out operator 中文意思是什麼

out operator 解釋
出"運算元
  • out : adv 1 〈位置及運動的方向〉向外,向外部;在外,在外部;出去,出外,離開;離岸,向海面;(船等)開...
  • operator : n 1 操作者,機務員;司機,駕駛員;【軍事】電話兵;【電話】接線員,話務員(=telephone operator)...
  1. Roll over protective structure ( rops ) is a device which installs on out of construction vehicle. the main functions are : when the vehicle rolling over. rops can prevent the vehicle from rolling over further, and reduce the possibility of rolling vehicle injures operator ; when the vehicle traveling on freezing soil. concrete and rock, it has large resist continuous impact ability ; when the vehicle overturning rops can support the whole vehicle. arrangement of falling object protective structure ( fops ) can block objects ( such as trees, rocks ) so that supply protection for operator. this problem is that research rolling over and falling objects protective structure of bulldozer by learning research condition of rops / fops and relative lay down international standard. on the base of theory analysis. detrudes counting formula of rops / fops deformation through founding mechanics analysis model of rops / fops at the stage of elasticity and plastoelastic. and finds a set of feasible nonlinear finite element analysis counting. lt calculates rops / fops plastoelastic deforma variable of 320hp bulldozer, bulldozer has been carried out by optimizing design method

    其主要功能是:當車輛滾翻時, rops能刺入未凍土壤而阻止車輛的進一步滾翻,降低滾翻的車輛對系著安全帶司機軋傷的可能性;保證rops在碰撞和沖擊變形不大的地面(如凍土、混疑土上、巖石)時,能具有相當大的抗連續沖擊能力;當車輛已經處于顛覆狀態時,已經變形的rops應能支撐住整車。落物保護裝置(簡稱fops ) ,其構件的布置方式要能遮蔽墜落的物體(如,樹木、巖石等) ,以便對司機提供適當的保護。本課題主要通過了解國內外有關對rops fops的研究情況和有關國際標準的制定,對大型推土機傾翻和落物保護裝置進行研究,在理論分析的基礎上,通過建立rops fops的力學分析模型,推導彈性、彈塑性階段rops fops變形的計算公式,建立一套可行的rops fops的非線性有限元分析計算方法。
  2. The article points out the importance and necessity of the information - security from its actuality in our country. the resources in the information system, for instance, hardware, software, data, document, operator, meterial and so on, are evaluated and gived safety grade firstly. and then, it analyses the menace including the nonauthorized access, the information leak, the refused sevice, the internal objection which the system will take. the following are the corresponding control police : confirm the users " rights and duties, including the mode of using account, the limit of accessing resource, the application of password, the building of backup ; confirm the administrators " right and duties, including physical safety, system configuration, account configuration and usufruct, password management, audit and control, backup and individual intimity ; run - of - mill measure of security defence, including access control, symbol and identification, integrality control, password technique, firewall system, audit and resumption, safety of operating system, safety of database system, defence of computers " virus and resisting - deny protocol. in the end, the article offers the strategies of disposing the safety - accident and analyse after ithow. to report it, how to solve it in phase, and how to avoid it happening again. in a word, the article presents a holistic resolvent about keeping away the information system ' s security, and supplies a essential frame for its configuration, management and application

    然後,對系統可能受到的威脅,包括非授權訪問、信息泄漏、拒絕服務和內部缺陷等進行分析,並提出了相應的控制策略:確定用戶的權力和責任,包括帳戶使用方式、資源訪問權限、口令應用以及建立備份等;確定系統管理員的權力和責任,包括物理安全、系統配置、帳戶設置及使用權限、口令管理、審計和監控、備份以及個人隱私等方面;一般性的安全防護措施:存取控制、標識和認證、完整性控制、密碼技術、防火墻系統、審計和恢復、操作系統安全、數據庫系統安全、計算機病毒防護和抗抵賴協議等。最後,對事故處理和事後分析提供策略,如何報告安全事故,如何協調解決安全事故,如何避免安全事故再次發生。總之,本文對信息系統安全防範工作給出一個整體的解決方案,為其在配置、管理和應用方面提供了基本的框架。
  3. The radio operator sent ( out ) an appeal for help to headquarters

    無線電報務員向司令部發出求救信號
  4. The operator should use the solder paste quickly after it has been taken out

    取出的錫膏要盡快實施印刷使用。
  5. Now he's turned out to be a terrific operator.

    而現在,居然變成了一個了不起的經理人才。
  6. Bank teller operator : it can check in and check out the teller and indicate the queue ; it can call and recall the number, prioritize a number, give up a number, transfer service and suspend window scrvice

    櫃員操作器:可實現員工登錄退出有人排隊提示可按鍵實現排隊號碼呼叫重呼優先呼叫棄號業務轉移暫停窗口服務等功能。
  7. Ought to point out, operator provider is tasted or the service has fraudulent action, answer to increase the loss that recoups its to get according to the requirement of consumer, the cost that raises compensatory amount to buy goods for consumer perhaps accepts one times of the charge of the service

    應當指出,經營者提供商品或者服務有欺詐行為的,應按照消費者的要求增加賠償其受到的損失,增加賠償的金額為消費者購買商品的價款或者接受服務的費用的一倍。
  8. A retired senior police constable was sentenced to six months imprisonment, suspended for three years, for posing as a serving policeman to cheat a gambling den operator out of 8, 500

    一名退休高級警員假扮現役警長,訛稱可向一個非法賭檔提供保護,騙取檔主共八千五百元,被判入獄六個月,緩刑三年。
  9. When you do not want to be disturb, please hang out this card on the knob, you can also inform the operator not to contact any call to your room

    當您需謝絕探訪及不被打擾時,請將「請勿打擾」牌掛在門把手上,並通知接線生不要把接轉電話到客房。
  10. Thereisnoanother operator quite like china mobile around the world, which not only owns the biggest mobile network and has the most mobile users in the globe, but is capable of achieving growth year in and year out

    放眼全球,沒有哪一家能像中國移動這樣,不僅擁有全球最大的移動,擁有全球最多的移動用戶,而且連續多年業績增長不菲。
  11. Article 23 a business operator which bears responsibility for guaranteed repair, replacement and return or other liability in accordance with state regulations or an agreement with a consumer in providing a commodity or a service must carry out such responsibilities in accordance with state regulations or the agreement and shall not be permitted to deliberately procrastinate or refuse to do so without reason

    第二十三條經營者提供商品或者服務,按照國家規定或者與消費者的約定,承擔包修、包換、包退或者其他責任的,應當按照國家規定或者約定履行,不得故意拖延或者無理拒絕。
  12. Uk gym operator la fitness was reprimanded for stressing out would - be customers with leaflets that looked like parking tickets

    英國健身業者la健身因其廣告傳單神似停車違規罰單、令潛在顧客感到困擾,而遭到斥責。
  13. A process which produces a new function out of any given function is called an operator.

    從一個已知函數產生另一個新函數的過程叫做運算元。
  14. In market economy system, this deficiency in credit management has clearly emerged as a series of problems : outstanding payment, repudiated debt, out - of - control internal management, back stage deal between operator and customer, and staying high receivables. all these credit problems have become the bottleneck for the enterprises " development

    進入市場經濟體制后,我國企業在信用管理上的欠缺就明顯地顯現出來,企業間相互拖欠、賴賬不還、內部管理失控、業務員與客戶內外勾結、應收賬款居高不下等現象愈演愈烈,信用問題已成為制約企業發展的瓶頸。
  15. In three part we study the ergodicty for k - regularized resolvent operator families including the mean ergodicty, abel - ergodicity and cesaro - ergodicity. we prove the mean ergodic theorems of k - regularized resolvent operator families. and we give out the definition of abel - ergodicity and cesaro - ergodicity for k - regularized resolvent operator families. moreover, we give the relationship between the two kinds of ergodicity and their basic properties

    我們證明了k -正則預解運算元族的平均遍歷定理。給出了k -正則預解運算元族的abel遍歷性和ces ro遍歷性的定義,並證明了它們的相互關系和一些基本性質。
  16. Miss [ whited out ] was again handed the gun, which she refused ( in an awakened state ) to pick up or accept from the operator

    小姐再次交出了槍,當她拒絕(在清醒的狀態下)拿槍或接受操作者的命令時。
  17. This week witnessed the biggest private - equity offer in history, a buy - out of bce, a canadian telecoms operator, that would be worth a total of $ 48. 5 billion

    本周,加拿大電信運營商bce的並購案成了私募股權史上規模最大的一宗,該案總值可達485億美元。
  18. In the application of pmos - 2000 system, the author carried out a hybrid encryption protocol with is suitable for information security transmission in electricity market with des, rsa and md5. with the pattern characteristics of pmos - 2000 power market operator system, and analyzed and compared with other encryption system, the author puts forward an implementing method, operational process and system structure of information encryption technology used in pmos - 2000, and the operating effects and projects which need further research and discussion were finally given. the research of this dissertation applied information security technology in power system project, which made it possible for information security transmission

    在pmos ? 2000系統的應用中,作者利用des對稱加密演算法、 rsa非對稱加密演算法、 md5數字簽名演算法實現了一套適合電力市場信息安全傳輸的混合加密體制,結合了pmos ? 2000發電市場技術支持系統的模式特點,通過與別的加密體制的分析比較,把混合加密體制應用於pmos ? 2000系統之上,並提出了這套加密系統在pmos ? 2000電力市場技術支持系統中的實現方法、運作過程和系統體系結構,最後給出了它的運行效果以及進一步可研究和探討的方案。
  19. The telephone operator said to the caller : " hello, the number you wanted is ringing out now.

    電話接線員對打電話的人說: 「喂,你要的那個號碼現在振鈴了。 」
  20. In order to find out a novel fuzzy inference algorithm being superior to cr1 algorithm and a novel fuzzy neural network, the author deduces nine kind of triple i algorithms by nine fuzzy operators. further more, the author compares these algorithms with the ordinary intuitional rules respectively and gives a conclusion that rl - type triple i algorithm is rather more closely to the intuitional rules. because fuzzy neural networks require the conditions of continuous and differential on membership functions of fuzzy sets and fuzzy operators of fuzzy inference, by means of comparison study, the author obtains a conclusion that the fuzzy neural networks with production operator and cr1 inference algorithm are very fit to study the problem of control

    為了找出優于cri演算法的模糊推理方法和新型模糊神經網路,本文首先對常用九種模糊運算元給出了具體三i演算法,並從模糊推理的另一個方面,考察了各種演算法對日常直觀模糊推理規則的貼近程度,得出「 r _ l型三i演算法貼近日常直觀推理規則」這一結論;同時,考慮到模糊神經網路要求「網路輸出保持對模糊運算元和隸屬函數連續性、可微性」這一特性,通過比較研究,得出利用乘積運算元和cri推理的模糊神經網路最適合控制問題。
分享友人