防護防復措施 的英文怎麼說

中文拼音 [fángfángcuòshī]
防護防復措施 英文
entrentchment
  • : Ⅰ動詞(防鷥) provide against; defend against; guard against Ⅱ名詞1 (防守; 防禦) defence 2 (堤...
  • : 動詞1. (保護; 保衛) protect; guard; shield 2. (袒護;包庇) be partial to; shield from censure
  • : Ⅰ形容詞1 (重復) repeated; double; duplicate 2 (繁復) complex; compound Ⅱ動詞1 (轉過去或轉過...
  • : 動詞1 (安排; 處置) arrange; manage; handle 2 (籌劃) make plans 3 [書面語] (施行) execute; a...
  • : Ⅰ動詞1 (實行; 施展) execute; carry out 2 (給予) exert; impose 3 (施捨) give; hand out; best...
  • 防護 : protect; shelter; shield; guard; shielding; protection; proofing
  • 措施 : measure; step
  1. Application of mixture - planting of shrub and grass in slope protection and remediation is more propitious to form three - dimensional and multiple vegetation structure than single grass greening, it also produces better effect on stabilization and beautification of the side - slope

    草、灌木混播應用於邊坡與修,較之於單一的草被,更有利於形成立體的、多樣的植被結構,對邊坡的穩定和美化有更好的效果。
  2. The article points out the importance and necessity of the information - security from its actuality in our country. the resources in the information system, for instance, hardware, software, data, document, operator, meterial and so on, are evaluated and gived safety grade firstly. and then, it analyses the menace including the nonauthorized access, the information leak, the refused sevice, the internal objection which the system will take. the following are the corresponding control police : confirm the users " rights and duties, including the mode of using account, the limit of accessing resource, the application of password, the building of backup ; confirm the administrators " right and duties, including physical safety, system configuration, account configuration and usufruct, password management, audit and control, backup and individual intimity ; run - of - mill measure of security defence, including access control, symbol and identification, integrality control, password technique, firewall system, audit and resumption, safety of operating system, safety of database system, defence of computers " virus and resisting - deny protocol. in the end, the article offers the strategies of disposing the safety - accident and analyse after ithow. to report it, how to solve it in phase, and how to avoid it happening again. in a word, the article presents a holistic resolvent about keeping away the information system ' s security, and supplies a essential frame for its configuration, management and application

    然後,對系統可能受到的威脅,包括非授權訪問、信息泄漏、拒絕服務和內部缺陷等進行分析,並提出了相應的控制策略:確定用戶的權力和責任,包括帳戶使用方式、資源訪問權限、口令應用以及建立備份等;確定系統管理員的權力和責任,包括物理安全、系統配置、帳戶設置及使用權限、口令管理、審計和監控、備份以及個人隱私等方面;一般性的安全:存取控制、標識和認證、完整性控制、密碼技術、火墻系統、審計和恢、操作系統安全、數據庫系統安全、計算機病毒和抗抵賴協議等。最後,對事故處理和事後分析提供策略,如何報告安全事故,如何協調解決安全事故,如何避免安全事故再次發生。總之,本文對信息系統安全範工作給出一個整體的解決方案,為其在配置、管理和應用方面提供了基本的框架。
  3. Some particular measures to be taken are as the followings : ( 1 ) to establish a uniform harmony mechanism in the river basin in order to have a general plan for wetland protection and utilization ; ( 2 ) to combine the existing protection districts according to lake drainage area and species distribution, and to construct new wetland protection region in order to solve problems in management districts ; ( 3 ) to develop wetland restoration and reconstruction ; ( 4 ) to carry out reforesting in formerly cultivated land and to construct shelter forest of the yangtze river in order to control soil erosion and to preserve the water resource ; ( 5 ) to protect and utilize reasonably the wetland resources in the middle and lower reaches of the yangtze river ; ( 6 ) to strengthen the research of wetland science

    具體可採取以下:在流域內建立統一協調機制,對流域濕地進行保與合理利用,合理布局,統一規劃;按湖泊流域和物種分佈整合現有保區,建立新的濕地保區,解決目前管理上的制約問題;大力開展濕地修重建;推進退耕還林、長江林等工程建設,發揮森林治理水土流失、涵養水源的作用;在保的前提下科學合理地利用長江中下游濕地資源,開拓新的生產力;同時加強濕地科學研究。
  4. This thesis built the models computing the working frequency over - voltage " operation over - voltage for 220kv fugai transmission line, calculates and analyzes working frequency over - voltage " operation over - voltage using emtp program and provides reasonable protection measures for the transmission line. furthermore, regulations method, traveling wave method and striking distance method are used to study and compare lightning - enduring capabilities of different types of pole in power transmission lines aiming at the fact that the lightning strike switching rate of 220kv fugai line is higher

    本文分別建立了計算220kv蓋線路的工頻電壓升高及操作過電壓的計算模型,利用emtp程序對220kv蓋線路工頻電壓升高、投切空線過電壓、投切空變過電壓、單相故障過電壓進行計算分析,並提出合理的
  5. In this paper at last. the localized anti - collapsing effect of the cave depot of single aircraft under the explosive load is calculated and analyzed. the explosive result shows that 3d ripped steel plate and ribbed shell structure are effective to raise the capacity of anti - collapsing of the protective structures

    對飛機單機掩蔽庫工程在爆炸荷載作用下,抗局部震塌效應進行了計算分析,模擬直接命中的爆炸試驗結果表明:鋼筋混凝土內襯三維波紋鋼板組成拱型合結構,是提高結構抗震塌破壞的一種十分有效的
  6. Article 55 any violator of the provisions of article 19 of this law who fails to follow the planned realigning and leading line to realign river courses and build up construct ion projects for leading the river direction or protecting embankments shall, if the flood control work is affected, be ordered to stop the illegal act, restore to the original state or take other remedies and may be concurrently fined not less than rmb 10, 000 yuan and not more than rmb 100, 000 yuan

    第五十五條違反本法第十九條規定,未按照規劃治導線整治河道和修建控制引導河水流向、保堤岸等工程,影響洪的,責令停止違法行為,恢原狀或者採取其他補救,可以處一萬元以上十萬元以下的罰款。
  7. In case where violation of requirements in the consent document for planning affects flood control but remedies can be taken, the violator shall be ordered to take remedies within a time limit and may be concurrently fined not less than rmb 10, 000 yuan and not more than rmb 100, 000 yuan

    第五十五條違反本法第十九條規定,未按照規劃治導線整治河道和修建控制引導河水流向、保堤岸等工程,影響洪的,責令停止違法行為,恢原狀或者採取其他補救,可以處一萬元以上十萬元以下的罰款。
  8. Side - slope greening is art important measure to ecological remediation and soil and water erosion prevention for artificial side - slopes

    摘要邊坡綠化是對人工開挖建設形成的各種坡面進行生態修以及止水土流失的一項重要
  9. Results show that the selected compound material is a good defense against underwater impact wave and provide a experimental reference for the protective study of underwater blast injury

    結果表明:所選合材料層對水下沖擊波的是顯著的,可明顯減輕水下沖擊傷的傷情,為水下沖擊傷的研究提供了實驗依據。
  10. The interlocking and protection system should have measures that prevent power break down and wrong resume operation

    聯鎖、保系統應有止電源中斷或恢時出現誤動作的
  11. China holds, in view of the complexity of the problems relating to the verification mechanism, that every country should, in a down - to - earth way, seek effective and feasible verification measures, and formulate concrete steps to prevent abuse of verification, and to protect the rightful commercial and security secrets of states parties

    中國認為,鑒于核查機制所涉問題的雜性,各國應以實事求是的態度,探尋有效、可行的核查,並制定具體止濫用核查,保締約國正當的商業和安全機密。
  12. As a precautionary measure during the early resumption period, the afcd might impose extra requirements on selective commercial consignments apart from existing import requirements. these additional measures include sampling and screen testing on arrival before release of the consignments

    發言人補充說,在恢進口初期,除現時入口管制規定外,漁農自然理署可能在雀鳥輸出市場出售前再抽樣檢查,作為額外的預
  13. Particularly four following respect problems of main research of this thesis : first, excavating and optimizing of the road bed and the slope protect, on the basis of influence factor analysis and the slope design principle by the expressway of mountain area of limestone, we excavate the model of optimizing after putting forward the road bed which is suitable for the expressway of mountain area of limestone, through employ this optimize model, we can reduce the amount of road bed excavate, thus maximum reducing slope excavate destruction to environment and pollute ; according to limestone mountain area expressway characteristic of the cutting slope, we use the law of finite element and rmr of revision carry on stability analyze and appraise to their side slope ; combine the limestone rock body characteristic of mountain area, we have analyzed the corresponding side slope safeguard procedures

    論文主要研究了以下四方面問題:第一,路基開挖優化。在分析石灰巖山區環境特徵的基礎上,探討了石灰巖山區路線設計的原則與方法;在應用有限元數值分析方法對邊坡的開挖穩定性進行分析的基礎上,提出了陡開挖強支的石灰巖山區高速公路的路基開挖方式,並建立了填挖平衡,開挖面積最小的石灰巖山區高速公路的路基開挖量優化模型;結合石灰巖山區巖體特性,探討分析了相應的邊坡。第二,土石方處理及自然水系調治恢
  14. According to features of diffcult anti - washing construction of pier foundation under compley hydroraphic, gological, and water potential conditions, combining construction condition methods, author analyze and conclude key points and difficulties of anti - washing construction of the fourth main pier of great sutong bridge, and difficulties in construction and relevant countermeasures

    摘要針對在雜的水文、地質、河勢條件下進行橋墩基礎沖刷工難度大的特點,結合工工藝和方法,對蘇通大橋主橋4號主塔墩沖刷工中的重點難點、工中出現的不利隋況及應對進行了分析研究。
  15. Conclusion the accurate record rinse and drainage situation, assess the patient ' s condition change in time, effective washing the drainage device, and attend to the measure wholly, it is the patient that rescues successfully after washing drainage, one of the key measures of preventive complication from occurring and recovering

    結論準確記錄沖洗及引流情況,及時評估病人的病情變化,有效的沖洗引流裝置,以及整體,是病人沖洗引流術后搶救成功,止並發癥發生和影響康的關鍵之一。
  16. Finally, in our progress toward a resumption of work we require two safeguards against a return of the evils of the old order ; there must be a strict supervision of all banking and credits and investments ; there must be an end to speculation with other people ' s money, and there must be provision for an adequate but sound currency

    最後,在恢工作的進程中我們需要止舊秩序弊端再現的兩項保;必須嚴格監督一切銀行存款、信貸和投資;必須制止利用他人的金錢進行投機活動,必須提供充足而數量合理的貨幣。
  17. Smartlock netpro s mcu smart circuit design provides internal data secure protection. when the data are burnt within the hardware lock, the operator will break mcu s internal fuse ; such secure device can prevent those people with some purposes from duplicating mcu s internal firmware, and allows the protection lock providing with the top - level security

    Smartlock netpro中mcu智能型線路設計,提供有內部數據安全保,當硬體鎖內部數據燒錄動作完成後,工作人員會將mcu內部的保險絲燒斷,這樣的保險裝置,可以止有心人進行mcu內部韌體制的可能性,使保鎖具備最高等級的安全性。
  18. Abstract : this paper provides a deep analysis of three problems ( how to locate leakage in formation, how to intercept and reconstruct the leakage information, realizing the measurement of count er - intercept information leakage of protection of computer information leakag e ( tempest ). it also puts forward detail points of view and measurements, and makes a series of experiments on some coclusions

    文摘:針對目前信息泄漏的前沿- -計算機信息泄漏與( tempest )中的三大問題(如何尋求信息泄漏的部位,如何截取並現泄漏信息,實現反信息竊取的)進行了剖析,提供了作者的見解,指出了可採取的技術,並針對有關結論開展了實驗研究
分享友人