文件保護功能 的英文怎麼說

中文拼音 [wénjiànbǎogōngnéng]
文件保護功能 英文
wfp
  • : Ⅰ名詞1 (字) character; script; writing 2 (文字) language 3 (文章) literary composition; wri...
  • : Ⅰ量詞(用於個體事物) piece; article; item Ⅱ名詞1. (指可以一一計算的事物) 2. (文件) letter; correspondence; paper; document
  • : Ⅰ動詞1 (保衛; 保護) defend; protect 2 (保持) keep; preserve; maintain in good condition 3 (...
  • : 動詞1. (保護; 保衛) protect; guard; shield 2. (袒護;包庇) be partial to; shield from censure
  • : 名詞1 (功勞) exploit; merit; meritorious service [deed]: 戰功 military exploits; 立功 render me...
  • : 能名詞(姓氏) a surname
  • 文件 : 1 (公文、信件等) document; file; papers; instrument 2 [自動化] file; 文件保護 file protection; ...
  1. This paper presents a method that chopping wave is done by switch devices which consist of three - level resistance regulating module and intelligence power module ipm, and which realizes constant - current discharge of storage battery. to achieve the intelligence control of the drive protection and the discharge process of ipm, the paper designs circuit formed by igbt threshold drive pulse pwm signals. ipm fault - blocking protection circuit and microcomputer 80c196. the devices can accurately control the 0 ~ 150a discharge current and the discharge time of the storage battery and calculate the releasing power

    實現蓄電池恆流放電過程智控制是蓄電池放電裝置發展的必然趨,本提出了一種通過三極電阻調節模塊和由智率模塊ipm為開關器進行斬波從而實現蓄電池恆流放電的方法。為達到對ipm的驅動和放電過程的智控制,中設計了igbt門極驅動脈沖pwm信號形成電路和ipm故障封鎖電路及由單片機80c196為核心的微機控制器。本裝置夠對蓄電池進行0 150a放電電流及放電時間的精確控制及釋放容量的計算。
  2. Jffs2 appends files rather than rewriting whole sectors, and features crash power - done - safe protection

    Jffs2附加而不是重寫整個扇區,並且具有崩潰掉電安全這一
  3. Abstract : the restoration of the riparian vegetation disturbed by human activities is one of the hotspots of watershed ecology. through interpreting the images of remote sensing in 1985 and 1999, the basic information of forest resources of lushuihe forest bureau, which is a typical forest area of changbai mountain, was obtained with support of gis. by dividing land covers of lushuihe area into 10 types ( water body, residential land, stump land, farming land, wetland, mature conifer forest, midlife conifer forest, mature broadleaf forest, midlife broadleaf forest, and man - made young forest ) and dividing the riparian zone into four buffers ( in turn, 1000, 2000, 3000, 4000 m away from the river ), the changes of riparian forest resources during 1985 - 1999 were analyzed. the results showed that the deforestation intension has obviously decreased and the whole environment has been evidently improved, but the riparian ecosystem was still flimsy. in buffer 1, 2, 3, the area of midlife conifer forest increased largely, but the areas of other types of land covers all decreased. midlife conifer forest had a comparatively good status in the three buffers. in buffer 4, midlife conifer forest, mature conifer forest, and mature broadleaf forest formed a forest - age rank that is helpful to stabilize the forest ecosystem and exert its functions. area percentage of wetland decreased in buffer 1, buffer 2, and buffer 3, even in buffer 4 in which forest ecosystem rehabilitated comparatively well, so protecting and rehabilitating wetland is a very difficult task

    摘:本對兩期遙感圖像進行解譯,並在gis支持下提取露水河林業局主要河流兩岸各緩沖區森林資源信息,經分析得到各類地物在1985年及1999年的變化趨勢.結果表明:在河流沿岸對森林的採伐強度1999年較1985年明顯減小,整體生態環境較1985年有所改善.在緩沖區1 , 2 , 3除中齡針葉林大幅度增加外,其它地物類型面積均減少,由此可以看出,在這三個緩沖區內針葉林得到了較好的恢復.在緩沖區4內,中齡針葉林、成熟針葉林、成熟闊葉林形成一個林齡梯隊,有利於森林生態系統的穩定與的發揮,十五年間緩沖區4受到的干擾相對較小.濕地數量在四個緩沖區內均有所減少,雖然在緩沖區4內森林生態系統恢復的較好,但濕地面積仍有所減少,說明及恢復濕地資源是一非常艱巨的任務,必須引起高度重視.圖5表2參12
  4. The restoration of the riparian vegetation disturbed by human activities is one of the hotspots of watershed ecology. through interpreting the images of remote sensing in 1985 and 1999, the basic information of forest resources of lushuihe forest bureau, which is a typical forest area of changbai mountain, was obtained with support of gis. by dividing land covers of lushuihe area into 10 types ( water body, residential land, stump land, farming land, wetland, mature conifer forest, midlife conifer forest, mature broadleaf forest, midlife broadleaf forest, and man - made young forest ) and dividing the riparian zone into four buffers ( in turn, 1000, 2000, 3000, 4000 m away from the river ), the changes of riparian forest resources during 1985 - 1999 were analyzed. the results showed that the deforestation intension has obviously decreased and the whole environment has been evidently improved, but the riparian ecosystem was still flimsy. in buffer 1, 2, 3, the area of midlife conifer forest increased largely, but the areas of other types of land covers all decreased. midlife conifer forest had a comparatively good status in the three buffers. in buffer 4, midlife conifer forest, mature conifer forest, and mature broadleaf forest formed a forest - age rank that is helpful to stabilize the forest ecosystem and exert its functions. area percentage of wetland decreased in buffer 1, buffer 2, and buffer 3, even in buffer 4 in which forest ecosystem rehabilitated comparatively well, so protecting and rehabilitating wetland is a very difficult task

    對兩期遙感圖像進行解譯,並在gis支持下提取露水河林業局主要河流兩岸各緩沖區森林資源信息,經分析得到各類地物在1985年及1999年的變化趨勢.結果表明:在河流沿岸對森林的採伐強度1999年較1985年明顯減小,整體生態環境較1985年有所改善.在緩沖區1 , 2 , 3除中齡針葉林大幅度增加外,其它地物類型面積均減少,由此可以看出,在這三個緩沖區內針葉林得到了較好的恢復.在緩沖區4內,中齡針葉林、成熟針葉林、成熟闊葉林形成一個林齡梯隊,有利於森林生態系統的穩定與的發揮,十五年間緩沖區4受到的干擾相對較小.濕地數量在四個緩沖區內均有所減少,雖然在緩沖區4內森林生態系統恢復的較好,但濕地面積仍有所減少,說明及恢復濕地資源是一非常艱巨的任務,必須引起高度重視.圖5表2參12
  5. Plc, robot and cad / cam are called the three major pillars in the modem factory automation. plc, as the head of the three, has become the leading basic automatic equipment in the field of the industry control in the early 1980s " but as a matter of fact, plc being with the lack of friendly man machine interface, rnakes no close relationship between human and machineometimes it even can not be promoted and applied in some fields aiming at the situation mat those imported products are too expensive while domestic products are of rare famous brands, a plc man - machine interface - plc monitor is developedthis paper systemically introduces the developing procedure for the whole system, including how to design hardware and software system. especially emphasizing plc communication protocol. real time message accessing, lcd controller instruction set, definition of data construction for message & tag screens and how to display thern, assignment of internal resource of cpuealization in software among plc & manitor, file format defining a nd download of user data, etcplc monitor will compensate some weakpoints of plc, and extend the application rangeimultanneously enhance the performance of plc and increase the attached value of mechanical machines, undoubtedly it will see hight market prospect

    針對人機界面進口產品的高昂價格和國產品牌稀少的這一現狀,研製開發了一種plc人機界面? plc監控器。本系統地介紹了整個系統的開發過程,包括硬體系統、軟體系統的設計及實現,重點介紹了plc通信協議,監控器的基本工作原理以及期望實現的,監控器電源電路、 sram存儲器掉電電路、 cpu監控器電路、按鍵輸入電路的設計及按鍵狀態的讀入,時鐘信息的設定與讀取, cpu液晶顯示器指令系統,信息畫面及標簽數據結構的定義及顯示方法, cpu內部資源的分配,監控器與plc通信的軟體實現,格式的定義以及畫面數據的下載等。 plc監控器彌補了plc一些方面的不足,可以擴大plc的應用范圍,提升機械設備的檔次,增加設備的附加價值,具有一定的市場前景。
  6. And pays emphasis on analyzing the system structure and system flow, the core techniques, the channel characteristic and parameters of dvb - t system. the system adopts some core techniques such as cofdm, a lot of tps ( transmission parameter signalling ) insert and guard interval, and so on. so it can withstand high - level ( up to odb ), long delay static and dynamic multipath distortion

    首先描述了數字電視地面廣播的需求條,技術難點和目前存在的問題,並重點分析了dvb - t系統結構流程,核心技術及系統通道特性和參數,該系統採用了cofdm (編碼正交頻分多路復用) ,大量導頻信號插入和間隔技術等核心技術,使之抵抗高電平( 0db ) ,長延時的靜態和動態多徑失真,有利於數字和模擬電視的混合傳輸,它的多載波調制模式和性在移動和便攜接收、同頻網等方面具有獨特的優勢。
  7. This paper put forward a method of using amending sine value in the spwm sine table. this method can correct the distortion of the output voltage waveform, which resulted from the dead time used to the voltage type whole bridge main circuit. the inverter system adopts digital fuzzy controller with feed forward correction and which proportion coefficient and integral coefficient is changeable, so dynamic response is improved

    提出了一種採用修補spwm正弦表值的方法,用以改善電壓型全橋逆變主電路因上下橋的率器切換時先關斷后導通的死區時間而引起的輸出電壓波形畸變;逆變系統採用帶前饋校正的變比例變積分系數的模糊控制器,提高了系統的動態響應指標;系統設計了完善的措施,並具有市電電網的故障診斷
  8. The research work is involved in the main circuits structure and the protection of the valves, the determination for the important parameters of the components in the main circuits, the triggering system of the valves, the technology of hv - tsc valve ' s turn - on without inrush current presentation, and the function design for the controller of the thyristor valves. a real hv - tsc valve controller corresponding to the research work has been developed. field tests has shown that the hv - tsc valve controller is able to provide effectively and reliably control and protection for the hv - tsc valves

    本論對高壓tsc裝置所用的可控硅開關的主電路電氣結構、主電路的電路、主電路中的重要元參數的選擇、可控硅開關的觸發系統構成、無沖擊涌流投入電容器技術、可控硅開關控制器設計及其實現進行了深入的研究和探討,並對可控硅開關控制器進行了實際的設計和試制,現場測試證明其對可控硅開關的控制是可靠、有效的。
  9. Firstly, the paper introduced the commonly hardware configure of microcomputer relaying and the function of every module of industry controlling computer std90386. secondly, the paper introduced several types busbarprotection which was commonly installed on electric power system and the characteristic of mv or lv system with low current grounding. based on it, the paper put forwards the theory of percentage - restraint differential relay. after that, in the discussing every problems of the relaying working the paper put the emphasis on the negative effect of the ct saturation and countermeasure

    首先介紹了微機裝置的一般硬體配置以及作為裝置硬體平臺的std90386工控機各組模板的,然後分析了目前電網系統裝設的母線的各種類型以及中、低壓小電流接地電網的特點,在此基礎上分析、介紹了作為本動作原理的「比率制動式差動」原理。
  10. Built - in application services that enable you to add membership for login security to your site, profile properties that enable you to maintain user - specific information, and other features, most without requiring any code

    提供內置的應用程序服務,使您可以向站點中添加用於確登錄安全性的成員資格;提供配置屬性,使您可以維用戶特定的信息;另外還提供其他,其中的大部分都不要求編寫任何代碼。
  11. The problems and shortage of previous reinforce and protection materials used for porous relics were understood on the basis of completely overview to their structure characteristics and property, to the influence factors, deterioration characteristics of the cultural object, as well as evaluation methods. on the other hand, the structure feature, special characteristics and the viability assessment in cultural relics of fluorinated polymers were proposed in this paper. so, a possible research way, including the synthesizing of fluorinated polymers, the completely and systematically study of the polymers in the reinforcing of cultural object, and final application to true cultural object protect, was proposed

    對多孔物結構特點、風化條和特徵以及目前國內外的相關物加固材料及表面封材料的種類、性、應用條效果、評估方法等全面系統的綜述,對多孔質無機材料存在的問題或缺限有了進一步的了解;通過含氟聚合物結構特點、獨特的性、研究進展及含氟聚合物在應用中的可行性分析,提出了從物特點、原則及要求出發,合成多的含氟聚合物,全面系統地研究這些聚合物在多孔物中的效果,並應用於真實的可行性研究思路。
  12. In the ip core ’ s data management, we construct ip data - base tree structure, take the ip function as main search factor, warpping the ip cores having same function in the same xml file, and set up the accessing popedom, avoid the redundancy information, advance the search

    在事務級ip核數據管理中,為了高效的搜索ip核,構建了事務級ip庫的樹型結構,以ip的為主要搜索要素,相同的ip核被封裝在同一個xml中,並設立訪問權限,避免冗餘信息,提高搜索效率,並且實現知識產權
  13. The punitive compensation system is take the traditional compensatory damage compensate as the foundation, in compensates under the premise which the victim loses, it has punishes party causing an injury ' s mistake behavior and the deterrent illegal man multiple function. current our country is occupying the social reforming time, because the law, the laws and regulations are not perfect, has had many illegal violations behaviors. but traditional civil law damage compensate, because it does not have the punitive compensation system

    認為,適當地加大懲罰性賠償的適用范圍,使之適用於侵權責任、違約責任和產品責任等領域,並以侵權行為人或違約方的「故意」或「重大過失」作為適用之基本條,全面受損害方的合法權益;充分發揮懲罰性賠償的懲罰、威懾等,減少違法行為的發生,促進社會主義市場經濟的健康有序運行。
  14. With the optional printer controller and finisher, any sophisticated documents could be printed out in double - sided, folded and then stapled to produce booklet, flyer or direct mailers ready for the envelope with just a click at the mouse

    同時使用列印密碼,更可在印表機密時進行密碼。用戶只需付出最低的成本,便可得到最高的密性。
  15. Fundamentally, securing your replication environment is a matter of understanding your authentication and authorization options, understanding appropriate uses of replication filtering features, and learning specific measures for securing each piece of the replication environment including the distributor, publisher, subscribers, and the snapshot folder

    基本上,復制環境需要了解身份驗證和授權選項如何正確使用復制篩選,以及用於復制環境的每個部分包括分發服務器發布服務器訂閱服務器和快照夾的具體措施。
  16. Spark pc lock is special designed to protect your individual information security of your pc. it offers encrypted disk protection, log on function and files folders encryption etc. it is cost - low and very ease of use for everybody

    Spark pc lock是一種基於硬體身份認證方式的桌面數據安全系統,它提供鎖機器,險箱,網路屏蔽,網站過濾,加密等
  17. This dissertation studies igbt, which is a new type large power thyristor, and its applying technique. according to its lots of advantage, a scheme of remodeling original locomotive resistance - load test bed has been proposed which will make it automatic and numerical

    研究了新型大率半導體器igbt的驅動與的原理和應用技術,根據igbt的諸多優點,提出了採用igbt對機車干阻試驗臺進行技術改造的方案,使之具有自動化、數字化等
  18. Because the mail merge function in word can allow an access database to run macro code automatically - with no macro protection warnings turned on - malicious users could entice you to open a specially constructed mail merge word document from an e - mail attachment or a link on a hostile web site that might cause arbitrary code to run on your machine

    因為word的合併列印會允許access在沒有開啟巨集警告的情況下,自動執行巨集程式碼。惡意使用者可以藉此安全性漏洞引導您從電子郵或網站連結開啟特定架構的word合併列印,因而導致某種巨集程式碼在您的機器上不受控制地執行。
  19. The course has incorporated the basic security training course recognized by the security and guarding services industry authority sgsia. a retrainee who has successfully completed this recognized course, passed its relevant examination and is able to produce a valid certificate can be exempted from the 16 - hour basic training on being employed by a security company

    課程已包含獲安及衛業管理委員會sgsia認可之基本訓練內容,成修畢認可課程並出示證明例如畢業證書的人士,在受安公司聘用時可被豁免接受16小時的基本訓練。
  20. Currently, only protection locks that are developed by using cpu as its major component could use hardware lock to encode and decode data files, so software development companies can not only use protection lock for protecting their software that is developed with great effort, but also use the special encode decode function to protect the data files generated by programs

    目前可以利用硬體鎖達成數據編碼與譯碼的鎖, ?有以cpu為主要組成組設計的鎖,所以軟體開發公司不僅可以利用鎖來辛苦開發完成的軟體,也可以利用該鎖中的特殊編碼譯碼軟體程序產生的數據
分享友人