操作系數 的英文怎麼說

中文拼音 [cāozuòshǔ]
操作系數 英文
stream coefficient
  • : Ⅰ動詞1 (抓在手裡; 拿; 掌握) hold; grasp 2 (做; 從事) act; do; operate 3 (用某種語言、方言說...
  • : 系動詞(打結; 扣) tie; fasten; do up; button up
  • : 數副詞(屢次) frequently; repeatedly
  • 操作 : 1 (按照一定的程序和技術要求進行活動) operate; manipulate; handle 2 (所進行的若干連續生產活動的...
  • 系數 : [數學] coefficient; ratio; modulus; quotient; factor
  1. Is a professional art glass manufacturer and is dedicated to the development of art glass on the basis of the operation principle of " top quality, sincere service ", and has set up complete chain service platform and is developing the domestic and european and american market with digital design and intelligent pos computerized marketing strategy

    是一家專業的藝術玻璃生產企業。我們秉承「至佳質量,至誠服務」的經營理念,專注于藝術玻璃的原創,建立了完善的連鎖加盟服務平臺,提供碼設計宅配和智能化的pos電腦統等現代營銷策略開拓國內及歐美市場。
  2. For example, we used brio to obtain the following operating system metrics for one of our lotus workplace servers

    比方說,我們使用brio獲得一臺lotus workplace服務器的下列據:
  3. Then this paper concerns about the network packet intercepting technology of linux os and gives a thoroughly overview of network hacking methods and some application protocol criterion, including http, ftp, telnet, nntp, pop3, smtp etc. then the system design scheme of the transparent proxy has been discussed, this system can be divided to 4 modules below : establishment of transparent charnel, implement of proxy service, gui configuration and management application, accessory filter functions ( such as url filter, command filter and logger etc ). we explain key techniques in all 4 main parts of this system, define the interfaces of each module, what is more the main data structures and software implements codes are all illustrated

    首先,論文陳述了防火墻的相關技術基礎,分析了透明代理為一種先進易用的防火墻技術的原理,闡述了linux統網路據包攔截技術和http 、 ftp 、 telnet 、 nntp 、 pop3 、 smtp等應用層協議的協議規范和具體的工流程。接著敘述了本透明代理服務器的統總體設計方案,將統分為以下幾個部分:透明通道建立、代理服務實現、 gui配置管理程序以及過濾功能(如url過濾、命令過濾和日誌審計等) 。論文然後分別介紹各個關鍵部分的具體實現要點,解釋了相互間的介面關,列出了主要據結構和實現流程。
  4. As a whole the system may compart three modules : ndis drivers in the kernel mode, the dll program in the user mode and the user application program, adopting the share memory technology three modules realize the data share of the control canal rule, the encapsulation data and the network neiborhood name and so on, so we can easily finis1 " the packet authentication by the control canal rule, improve the filtering efficiency of the system. whereas the current of firewall technology, the system has wide utily value and business value. this software is based on windows 2000 operating system, the programming language is chosen as visual c + + 6. 0 and win2000 ddk

    從總體上可以劃分為以下三個模塊:核心層的ndis網路驅動程序、應用層的動態鏈接庫程序以及用戶應用程序,這三個模塊之間通過內存共享技術完成對控管規則、封裝據、網上鄰居名字列表等據的讀寫,從而很方便的根據控管規則實現了對網路封包的認證,提高了統的過濾效率。鑒于目前防火墻技術的發展趨勢,本統具有廣泛的實用價值和商業價值,因此具有一定的推廣前景。軟體的開發基於windows2000統,開發語言採用visualc + + 6 . 0和win2000ddk 。
  5. Polish or sand the exterior surface of stainless steel or aluminum discal ware products, which are in the shape of squareness, roundness and oblong. it adopts computer numerical control techniques to achieve polishing automatically

    本機器主要用於不銹鋼器皿或鋁製品方形圓形橢圓形等盤狀器皿的外表面拋光或砂光,它採用cnc自動統,控編程自動加工完成拋光大大降低工人勞動強度,保證產品質量穩定性及拋光亮度一致性,提高生產效率。
  6. Operating system experiment system ( oses ) has been a old topic, but it developed slowly. so it is discommodity to go deep into study the principle of the operating system ( os ) for the learners, that most learners ca n ' t master the os

    統實驗統」是一個較早的話題,可也是一個發展不夠充分的一項技術,這給深入學習統的原理帶來了不便,以致絕大多學習者對統理解不透。
  7. Xml web services use xml - based messaging as a fundamental means of data communication to help bridge the differences that exist between systems that use incongruent component models, operating systems, and programming languages

    Xml web服務使用基於xml的消息處理為基本的據通信方式,以幫助消除使用不同組件模型、統和編程語言的統之間存在的差異。
  8. Debian gnu linux is the first choice as base operating system for innominate when developing standard and customized security appliances for a long time

    年來, innominate在開發標準及特殊訂做的網路安全產品時, debian gnu linux一直是他們基礎統的第一選擇。
  9. Multithreading and message drive mechanism is applied to simulate the intercurrent and schedule of the multitask in power distribution system, which builds the foundation of the development based on real - time operation of the project. at the same time, the software deals with the real - time data by the means of memory database and uses the thread security class to maintain the data ' s integrity

    利用windows的消息驅動和多線程機制模擬了配電統中多任務的並發和調度過程,為課題在嵌入式實時統下的開展打下了一定的基礎;同時,對統中大量實時據則採用內存據庫管理方式,並利用線程安全類來保證讀取據的完整性。
  10. The article points out the importance and necessity of the information - security from its actuality in our country. the resources in the information system, for instance, hardware, software, data, document, operator, meterial and so on, are evaluated and gived safety grade firstly. and then, it analyses the menace including the nonauthorized access, the information leak, the refused sevice, the internal objection which the system will take. the following are the corresponding control police : confirm the users " rights and duties, including the mode of using account, the limit of accessing resource, the application of password, the building of backup ; confirm the administrators " right and duties, including physical safety, system configuration, account configuration and usufruct, password management, audit and control, backup and individual intimity ; run - of - mill measure of security defence, including access control, symbol and identification, integrality control, password technique, firewall system, audit and resumption, safety of operating system, safety of database system, defence of computers " virus and resisting - deny protocol. in the end, the article offers the strategies of disposing the safety - accident and analyse after ithow. to report it, how to solve it in phase, and how to avoid it happening again. in a word, the article presents a holistic resolvent about keeping away the information system ' s security, and supplies a essential frame for its configuration, management and application

    然後,對統可能受到的威脅,包括非授權訪問、信息泄漏、拒絕服務和內部缺陷等進行分析,並提出了相應的控制策略:確定用戶的權力和責任,包括帳戶使用方式、資源訪問權限、口令應用以及建立備份等;確定統管理員的權力和責任,包括物理安全、統配置、帳戶設置及使用權限、口令管理、審計和監控、備份以及個人隱私等方面;一般性的安全防護措施:存取控制、標識和認證、完整性控制、密碼技術、防火墻統、審計和恢復、統安全、據庫統安全、計算機病毒防護和抗抵賴協議等。最後,對事故處理和事後分析提供策略,如何報告安全事故,如何協調解決安全事故,如何避免安全事故再次發生。總之,本文對信息統安全防範工給出一個整體的解決方案,為其在配置、管理和應用方面提供了基本的框架。
  11. Furthermore, applying embedded real time operating system to the design of onc is innovative and can prompt the development of onc

    同時,將嵌入式實時統引入到開放型統開發當中,對開放型統的研究和發展具有創新和現實推動意義。
  12. The non - simp chinese system player, if you can not run the setup, youcan try to rename the setup programs name to anything you want. example : change it to a number, then you can run the set up

    非簡體中文統的玩家,如果無法運行安裝,可以嘗試將安裝程序隨意更改一個文件名,比如一個字之類,這樣就能正常安裝了,謝謝支持! !
  13. A digital automatic ultrasonic inspection system designation is introduced. this system was developed with pc computer and embedded dsp, combining computer software and hardware, ultrasonic nondestructive testing, digital signal processing, embedded rtos and visual instruments technology. it meet the requirements of automatic inspection such as high repetitively frequency and real time alertation

    該方案以pc機和dsp統為核心構成主從機統框架,以基於虛擬儀器思想的pc機應用程序和基於dsp的嵌入式實時統構成雙重軟體結構,把傳統的超聲波無損檢測技術和先進的虛擬儀器技術、字信號處理技術、嵌入式實時統、計算機介面通信技術相結合,從而滿足了自動化探傷中1k / s的重復頻率和實時報警的要求。
  14. A value held by an operating system that indicates how much primary storage a process is likely to require for its active set during a particular phase of processing

    在特定的處理階段,為了建立某個進程,統提供的主存儲器容量的值。
  15. The protocol specifies the definition of inter - library loan service working on c / s mode. by means of 21 apdu messages defined in this protocol and standard encode / decode rule, we can realize the resource sharing between different libraries. this article advances a set of solution scheme for the implementation of inter - library loan on the internet environment, and gives some discussion about the key elements for the implementation which includes the process of apdu, the computer descriptions of asn. l syntax, the ber coding rules and the design for supporting db etc. the exact method and program for implementation of inter - library loan are also presented in the article

    本文在詳細分析和研究館際互借協議內容和工原理基礎上,根據我國圖書館目前的實際情況,給出了在internet環境下實現館際互借服務的解決方案,論述了基於windows2000統下開發館際互借軟體的具體思路,討論了實現該協議的一些關鍵問題,包括apdu的處理, asn . 1抽象語法表示、 ber編碼規則、據庫設計等,並給出了具體的解決方法和實現程序。
  16. The security mechanism of network database is related with many aspects. though the analysis of architecture and software arrangement, i divide this problem into four layers : network security mechanism, dbms security mechanism, operating system ( server ) security mechanism and application system security mechanism

    從體結構和軟體層次上思考,筆者將其分為網路安全機制、服務器統安全機制、據庫管理統安全機制和應用統安全機制四層。在這個層次結構中,每一層都有自己的一套機制,完成自己的任務,實現一定的安全內容。
  17. Assured processibility factor

    安全操作系數
  18. There are two series interface installed on the os in advance, the one is called bsd socket designed by berkeley software, with the working mode of blocking synchronization, nonblocking asynchronization and polling, the other is named winsock designed by microsoft, worked via the way of windows message driven. as the foundation of process socket seizing technologies under microsoft windows, api ( application program interface ) hook technology is the core to achieve

    Windows進程套接字據劫持技術的基礎部分, windows應用程序介面api掛接技術,該技術是實現統不支持的特殊功能的應用程序的核心,有相當難度,與傳統的基於網路設備介面規范( ndis )的包過濾技術相比,該技術的不同之處在於它可以在應用層上對任意進程的網路輸入和輸出據進行捕獲。
  19. The installer will start copying programs to your hard disk. this may take quite a while, as the operating system must be copied to your hard disk

    安裝程序將要花費幾分鐘把據復制到你的硬盤上(統必須復制到硬盤上) 。
  20. The system realizes multiple serial port communication and management by way of multi - port serial board ( 2 ) use the database technology to manage and manipulate the physics information data of nc tool. the basic information management system, the nc program auto - create system, the simulation of cutter working and dnc communication program are integrated to one system. it realizes the offline programming and controls of no - punched tape, helps to cut short the supplementary cutting time and improves the efficiency of to program and machine tools and realizes the separation and seamless connection of program and manufacture

    本課題以硬體為輔助手段,以軟體為主要手段實現了以下功能:以串口擴展卡來實現網路中多臺控機床的通信和管理;使用據庫技術對控機床的物理信息進行管理和,將控機床基礎信息管理統、 nc程序自動生成模塊、刀具加工軌跡模擬模塊和dnc通信介面模塊集成為一體,實現了控加工的離線編程和統的無帶控制,提高了編程效率、質量,縮短加工輔助時間,提高了機床的效率,既實現了編程和加工的分離,又達到它們之間的無縫連接。
分享友人