步行最安全 的英文怎麼說

中文拼音 [hángzuìānquán]
步行最安全 英文
its the safest on foot
  • : Ⅰ名詞1 (步度; 腳步) pace; step 2 (階段) stage; step 3 (地步; 境地) condition; situation; st...
  • : 行Ⅰ名詞1 (行列) line; row 2 (排行) seniority among brothers and sisters:你行幾? 我行三。where...
  • : 副詞(表示某種屬性超過所有同類的人或事物) most; best; worst; first; very; least; above all; -est
  • : Ⅰ形容詞1 (完備; 齊全) complete 2 (整個) whole; entire; full; total Ⅱ副詞(完全; 都) entirely...
  • 步行 : go on foot; walk步行鍛煉法 deambulation; 步行機 pedipulator; walking machine; walkie talkie; 步行...
  1. At the end, the thesis discusses the issues associated with the extensity and security of the agent

    論文的後對代理的可擴展性和性進了進一的討論。
  2. The paper studies the degradation rule of physical mechanical property of vulcanizate during the period of heat ageing, which involves the relationship between the property, variable temperature and time. the analytic expressions for the frictional temperature rise of the interface were presented according to the theory of heat conduction of solid when a tire slides of rolls along the road. finally, the value of temperature and pressure is used to monitor the tire ' s status

    本課題針對影響汽車輪胎橡膠機械性能的溫度老化模型進了一定深度的理論研究,並進一研究輪胎的在滑動、滾動時的溫度場的數學模型,在理論上論證了溫度、壓力是影響輪胎使性能的重要因素,並以其作為終的監測對象。
  3. In e - business, security electronic payment always plays an important role in the electronic transaction. at the end, we analyze the related online payment technology, implement an online payment prototype component system based on the java cryptography architecture and discuss the online payment component technology briefly

    論文的後還分析了網上支付系統的相關技術,並對現有的網上支付系統的性進折衷,基於jdk的加密體系實現了一個網上支付原型組件系統,對網上支付組件技術做了初探討。
  4. On the operating design of raas, the paper focused on the change of task _ struct, the design of kernel process kaasd, the timing of raas, the configuration and initialization of raas in the end, the paper evaluate the raas from the aim of system design, the integration with the other secure components of secure os, provide some problems unsolved, such as the expanding to network monitor, the new technology of ids

    對于實時審計分析系統的整體運設計,從操作系統原有數據結構task _ struct的改變,內核進程kaasd的設計, raas的定時和系統的配置和初始化這幾個方面逐個進敘述。在本文的後,從raas的達到的目的,與原有功能的有效合成等方面對該系統作了一個評價,同時提出幾個需要進一思考的問題,如對網路的擴展,對入侵檢測新技術的引入等
  5. The flight up was successful and the spacecraft entered its orbit ten minutes after the launch. in the 21 - hour mission yang liwei orbited the earth 14 times, making a journey of about 600, 000 kilometers. shenzhou - 5 then landed safely on the amugulang prairie in the siziwangqi region of inner mongolia, only 4. 8 kilometers from the designated landing spot, significantly pointing to the advanced achievements of astronautics in china

    楊利偉在太空航二十一小時,環繞地球運十四周,飛共六十萬公里,後在內蒙古四子王旗阿木古朗草原著陸,與目標著陸點僅相距四點八公里,顯示中國航天科技的長足進與卓越成就。
  6. Sand and gravel are loose and can easily cause slippage, especially on rainy days. the stones used for pavements on campus have been safety - tested for the best anti - slippage properties

    沙土散石因為易於流失,特別在雨天時候,容易濕滑構成危險,鋪設路面的磚是經過測試證實有佳防滑作用而採用,確保者的
  7. The red wall hotel gugong hongqiang fandian is only 300 - meter walking along the yanan wu si boulevard to the west of chinese art gallery. some famous scenic spots, such as the imperial palace museum, jing shan park and bei hai park are all nearby. the most prosperous business area - wang fu jing avenue is a stone s throw away

    北京紅墻飯店是一家商務型飯店,由中國美術館往西延五四大街300米即到,享盡地利之便,與故宮博物院景山公園北海公園等北京著名的旅遊景點僅幾之遙,北京繁華的商業區王府井大街更是近在咫尺,周圍交通設施一應俱,十分便利。
  8. Wake vortex separation standards are used to prevent hazardous wake vortex encounters which mainly found in the final approach course within the airport termination zone. firstly, this paper analysis the mechanism of the vortex decay and research the influence on the safety of the flight ; then. several different radar wake vortex separation standards are compared and some basic guidelines are developed to establish the future vortex standards. in addition, one kind of advance vortex classification for the civil airplane is proposed. secondly, an encounter hazard model which established for the following aircraft and a simple vortex decay model which mostly concern with the proceeding one are developed ; and a safe separation model can be derived from the both. finally, through the simulation calculation, the correctness of the vortex classification of different types of aircrafts are tested and proved

    本課題對雷達管制條件下的小尾流間隔標準進了較為詳細的分析和研究;首先對尾流的形成和消散機理以及尾流對飛的影響做出了詳細的分析,然後就目前實的幾種不同的小尾流間隔標準進了比較和分析,提出了相關的幾條準則和一種改進的機型尾流分類標準;在這之後,採用理論分析和統計數據分析相結合的方法,建立了尾流危險遭遇基本模型和尾渦消散模型;並在此基礎上對民用航空不同機型的尾流分類的合理性進了計算和評估,為小尾流間隔標準的確定和改進提供了初的理論依據。
  9. In the application of pmos - 2000 system, the author carried out a hybrid encryption protocol with is suitable for information security transmission in electricity market with des, rsa and md5. with the pattern characteristics of pmos - 2000 power market operator system, and analyzed and compared with other encryption system, the author puts forward an implementing method, operational process and system structure of information encryption technology used in pmos - 2000, and the operating effects and projects which need further research and discussion were finally given. the research of this dissertation applied information security technology in power system project, which made it possible for information security transmission

    在pmos ? 2000系統的應用中,作者利用des對稱加密演算法、 rsa非對稱加密演算法、 md5數字簽名演算法實現了一套適合電力市場信息傳輸的混合加密體制,結合了pmos ? 2000發電市場技術支持系統的模式特點,通過與別的加密體制的分析比較,把混合加密體制應用於pmos ? 2000系統之上,並提出了這套加密系統在pmos ? 2000電力市場技術支持系統中的實現方法、運作過程和系統體系結構,後給出了它的運效果以及進一可研究和探討的方案。
  10. The scheme is based on the asynchronous teaching and individualized learning model in internet. the system is loaded into ‘ the information system of educational administration ’ and tested. in the end the overall and security performance of the system and the prospect is analyzed deeply

    本文採用基於internet網異講授和個別化學習模式的實現方案,設計了一種基於web的遠程教育系統,並載入了「湘潭大學教務管理系統」做了測試,後對系統的整體性能、性能以及研究的前景情況進了深入地研究和分析,給出了系統運的情況和性能分析結果。
  11. The article can be divided into following parts : first, introducing the development and existing situation of air - traffic service and aeronautics safety, directing the potential and great insidious danger caused by disco - ordination between air - traffic service and aeronautics safety and aeronautics development, analyzing the causes of accident. second, introducing the related theory of safety and safety systematic engineering and methods of analyzing accident. third, based on the above content, analyzing the factors that affect the safety of air - traffic safety management, especially the human factor

    本文首先介紹了空中交通服務與航空的發展及現狀,指明了空中交通服務與航空與航空發展不匹配所潛在的對國際民生的巨大隱患,並對發生的事故徵候和事故進了初的原因分析;其次介紹了系統工程的有關原理和事故分析的方法;第四章則在此基礎上對影響空中交通管理的因素進了詳細的分析,特別是人為因素的分析;後,引入了mort方法以提高空中交通管理的性。
  12. Secondly, some encryption algorithms are introduced, with the analysis and comparison for these encryption algorithms, the author designs an appropriate project to accomplish the end - to - end encryption. thirdly, this paper accomplish the design of an encryption scheme which combining the strongpoint of the rsa algorithm and the idea algorithm. the main process is as following : first, input the digital signal to the encryption device, and then the digital signal exclusive or with the keying sequence which is generated by key stream generator ( ksg ) and the ksg is based on the idea encrypting and deciphering algorithm, the secret key synchronization is also studied

    本課題主要研究的內容是數字集群通信系統加密機制的研究,首先介紹了數字集群通信系統的保密機制,講述了單向和雙向鑒權的過程、單呼和群呼的空中介面加密過程及其密鑰的選用和管理,特別介紹了端到端加密;然後介紹了幾種常用的加密演算法,通過分析其優劣,提出了端到端加密的解決方案;後完成了基於rsa演算法和idea演算法的數字集群通信系統加密方案的設計,其具體過程為將經過數字信號送入加密器里,和以idea加密演算法為基礎設計的密碼流發生器( ksg )產生的密碼序列進加解密運算,並且研究了此加密過程的密碼同問題。
  13. This paper from the view of financial capital globalization, studies on the effects of financial capital flow, the relationship between capital flow and financial crisis, the choice of regulation or deregulation and the problem of china ' s financial safety. firstly, this paper discusses the conceptions of economic globalization, financial globalization and financial capital globalization and based on the existing capital flowing theories and financial theories, sets up an academic framework for further study. secondly, this paper applies a representative new currency crisis model - - - - - - c - p - r model to analyze the effects of capital controls

    本文首先對金融資本球化與經濟球化、金融球化進界定,在充分吸收現有的資本流動相關理論和金融危機理論的基礎上,建立起統一的理論分析框架;然後運用一個有代表性的第三代貨幣危機模型? ? c ? p ? r模型分析了資本控制的有效性;繼而,建立了一個小型開放經濟的三階段模型進了資本控制有效性的數理分析,並在此模型中,運用博弈論進一探討了間接資本控制的有效性及有效稅率;進而,比較討論了發展中國家可供選擇的資本控制措施,認為資本控制應主要採用間接措施;後,從資本流動角度對中國金融現狀進分析,並有針對性地提出政策建議,尤其是資本帳戶的開放一定要恪守循序漸進的原則。
  14. Above all, with the data acquired by tests, this thesis has analysized the lateral resistanc, longitudinal resistance and rail creep etc between ballast and sleeper before and after mass machine work, discussed the effect of mass machine on stability of continuously welded rail track, reseached the change regularity of fastening - down temperature of rail, which is resulted by mass machine work, and have settled the suitable range of work temperature which guarantees the stability of jointless railway. what ' s more, this thesis has put forward the appropriate work pattern, work temperature and work area for mass machine work in future. at the same time, this thesis has given rational suggestions about some conditions worth of attention in production of mass machine, which can in return raise the work productiveness of mass machine. at last, this thesis has considered formulating reasonable measures for operation organization and work standard, so that mass machine work can play an important role in maintenance, which can reduce work load, raise work efficiency and maintenance cost in daily maintenance

    本文通過實測的各種數據,分別對大機作業前後道床對軌枕的橫向阻力、縱向阻力、鋼軌爬情況等進深入分析,進一探討大機作業對無縫線路穩定性的影響,研究大機作業引起的鎖定軌溫的變化規律,確定保證無縫線路穩定的合適作業軌溫范圍。為我國今後的大型養路機械作業提出合理的作業方式、合適的作業軌溫和作業地段,同時對大型養路機械作業中應注意的問題提出合理化建議,為大型養路機械作業提供更高的保障,進一提高大機作業效率。後,對工務段在大機作業中的配合制定完善的施工組織措施及作業標準,使大機作業在養護維修中發揮更大的作用,為工務段日常的養護維修減少工作量,提高勞動效率,降低維修成本。
  15. Secondly, the mechanism of fatigue is summarized, the factors and measure of driving fatigue is analyzed and then the mechanism of driving fatigue affecting driving safety is studied based on previous study. finally, the experiment of a block design is schemed according to the difference in driving time, using the human factors and experimental psychology theories and instruments. after the experimental data is analyzed, the mechanism of driving fatigue affecting driving safety is tested and the measure of driving fatigue prevention is suggested

    論文以從事公路客運業的營運駕駛員為研究對象,首先通過問卷和訪談的方式調查了營運駕駛員的實際工作狀況,總結出營運駕駛員的群體特徵;然後,從理論角度闡述了疲勞的產生機理,分析了駕駛疲勞的產生原因及測量方法,並在總結前人研究成果的基礎上進一分析了駕駛疲勞對的影響機理;後,應用人機工程學和實驗心理學的理論方法和實驗儀器,按駕駛時間的不同設計了區組對比的實驗方案,通過對實驗數據的匯總分析,驗證了駕駛疲勞對的影響機理,並提出了預防疲勞駕駛的措施和建議。
  16. My work exams the realization of rsa algorithm, explains some important steps and its security in detail and sign the assess file by rsa algorithm in real estate evaluation s < tem in the end

    本文研究了rsa演算法的實現過程,並對其中的一些重要驟及其性進了詳細的討論。後,在房地產評估系統中實現了通過用rsa演算法對評估報告進數字簽名來驗證報告的合法性和可靠性。
  17. Base on this, the thesis addressed the total food security concept ( tfs ) with normative study firstly ; then combined qualitative analysis with quantitative analysis, compared with many kinds of food security evaluation methods and the intellective bp - ann model, improved the heilig ' s evaluation matrix, constructed the total food security evaluation matrix ( tfs matrix ), analyzed grain - production, circulate and consuming all - sidedly ; at last, analyzed and compared with different modes that can realize our country food security, and studied the rationality and feasibility of food cooperative security further using the cooperative game model. the tfs pursuits sustainable grain production, stable and smooth grain circulation, fair and suitable grain consumption increase

    據此,本論文首先運用規范研究,提出面糧食( totalfoodsecurity ,以下縮寫成tfs )的概念;然後將定性分析與定量分析相結合,比較了多種糧食評價方法及智能bp - ann模型,改進了黑利格評價矩陣( heidi ' sevaluationmatrix ) ,構建了面糧食評價矩陣( totalfoodsecurityevaluationmatrix ,簡稱tfs矩陣) ,對糧食生產、流通與消費進面分析;後分析和比較了實現我國糧食的不同模式,並應用合作博弈模型進一探討了糧食合作的合理性與可性。
  18. Second, emphases were put on set authentication research, an architecture of set authentication was proposed to expound the intelligent architecture design theory fitting with layered model. then, with displaying the protocol model, the process control principle was analysed, and more attention was taken to discuss the mathematic model of rsa algorithm and integration of various model methods, to give the component model based on main - program / sub - process architecture family and formalized description. next, by establishing the usercase model, activity model, object structure model and sequence model in order, and based on the data model, a lot of measure were taken to optimize these models. finally, the main framework of set authentication in acme template was given, with the java implement and aop implement for typical applications together

    然後重點對set認證的領域模型進了研究與分析,提出set認證的領域框架,闡述了與層次模型相適應的智能軟體構架設計思想;進而提出set認證的協議模型,分析其過程式控制制原理,並且進一探討了rsa演算法的數學模型和多種建模機制的綜合應用,給出基於主程序/子過程體系結構風格和形式描述的構件模型。在依次建立set認證的用例模型、活動模型、對象結構模型、順序模型的基礎之上,分析得到了系統的數據模型,然後使用多種手段對模型進優化。後給出了set認證系統主要框架的acme描述,以及set認證系統中的典型應用的java實現和面向方面實現。
  19. In this thesis, the basic problem of network security, some correlative protocols and cryptology are discussed at first, math theory in point is also studied. especially, a sort of new matrix method of solving quadratic equation over gf ( 2m ) is given, which is the key of selecting random point over elliptic curves. no better solution has been found in related literature in the world. compared with ieee p1363 ' s method, it is easy to implement the software and obtain high efficiency, etc. then the basic operation of elliptic curve is debated and the steps of finding secure curve and basis point over gf ( 2m ) are presented. moreover, the encryption and decryption schemes of the ecc are designed and the security problem of ecc is also considered. in the end, ecc by koblitz curves are implemented

    文章首先討論了網路基本問題、網路協議和密碼學;對相關數學理論進了研究,特別是給出了一種新的求解gf ( 2 ~ m )上二次方程的矩陣法,而它是選取橢圓曲線上的隨機點的關鍵驟,和ieeep1363的方法相比,它有易於軟體實現、效率高等優點,在國內外相關文獻上還未見到更好的求解方法;接著討論了橢圓曲線的基本運算,進而給出了在gf ( 2 ~ m )上選取曲線及基點的驟;文章還設計了橢圓曲線加密系統的加解密方案,討論了橢圓曲線系統的性問題。後文章就koblitz曲線加密系統進了軟體實現。
  20. This essay firstly systematically introduces the theories and key technologies of vpn with the detailed presentation of the functions of safety manage central - - - - the automatic production and distribution of passwords, remote - controlled destroy of passive and active passwords, loading special data in air and special tracing of cell phones that are out of control. besides, the researchers has analyzed the contents and findings of similar researches both domestics and overseas with the emphases on the in - depth research of safety communication gateway in order to confirm a system model and carry out the macro - design. after that is the detailed introduction of the design realization of special information transportation

    本文首先系統地介紹了gsm移動通信保密專網的原理知識及關鍵技術,詳細介紹了管理中心的功能- -密鑰自動產生和分配、被動式和主動式密鑰遙控銷毀、專用數據空中加載、以及失控專用手機追蹤等,並且對國內外同類研究的內容和成果進分析;重點對通信網關進了深入研究,確定了一種系統模型並進了總體設計,然後對其中專用信息傳輸的設計實現進重點介紹;本文還對管理中心的短消息通信網關與專用手機進性能測試,測試結果表明該系統符合課題的各項技術指標,實現了通信網關的各項功能需求;後,總結課題工作,對下一系統進完善和發展的內容提出了具體建議。
分享友人