設施請求 的英文怎麼說

中文拼音 [shèshīqǐngqiú]
設施請求 英文
facility request far
  • : Ⅰ動詞1 (設立; 布置) set up; establish; found 2 (籌劃) work out : 設計陷害 plot a frame up; fr...
  • : Ⅰ動詞1 (實行; 施展) execute; carry out 2 (給予) exert; impose 3 (施捨) give; hand out; best...
  • : 動詞1. (請求) request; ask 2. (邀請; 聘請) invite; engage 3. (招待; 款待) entertain 4. [敬] (用於希望對方做某事) please
  • : Ⅰ動詞1 (請求; 要求) ask; beg; request; entreat; beseech : 求人幫忙 ask sb a favour; ask a favou...
  • 設施 : installation; facilities
  • 請求 : ask; request; demand;beg:請求寬恕ask for forgive ness; 請求某人幫忙 ask a favour of sb ; 請求一項...
  1. Deadlock can be overcome by avoiding method, while this method either re - quires the system possesses enough resources or assigns strict rules for the resource requirement of processes before in order to prolong the running time to get unblock - ing

    死鎖可以在分散式系統計之初就採取措加以避免,但這樣一來或者需要系統擁有足夠多的資源,或者需要對進程的資源做出嚴格的限制,以運行時間的延長來換取不被鎖住。
  2. At first, there ' re some suggestions on amending articles of the definition of real law, the evidence qualification of real estate register, the effect of the good faith protection of the real estate registration, the fault responsibility of registration structure, the possession reformulation, the state ownership of water resources, the state ownership of wild animals and plants resources, the state ownership of public facilities, bona fide acquisition, transfer of right to land contracted management, mortgage and etc

    物權定義建議增加排他性效力;建議修改物權定義、不動產登記簿的證據資格、不動產登記的善意保護的效力,登記機構的過錯責任、佔有改定、水資源屬于國家所有、野生動植物資源屬于國家所有,公共屬于國家所有,善意取得、承包經營權轉讓、抵押等條文;建議增加關于宗教財產歸屬、取得時效、營業質權等規定;建議刪除第三十九條、第四十二條關於物上權之規定,刪除第十五章即居住權的規定。
  3. Project construction, as the owners did not agree to pay for the contract, or other owners of the obligations assumed by the reasons caused the increase in construction costs, extended construction period, project contractor compensation to the owners of losses ( cost or time limit ) of a written request, known as the engineering claims

    工程建中,由於業主未按合同約定支付工程費用,或其他應由業主承擔的義務等原因而造成的增加工程工費用、延長工期限等,工程承包單位向業主提出賠償損失(費用或工期)的書面,稱為工程索賠。
  4. Does the ship have a process for receiving information from contracting governments requiring them to execute a dos with a port facility, and if so, please elaborate

    當締約國政府要船舶向港口遞交保安聲明,船舶是否具有一套接收此類信息的程序?如果有的話,詳細說明。
  5. This paper has analyzed the pkix ( public key infrastructure based on x. 509 standard ) digital certificate authority mechanism, and has discussed the espkix, a platform independent and java implemented essential pkix, and its implementation. it covers the design thought in the phases of certificate request, issuance and revocation

    本文分析了基於x . 509標準的公鑰基礎( pkix )數字證書授權機制,對使用java語言計和實現跨平臺的簡化版pkix ? espkix ( essentialpkix )進行了深入的討論,涉及espkix系統中證書的、頒發和撤消等各個階段。
  6. Countermeasures to standard construction of bhfla in domestic are as follows : before execution, in order to make full use of the local resources and reduce the cost, the executor need to argument on the necessity and feasibility of bhfla. employ experienced manager in the field of bhfla to take charge of the project. and supply the scientific and reasonable requirements of design

    3 、我國實驗動物屏障規范化建的對策: 1 )建單位在建之前,首先要充分論證其必要性和可行性,以充分利用本地資源,避免重復建;安排具有管理經驗的專業人員負責;對擬建提出科學、合理的計要;工程工中,聘專家和專業監理隊伍,加強工程質量監督。
  7. Xacml not only processes the authorization requests, but it defines the mechanism for creating the complete infrastructure of rules, policies, and policy sets to arrive at the authorization decisions

    Xacml不但處理授權,而且還定義了一種機制,來創建進行授權決策所需的規則、策略和策略集的完整基礎
  8. For the above reason, new security mechanism for wlan is necessary to make sure the data in transmission confidential, complete and undeniable. at the same time, it should provide identity certification and access control. the 802. 1x fulfils all the above requirements, which provides an upgraded certification and authentication method for controlling lan users ’ access through port - based certification

    然而常規的無線局域網安全措如wep等都已被證明不再安全,人們已經認識到必須專門為wlan計新的安全防護機制,以保護在wlan中傳輸數據的機密性、完整性和不可否認性,同時對接入wlan的用戶進行身份認證和訪問控制。
  9. Then the article analyses four component parts of the damages caused by the tort affecting the public utility facilities. the first part is to be the public utility facilities. the second part is to exist the defect on the public utility facilities

    同時,文章第四部分又從公有公共賠償的當事人、損害賠償的程序和損害賠償的方法與范圍等幾方面論述了公有公共致害賠償權的行使。
  10. In formulating the implementation plan, we have taken into account the demand for various government services on saturdays and tried our best to minimise the impact on the public. for example, services that are widely offered directly to the public will continue to operate on saturdays. these include immigration - related counter services for registration of births and deaths, marriage ceremonies, id card visa passport applications ; mail delivery and post office counter services ; job centres ; occupational health clinics ; social welfare departments family services, medical social services in hospitals and hostel services ; environmental hygiene services, hawker management and control, market management ; libraries, performing arts venues, museums and sports and recreational facilities

    政府在訂定五天工作周的實方案時,已考慮到公眾在星期六對不同政府服務的需,並致力減少五天工作周對公眾的影響,例如在星期六仍會提供與廣大市民直接有關的服務,包括與入境事務有關的櫃臺服務出生和死亡登記婚禮儀式處理身分證簽證及護照的申郵件派遞和郵政櫃臺服務就業中心職業健康診所社會福利署的家庭服務駐醫院的醫務社會服務部提供的服務和院舍服務環境生服務小販管理及管制街市管理圖書館演藝場地博物館和康體
  11. Any time a user id and password is explicitly provided to db2 udb as part of an instance attachment or database connection request, db2 udb attempts to authenticate that user id and password using this external security facility

    一旦用戶id和口令作為實例附件或數據庫連接的一部分明確地提供給db2 udb , db2 udb就會嘗試使用該外部安全驗證用戶id和口令。
  12. Facility - accepted request far

    可接受設施請求
  13. 14 ajtai m, komlos j, szemeredi e. sorting in c log n parallel steps. combinatorica, 1983, 3 : 1 - 19. 15 batcher m e. sorting networks and their applications

    更具體地說, naregi superscheduler是一套網格服務,它們通過相互配合工作,並允許各種并行消息傳遞例如mpi同時多個網格機器,實現了網格上復雜耦合應用的執行。
  14. Db2 udb interacts with this external facility in order to validate a supplied user id and password when a db2 request is submitted

    當提交db2時, db2 udb與這個外部進行交互,從而檢驗提供的用戶id和密碼。
  15. The portal infrastructure might contain an optional reverse proxy, which is configured to receive requests on behalf of the origin server

    門戶基礎可能包含可選的反向代理,此代理被配置為代表原服務器接收
  16. Since the sighting of the crocodile on november 3, 2003, afcd had spent about $ 300, 000 on the operation. about one third of it was used for making capturing facilities including cage traps, snares, pit - falls and nets, and for setting up temporary outdoor camping facilities for the crocodile experts from panyu upon their request. the rest was used to hire two security guards for 24 - hour surveillance of the crocodile and the facilities since november 22, 2003

    自二三年十一月三日鱷魚被發現至今,漁護署在捕鱷方面的支出共約30萬元,當中約三分之一用於置捕獸籠、套索、土坑陷阱、圍網等誘捕鱷魚的工具及按番禺捕鱷專家要在山貝河附近搭建臨時露宿,其餘是自二三年十一月二十二日開始聘兩名護衛員在南生圍進行24小時監察鱷魚及捕鱷裝置的費用。
  17. It is based on the internet with higher quality and stronger function and wider user. grid gis is a technology system which can be used to construct computation environment of space information grid and space information service system. grid gis provides technology support the user to obtain, share, access and analyze the space data and provides a basic equipment for strong space data management and information process

    Gridgis為空間信息用戶對空間數據進行信息獲取、共享、訪問、分析和處理提供技術支持,為空間信息應用提供一個強大的空間數據管理和信息處理的基礎,確保任何空間信息事件( anyevent ) 、在任何時候( anytime ) 、在任何地點( anywhere ) 、任何有權限的用戶( anyone )之間信息的共享,即實現所謂的4a目標。
分享友人