訪問分析 的英文怎麼說

中文拼音 [fǎngwènfēn]
訪問分析 英文
access analysis
  • : 動詞1. (訪問) call on; interview; visit 2. (調查; 尋求) inquiry into; seek by inquiry [search]; try to get
  • : Ⅰ動詞1 (請人解答) ask; inquire 2 (詢問; 慰問) question; ask about [after]; inquire about [aft...
  • : 分Ⅰ名詞1. (成分) component 2. (職責和權利的限度) what is within one's duty or rights Ⅱ同 「份」Ⅲ動詞[書面語] (料想) judge
  • : Ⅰ動詞1. (分開; 散開) divide; separate 2. (分析) analyse; dissect; resolve Ⅱ名詞(姓氏) a surname
  • 訪問 : visit; call on; interview; access; addressing; reference to
  1. Various sensors that are besotted in the 3d world through vrml can effectively sense all kinds of operators " behaviors ; java byte codes that are besotted in the interface between vrml and java through the " script " node can finish difficult tasks. so the alteration can be concluded as follows : operators touch parts of the shelf, and the java byte codes execute the relative function, finally results are reported to the operators. ( 3 ) through detailed studying the working function of the throttling experiment, i constructed a mathematical model of the experiment and simulated the model

    Vrml可以在瀏覽器環境中為3d實驗臺模型添加多種感知器,能夠良好地感知操作者的各種意圖;在vrml和java技術的介面中,可以利用java程序代碼來完成一些復雜的任務,從而實現了實驗的交互:實驗者感知實驗臺的各種儀器,程序完成相應的任務,然後返回相應的結果; 3 )仔細研究了節流調速實驗的液壓迴路原理,對實驗過程建立了相關數學模型,進行模擬並獲得了模擬結果,實現了基於模型驅動方法的虛擬實驗; 4 )實驗臺遠程的實現。
  2. It ' s the author ' s micro or local observational view. by using different methods such as questionnaires, casestudy, interview and so on, the author mainly discussed four important educational topics : learners " living space, educators " discourse space, curriculum and knowledge, interaction between teachers and students. in the mean time, she tried to pay more attention to the students " confusion happened in their daily life

    這一部是研究者的地方觀察視野,主要通過對四個重要教育主題:學習者的活動空間、教育者的話語空間、課程知識的張力和師生課堂互動空間的,詳細展開研究者通過切身觀察與體會而描述的具體生活圖景,通過以卷調查、個案研究、藏族中學生內地教育的跨文化研究?教育人類學的觀察方式談等多種研究方式的綜合,試圖較為詳細深入真實地再現學生的日常生活,同時對這一年齡階段學生在高中學業、生活、交友等方面遇到的困惑予以較多的關注。
  3. Having soochow industrial park as a case, this study made an inquiring investigation and calling talk to some white collar working in the park. from the sight of the white collar, based on the investigation data, this study analyze the affect factors to white collar ' s position obtaining, meanwhile, analyze the current condition of the industrial white collar ' s mobility, including the ways of searching chance, cause and result of mobility, and obstacle of mobility. beside it, this study discussed the industrial white collar ' s mobility mode and the trend of polarization

    本研究以蘇州工業園區為個案,以企業白領為研究的視角,運用卷調查和談相結合的方法,對企業白領群體的形成以及企業白領的地位獲得進行了;具體了企業白領的流動情況,包括企業白領尋找流動機會的途徑、流動的原因、流動的結果、流動過程中存在的障礙和題等;同時探討了企業白領的流動模式與企業白領化的趨勢。
  4. Whenever psychological consultors face to cope with the advisee ' s problems of values, he or she should comply with the rules of trying for the advisees ' maximum of benefit, analyzing the specific issues either to keep value neutrality or to carry out value intervention, on the basis of facts of the advisee ' s reality value intervention, which is licit, can be done with verbal means or nonverbal one, and the consultor may intervene in the advisee ' s values with value criteria of general significance

    摘要心理咨詢中咨詢員面臨來者的價值觀題時,應該具體題具體,遵循靈活運用和追求來者利益最大化的原則,根據來者的實際情況來決定是保持價值中立或者是進行價值干預;價值干預是合法的;咨詢員既可以通過言語形式,也可以通過非言語形式對來者進行價值干預;咨詢員可以用具有普遍意義的價值標準對來者進行價值干預。
  5. Thus this thesis makes a detailed analysis on the above problems in order to solve them. through questionnaires and interviews, the paper analyses the recognition degree of the company ’ s stimulation measures and the degree of the employees ’ satisfaction as well as their incentive factors. we reach the conclusion that the staffs ’ urgent incentive factors are high income, the equability of performance assessment and allocation, and the opportunity of study as well

    本文通過卷調查、談等方式,對中國人壽技術與研發人員的激勵措施認知度、工作滿意度以及激勵因素等進行了調查與,並得出:收入高、績效考核和收入配的公平性和更多的學習提高的機會是公司技術與研發人員需要迫切的激勵要素。
  6. It implements web crawling through distributed technology, and builds index database through accidence analyzing chinese characters separating unuseful words deleting etyma extracting index words selecting and lexicon. the level system uses new model of web accessing and level computation to build web level system so that the requirement for computer resources is greatly reduced

    該搜索引擎使用散式技術實現網頁獲取模塊;通過詞法、中文詞、無用詞匯刪除、詞干提取、索引詞條選擇和詞典等技術建立索引數據庫;該搜索引擎的級別系統使用了新的網路模型和級別計算模型,大大降低了搜索引擎對于計算機資源的要求。
  7. This paper, based on documentation and questionnaire, makes a systematic analysis of the development of our country ' s female triple jump, pole vault and hammer throw

    摘要為了使昔日輝煌的我國女子新興田賽項目重振雄風,運用文獻資料和調查等方法,對我國女子三級跳遠、撐桿跳高和鏈球運動開展的現狀進行了較為系統的
  8. By means of documentation, questionnaires and interviews with experts, the paper presents a serious analysis on reasons of hurdlers ' injuries caused by hurdle race and offers several effective preventive measures as well as theoretical references for teachers and hurdlers in order to improve the teaching quality and reduce the cases of hurdlers ' injuries

    摘要本文通過文獻資料法、卷調查法和專家談法對體育教育專業跨欄跑教學運動損傷產生的原因認真進行研究和,並提出一些有針對性的預防措施,為跨欄課教師及學生在跨欄跑教學中減少運動損傷、提高教學質量,提供參考。
  9. The article points out the importance and necessity of the information - security from its actuality in our country. the resources in the information system, for instance, hardware, software, data, document, operator, meterial and so on, are evaluated and gived safety grade firstly. and then, it analyses the menace including the nonauthorized access, the information leak, the refused sevice, the internal objection which the system will take. the following are the corresponding control police : confirm the users " rights and duties, including the mode of using account, the limit of accessing resource, the application of password, the building of backup ; confirm the administrators " right and duties, including physical safety, system configuration, account configuration and usufruct, password management, audit and control, backup and individual intimity ; run - of - mill measure of security defence, including access control, symbol and identification, integrality control, password technique, firewall system, audit and resumption, safety of operating system, safety of database system, defence of computers " virus and resisting - deny protocol. in the end, the article offers the strategies of disposing the safety - accident and analyse after ithow. to report it, how to solve it in phase, and how to avoid it happening again. in a word, the article presents a holistic resolvent about keeping away the information system ' s security, and supplies a essential frame for its configuration, management and application

    然後,對系統可能受到的威脅,包括非授權、信息泄漏、拒絕服務和內部缺陷等進行,並提出了相應的控制策略:確定用戶的權力和責任,包括帳戶使用方式、資源權限、口令應用以及建立備份等;確定系統管理員的權力和責任,包括物理安全、系統配置、帳戶設置及使用權限、口令管理、審計和監控、備份以及個人隱私等方面;一般性的安全防護措施:存取控制、標識和認證、完整性控制、密碼技術、防火墻系統、審計和恢復、操作系統安全、數據庫系統安全、計算機病毒防護和抗抵賴協議等。最後,對事故處理和事後提供策略,如何報告安全事故,如何協調解決安全事故,如何避免安全事故再次發生。總之,本文對信息系統安全防範工作給出一個整體的解決方案,為其在配置、管理和應用方面提供了基本的框架。
  10. In this paper, through practical investigation, spot visit and scientific analysis, the problem which exits in the enterprise ' s inside encouraging system is studied, and by inducing, the following problems are pointed out : first lacking scientific result examination system, unfair distribution system ; second disjointed distribution and personal work - effect, lacking enterprise loudening power, lass of use - full personnel, lacking power of bringing forth the new ideas. in this paper, according the practical situation and combining with the theory of encouraging system, the author analyzed the problem in this enterprise and thought that the main reasons

    本文作者結合所學的激勵相關理論知識,通過實際調查、現場和科學的方法,研究該企業在激勵機制上存在的題,經過認真、整理,認為該企業激勵機制上存在的主要題是:首先在機制上缺乏科學的績效考核體系、配製度不公;其次,在制度上配與個人績效嚴重脫節;第三在管理方法上缺乏靈活性、企業缺乏凝聚力、人才流失,缺乏創新力。
  11. Aim at the city divagation begs the personnel to manage, recently promulgation in state department “ the city life who have no of divagation beg the personnel the salvage management way “ replaced to practice more than 20 years of “ the city wander about to beg the personnel to accept to permit to send the way ”, this symbolize to the city mendicant of management system from accept to permit to send to change into the salvage compulsory voluntarily

    討論的焦點政府該不該「禁乞」 。筆者通過資料考查和對城市市民的談等方式,發現政府在實施「禁乞」法規時,媒體的報道與民眾的輿論大都站在贊同政府一面。筆者根據「社會排斥」理論視角,來由「禁乞」引發的有關城市乞丐的有關題。
  12. At the same time, this article chooses the network framework of its system by analyzing several basic kinds of network system structure. it utilizes network data base programming principle to discuss the visit technology of data base odbc, web data base middle pieces technology cgi, and characteristic of the calculate mode of asp c / s b / s, proposes the topological structure of network data base used in this system

    同時了幾種基本的網路體系結構,選擇了系統的網路構架,利用網路數據庫編程原理,討論了數據庫的技術odbc 、 web數據庫中間件技術cgi和asp 、 c s及b s計算模式的特點,提出系統中應用的網路數據庫拓撲結構。
  13. Based on the experience of native or foreign country, integrating the fact of local area and teaching experience of the experimental schools, the author began researching in the autumn in 2002 with the researching methods such as the participant observation, literature analysis, questionnaire survey, deep - seated interview etc. through the researching of this task, the author strives hard to provide the reference teaching material for the practical teachers and make greater progress of science curriculum

    為此,筆者借鑒國內外經驗,結合本地區的實際和實驗學校一年多的教學經驗,運用課堂觀察、文獻卷調查及深度談等研究方法,在2002年秋季開始以理論與實踐為主線開展本課題的研究。力求通過本課題的研究,為一線教師提供一些可以借鑒的教學資源,促進《科學》課程的進一步發展。
  14. This chapter analyzes kinds of reasons and the prospect of the school through investigating by questionnaire and interview in - depth, proceeding with steps from designing to using for school playgame environment study on the plan of elementary school playgame environment suitable to quality education

    本文從建築設計到使用中的各個環節入手,別選取適當的樣本,用發放卷與個別來調查,建設面臨的各種障礙及原因。小學校園兒童游戲活動空間形態的設計研究。
  15. Referring to " career development inventory " of d. e. super and interviewing, by the principles and techniques of psychometrics and statistics, such as investigation and factor analysis, this study revises and validates " career development inventory " of john o. crites, and works out a career maturity questionnaire suited to chinese youth

    的《職業發展量表》 ( 1988 )和談的基礎上,通過卷調查、因子等測量學和統計學原理,對crites , johno的《職業成熟度量表》 ( 1995 )進行修訂和檢驗,研製出適合我國青年人的職業成熟度卷。
  16. In addition, through the grid, physicians can access analytical tools that help them with early cancer detection and diagnosis

    另外,通過格網,醫師能夠訪問分析工具,這些工具可以通過提供早期癌癥檢測和診斷來協助醫師。
  17. Studies the complementarity between them. 3. analyses the technologies involved in building erp data warehouse : data access and analysis, data collecting, middleware, net. remoting and web services

    了建設erp數據倉庫所涉及到的技術:數據訪問分析技術、數據抽取轉換加載技術、中間件技術、 net . remoting技術以及webservice技術。
  18. Part 6 : case study of the pattern. in this part, different methodologies such as observation, questionnaire, interview and experiment are employed to verify the patt

    通過課堂觀察、和實驗研究等來驗證主持人型教學的可行性,為主持人型教學的實施與推廣提供參考。
  19. Based on a literature review about bidding theory and game theory, this paper attempts to do some theory and proof research about the compound lower limited bids project in microcosmic angle. the main methods involve questionnaire, research interview, model study and case study. some useful results have gained

    本文在以往研究的基礎上,結合投標報價理論和博弈論的觀點,綜合應用卷調查研究、、模型研究及案例研究等方法,從微觀的角度,對施工企業投標行為中「復合標底法」項目的投標報價決策進行了理論及實證研究,得到了一些有意義的結果。
  20. It is based on the internet with higher quality and stronger function and wider user. grid gis is a technology system which can be used to construct computation environment of space information grid and space information service system. grid gis provides technology support the user to obtain, share, access and analyze the space data and provides a basic equipment for strong space data management and information process

    Gridgis為空間信息用戶對空間數據進行信息獲取、共享、和處理提供技術支持,為空間信息應用提供一個強大的空間數據管理和信息處理的基礎設施,確保任何空間信息請求事件( anyevent ) 、在任何時候( anytime ) 、在任何地點( anywhere ) 、任何有權限的用戶( anyone )之間信息的共享,即實現所謂的4a目標。
分享友人