角色任務 的英文怎麼說

中文拼音 [jiǎoshǎirèn]
角色任務 英文
character_quests
  • : 角Ⅰ名詞1 (牛、羊、 鹿等頭上長出的堅硬的東西) horn 2 (古時軍中吹的樂器) bugle; horn 3 (形狀像...
  • : 色名詞[口語] (顏色) colour
  • : 任名詞(姓氏) a surname
  • : Ⅰ名詞1 (事情) affair; business 2 (姓氏) a surname Ⅱ動詞1 (從事; 致力) be engaged in; devote...
  • 角色 : role; part
  1. You take the role of a young hero on a mission to restore balance to the world and uncover the secrets of the dark light - the root of chaos

    你輪流回復到世界的平衡而且脫帽致敬黑暗的光秘密的在一個上的年輕英雄的-大混亂的根。
  2. We analyze agent cooperation methods now commonly in use, and, on the basis of ecology and experiences, we propose a competitive price auction contract network protocol. while using the same network traffic volume as the simple auction, our strategy of second overbid competitive price auction can achieve the same effect as the traditional auction. further, we improve traditional contract network protocol, introduce constraints into message transmit, and use fell back punishment and credit when an agent cannot complete the intended task, consequently the traffic volume and the complexity of systems are considerably reduced

    本文分析了現在通常採用的agent協同方法,提出基於生態學和經驗的競價拍賣合同網協議,採用的選擇次高價競價拍賣策略能在與簡單拍賣相同的通信量上達到類似於傳統競價拍賣的效果,對傳統的合同網協議進行改進,在消息傳播中加入約束機制和對agent不能完成時不採取轉變重新招標而採用違約懲罰和信用機制,減少了系統的通信量和系統的復雜度,最後在此基礎上實現一個基於fipa標準的多agent電子商原型系統。
  3. We characterized the security issues in asp - based networked manufacturing system, especially the issue of the user access control. then the typical methods of access control were introduced, which include discretionary access control ( dac ), mandatory access control ( mac ), role - based access control ( rbac ), task - based access control ( tbac ), coalition - based access control ( cbac ) and relationship - driven access control ( rdac ) and so on. based on that, we provided an integrated user access control model, which was composed of rbac, tbac, rdac and cbac

    本章描述了asp和網路化製造系統的安全性問題,尤其是用戶訪問控制的問題;接著介紹了幾種浙江大學博士學位論文典型的訪問控制方法,包括強制訪問控制、意訪問控制、基於的訪問控制、基於的訪問控制,以及基於公司關系的訪問控制、基於企業聯盟的訪問控制等;在前面描述的典型訪問控制模型基礎上,給出了一個網路化製造系統的綜合訪問控制模型,包括網路化製造系統的用戶和資源層次關系圖、訪問控制參考模型和訪問控制過程模型,並定義了各個模型中的相關元素和關系,給出了各級約束驗證和授權的表達;最後我們給出了以xacml為基礎的網路化製造系統的訪問控制描述語言。
  4. A low dexterity stat means your character is clumsy and uncoordinated while high dexterity means they are nimble and accurate even at precise tasks

    低敏捷就意味著是很遲鈍並且不協調的,而高敏捷就意味著很靈活,甚至在一些精確中行動準確。
  5. On the basic of the prevailing laws and regulations of our country, this paper analyzes the legal roles and basic terms of freight agenes in different businesses and studies the legal relation of such freight agents with clients or any third parties as well as their legal responsibilities in the case of merely acting as agents or otherwise as in dependent operating enterprises

    摘要以我國法律法規為背景,分析了貨運代理企業在不同業中的不同法律和基本條件,分別探討了貨運代理企業以貨運代理人和獨立經營人身份開展業時與委託人和第三人的法律關系及不同的法律責
  6. On the game : a first choice to fill the role of captain, the captain of each related task is to annihilate the enemy aircraft, the figure is the number of aircraft and the bottom right hand corner

    游戲介紹:先選擇一個來擔機長,機長每關的就是殲滅敵人的飛機,右下的數字就是敵機數量。
  7. As the first executive to be invited from outside both the public service and the military, mr dickson had the challenge of establishing the role of cio within the department of national defence, reporting to the deputy minister and also the chief of defence staff

    戴啟新是國防部首位非從公員及軍事人員中委的行政人員,他在國防部成功確立資訊科技總監的,並向副部長及國防總參謀長負責。
  8. In this article, we perform a tri - layer security mechanism ; we improve the form authentication of asp. net in two places ; we also perform a new dynamic authentication based on two factor ; then we perform a new way to send the credential through the soap header ; we solve the problem about the key creation and the key storage and the transmission of the encrypted message ; after analyzing and discussing the soap protocol, we put forward a safely custom authentication through combining the digest authentication and soap protocol and credential

    在web服安全方面提出了一些新看法,解決了一些新問題: 1 )提出了基於的三層安全機制; 2 )對asp , net的表單驗證技術提出了兩處新的改進: 3 )提出一種動態的雙因素口令認證方法,即在單因素(固定口令)認證基礎上結合第二個物理認證因素,以使認證的確定性按指數遞增。在此,本文提出了第二種認證因素?信憑證。
  9. As web ’ s own openness and sharing, not only brings the government service transformation and highly effective revolution, but also causes the phenomenon which government institution appears exceeds authority to visit, creates the information visitor ’ role blurred, jurisdiction unclear, the task responsibility is vague, brings the enormous threat to information security of the government

    由於web本身的開放性和共享性,帶來政府業方式變革和高效運轉的同時,也使得政機關中出現越權訪問的現象,造成信息訪問者不清,權限不明,模糊,給政府信息安全帶來極大的威脅。
  10. Although you can use any intellectual work or analysis you may have already done for other role - based applications in use at your organization, you cannot import the security constructs into reporting services

    雖然可以使用可能已在單位內的其他基於的應用程序中完成的信息管理和分析,但無法將安全結構導入reporting services中。
  11. To allow me to focus on political issues and to enhance institutional and operational efficiency, i will authorise the chief secretary for administration and the financial secretary to play the important role in policy co - ordination. they will be tasked to ensure government policies are properly staged, public resources are efficiently used, and duplication, inaction and ineffective action are avoided. our aim is to better deliver on our performance pledges and to raise the communitys trust in the government

    8 .為了配合我對政治領導工作的專注,提高制度運作的效率,我授權政司司長和財政司司長在政策統籌和協調上擔當重要,確保政府各項政策能夠密切配合,公共資源能夠更有效運用,避免政出多門或政策決而不行行而不果,更好地兌現政府服市民的承諾,和提升市民對政府的信
  12. That high - level breakdown of responsibilities has a pivotal impact on what roles, tasks, and ultimately tools will operate at each of the two sites

    這個高層次的職責分解對于什麼以及最終工具將在每個地點如何運行具有關鍵的影響。
  13. The requirements imposed by workflows call for suitable access control mechanism that is more flexible and fine - grained. based on above analysis, a model, rtbac ( role - task based access control for workflow system ), is proposed to solve access control problems of the workflow system

    在上述分析的基礎之上,本文提出了基於-的工作流系統存取控制模型rtbac ( role - taskbasedaccesscontrolforworkflowsystem ) 。
  14. Define the respective roles of those involved in governance at all levels

    訂定那些參與所有階層管理之各自的角色任務
  15. The role, mission and authority of the division are defined in the internal audit charter granted by the chief executive of the hkma

    金管局總裁授予該處的內部審核規章,明確地列出其角色任務及權力。
  16. Asp. net allows for user accounts and roles, to give each user ( with a given role ) access to different server code and executables

    Net允許加入用戶帳戶以及角色任務,給每個用戶(通過分配角色任務)來訪問不同的服器代碼和可執行的代碼。
  17. The paper takes the manufacturing enterprise as an example, utilizes orm modeling tools by extracting roles, and role ' s tasks so as to model the user roles " task of the enterprise and gives the model of the whole system

    以製造企業為例,通過提取角色任務,並利用orm建模工具,對企業產品用戶進行建模,給出了整個系統的模型。
  18. Hr ' s new challenging role would be able to quickly turn strategy into action, to manage processes intelligently and efficiently, to maximize employee contribution and commitment, and to create the conditions for seamless change

    人力資源管理師富於挑戰性的新角色任務是要迅速將戰略轉化為行動,機智又高效地管理流程,優化擴大員工的貢獻和投入,打造適用於無縫轉變的環境。
  19. Chapter two explores three stages of case teaching : before - class, during - class and after - class, and the roles of teacher and student in eacli stage, furthermore puts forward the requirements on case, teacher and student in case teaching

    第二章重點闡述了案例教學的三個階段? ?課前準備、課中的教與學和課后的反思評價,以及各個階段中教師與學生的角色任務,並說明了案例教學對案例、教師與學生的要求。
  20. For example, the analyst gathers roles, tasks, sequence information, resources, data, narratives, requirements, and so on using appropriate tools and uses them as input to construct the bp model

    例如,分析員使用適當的工具收集、序列信息、資源、數據、敘述、需求,等等,並將它們作為構建bp模型的輸入內容。
分享友人