防護洞 的英文怎麼說

中文拼音 [fángdòng]
防護洞 英文
shelter cave
  • : Ⅰ動詞(防鷥) provide against; defend against; guard against Ⅱ名詞1 (防守; 防禦) defence 2 (堤...
  • : 動詞1. (保護; 保衛) protect; guard; shield 2. (袒護;包庇) be partial to; shield from censure
  • : Ⅰ名詞(物體上穿通的或凹入較深的部分; 窟窿; 洞穴) hole; cavity Ⅱ形容詞(深遠; 透徹) profound; thorough; clear
  • 防護 : protect; shelter; shield; guard; shielding; protection; proofing
  1. In addition, this paper carry out successfully the support design practice in the preceding excavation of 4km long exploratory tunnel. according to the thesis research results, the following conclusion can be drawn. if the grouting rock can possess sound anti - seepage capability and the liner structure can hold higher hydraulic permeability relatively, and if the adjoining rock can be made as primary load - bearing structure by construction measure, the stability of country rock and the safety of liner structure will be guaranteed

    計算結果表明,如果能使錦屏工程引水隧灌漿圈圍巖具有較好的滲性能,將高外水壓力控制在灌漿圈以外,再配合透水性相對較好的支結構以及排水措施,使灌漿圈圍巖成為主要承載結構,並使襯砌結構和灌漿圈共同承載,是可以保證圍巖的穩定和支結構安全的。
  2. Network security techniques include router filter, firewalls, intrusion detection, audit, counteroffensive and etc. in these techniques, router filter and firewalls are static security techniques, and others are dynamic security techniques

    目前網路安全技術包括路由器、火墻、漏堵、入侵檢測、審計和反攻擊等,其中路由器過濾、火墻、漏堵屬于靜態安全技術,而入侵檢測、審計和反攻擊等屬于動態
  3. Two farmers with 2 ( superscript nd ) degree burn, 3 % and 2 % tbsa, respectively in the perineal areas due to accidental contacting with paraquat were reported

    回溯病史,兩人皆是因為巴拉刈自銹蝕的農具接縫滲漏出來,穿過衣的破而積聚在會陰部,造成此一特殊部位的化學藥物灼傷。
  4. Armor class bonuses that are not armor bonuses, such as the insight bonus from the combat precognition power, stack with other armor bonuses, as do deflection bonuses, such as the bonus from a ring of protection

    不是盔甲加值的禦等級加值,例如「戰斗預感」異能的察加值,和其他盔甲加值累計,偏斜加值也是,例如戒指。
  5. Firstly, it analyses economic character, competition situation, future and attraction of mobile communication industry in huazhou at present. secondly, it analyses the importance of resource, competition ability and customer orientation with swot method and value chain method. thirdly, with continuous competitive advantage theory and creative destruction theory, it illustrates that defense cannot protect the original competitive advantage in the severity competition situation, and that the only source for continuous competitive advantage is continuous creation and method of pursuing a scries of temporary dynamic advantage

    首先,分析了當時華州移動通信行業的經濟特性、競爭態勢、前景及吸引力;接著,運用swot 、價值鏈等分析法分析了aaa的資源、競爭能力及客戶導向的重要性;然後,運用持續競爭優勢和創造性破壞理論,闡明在激烈競爭的新形勢下,禦已不能保原有的競爭優勢,只有通過不斷地創新,追求獲得一系列暫時的動態優勢的方法,才是構築持續競爭優勢的源泉,從而形成aaa的戰略選擇;最後,運用漏分析法和核心競爭力分析等,結合動態戰略管理的理念,導出aaa的戰略實施方案,提出了戰略計劃。
  6. Recently, net attack things often occur. it makes people know the fearfulness that net holes bring and realize the importance of the things that keep away the hackers. in fact, net security risks are in every time

    近年來,網路攻擊事件頻頻發生,讓人真正認識到了網路漏所帶來的安全問題的可怕,並切實體會到了黑客攻擊範和網路安全的重要性。
  7. The signature hole is the 8th 162 yards, par 3 where you play across gosford bay after which the hole is named to a far from generous green, close to a barrier of sleepers that provide protection from the tide

    第8為簽名162碼,標準桿數3 。擊球越過高斯福德海灣,到達一個非常狹小的果嶺,緊臨一道枕木屏障用來潮汐的侵入。
  8. Protecting the dispersion of vegetation in this area is basic for the function of restoring flood - water

    庭湖區植被分佈和功能狀態是為了更好地發揮東庭湖區的生產功能和洪、蓄洪功能的基礎。
  9. Occlumency is the art of magically defending the mind against external penetration, sealing it against magical intrusion and influence - the defensive counter to legilimency

    大腦封閉術是一種用魔法保自己的思想不被他人察的法術,通過封閉大腦,對抗侵入和影響思想的魔法? ?也就是和攝神取念術相對的禦術。
  10. In security defense measures, the author advances a dynamic defense system, the core of which is intrusion detection system, namely the linkage with intrusion detection system, vulnerability scanners system and firewalls system

    安全措施中提出了以入侵檢測為核心的動態禦體系,即入侵檢測系統與漏掃描系統和火墻系統的聯動,同時,建立了日常安全維體系和應急響應體系及風險評估機制。
  11. Netradar system is an important research subject in the area of internet security. it ' s aim is to detect the foundational terminals of and the route to a certain aimed intranet ; to scan the softwares that run on the terminals ; to find the services which are provided by the terminals ; to determine the vulnerabilities of the services and the distribution of the vulnerabilities. ater all the above have fmished, the netrada system attacks the vital terminals or the vulnerable terminals and controls them automatically

    網路雷達系統( netradar )是網路安全領域的一個研究課題,該課題的研究目標包括三個方面:探測接入internet的特定目標網路的基礎設施、到達該目標網路的路徑;掃描支撐目標網路運行的軟體實體的類型、提供的服務、探測出其軟體實體的漏和脆弱點分佈等信息;根據目標網路的基礎設施構架、拓撲信息、漏和脆弱點分佈等信息,有針性對的選取關鍵設備或者較弱的設備進行攻擊與控制。
  12. My thoughts were now wholly employ d about securing my self against either savages, if any should appear, or wild beasts, if any were in the island ; and i had many thoughts of the method how to do this, and what kind of dwelling to make, whether i should make me a cave in the earth, or a tent upon the earth : and, in short, i resolv d upon both, the manner and description of which, it may not be improper to give an account of

    當時,我的思想完全集中在如何保自己,備野人或野獸的襲擊,假如島上有野人或野獸的話。我想了許多辦法,考慮造什麼樣的住所:是在地上掘個呢,還是搭個帳篷。最後,我決定兩樣都要。
  13. Including the main body of the subgrade, protecting and supporting engineering. drainage equipment of road, culvert and the transition zone between the road and the bridge. through investigating the types of diseases, the author discusses the existing problems and causes of producing diseases, puts forward the protective measures in design and construction, and raises the treatment measures in highway maintenance, which makes it more scientific and perfect for highway construction and maintenance in the loess areas

    論文首先對黃土的工程特性及其影響因素進行了分析,然後對黃土地區路基病害及其治技術進行了研究,具體包括路基主體、與支擋工程、公路排水設施、涵及路橋過波段等部分,對病害類型進行了調查,分析了使用中存在的問題與病害產生的原因,提出了在設計與施工中應採取的範措施,給出了養中的處治對策,使我國黃士地區公路建設與養更加科學和完善。
  14. Geological features and safety protection for tunnels at xiluodu hydropower station

    溪洛渡水電站隧工程地質特性與安全
  15. In order to protect the natural environment of the zone adjacent to mountain of right no. 2 laoshan highway tunnel in nanjing, china, the design of shed - tunnel was adopted through economical and technical comparison

    摘要為了保南京老山二號公路隧道右線傍山段的自然環境,採用錨噴支與棚結構相結合的傍山隧道結構形式,形成互為補充的完整受力體系和邊坡工程,減小了刷坡范圍。
  16. In technological part, it begins with maintaining physical security, network security, system security, data security, application security and user security, and then takes proven actions, that include authentication, password checking, access control, anti - virus, firewall, leak scan, ids, security audit, anti - hacker, backup mechanism and etc. in organization sketch part, the different positions are arranged by insisting the rule of the minimum right. in management sketch part, a series of effective regulations are settled, according to the chinese governmental laws and the regulations of the agricultural bank of china. now, the plan has been preliminarily applied into the practice

    在技術層面上,從維銀行網路信息系統物理安全、網路安全、系統安全、應用安全、用戶安全等方面出發,採用了成熟、適用的安全技術措施,包括;身份認證、密碼、訪問控制、病毒、火墻、漏掃描、入侵檢測、安全審計、黑客入侵、同城災難備份等技術;在組織結構上,堅持權限最小化原則,設置不同的崗位,對每個崗位的安全職責進行了明確的界定;在管理體繫上,依據法律法規,制定了行之有效的規章制度。
  17. In this paper we analyzed the structure, function and characteristics of the private office network, discussed the primary threats to the office network security and common attack methods, based on the p2dr model, we distributed the office network security policy across three layers : network layer, system layer and application layer. the security principle, implement solution and the relationship among these three layers were illustrated in this paper, including physical access control, logical access control, vpn, data encryption, authentication, authorization, audit, ids ( intrusion detection systems ), system leak test and anti - virus protection

    本文中將辦公網路的安全策略由下至上劃分為網路層、系統層和應用層三個層次,分別敘述了各個層次上的安全原則和實現方式,以及各層之間的相互關系,詳細介紹了物理控制、邏輯控制、 vpn與數據加密、用戶認證和授權、審計與入侵檢測、漏掃描及病毒等方面的策略和實現方式。
  18. Firstly, it introduces the information security theories and technologies used in the study. the information security theories mainly includes ppdr - the dynamic security model, sse - cmm, padminee - the life cycle of information security engineering model, bs7799 - the standard of information security management, the grade - classification standard of information system security protection, iatf - the technical framework of information security guarantee and the principle of wooden pail etc. and the information security technologies consist of the technology of firewall, invasion detection, virus prevention and cure, loophole scanning, the identity certification and the soc etc. then it studies on the designing of the information security guarantee system

    首先,介紹和分析與本研究相關的主要信息安全理論與技術,其中信息安全理論有ppdr動態安全模型、 sse - cmm系統安全工程-能力成熟度模型、 padminee信息安全生命周期工程模型、 bs7799信息安全管理標準、信息系統安全保等級劃分準則、 iatf信息安全保障技術框架和木桶安全理論等;信息安全技術有火墻技術、入侵檢測技術、計算機病毒治技術、漏掃描與評估技術、身份認證技術和soc技術等。
  19. Its products are for detecting material position, controlling liquid level, counting, measuring speed, recognizing width, postponing signal, marking color spot, correcting position, recognizing hole, protecting, alarming, etc

    健埃爾公司產品廣泛用於工業、高科技及各種設備中作物位檢測、液位控制、產品計數、速度監測、寬度判別、信號延時、色斑標記、定位糾偏、孔識別和安全裝置、盜警戒等。
  20. In order to improve the defense capability of the online security, making the network safe protection system occupying the initiative position in the face - off of attacking and protecting, besides using the safe tool of passive type ( the fire wall, loophole scan etc. ), the initiative type safe safeguard procedures are needed

    為了提高網路安全禦能力,使網路安全系統在攻擊與的對抗中占據主動地位,在網路安全系統中,除了使用被動型安全工具(火墻、漏掃描等)外,也需要採用主動型安全措施。
分享友人