標識控制 的英文怎麼說

中文拼音 [biāozhìkòngzhì]
標識控制 英文
marker control
  • : Ⅰ名詞1 [書面語] (樹梢) treetop; the tip of a tree2 (枝節或表面) symptom; outside appearance; ...
  • : 識Ⅰ動詞[書面語] (記) remember; commit to memory Ⅱ名詞1. [書面語] (記號) mark; sign 2. (姓氏) a surname
  • : 動詞1 (告發;控告) accuse; charge 2 (控制) control; dominate 3 (使容器口兒朝下 讓裏面的液體慢...
  • : Ⅰ動詞1 (製造) make; manufacture 2 (擬訂; 規定) draw up; establish 3 (用強力約束; 限定; 管束...
  • 標識 : [物理學] characteristic; identification; identifying標識碼 identification code; 標識位置 home position
  • 控制 : control; dominate; regulate; govern; manage; check; cybernate; manipulate; encraty; rule; rein; c...
  1. Identifies the caret width, in pixels, for edit controls

    編輯項的插入符號寬度(以像素為單位) 。
  2. The article points out the importance and necessity of the information - security from its actuality in our country. the resources in the information system, for instance, hardware, software, data, document, operator, meterial and so on, are evaluated and gived safety grade firstly. and then, it analyses the menace including the nonauthorized access, the information leak, the refused sevice, the internal objection which the system will take. the following are the corresponding control police : confirm the users " rights and duties, including the mode of using account, the limit of accessing resource, the application of password, the building of backup ; confirm the administrators " right and duties, including physical safety, system configuration, account configuration and usufruct, password management, audit and control, backup and individual intimity ; run - of - mill measure of security defence, including access control, symbol and identification, integrality control, password technique, firewall system, audit and resumption, safety of operating system, safety of database system, defence of computers " virus and resisting - deny protocol. in the end, the article offers the strategies of disposing the safety - accident and analyse after ithow. to report it, how to solve it in phase, and how to avoid it happening again. in a word, the article presents a holistic resolvent about keeping away the information system ' s security, and supplies a essential frame for its configuration, management and application

    然後,對系統可能受到的威脅,包括非授權訪問、信息泄漏、拒絕服務和內部缺陷等進行分析,並提出了相應的策略:確定用戶的權力和責任,包括帳戶使用方式、資源訪問權限、口令應用以及建立備份等;確定系統管理員的權力和責任,包括物理安全、系統配置、帳戶設置及使用權限、口令管理、審計和監、備份以及個人隱私等方面;一般性的安全防護措施:存取和認證、完整性、密碼技術、防火墻系統、審計和恢復、操作系統安全、數據庫系統安全、計算機病毒防護和抗抵賴協議等。最後,對事故處理和事後分析提供策略,如何報告安全事故,如何協調解決安全事故,如何避免安全事故再次發生。總之,本文對信息系統安全防範工作給出一個整體的解決方案,為其在配置、管理和應用方面提供了基本的框架。
  3. Using the approximate ability to nonlinear function of neural networks, the adaptive frame of identification and controller are constructed. and the formula of jacobin matrix for unknown systems is given, which is used to train the neural networks controller in closed systems

    總結了bp神經網路的基本理論,把基於非線性數值優化技術的leven - marquardt方法用於bp網路辨器和器的訓練,模擬結果表明該演算法性能遠遠優于準bp類演算法。
  4. After extension, new security properties of users, security label and audit mask, are added to the i & a system, in order to support the mandatary access control ( mac ) and audit system under the secure os

    擴展后的鑒別機增加了新的用戶安全屬性,即安全簽和審計掩碼,以增加對安全操作系統下強存取訪問和審計機的支持。
  5. Involuntarily, questions of these engineering datas " management appear, datas " persistance only depending relational model and rdbms is greatly insufficient, so this paper carefully studies object - relational mapping based on rdbms based on the analyse of home & overseas actualities, correlative theories and realizing methods of object - relational mapping, we find opl based on rdbms is the most suitable for object relatinoal mapping of clera. based on the engineering application analyse of opl in clera, function requirements, database modes, interface criterions and functions, running modes of opl have being detailedly described. with the framework of microsoft dna, a kind of realizing method of opl based on com / dcom / activex component technology has being brought forward, and this paper describes realizing keys from base tables " definition, object id and class hx class and inheritance of class, object storage, parallel control and affair, object query, object nesting, relations between objects, support of complex data types, right control of object and buffer management of object

    本文在分析對象?關系映射技術的國內外現狀、相關理論及實現方法的基礎上,研究發現基於rdbms的opl是目前最適合clera的對象?關系映射方法;在clera的opl應用分析的基礎上,詳細描述了opl的功能要求、數據庫模式、介面規范與功能、運行方式等內容;結合microsoftdna開發框架,提出了一種基於com dcom activex組件技術的opl實現思路,並從基本表定義、對象與類、類與類繼承、對象存儲、並發與事務、對象查詢、對象嵌套、對象間聯系、復雜數據類型的支持、對象級權限及對象緩沖管理等幾方面概述了實現要點。
  6. Giving the goal and conceptual design, this paper pays attention to expatiate how to practically use the techniques of image - processing, communication and recognition in remote image monitoring system, and discusses how to realize the key techiques such as terminal connection and frame design, platform decoding control and alarm, image communication and track, etc. in order to overcome most existing image monitoring systems " shortages - those systems are at low intelligent level, need overfull manual work and ca n ' t work all day, this paper has adopted the advanced image code / decode technology and digital image transmission technology, and has applied the intelligent image processing and recognition technique to the display, adjust and track of images

    本論文在設計圖像監系統的建設目和總體方案的同時,重點闡述了圖像處理、通信與別技術在遠程圖像監系統中的應用實現,給出了圖像監系統中的終端接入和框架設計、雲臺解碼與報警、圖像通信和圖像跟蹤等關鍵技術的實現。針對現有的圖像監系統大部分採用人工為主,機器為輔,智能化程度低,不能全天候工作的現狀,本文採用先進的數字圖像壓縮編解碼技術、數字圖像傳輸技術,將智能圖像處理與別技術應用於圖像的顯示、調整、跟蹤,克服了一般監系統要求監人員過多地干預、智能化程度低的缺陷,並總結了其特點和優勢。
  7. Based the value, the quality characteristic of different group processes can be expressed in the same control chart, the tendency of the current quality of the process may be predicted. at last, a case indicates that the approach is some piratical valuable

    利用變換后的特徵值,採用均值?準差圖,把不同工序的質量信息表示在同一張圖上,別當前工序的變化趨勢,監過程的質量。
  8. Gets the unique programmatic identifier assigned to the

    項的唯一編程符。
  9. In this system, the movement of the step - electromotor is controlled by computer, and then the dial pointer is drove by the step - electromotor. at the same time, these images of the analog instrument are took by high precision ccd video, and then these images will be processed by the computer, using some image - processing algorithms such as image segmentations, threshold identification, image binarization, areas labeling, dial center - point identification, useful areas identification & abstracting, and areas thinning, etc. followed this, the dial pointer of the “ circle ” is able to be located. at last, the dial pointer position will be recognized by the computer

    本系統由計算機步進電動機的運動,進而驅動指針式儀表表針的運動,並且通過高精度ccd攝像機實時獲取表盤圖像數據,同時進行表盤圖像的相關處理,包括圖像分割,閾值確定,圖像二值化,區域記演算法,圓心擬合,有效區域別提取,區域細化等,最終快速別出表盤指針所處位置;最後,根據國家指針式儀表類檢定規程所定的演算法計算出該儀表的相關誤差,檢定指針式儀表的各種精度,通過這些數據判斷該儀表是否合格,列印該儀表的檢定結果報表。
  10. The following flags control vertex processing behavior for the hardware abstraction layer ( hal ) and reference devices

    下面的為硬體抽象層和引用設備頂點處理的行為。
  11. The globally unique identifier for the activex control

    Activex項的全局唯一符。
  12. The ctm is suitable for the case that all e - type influentially uncontrollable subnets are state graphs, and the outstanding virtue is that the designed controller is explicit. the emm is suitable for the case that all f - type influentially uncontrollable subnets are normalized cascade petri nets, and the advantage is that control patterns can be on - line computed within polynomial times

    約束變換法適用於所有e -型影響不可子網為狀態圖這種特殊的場合,用該方法所綜合的器最大的優點在於所董利達:浙江大學博士論文獲得的器是顯式的;特徵法適用於所有凡型影響不可子網為規范化序狀petri網這種場合,用該方法設計的器在線運算工作量是多項式可解的。
  13. Chapter 2 puts forward the internal control system framework and its core arguments through borrowing and initiating present achievements. it claims that the nature of the internal control for securities firms should be determined as one type of inherent system, distinguished from external control, that the management objectives of internal control system for securities firms include : security business objectives ( core objectives ), security operational environment objectives ( basic objectives ), security operational information objectives ( conditional objectives ) ; according to the management objectives, the internal control system for securities firms is divided into security business subsystem, security operational environment subsystem, and security operational information subsystem. the control objectives of internal control system for securities firms refers to guard against and eliminate the certain risks that the securities firms faced at the process of achieving management objectives with reasonable assurance

    主要內容是:證券公司內部的性質應確定為區別于外部的一種內在系統;證券公司內部系統所要服務的管理目主要有證券經營業務目(核心目) 、證券經營環境目(基礎性目) 、證券經營信息目(條件性目) ;按照管理目,可以將證券公司內部系統分為證券經營業務、證券經營環境、證券經營信息三大子系統;證券公司內部系統自身的是要合理地保證管理目實現過程中面臨的特定風險得到防範和化解;證券公司內部系統的要素包括環境(基礎性要素) 、(起點性要素) 、風險別(樞紐性要素) 、活動(核心要素) 、信息與溝通(條件性要素) 、監(修正性要素) 。
  14. General rules of color identification for external lead wire of control gear with external lead wire

    帶有外部引線的裝置的外部引線顏色通用規則
  15. Identifier of the protocol control information compression

    使用的協議信息壓縮演算法
  16. Identifying the control variable

    標識控制變量。
  17. Solving maths problems is a creative maths thinking activity. in this process, the leading function of meta - cognition knowledge of maths is presented on its controlling procedural knowledge, directing and supporting contextual knowledge, gathering evaluation knowledge and adjusting meta - cognition experience. through the questionnaire of maths meat - cognition for students, the author finds that students " maths meta - cognition capability can be improved

    數學問題解決是創造性的數學思維活動,在數學問題解決過程中,數學元認知知的統攝作用表現在程序性知製作用、情境性知的引導和支持作用、評價性知的收斂作用、數學核心思想的調作用、數學思維模式的規范作用、策略性知的啟發作用;數學元認知體驗的調節作用表現在修正目、改組數學元認知知和激活策略;數學元認知的監作用表現在定向、、調節。
  18. The table will write down all about the electronic records during their life period. the content noted in the table will be the only basis on original and reality " testing of electronic records ". the major task of the second levels is to build the tight filing rules, moreover, combined the " life cycle table ", to build the test system to assure the original and the reality of the information during filing ; the assignment of the third level is to build testing and restoring measures of the original and the reality. by maintaining the media of electronic archives or building information file of electronic archives etc, electronic archives can maintain their available ^ visuak understandable during their deadline ; meanwhile, to build the safe control of the system through the workers dispersed authorization and deterring skills, to formulate the standards of the protective system, such as the standard of the basic structure of united electronic records ^ electronic archives. all of this is important to protect the original and the reality of electronic records and electronic archives

    「生命周期表」所記錄的內容將作為電子文件歸檔時檢驗原始性、真實性的唯一依據;電子文件歸檔管理層中的主要任務是要建立起嚴密的歸檔度,同時結合「文件生命同期表」建立檢驗措施保證電子文件在歸檔過程中信息內容的原始性、真實性;電子檔案保管層中主要任務是建立電子檔案數據原始性、真實性檢驗及原始數據恢復管理措施,通過對電子檔案載體的維護、建立電子檔案維護管理的信息文檔等工作,確保在保管期限中的電子檔案保持其可用性、可存取性、可理解性:建立電子文件與電子檔案原始性、真實性保護體系安全,通過對系統工作人員授權分散化、建立用戶與認證技術等措施確保「保護體系」安全運行;加強「保護體系」涉及的準與規范的定工作,如建立統一的歸檔電于文件、電子檔案基本結構等準對保護電子文件、電子檔案信息原始性、真實性有著重要意義。
  19. The achievements are as follows : 1 ) the system model based on the whole course in of erp project theory have been put forward, erp ' s project are divided into three stages in this model, evaluation is divided into four parts, and the indexes that should been evaluated at each stages and relationship among these stages has been described systematically ; 2 ) at proposed stage, according to the characteristic of erp project, feasibility analysis should been carried out from seven respects such as managing foundation technological foundation, the fund foundation, personnel foundations, basic data, understanding and demand to erp and goal of the enterprise ; 3 ) in selecting software, 18 indexes and three factors have been put forward including system quality of the software, the fact relating to the software supplier serves, and the fact relating to enterprise, then use ahp to evaluate ; 4 ) in project implementation the evalution flow model on the basis of implementing and the index system have been proposed. the index system include 14 indexes and three respects respect which are control of the goal and plan, quality of the system use, and quality of information. 5 ) performance measurement of erp project is proposed in four respects of balanced scorecard. and according to the characteristic of erp project performance, the result of measurement should been calculated with fuzzy mathematics, then a satisfaction index can be drawn

    主要成果表現在: 1 )在評價erp項目評價理論基礎方面提出了基於全過程erp項目的評價體系模型,在此模型中將erp項目實施分為三個階段,評價分為四個部分,並系統論述了各個階段應該評價的指,以及各個階段的相互關系; 2 )在項目可行性分析部分,根據erp項目的特點提出了從七個方面分別是:管理基礎、技術基礎、資金基礎、人員基礎、基礎數據、對erp的認與需求,和企業的目對erp項目進行可行性分析; 3 )在軟體選型部分,提出了軟體系統質量因素、與軟體供應商服務有關的因素、和與企業有關因素三個方面18個指的評價體系,並用層次分析法進行評價; 4 )在項目實施階段,提出了基於實施過程的評價流程模型,同時提出了評價指體系從計劃,目、系統使用質量、和信息質量三個方面14項指來評價實施過程; 5 )在項目績效評價部分,提出以平衡記分法的四個方面評價erp項目的績效,建立了bsc - erp評價模型,並根據erp項目績效的特點提出了用模糊數學對評價結果進行計算,得出一個滿意程度指
  20. Through integration with the original project manage system, this product can do the identification, change control, statistic and audit for all the r & d project software of the enterprise. and more, it offers many enterprise managing functions, including the scm plan, test process manage, team manage and product release manage

    Cmis通過和企業原有的項目管理系統的集成,實現了對企業所有項目的軟體配置項的、統計和審計功能,還實現了配置管理計劃、軟體開發人員、測試流程、產品發布的管理功能。
分享友人