自存 的英文怎麼說

中文拼音 [cún]
自存 英文
self existent
  • : Ⅰ代詞(自己) self; oneself; one s own Ⅱ副詞(自然;當然) certainly; of course; naturally; willin...
  • : 動詞1 (存在; 生存) exist; live; survive 2 (儲存; 保存) store; keep 3 (蓄積; 聚集) accumulat...
  1. Based on the analysis of autonomous agent - based ids and mobile agent - based ids, a multi - agent - based intrusion detection and response system, maidrs, is designed, which not only has the advantages of both autonomous agent - based ids and mobile agent - based ids but also overcomes some their drawbacks. to solve the common problem of configuring agents in agent - based ids, an adaptive model generation, amg, is only designed theoretically for the agents using the ideal of information theory, which makes maidrs more efficient

    該系統模型利用多代理的思想來構造分散式入侵檢測與響應系統,使之不但兼有基於治代理和基於移動代理入侵檢測的優點,又克服了它們各自存在的一些缺陷;針對基於代理的入侵檢測系統普遍在的代理配置復雜問題,作者結合信息論的思想從理論上設計了一個適應模型生成器來為代理動生成檢測模型,從而使系統能更高效地運作。
  2. While the social products of human externalization have a character sui generis as against both their organismic and their environment context, it is important to stress that externalization as such is an anthropological necessity

    當人類具體化的社會產物脫離他們身生物體和環境脈絡而獨立自存時,強調具體化是人類學上的必然就是一件重要的事。
  3. It is entirely uncaused, independent, complete in itself, beyond time and space, mind and matter

    它完全沒有原因,獨立自存,超越時空心物。
  4. For instance, even though jay - soo is a good fighter, he is still unable to take four gangsters at a time ; when two cops are tailing four gangsters, they would not injudiciously start the arrest until they have called for backups. moreover, the private life of the detectives are also delineated genuinely. jay - soo and young - dahl have their own love and family problems to deal with

    例如歹徒在街頭暗角強暴女子,巡警卻看不到;兩個警探遇見四個匪徒,知道不能應付,並不沖動行動,而是集齊人馬才出手; jay - soo一人追捕四個罪犯,然不能取勝; young - dahl和jay - soo本身亦各自存在一些家庭和感情問題。
  5. Self - existence of god

    神的自存
  6. Our company policies are " quality is our model, efficiency is our goal " we gladly welcome new customers and valued our old customers

    本公司均以「以質量求自存,以時間贏市場」的宗旨尋求發展,我們用同樣的熱情歡迎新老客戶與我們攜手並進。
  7. The general requirement of communication system and the application potential in secure communication are expatiated. the chaotic secure communication methods home and abroad are also summarized, including chaos spread spectrum communication, chaos key - shifting, chaos parameter modulation, chaos masking, chaos cdma. the exiting problems and development direction are also pointed out respectively

    介紹了混沌學的發展過程和意義,闡述了通信系統的一般要求和混沌在保密通信中的應用潛力,綜述了國內外現有的混沌保密通信方法,其中包括:混沌擴頻通信,混沌鍵控,混沌參數調制,混沌掩蓋,混沌數字碼分多址等五大類,指出了各自存在的問題和發展方向。
  8. On the basis of the theory and the experiment, the paper has synthetically analyzed the anti - interference characteristics of the hardware method ( differential balance ) and software method ( digital filter ). the paper has presented that these two methods have some disadvantages respectively. based on this fact, a new method has been presented. hardware method can be use to restrain periodical interference, and software method can be use to discriminate pulse polarity

    從理論和試驗兩方面,綜合分析了硬體措施(差動平衡法)和軟體措施(數字濾波法)抑制干擾(包括周期性和脈沖性干擾)的方法和特點,指出了兩種方法各自存在的缺點,在此基礎上提出了用硬體方法抗周期性干擾,用軟體抗脈沖性干擾的新方法,並通過試驗證明,該方法可以抑制周期性干擾,有效地鑒別出外部干擾信號和內部局部放電信號。
  9. So the problem of * principal - agent come into bring. part ii is the problem " s advance. by the analyses of three format of private enterprise, open out the property right " s problem each other

    第二部分是問題分析,通過對我國私營企業並的三種企業形式的具體分析,揭示出各自存在的產權關系問題,並對每個問題做出分析,也使最後部分的問題解決思路具有針對性。
  10. In qingdao, john chapple, visited the vegetable production and wholesale markets and processing enterprises in pengzhou on january 18th - 19th, 2005 and exchanged ideas with local leading enterprises, vegetable sellers and relevant staff of the vegetable office of the agriculture and animal husbandry bureau of pengzhou and various vegetable stations about the strengths and weaknesses of the development of the vegetable industry in pengzhou and the eastern coast areas and how to control the quality and safety of vegetables. the development of the vegetable industry in pengzhou was identified by john as feasible for the domestic market. but at the same time, he thinks that although the orientation responds to the domestic market, the increasing awareness of the quality and safety of agricultural products of the consumers also poses a great challenge to the vegetable producers of pengzhou

    的john chapple總經理於2005年1月18 - 19日考察了彭州的蔬菜生產批發市場,加工企業,並於當地的頭企業蔬菜營銷戶彭州市農牧局蔬菜辦各業務科站的相關人員對彭州蔬菜與東部沿海地帶的蔬菜各自存在的優劣勢,發展方向,如何控制蔬菜的質量安全等方面進行了交流, john對彭州蔬菜發展定位在國內市場是認同的,同時認為盡管是針對國內市場,隨著消費者對農產品質量安全意識的提高,對彭州的蔬菜生產者也形成了一個很大的挑戰,一些發達國家有關市場蔬菜產后儲藏的經驗可以借鑒,避免己花很多時間來摸索。
  11. Scholars rarely distinct the legal origins and contents of legal regulations, as a result, they dispute mixing the form of the legal base of conviction and contents. the legal standards of conviction should be distinguished into two parts : the form and content. the form of the legal

    在定罪的法律依據上,人們一直很少注意將定罪的法律淵源與法律規范的內容區別開來,所以不獨在定罪法律依據形式、內容方面各自存在不同的爭議,而且將形式與內容混而不分地進行爭議,使得歧義的局面更加紛亂。
  12. Then, the paper summaries disadvantages of traditional concurrency controls under multilevel security condition and introduces multilevel security dbms concurrency control. after summarizing the related research work, we present a multi level transaction model to solve the convert channel and starvation problems in concurrent control under blp multi level security model

    本文首先分析了傳統的數據庫並發控制各自存在的優缺點,總結了傳統並發控制在多級安全條件下在的問題,由此引出了多級安全數據庫並發控制機制。在總結了已有的研究基礎上,針對blp多級安全模型下並發控制產生隱通道和饑餓問題,本文提出了一種多級事務模型- - - nhstm模型。
  13. Some basic concepts of insulator contamination are introduced firstly. existing methods of avoiding contamination flashover and methods of detecting contamination degree of insulators are discussed in details and disadvantages of them are pointed out

    引入了變電污穢及其相關概念,對國內外現有的變電污穢防治方法和變電污穢在線監測方法進行了簡要的介紹,並指出了各自存在的不足。
  14. Based on these, this paper explores a new way which combines the visual modeling language and formal method to describe software architecture through combining uml 2. 0 and xyz / adl. in this paper, the disadvantage of several main methods of software architectural description is analysed, the advantage of uml 2. 0 compared with uml 1. x in the software architecture description is analysed, the corresponding relationship between uml 2. 0 and xyz / adl in the architectural description is given and uml 2. 0 model elements which used to describe the according architectural conception are determined, then a new way to describe software architecture which combine uml 2. 0 and xyz / adl through defining the semantics of xyz / e for uml 2. 0 is composed. in order to realize this method, the formal semantics of uml 2. 0 sequence diagram and state diagram based on xyz / e are defined. in final, the arcitectural description of a simple dask manager system which uses our method is given

    本文分析和比較了當前國內外常用的軟體體系結構描述方法,指出了它們各自存在的問題;分析了uml2 . 0與uml1 . x相比在軟體體系結構描述方面的優勢,確定了用uml2 . 0描述軟體體系結構概念元素所使用的相關模型元素,給出了uml2 . 0與xyz / adl在體系結構描述中的元素對應關系;提出了一種通過定義uml2 . 0相關視圖的xyz / e語義,把uml2 . 0與xyz / adl結合起來描述軟體體系結構的新方法,並分別定義了uml2 . 0的順序圖和狀態圖的xyz / e時序邏輯語義;最後通過對一個簡單的任務管理系統的體系結構進行描述,把本文提出的結合思想運用到實例系統的描述當中。
  15. Article 9 all foreign exchange receipts of domestic entities for current account transactions shall be repatriated and shall not be deposited abroad in violation of the relevant government regulations without authorization

    第九條境內機構的經常項目外匯收入必須調回境內,不得違反國家有關規定將外匯擅自存放在境外。
  16. Based on image sparse representation, researched the background, development and non - linear approximation of the multiscale geometric analysis, and respectively analyzed the advantages and disadvantages. finally, pointed out the developing direction

    摘要以函數的稀疏表示為主線,詳細介紹了各種多尺度幾何分析產生的背景、發展歷程和逼近性能,並分析了它們各自存在的優缺點,最後指出了其發展方向。
  17. Two types of research methods for spi, i. e. the theoretical analysis method and the experimental method, as well as their characteristics, applicability, and some related problems are reviewed

    介紹國內外樁土相互作用兩大類研究方法理論分析方法、試驗方法各的特點和適用范圍,並分析了其各自存在的主要問題。
  18. This thesis bases on the actual need that ensures high - efficient operation of military political work information system and advances the informatization construction of military political work. being directed against the characteristics of the military political work information system and current situation of the development, the article carried on the discussion from four respects of the safe protection : database, network, application software and physics. on the basis of having analyzed on security questions and threats in detail, the article has proposed a series of safeguard procedures separately

    本論文立足於保障我軍政治工作信息系統的高效運轉、推進我軍政治工作信息化建設的現實需要,針對我軍政治工作信息系統的特點和現狀,從政治工作信息系統的數據庫安全防護、網路安全防護、應用軟體安全防護以及物理安全防護四個方面進行探討,在詳細分析了各自存在的安全問題和面臨的安全威脅的基礎上,有針對性地提出了一系列安全防護措施。
  19. The paper begin with the property right and the organization system of the listed companies, the common equity structure and the corporate governance are analyzed, and we reach a conclusion that there are four big defects in the corporate governance, after that we also analyze that the common equity how to act on the corporate governance, finally they are verified by the substantial evidence

    這部分共有三節,第一節描述了我國上市公司股權結構的現狀,並歸納出其特徵。第二節從公司治理結構的四個方面入手,分析股東及股東大會、董事會、經理層和監事會的治理行為,指出他們各自存在的不足及原因,還特別提出外部治理機制在的弊端。
  20. Will you let me believe, when i recall this day, that the last confidence of my life was reposed in your pure and innocent breast, and that it lies there alone, and will be shared by no one

    你是否能讓我在回憶起現在時相信我生活中最後的一番知心話是保在你那純潔真誠的心胸里的,它將在那兒獨自存在,不會讓任何人知道? 」
分享友人