本機訪問 的英文怎麼說

中文拼音 [běnfǎngwèn]
本機訪問 英文
lc
  • : i 名詞1 (草木的莖或根)stem or root of plants 2 (事物的根源)foundation; origin; basis 3 (本錢...
  • : machineengine
  • : 動詞1. (訪問) call on; interview; visit 2. (調查; 尋求) inquiry into; seek by inquiry [search]; try to get
  • : Ⅰ動詞1 (請人解答) ask; inquire 2 (詢問; 慰問) question; ask about [after]; inquire about [aft...
  • 訪問 : visit; call on; interview; access; addressing; reference to
  1. Microsoft sql native client ole db provider

    Microsoft sql客戶端ole db介面
  2. I was flying back with a group of western and japanese journalists after an exhilarating trip to tibet.

    我與一夥西方和日記者歡天喜地西藏后,一起乘飛回來。
  3. Meanwhile, it supports the international open specification. owl - s it based owl is the primary production for the describing model of semantic web - service in international, it is a mark model for describing web service, it provide a mark symbols set that is explicable and precise to describe the attributes and functions of web service for computer. owl - s uses serviceprofile 、 servicemodel and servicegrounding to describe “ what the service does ? ” 、 “ how it works ? ” 、 “ how to access it ? ” this paper provides an introduction to the basic concepts and architecture of soa ( service - oriented architecture ), the features of web service technology, anddiscusses the relationship between soa and web services

    而owl框架下的owl - s是國際上語義web服務描述模型方面的主要研究成果,它是一種描述web服務的標記模型,為器提供了可解釋的、精確的、關于web服務屬性和能力描述的一系列標記符。它是基於owl語言為描述web服務而定義的一個體,主要通過服務proile ( serviceprofile ) ,服務模型( servicemodel )和服務綁定( servicegrounding )三個類來描述服務做什麼、服務如何做、服務如何等三方面的語義,從而允許服務的自動發現、執行、組合和運行的監視。
  4. The article points out the importance and necessity of the information - security from its actuality in our country. the resources in the information system, for instance, hardware, software, data, document, operator, meterial and so on, are evaluated and gived safety grade firstly. and then, it analyses the menace including the nonauthorized access, the information leak, the refused sevice, the internal objection which the system will take. the following are the corresponding control police : confirm the users " rights and duties, including the mode of using account, the limit of accessing resource, the application of password, the building of backup ; confirm the administrators " right and duties, including physical safety, system configuration, account configuration and usufruct, password management, audit and control, backup and individual intimity ; run - of - mill measure of security defence, including access control, symbol and identification, integrality control, password technique, firewall system, audit and resumption, safety of operating system, safety of database system, defence of computers " virus and resisting - deny protocol. in the end, the article offers the strategies of disposing the safety - accident and analyse after ithow. to report it, how to solve it in phase, and how to avoid it happening again. in a word, the article presents a holistic resolvent about keeping away the information system ' s security, and supplies a essential frame for its configuration, management and application

    然後,對系統可能受到的威脅,包括非授權、信息泄漏、拒絕服務和內部缺陷等進行分析,並提出了相應的控制策略:確定用戶的權力和責任,包括帳戶使用方式、資源權限、口令應用以及建立備份等;確定系統管理員的權力和責任,包括物理安全、系統配置、帳戶設置及使用權限、口令管理、審計和監控、備份以及個人隱私等方面;一般性的安全防護措施:存取控制、標識和認證、完整性控制、密碼技術、防火墻系統、審計和恢復、操作系統安全、數據庫系統安全、計算病毒防護和抗抵賴協議等。最後,對事故處理和事後分析提供策略,如何報告安全事故,如何協調解決安全事故,如何避免安全事故再次發生。總之,文對信息系統安全防範工作給出一個整體的解決方案,為其在配置、管理和應用方面提供了基的框架。
  5. In this paper, through practical investigation, spot visit and scientific analysis, the problem which exits in the enterprise ' s inside encouraging system is studied, and by inducing, the following problems are pointed out : first lacking scientific result examination system, unfair distribution system ; second disjointed distribution and personal work - effect, lacking enterprise loudening power, lass of use - full personnel, lacking power of bringing forth the new ideas. in this paper, according the practical situation and combining with the theory of encouraging system, the author analyzed the problem in this enterprise and thought that the main reasons

    文作者結合所學的激勵相關理論知識,通過實際調查、現場和科學分析的方法,研究該企業在激勵制上存在的題,經過認真分析、整理,認為該企業激勵制上存在的主要題是:首先在制上缺乏科學的績效考核體系、分配製度不公;其次,在制度上分配與個人績效嚴重脫節;第三在管理方法上缺乏靈活性、企業缺乏凝聚力、人才流失,缺乏創新力。
  6. To most people, the most remarkable aspect of the movie is probably the comparsion between the new and the old, that is, the skyscraper plaza hollywood and the shabby " dai hum chuen " sorry but i really don t know the official english name of this place

    由於筆者只曾觀看vcd版,並沒有會一窺dvd版包括的導演,也不太清楚戲中角色或劇情的象徵意義,所以以下都是筆者自己一些主觀憶測和感想,可能十分天馬行空,和導演原意不同。
  7. The center of the computer application and research is often related with specialists in japan, in america, etc, also sends some science technocrats to study abroad

    計算中心注重與國內外的交流,多次接待日、美國的專家來,也派學者、專家、青年科技人員赴美國、日等國留學。
  8. In order to change situation and realize higher education evaluation online, with introducing the origin and the phylogeny of higher education evaluation as the starting point in the paper, analyzing the characteristic of higher education evaluation and comparing several typical evaluation methods each other, we put forward a synthetic evaluation method based on a combination of ahp and fuzzy estimation. then we have made a thorough and careful study in education evaluation work pattern and system structure, in which some related technique, such as active server page technology and web database access technology etc. are discussed

    文首先介紹高教評估的起源及其發展概況,並分析了高教評估的特點,在深入研究幾種經典的評估方法的基礎上,提出模糊評估與層次分析相結合的綜合評估方法;接著對網上評估系統的工作模式及其體系結構進行探討,並應用相關的理論、技術,如數據庫理論、動態網頁技術asp 、和基於asp的web數據庫技術等,開發了一個基於計算網路的高等教育評估系統。
  9. Anshan yingyi trading co, ltd, comprehensive group enterprise, is a large company which combines production, operation togethe, the headquarter of the company is in steel capital of china - anshan, it has branches in northeast of china, guangzhou, shanghai etc, it mainly engaged in metallurgical industry, and also mechanical processing, manufacture, chemical products, agricultura, forestry, husbandry and native produce etc, our mission statement is to provide best service and products on the basis of honesty and good credit by means of science of technology, in order to expand our world market, we would like to cooperate with the talents all over the world to create our splendid future, the steel rolling equipment and scope of business of the steel rolling plant is as below, we sincerely welcome to visit our company,

    公司總部設在中國鋼都鞍山,其分公司遍布中國東北廣州上海等各地,所涉及的行業以冶金企業為頭,兼營各種械加工製造化工產品農林牧及土畜產品等。我們的服務理念是以誠信為基礎,以科技為手段,以優質的產品和服務為宗旨。為了使企業在國際市場得到進一步的發展,壯大,更廣泛聯合天下有識之士,共創美好明天,特向國際友人介紹公司軋鋼部的軋鋼設備及服務范圍,敬請各位到我公司來參觀
  10. Panic disorder is characterized by the recurrent sudden attacks of physical and emotional anxiety symptoms, phobic avoidance behavior, and impairment of social function. in order to understand its prevalence, symptom patterns, and help seeking behavior, the hong kong mood disorders center of the faculty of medicine, the chinese university of hong kong conducted a large - scale telephone survey from april 16 to 25, 2002. 3, 004 respondents aged 15 to 60 ( 1, 446 males and 1, 558 females ) were randomly selected and interviewed

    驚恐癥是情緒病的一種,香港中文大學醫學院香港健康情緒中心委託香港中文大學香港亞太研究所,于年4月16至25日以隨抽樣形式透過電話了3 , 004位年齡介乎15至60歲的人士,當中1 , 446為男性, 1 , 558人為女性,了解香港人患驚恐癥的比例、癥狀及求醫意欲。
  11. Information technology small computer system interface scsi - 3 primary command layer part 9 : common access method

    信息技術小計算系統介面scsi - 3基命令層第9部分:公共方法
  12. First, the paper introduces the basic knowledge of the image processing technique, emphasizes the image processing method that is used in the measur - ement system, such as edge detection operator, curve fitting algorithm, espe - cially hough change in detail, etc. second, the paper introduces the vc + + 6. 0 program language, analyses its peculiarity and advantage, explains the form of the image in the computer and dib visiting functions

    首先,介紹了圖像處理方法的基礎知識,特別重點講述了在系統中將會應用到的一些圖像處理方法,如邊緣檢測運算元、曲線擬合演算法等等,尤其是對于哈夫變換的方法,進行了詳細闡述。其次,介紹了系統所應用的編程語言vc + + 6 . 0 ,分析了其特點和優點,並說明了模擬圖像數字化后,在計算里的存儲格式以及相應的設備無關位圖函數。
  13. As web ’ s own openness and sharing, not only brings the government service transformation and highly effective revolution, but also causes the phenomenon which government institution appears exceeds authority to visit, creates the information visitor ’ role blurred, jurisdiction unclear, the task responsibility is vague, brings the enormous threat to information security of the government

    由於web身的開放性和共享性,帶來政府業務方式變革和高效運轉的同時,也使得政務關中出現越權的現象,造成信息者角色不清,權限不明,任務責任模糊,給政府信息安全帶來極大的威脅。
  14. However, the farther analysis in the paper indicates that the strategy of parameter configuration in current connection pool technique is static state with 1 - order enactment while initializes connection pool without self - optimized adjustment according as the variety of application demand, the operation results of high use frequency database are not cached and users visit the same database independently. the multi - propose connection strategy cannot control the database operation for the same transaction and cannot ensure the acid attribute, etc. in according with the defections mentioned above, the service technique of self - optimized connection pool is presented in this paper and the composing structure for self - optimized connection pool is designed, then, some strategy in dynamic parameters adjustment, transaction management and data cache for connection pool is improved

    然而,通過文的研究分析,現有數據庫連接池技術的參數配置策略是靜態的,連接池初始化時進行一次設定,不能根據應用需求的變化而動態調整;連接池的核心管理制中,沒有對使用頻率較高的數據庫操作結果進行緩存,多個用戶依然各自獨立地完成相同的數據庫;使用的連接復用策略無法控制屬于同一個事務的多個數據庫操作,不能保證事務的acid屬性等。
  15. Even though we didn t have the good fortune of meeting mr li han - hsiang in person, we were lucky to discover from the memorabilia donated by his family, some documentary footage shot at the time when he was filming in beijing. grace ng has collated this filmed oral history, narrated by li himself, into an article. in 1975, lau shing - hon interviewed li to discuss issues of creativity

    我們沒有會見過李翰祥,卻很幸運,在其後人捐贈給香港電影資料館的物件里,找到了當年他在北京時拍下的紀錄片段,詳細憶述自己的故事,藍天雲將這段自拍的口述歷史整理成文1975年,劉成漢曾就創作的了李翰祥,寫成與李翰祥的對話一文,內容詳盡而又具針對性,承蒙作者慨允,我們將之收錄于書內。
  16. Vnc + : virtual network computing for mobiles provides an easy and convenient way for anyone to access, enjoy the navigation and perform tasks on a desktop or laptop pc from a mobile device

    遠程電腦控制的手端軟體,提供了從手臺式或筆記的一種簡便途徑。
  17. Though xml based on metadata relaxes the difference of heterogeneous metadata to some extent, it is difficult to integrate learning resources of different authors and the precision of query is not satisfying for the short of semantic. this thesis makes a tentative exploration to personal analyzing and instructing method in ontology - based e - learning by combining ontology technology and jena ’ s rules based ontology accessing mechanism. it provides an analyzing and instructing mechanism facing on semantic, in order to put forward a solution to realize e - learning individuation

    文結合wi ( webintelligence )中的ontology (體)技術和jena (由hp公司的brianmcbride開發,起源於早些時候sirpacapi的工作,其定義了很多的介面來和處理ontology文件)基於規則的制,對基於體e - learning的個性化分析與指導方法進行了初步的探索和嘗試,並給出了一種面向語義的分析與指導制,為實現e - learning的個性化提出了一個可行的解決方案。
  18. While the browser option provides online access to available resources, the eclipse - based architecture of the workplace managed client provides a rich user experience with all the functionality of a native desktop client, including offline functionality, replication mechanisms, and strong security

    瀏覽器選項支持對可用資源的聯,而workplace managed client的基於eclipse的體系結構提供了更豐富的用戶體驗,帶有桌面客戶的所有功能,包括離線功能、復制制和增強的安全性。
  19. This paper introduces the origin of jpeg 2000, jpeg 2000 itself and its application background as well as the still - image compression and coding system. jpeg 2000 standard is thoroughly analyzed in this paper. the features of jpeg 2000 such as region of interest coding, random access and progressive transmission are discussed in this paper

    Jpeg2000是目前國際上最新的靜態圖像壓縮編碼標準,文分析了jpeg2000的由來和應用背景,並由靜態圖像編碼壓縮系統的背景知識出發,對jpeg2000標準進行了深入的研究,對該標準的新特性,包括roi編碼、隨技術、漸進傳輸等進行了探討。
  20. The data bank technique provides the users with a high - performance storage and management system and safer rapid on - line visit so as to reduce the cost of storage and preservation of data, save the time of searching for data and help geologists to make decision in a better way

    數據銀行技術給用戶提供了一個高性能的存貯管理系統,提供更安全的快速聯,可以大幅度降低存貯、維護資料成,節省尋找資料時間,幫助地學家更好地作出決策。
分享友人