read procedure 中文意思是什麼

read procedure 解釋
讀出過程
  • read : vt 1 閱讀,朗讀,誦讀;【議會】宣讀(議案);照譜唱[奏] (aloud out off)。2 辨讀,辨認(暗號等)...
  • procedure : n. 1. 工序,過程,步驟。2. 程序,手續;方法;訴訟程序;(議會的)議事程序。3. 行為,行動,傳統的做法;(外交、軍隊等的)禮儀,禮節。4. 〈罕用語〉進行。
  1. Abstract : a technical solution for the multi - channel random data stream by tsr receiving programming is presented. details about resident interrupt receiving, data buffer setup, data segment address keeping, buffer read / write operation and program resident / unresident are described , and information process programming with advanced language is discussed. the application of this technique in the control system for the automatic burdening of a cement production line is given. the debugging method and procedure is introduced. source program written in advanced language, include data buffer access and calling are listed

    文摘:給出了一種「多通道隨機數據流的中斷駐留接收技術方案」 ,詳細描述了內存駐留中斷接收、開設數據緩沖區、數據段地址保存、駐留/解除和數據緩沖區讀取,討論了高級語言程序信息處理,舉出了該技術方案在「水泥生產線微機全自動配料測控系統」中應用的實例,介紹了調試方法和步驟,給出了高級語言讀取數據緩沖區數據及調用源程序。
  2. Article 176 in a case of private prosecution that is tried through summary procedure, after the bill of prosecution is read out, the defendant and his defenders may, with the permission of the judges, debate with the private prosecutor and his agents ad litem

    第一百七十六條適用簡易程序審理自訴案件,宣讀起訴書后,經審判人員許可,被告人及其辯護人可以同自訴人及其訴訟代理人互相辯論。
  3. Procedure write only, or both read - write

    過程(只寫)或同時有兩個過程(讀寫)
  4. A lot of papers about the report of probabilistic risk assessment of daya bay npp and system manuals has been read by the author and let as the basis. in this paper, based on the reliability analysis methods of failure mode and effect analysis and failure tree analysis, according to the result of event tree analysis of probabilistic risk assessment report of daya bay npp, the top events of the fault trees of reactor protection system and the success criteria were established. by using risk - spectrum procedure, the unavailability and the minimal cut - sets ( mcs ) of the fault trees were obtained

    本文在閱讀了大量的大亞灣核電站pra報告和各種系統手冊等資料的基礎上,採用fmea (故障模式和影響分析)和fta (故障樹分析)可靠性分析方法,依據大亞灣核電站pra事件樹分析的結果,建立了以緊急停堆失效和專設安全設施驅動失效為頂事件的故障樹,利用risk - spectrum程序,對所建的故障樹進行定量分析,計算,得到系統故障樹的失效概率和最小割集,從而為大亞灣核電站可視化風險分析軟體提供數據支持。
  5. Theoretic read a book ; every working procedure must be familiar with in practice. the demand that presses controller goes business accounting. very academic

    理論上看書;實踐中必須熟悉每道工序。按治理者的要求去核算。很好學。
  6. Ability to read and understand documents such as safety rules, operating and maintenance instructions, and procedure manuals, test procedure, etc

    能夠閱讀和理解相關文件如安全規則、操作和維護指導、操作手冊、測試程序等。
  7. 1 sub - section 4. 9 shall be read in conjunction with sub - section 4. 8 above ; i. e. the ranking procedure shall first be completed before sub - section 4. 9 is applied

    第4 . 9條應與第4 . 8條共同釋讀;即應先完成排名程序才適用第4 . 9條。
  8. So, you ve read the chapter in your favorite java book on enterprise javabeans technology, and you ve knocked out a quick helloworld bean, followed the recommended deployment procedure, and published it

    您已經在自己所鐘愛的java書籍中讀過了關于企業javabean技術的那一章,也已經練習過了簡單的helloworld bean ,並遵循所建議的部署過程發布了它。
  9. Using the procedure described in step 7. change the ntfs security settings on the tutorial. udl file to allow read access by the

    按照第7步中描述的過程,更改tutorial . udl文件的ntfs安全設置,以允許
  10. If a batch or stored procedure contains multiple statements, then a forward - only read - only client cursor must be used

    如果批處理或存儲過程包含多條語句,則必須使用只進只讀的客戶端游標。
  11. We deeply studied the requirement of the security email and the procedure of the transportation of emails over the network, and give out during the period that we worked on this subject, we first studied the status of the current internet email system and the requirement of security email in detail, then studied every period that the emails exist on the internet, the threats facing them, and the imaginable applications of the security email in real life. we have read many materials those relate to the security of information transporting on the internet, and we have refer to many network information security modules and experiences of the other email service providers. based on all of these, we give out a whole solution from the client side to the server side, we not only provide the confidential service for the email users, but also provide the signature, anti - deny and anti - impose security services

    在課題開發的過程中,我們首先深入詳細地調研了整個郵件系統的現狀以及對郵件安全的需求,然後從網路信息安全的角度,對郵件傳輸的各個環節、每個環節所面臨的安全隱患、以及安全郵件在現實生活中可能的應用進行了深入的研究,我們先後查閱了與網路信息安全郵件相關的大量文獻,參考了許多現有的網路信息安全模型,並且參照了現有其它郵件服務提供商的web安全郵件的一些安全做法,分析了它們系統的優缺點;在此基礎上,結合中國的實際情況,我們提出了web安全郵件系統的從客戶端到服務器端完整的解決方案,方案中不僅為用戶提供了郵件保密性服務,還提供了郵件簽名,防抵賴,防篡改等安全業務,滿足了人們對郵件安全的迫切需要。
  12. This extended stored procedure is used to read from the registry

    這個擴展過程可以度曲注冊表特定的鍵里特定的值。
  13. They then showed him many tools used for cutting, sawing, and slicing a person before putting him into the pot to cook. they explained the complicated procedure step by step, about what would be done to his body, which part would be deep - fried, which part sauteed, and how many times he would have to go through it. they read a whole big menu, which made his hair stand on end

    還給他看很多工具,要割要鋸要切,才能夠煎,然後丟進去炒,他們說還有很多方法,在那邊描述給他聽,對他的身體應該怎麼做,哪一個部份煎,然後炒在哪裡,炒多少百次這樣子,他們弄一個很大的菜單給他聽,他在那邊雞皮疙瘩頭發都豎起來,說:喔呼呼!
分享友人