系統安全、數據庫系統安全、計算機病毒防護和抗抵賴協議等。最後,對事故處理和事後分析提供策略,如何報告安全事故,如何協調解決安全事故,如何避免安全事故再次發生。總之,本文對信息系統安全防範工作給出一個整體的解決方案,為其在配置、管理和應用方面提供了基本的框架。
  2. In a word, it presents a comprehensive and systemic analysis on mbo in china and foreign countries, from the followly fire aspects : the background of mba, the policy environment, the objective firms, the pricing methods, the financing system, find out differences of mba and the causes of them, and combinating special eco - nomic environment and economic traces of our country, the author puts forward counterplan. these counterplans primarily include : from strengthening laws, enhancing the information to publish, culturing to agency and etc to come to perfect the mbo policy environment on our country ; defining objective firms of mbo in realm that the state - owned property is decided to withdraw ; with the clean property worth for the foundation, synthesize to consider managers " contribute and the value of control powers with company, and pass the market mechanism to come for right price of the objective firms ; pass growing the organization investor, creative financing tool and optimizing the assistant financial system, establishing the valid withdrawing way of financing etc to resolve the financing problem

    在此基礎上,論文從收購背景、政策環境、目企業、定價方法、融資體等五個方面對中外mbo做了全面系統的對比分析,找出了兩者的差異及原因,並結合我國特有的經濟環境和經濟軌跡,提出了相應的對策措施。這些對策主要括:從健全法律法規、加強信息披露、培育中介機構等方面來完善我國mbo的政策環境;在國有資產決定退出的領域內對mbo的目企業進行界定;以凈資產值為基礎,綜合考慮管理層貢獻和公司兩個因素,通過市場機來為目公司正確定價;通過培育機構投資者、創新融資工具和優化配套金融度、建立有效的融資的撤出渠道等來解決融資問題。
  3. Round keys are taken from this expanded key in the following way : the first round key consists of the first nb nb block length words, the second one of the following nb words, and so on

    安全性策略配置目對數據的原始訪問、保護內核和系統軟體的完整性、防止有特的進程執行危險的代碼,以及限由有特的進程缺陷所導致的傷害。
  4. The results show that : ( l ) adoption of the intermittent mean price instead of the point price at the end of the option will help to reduce the chances of profit - making manipulated by managers and to curb the manager ' s motive to control the stock price ; ( 2 ) generally speaking, stock price of mean price option is more incentive to the managers than that of the black - scholes ; ( 3 ) when the stock market slumps at the end of the option, mean price option will ensure a moderate insurance for the managers ; ( 4 ) when stock price slumps alone with the overall situation of the stock market in the intermittent option, mean price option. however, will be inefficient as an incentive. chapter four addresses the questions concerning the manager ' s manipulation of the stock price, and the increase of the option risks because of long - term slump of the stock market

    第三部分括第三至五章,第三章針對時點價格容易被和時點價格的波動性太大,增加了經理期的風險等問題,研究採用期期內的平均價格替代期期末的時點價格計算經理股票期收益,構建了幾何型平均價格期定價公式,並與black ? scholes期定價公式進行了定量對比分析,結果表明: ( 1 )採用期期內平均價格替代期期末時點價格有利於降低經理通過操縱股價的牟利機會,遏經理操縱股價的動機; ( 2 )一般條件下,平均價格期股票價格對經理的激勵作用優于準期; ( 3 )當臨近期期末股價下跌時,平均價格期能為經理提供適度保險; ( 4 )當期期內,股票受大市持續走弱影響而下跌時,平均價格期失去了激勵作用。
  5. The main conclusions read as follows : ( 1 ) on the premise of stabling the land contract right, the land use right could be transferred, in order to make better use of land ; ( 2 ) propose considering the net profit of land and farmer ' s minimum living guarantee synthetically to make the price standard of land, drawing up the fee of tlur according to the difference between the net profit of land and the contract fee, and perfecting the land grades system additionally ; ( 3 ) to reduce the transaction costs of land transference, we should establish and perfect the medium mechanism of land transference ; ( 4 ) to affect the institutional changes positively, government should do a good job of macro - control, and optimize the institution environment continually

    本文的主要結論是: ( 1 )在穩定土地承的前提下,土地使用應進行市場化流轉,實現農村土地的有效利用和適度規模經營; ( 2 )建議綜合考慮土地純收益和農產最低生活保障來訂土地價格準,而土地使用流轉費應根據土地純收益與集體承費的差額來確定,另外必須健全土地分等定級度; ( 3 )為了降低土地流轉的交易費用,必須建立和規范土地交易中介機; ( 4 )做好宏觀調工作,不斷優化度環境,發揮政府在度變遷中的積極作用。
  6. Acquisition of a listing company prefers to such a process : in order to acquire or hold the control of a listing company, the acquirer, a person or a corporation, buys enough equity securities ( public or private ) of the target company through tender offers or through agreements with some shareholders under the permission of law. in china, the legitimate forms of acquisition can be through tender offers or through private agreements

    上市公司收購是指收購人(括自然人與法人)為了獲得對目公司(上市公司)的,通過向目公司全體有表決股東發出公開收購(買入)要約的方式,或在法律許可范圍內與部分有表決股東簽訂收購(買入)協議的方式,一般以高於市價的代價,獲取足夠的該公司發行在外的有表決股票(含可上市流通與不可上市流通)的行為,其在我國的法定形式括要約收購與協議收購兩種。
  7. Through analyzing at present situation of civil construction industry of our country, the author discloses some current problems and brings out a few methods and measures for resolving these problems. taking the case of contract management and claims of yellow river xiao lang di dam project as an example, author illustrates again the importance for enterprises in our country to establish modern business enterprise system and run project according to international codes and customs

    論文最後通過黃河小浪底水利樞紐工程中合同管理與索賠這一具體案例的分析,再一次證明了只要我國的工程建設主體按現代企業度進行管理,真正實現與國際慣例接軌,嚴格實施項目業主負責、建設監理、招,按照fidic合同條件進行項目管理,採取措施保證監理工程師的地位和利,並不斷提高監理工程師的水平,我國的工程項目管理水平將會得到更大提高,工程項目在建設周期、工程質量和投資等方面均會收到理想效果。
  8. The effectiveness of net - bank risk management require a clear goal of risk management, that is to establish a complete system of risk control to caution the risk effectively ; to own an advanced net technology with a legal intellectual property, and a combination of technology and services ; to find a law to abide by and to operate legally, and to find a good legal environment ; to supervise it and to manipulate closely, and to establish a special institution to supervise the operation of the inner and outer banking system ; to armed with talents with comprehensive knowledge of net - banking management

    網路銀行風險管理有效性的要求括明確網路銀行風險管理的目;能有效地防範安全風險,建立完備的安全風險體系;擁有先進的自主知識產的網路技術,科學的網路銀行技術與產品、服務的組合;有法可依,依法經營,有良好的外部法律環境;嚴密的監管與技術,在網路銀行內外部建立專門的監督機構;擁有高素質的復合型的網路銀行管理與技術人才。
  9. Four chapters including chapter 5 and chapter 6 and chapter 7 and chapter 8 were consisted of part 3 as empirical analysis. in order to improve reliability and classic and effectiveness of research conclusions to the greatest extents, characteristics of statistic samples and time periods were emphasized in the studies and the kinds of statistical software and test tools were used in the periods of models being built

    第三部分為我國上市公司變更的實證分析,括第五章、第六章、第七章和第八章共四章內容,實證是該部分的最大特徵,統計樣本選取注重其代表性和時序發展特徵,統計指全面和多角度反映研究對象,運用統計軟體和多種檢驗手段建立模型,以便最大限度提高研究結論的可靠性、代表性和有效性。
  10. The risk control system shall at least include an investment decision - making process, an investment authorization system, a research and report system, a risk assessment and performance evaluation indicator system

    風險度至少應當括投資決策流程、投資授度、研究報告度、風險評估和績效考核指體系。
  11. Applying the key technique of concurrent engineering - design for function ( dff ), design for assembly ( dfa ) and design for manufacture ( dfm ) of the method of design for " x ", the virtual design of the torque converter is accomplished in catia v5. then the model constitution and the simulation of virtual process of the torque converter is done in catia v5, including the model constitution and the simulation of 5 - aixe nc virtual process of the vane, the model constitution ( material : pvc ) of the idler pulley rapid prototyping ( rp ) and the virtual assembly and the motion simulation of the torque converter, etc. 3 - d data exchange between various cad systems is realized by using step standard. the lever of classing the character model of the torque converter is given

    應用并行工程的關鍵技術之一? ?面向產品全生命周期的設計dfx中面向功能的設計dff 、面向裝配的設計dfa和面向製造的設計dfm的方法,在catiav5中完成液力變矩器虛擬設計;在catiav5中對液力變矩器進行虛擬加工建模和模擬,括液力變矩器導輪葉片五軸數加工刀軌建模與模擬、導輪快速成型rp建模( pvc材料) 、液力變矩器虛擬裝配和運動模擬等;採用step準實現多cad系統之間三維數據交換,提出液力變矩器特徵模型的分級準並對三維模型數據進行分級管理,定相應的限等級以規范合作廠家的產品數據管理層次。
  12. Gt2 used an acl file, known as gridmap file, to map grid identity to a local identity associated with an unix account. gt3 installation uses the same file as used by a gt2 installation

    Gt2通過訪問列表文件來映射全局用戶證書識到本地帳號的方式進行授, gt3工具也採用了同樣的方法。
  13. The main contents of this paper are outlined as follows, ( 1 ) the physical significations and the correlativities of the often - used h performance targets are summarized, the selection strategies of the weighting functions are researched, and loop - shaping method as well as standard problems of robust h control are introduced. the frequency domain methods of robust h control are also introduced to solve the rate - based congestion control problem of the high - speed communication networks, and the h based controller are designed to deal with the time - delay problem of the single bottleneck node and multiple resources networks

    主要研究內容括( 1 )總結了各種常見h性能指的物理意義及相互關系,探索了函數的選取策略,介紹了迴路成形方法及h準問題;最後把h頻域設計方法應用於解決高速通信網路基於流速的擁塞問題,設計基於h理論的流器用於解決多源單瓶頸網路中時變不確定多時滯問題。
  14. The cisssps adopts three - layer - structure design conforming to j2ee standard, which internally includes platform modules such as search engine, application install management, data management, resources management, safety control etc. and externally provides unified connecting points for information service, unified customer identity attestation, authorization management and access control

    四川公安綜合信息查詢系統採用符合j2ee準的三層架構設計開發,內部含查詢引擎、應用配置管理、數據管理、資源管理、安全等平臺化組件;對外提供統一的信息服務接入,統一的用戶身份認證、授管理和訪問
  15. Tender offer refers to legal activities that a natural person or legal person ( so called the offerer ) discloses the take - over - bid ( tender offer ) to all of the shareholders of the target company, i. e., the listed company, during a given course and by a statutory approach, to buy certain amount of voting negotiable securities to which are attached rights for voting, in order to obtain or reinforce the control power upon the listed company

    具體而言,要約收購的法律內涵括四個方面:其主觀上是收購人以謀取目公司為目的;其主體是收購人(要約人)和目公司股東,而無需徵得目公司董事會的同意;其客體是目公司發行在外的有表決的證券;其客觀方面的特徵是收購人在證券交易市場外向公司所有股東公開發出收購要約,購買該公司有表決的證券。
  16. Searches for an audit control rule with the same user as the specified rule, and with compatible inheritance and propagation flags ; if a compatible rule is found, the rights contained in the specified rule are removed from it

    搜索以下的審核規則:與指定的規則具有相同的用戶,並具有兼容的繼承和傳播志;如果找到兼容規則,則從中移除指定的規則中含的限。
分享友人