防護計算 的英文怎麼說

中文拼音 [fángsuàn]
防護計算 英文
shielding calculations
  • : Ⅰ動詞(防鷥) provide against; defend against; guard against Ⅱ名詞1 (防守; 防禦) defence 2 (堤...
  • : 動詞1. (保護; 保衛) protect; guard; shield 2. (袒護;包庇) be partial to; shield from censure
  • : Ⅰ動詞1 (計算) count; compute; calculate; number 2 (設想; 打算) plan; plot Ⅱ名詞1 (測量或計算...
  • : Ⅰ動詞1 (計算數目) calculate; reckon; compute; figure 2 (計算進去) include; count 3 (謀劃;計...
  • 防護 : protect; shelter; shield; guard; shielding; protection; proofing
  • 計算 : 1 (求得未知數) count; compute; calculate; reckon; enumerate 2 (考慮; 籌劃) consideration; pla...
  1. In addition, this paper carry out successfully the support design practice in the preceding excavation of 4km long exploratory tunnel. according to the thesis research results, the following conclusion can be drawn. if the grouting rock can possess sound anti - seepage capability and the liner structure can hold higher hydraulic permeability relatively, and if the adjoining rock can be made as primary load - bearing structure by construction measure, the stability of country rock and the safety of liner structure will be guaranteed

    結果表明,如果能使錦屏工程引水隧洞灌漿圈圍巖具有較好的滲性能,將高外水壓力控制在灌漿圈以外,再配合透水性相對較好的支結構以及排水措施,使灌漿圈圍巖成為主要承載結構,並使襯砌結構和灌漿圈共同承載,是可以保證圍巖的穩定和支結構安全的。
  2. Increscent weight of oxidation, graphic and micrographic were explored, meanwhile, the mechanism of anti - erosion and wear - resistant of new coating material are also studied. at last, a program applied to calculate the temperature distribution and heat transmission between water wall tubes with sprayed coatings and metal anti - erosion tile was developed by use of visual basic

    文中最後採用vb6語言機編程,了不同材料塗層對鍋爐水冷壁管的傳熱效果及徑向溫度梯度的影響,同時與加裝了瓦和未加任何的水冷壁管進行了比較。
  3. The article points out the importance and necessity of the information - security from its actuality in our country. the resources in the information system, for instance, hardware, software, data, document, operator, meterial and so on, are evaluated and gived safety grade firstly. and then, it analyses the menace including the nonauthorized access, the information leak, the refused sevice, the internal objection which the system will take. the following are the corresponding control police : confirm the users " rights and duties, including the mode of using account, the limit of accessing resource, the application of password, the building of backup ; confirm the administrators " right and duties, including physical safety, system configuration, account configuration and usufruct, password management, audit and control, backup and individual intimity ; run - of - mill measure of security defence, including access control, symbol and identification, integrality control, password technique, firewall system, audit and resumption, safety of operating system, safety of database system, defence of computers " virus and resisting - deny protocol. in the end, the article offers the strategies of disposing the safety - accident and analyse after ithow. to report it, how to solve it in phase, and how to avoid it happening again. in a word, the article presents a holistic resolvent about keeping away the information system ' s security, and supplies a essential frame for its configuration, management and application

    然後,對系統可能受到的威脅,包括非授權訪問、信息泄漏、拒絕服務和內部缺陷等進行分析,並提出了相應的控制策略:確定用戶的權力和責任,包括帳戶使用方式、資源訪問權限、口令應用以及建立備份等;確定系統管理員的權力和責任,包括物理安全、系統配置、帳戶設置及使用權限、口令管理、審和監控、備份以及個人隱私等方面;一般性的安全措施:存取控制、標識和認證、完整性控制、密碼技術、火墻系統、審和恢復、操作系統安全、數據庫系統安全、機病毒和抗抵賴協議等。最後,對事故處理和事後分析提供策略,如何報告安全事故,如何協調解決安全事故,如何避免安全事故再次發生。總之,本文對信息系統安全範工作給出一個整體的解決方案,為其在配置、管理和應用方面提供了基本的框架。
  4. Firstly, the status of our nation ' s water resources, flood and arid hazards is overviewed to illustrate the necessity for study on dynamic control of flood season limited water level. disadvantages in traditional limitsd water level design, static control of limited water level design, static control of limited water level and fuzzy limited water level curve are pointed out, and mending methods for these are introduced. dynamic control and its key problems are analyzed hi next section. the allowable range of limited water level is determined, so as the allowable extreme risk index. the definition of extreme risk is re - illustrated, risk analysis methods in reservoir operation is discussed either. according to the definition of extreme risk rate, the allowable extreme risk rate of reservoir is systematically demonstrated with variant extreme risk indexes and flood season limited water level

    本文首先闡述了我國水資源狀況和水旱災害、說明水庫汛期限制水位動態控制研究的必要性;介紹了傳統汛限水位設、汛限水位靜態控制、模糊汛限水位過程線存在的問題及其初步改進方法;分析汛期限制水位動態控制的方法及關鍵問題;進一步闡述了水庫極限風險率的定義;根據極限風險率定義,詳細敘述了不同極限風險指標時、不同汛期限制水位下起調,水庫所能承受的極限風險率方法。然後,基於極限風險率方法,以白石水庫為背景,研究「考慮壩體自身安全、考慮壩體安全與下游對象控制下泄流量的汛限水位動態控制的極限風險率」 。
  5. This thesis built the models computing the working frequency over - voltage " operation over - voltage for 220kv fugai transmission line, calculates and analyzes working frequency over - voltage " operation over - voltage using emtp program and provides reasonable protection measures for the transmission line. furthermore, regulations method, traveling wave method and striking distance method are used to study and compare lightning - enduring capabilities of different types of pole in power transmission lines aiming at the fact that the lightning strike switching rate of 220kv fugai line is higher

    本文分別建立了220kv復蓋線路的工頻電壓升高及操作過電壓的模型,利用emtp程序對220kv復蓋線路工頻電壓升高、投切空線過電壓、投切空變過電壓、單相故障過電壓進行分析,並提出合理的措施。
  6. Automated response to intrusions has become a major issue in defending cri tical systems because the traditional network security components run short of cooperation and automation. the system is requested to have the capability to cooperatively react without human intervention. an infrastructure that supports collaboration between security components is critically needed

    由於傳統的網路安全組件在檢測與響應方面缺少協作,自動化程度低甚至需要人工配置,而入侵者卻可能在速度等方面大做文章,所以對網路入侵的自動響應已經成為關鍵系統中的首要問題,也就是說,我們要求系統在無人參與的情況下,具有協同檢測和自動響應的能力。
  7. Shielding schemes of computer vdu are suggested through transient electromagnetic scattering analysis. method of time - domain integral equations is used here. a new soft - tempest method is found to strengthen protection capability of electromagnetic information leakage

    用時域積分方程法,通過瞬態電磁場分析推薦了機顯示器的屏蔽方案,提出soft - tempest技術的新措施以加強信息電磁泄漏; 4
  8. The main content of this article includes : " ( l ) the planar non - linear and viscid - elastic static mechanical analysis is used to analyze and calculate the md in service. ( 2 ) the planar nonlinear static mechanical analysis of the stress and deformation is used to analyze the med in banking, which is banked to the height of 140m

    主要研究工作有: ( 1 )茅坪溪大壩完建和蓄水時的應力和變形的分析:對完建和蓄水時壩體的應力和變形進行平面非線性靜力分析和平面粘彈性靜力分析,對分析結果作出結論。
  9. For the protection of system resource, need to establish a active defence machine different from firewall and antivirus software to detection intrusion. by monitoring network or computer systematic development behavior feature intrusion detection system ( ids ) judge whether have invade take

    為保系統資源,需要建立不同於火墻和病毒軟體的主動禦機制檢測入侵。入侵檢測系統( intrusiondetectionsystem )就是監控網路或機系統的動態行為特徵並據此判斷是否有入侵的主動禦措施。
  10. Antivirus program - virus protection for any computer from pda, pc to server network

    殺毒程序-任何器從pda , pc到服務器網路
  11. For your convenience, please use the following online calculator to find out the resulting price of the avast ! - based antivirus protection of your network

    為了您的方便,請使用以下的網上出您所需的殺毒的價格
  12. ( ) i1 t [ lo basi s of " that, we make systemic rosoarcl1 ( ) n l f1o s ( ) cllr i ty ilrct1 i t. cc 1. ljre, dcs i gn out the securi ty so. l ut io11 ; 1l1t ] s l. ci ) i n i, rilc t. i cc ( ) f. s1 ) t } ( t i ; l l network according to the security archi tec turc fr ; tn1e, wi1 icl1 silt i si ! y the need of confidentia1 ity, integri ty, avai 1 abi l i ty, authentj cat ion, authorization and accountable of specia1 network information system

    特別是,論文作者在網路安全系統建設的過程中,獨立承擔了中心子網火墻、網路入侵檢測系統、病毒體系的安裝及管理工作,在詳細了解了ddn鏈路加密、 pki ca體系的建設和使用原理的基礎上,參與了網路基礎設施的安裝調試以及各類服務器的配置管理,擬定了《機信息系統安全管理規定》 、 《網路ip地址規范》 ,為本單位網路安全建設規劃提出了意見和建議。
  13. The flow diagram of a lpg bottle paint - drying heating system using heat carrier as heat - medium, which has similar properties as other heat - carrier heating systems, has been improved, which has good effect in avoiding oil - spraying, shortening dehydration time and power - fail protecting etc. after making a series of analysis, calculational methods of expansion tank dimension have been deduced, which takes the moisture boiling - off of heat carrier into account and accords with real conditions

    對與其它熱載體加熱系統具有共性的鋼瓶熱載體加熱系統的流程圖進行了改進和完善,在止噴油、縮短脫水時間和停電保等方面取得了良好效果。通過分析,整理出了熱載體加熱系統膨脹器容積的方法,該方法考慮了熱載體所含水分汽化而帶來的影響,比原有的方法更加符合實際。
  14. In this paper at last. the localized anti - collapsing effect of the cave depot of single aircraft under the explosive load is calculated and analyzed. the explosive result shows that 3d ripped steel plate and ribbed shell structure are effective to raise the capacity of anti - collapsing of the protective structures

    對飛機單機掩蔽庫工程在爆炸荷載作用下,抗局部震塌效應進行了分析,模擬直接命中的爆炸試驗結果表明:鋼筋混凝土內襯三維波紋鋼板組成拱型復合結構,是提高結構抗震塌破壞的一種十分有效的措施。
  15. Low and medium voltage power distribution systems, lighting, ups, afd application, short circuit calculation and protective device coordination, fire alarm systems, telephone systems, hazardous material monitoring and alarm systems

    中、低壓配電系統,照明, ups ,變頻器應用,短路,保裝置協調,消報警系統,電話系統,危險材料監控和報警系統。
  16. The research shows that : 1 ) the ductility of the hsc bending members constructed is much greater than 5 ; 2 ) increasing the vertical links and distribution steel can increase the deflection under ultimate moment ; 3 ) with appropriate compressive bars, vertical links and distribution steel the increase of moment after yield and the decrease of moment under ultimate moment can be ignored, so the ductility of the hsc bending member is much larger ; 3 ) the width / depth ratio of hsc bending member has no obvious effect on the ultimate compressive strain of concrete ; 4 ) the method used here to calculate the deflection is applicable ; 5 ) the location of crack coincides with the location of vertical links and distribution steel ; 6 ) the bending property of the hsc structure under the blast load can meet the demand of protective engineering

    研究表明:本文研究的梁、板構件的延性比遠大於5 ;增加箍筋(鉤筋、分佈筋)含量,可以提高壓區混凝土剝落時的撓度;在適當的受壓筋、箍筋(鉤筋、分佈筋)含量下,可以忽略壓區混凝土剝落瞬間的承載力下降,從而大大提高構件的延性;受彎構件的寬高比對壓區混凝土極限應變的影響不明顯;受彎構件的裂縫間距受箍筋(鉤筋、分佈筋)的布置影響;文中所用的承載力和變形方法是可行的。化爆試驗表明,高強混凝土構件的動載抗彎性能能夠滿足結構的要求。
  17. To help protect computer systems from malicious mobile code, to allow code from unknown origins to run with protection, and to help prevent trusted code from intentionally or accidentally compromising security, the. net framework provides a security mechanism called code access security

    為了幫助保機系統免受惡意移動代碼的危害,讓來源不明的代碼安全運行,止受信任的代碼有意或無意地危害安全, . net framework提供了一種稱為「代碼訪問安全性」的安全機制。
  18. The program teaches students about data protection, computernetwork protocols and vulnerabilities, security, firewallsandforensics, data hiding, and infrastructure andwirelesssecurity. most importantly, officials said, teachers discuss ethicalandlegal considerations in cyber security. its a great course

    據美聯社3月12日報道,根據這項劃,教師向學生講授數據保機網路協議弱點和辯論學火墻信息偽裝網路基礎和無線安全等。
  19. Neutron and gamma - ray cross sections for nuclear radiation protection calculations for nuclear power plants

    核電站核輻射防護計算用的中子和射線截面
  20. Installations for nuclear medicine ; radiation protection calculations

    核醫療設備.射線防護計算
分享友人