鍵系 的英文怎麼說

中文拼音 [jiàn]
鍵系 英文
bond system
  • : 名詞1 [機械工程] (使軸與齒輪、皮帶輪等連接並固定在一起的零件) key 2 [書面語] (插門的金屬棍子)...
  • : 系動詞(打結; 扣) tie; fasten; do up; button up
  1. All main technicals have been participated in the united design and technology transfer of mpc75 branchline aerobus and have a good command of key technologies on structural and system design of the airplane kinds like boeing and airbus as well as possess rich data of above planes

    主要技術人員均參加過mpc75支線客機的聯合設計與技術轉讓,掌握波音空中客車等機種的結構統設計的技術關,擁有大量上述飛機的有關資料。
  2. ( 3 ) the polar eddy, the west circumfluence on 500hpa medium latitudinal region ands subtropic circumfluence are the key systems of tpnes floods precipitation and, the wet years have abundant vapor, moreover, the omga is positive in all atmosphere

    ( 3 )極渦、中高緯西風環流統和副熱帶統是影響青藏高原東北側區汛期降水的大尺度環流背景關鍵系統。同時,多雨年的主要流場特點是有利於水汽輸送,且整層大氣始終表現為上升運動。
  3. Automated response to intrusions has become a major issue in defending cri tical systems because the traditional network security components run short of cooperation and automation. the system is requested to have the capability to cooperatively react without human intervention. an infrastructure that supports collaboration between security components is critically needed

    由於傳統的網路安全組件在檢測與響應方面缺少協作,自動化程度低甚至需要人工配置,而入侵者卻可能在計算速度等方面大做文章,所以對網路入侵的自動響應已經成為關鍵系統防護中的首要問題,也就是說,我們要求統在無人參與的情況下,具有協同檢測和自動響應的能力。
  4. In the multitudinous intrusion event, the hacker often gain control of the target computer through exploiting essential system process, and leaves trojan horse or back door in the system after a successful intrusion, which provides a shortcut for next access. therefore the process detection for the exploited system process and the trojan horse is important topics in the intrusion detection field

    在眾多的入侵事件中,黑客往往通過感染關鍵系統進程獲得目標主機的統權限,並在成功入侵后在目標主機留下木馬、后門作為下次入侵的捷徑,所以對這些受感染的統進程以及木馬、后門進程進行檢測是入侵檢測技術研究的重要課題之一。
  5. Over the past year we have worked with the largest group of volunteer end users ever assembled by the foundation to develop a specification that will enable the diagnostic, information capabilities and reliability of fieldbus technology to be deployed in safety critical systems

    再過去的一年裡,我們同迄今基金會組織的最大志願用戶組織一起,著手開發一個將基金會技術的診斷、信息功能及可靠性部署在「安全關鍵系統」的規范。
  6. High availability has been so important for the key systems as one basic index

    高可用性這是關鍵系統最重要的要求之一。
  7. New design approach for safety - critical systems based on the supervisory control theory of discrete event systems

    監督控制理論的安全關鍵系統設計研究
  8. But china ' s space agency built several key systems on its own, and in some ways the shenzhou is technologically superior to the soyuz

    然而,中國國家航天局自行建造出許多關鍵系統,使得神舟號在某些技術層面優于聯合號。
  9. Through the detailed analysis of safety - crital system software speciation arinc653 and several main stream commercial real - time operating system kernel, we designed and implemented a high available and reliable real - time operating system artos, which is as well as the same catagerous system on functionality and performance, based on our technology

    本課題就是在通過對安全關鍵系統軟體標準arinc653以及幾個主流商業實時操作統內核機制細致分析的基礎上,揚長避短,在原有的國有實時嵌入式操作統deltaos之上,並加入自己的技術特色,設計並實現一種在功能、性能上與國外同類操作統都具可比性的高可靠性實時操作統artos 。
  10. Second, process state shift is irrelevant to concrete operating system, so the process state sequence may be used across platforms. third, the model has a wide detection scope

    第三,檢測的范圍廣,不僅可以檢測受感染的關鍵系統進程,還可以檢測木馬、后門等惡意軟體的進程。
  11. On the basis of the two - component soliton model, discussed the motion of a kink soliton in the presence of an external force and damping in hydrogen bonded systems, investigated the influence of motion and the optical model of the heavy - ions sublattice on the proton sublattice. the solution, the mobility and the conductivity of a kink soliton are found. the calculated results are in good agreement with the experiment results

    採用二分量弧子模型,討論了在外場和阻尼存在的情況下,氫鍵系統中扭結弧子的運動,研究了重離子子晶格運動和光學模對質子子晶格的影響,獲得了扭結弧子解、遷移率和電導率,計算結果和實驗值相一致
  12. The authentication mechanisms provided in wireless networks are not sufficient for critical systems

    無線網路中提供的認證機制不足以保護關鍵系統。
  13. Includes a class project involving the high - level system design and analysis of a safety - critical system

    它還包括一次關于安全關鍵系統高級統設計和分析的課堂設計。
  14. Not at this moment, but the hot keys have not been finalized yet for starcraft ii

    目前沒有,但是星際2的熱鍵系統還沒有最終完成。
  15. Analysis is given to the on - going result - oriented evaluation of training effectiveness, and preference is given to the principles of all - roundness and future - orientedness, and warning is given to organizations " non - relevant evaluation of economic value of training and preference of interest returns rather than wholesale quality. the other issue is the objective obstacles for improving training effectiveness. much research of literature on the key system factors leads to the conclusion that the training interest conflicts are the objective obstacles, and followed is detailed analysis of the organizations " complex training interest, especially in the views of organizational theories

    文章對培訓有效性的兩個關問題作了較深入的探討:一是培訓有效性評估的問題,文章分析了目前最常用的結果導向的培訓有效性評估方法,並提出實踐應用時所應遵循的全面原則和未來導向的原則,對防止組織牽強評估培訓的經濟價值以及只重回報不重整體質量的做法提出了警示;二是組織提高培訓有效性的客觀障礙的問題,文章通過大量文獻研究對關鍵系統因素進行了歸納和分析,從而得出培訓利益沖突是客觀障礙的結論。
  16. As the bridge connecting the planning & managing layer and the facility control layer, manufacturing executive system ( mes ) is the key to raising enterprises " agility

    製造執行統( mes )是連接企業計劃管理層和低層控制的橋梁,是實現企業集成的關鍵系統。
  17. It s far cheaper to identify vulnerabilities and put in place cost - effective safeguards, such as a disaster recovery plan and a daily backup system, than to recover from an enterprise - wide dos or destruction of critical system assets

    和企業范圍的dos或關鍵系統資源被破壞相比,確定漏洞並在適當的位置採取經濟實用的安全措施(例如災難恢復計劃以及日誌備份統)的代價要小得多。
  18. The first step is to identify critical system assets - intangible or tangible - that are vulnerable to malicious attacks

    第一步是確定易遭到惡意攻擊的關鍵系統資產無形的或者有形的。
  19. At the same time, the paper analyses its affecting factor and degree, and it " s feasibility and rightness were tested by field practice

    通過室內試驗求出了改進應力恢復法的關鍵系數應力等效數,並運用數值模擬進行檢驗,同時分析了其影響因素及影響程度。
  20. Several mappings of commonly used digital signal processing algorithms for future telecommunication and multimedia systems and implementation results are given for a standard - cell asic design realization in 0. 18 micron 6 - layer umc cmos technology

    由於上市的時間越來越關統的自適應性和演算法的復雜度增大了,硬部件的重用也因此變得必要了。
分享友人