最後安全期 的英文怎麼說

中文拼音 [zuìhòuānquán]
最後安全期 英文
last safe date
  • : 副詞(表示某種屬性超過所有同類的人或事物) most; best; worst; first; very; least; above all; -est
  • : Ⅰ形容詞1 (完備; 齊全) complete 2 (整個) whole; entire; full; total Ⅱ副詞(完全; 都) entirely...
  • : 期名詞[書面語]1. (一周年) a full year; anniversary 2. (一整月) a full month
  • 最後 : last; final; ultimate
  1. By the means of integration of theory with practice, the way how the dangerous weather factors affect the flight safety and the way to deal with have also been analyzed. at last, this thesis analyzed the flight accident at wuhan on 22nd, june, 2000. with synoptic chart, code, satellite nephogram, and radar chart, this thesis explained how the dangerous weather affects the aviation flight safety

    文章,採用系統分析方法,對2000年6月22日武漢空難事故產生的天氣因素進行了綜合分析,通過對事故發生間的天氣圖、電碼、衛星雲圖和雷達圖進行系統分析,指出了造成這次事故存在的危險天氣種類,它們的演變過程,對飛行的影響。
  2. In the thesis, the strategy for china to develop the hydrogen energy system about fuel cell vehicles is analyzed firstly. then a case in beijing is studied, which is based on an imaginary but possible fcb ( fuel cell bus ) project in beijing, 2008. in the case, 11 feasible plans of hydrogen energy systems about fuel cell vehicles are evaluated from all the aspects of energy, environment and economy with lca ( life cycle assessment )

    論文首先從宏觀角度分析我國應該採取的燃料電池汽車氫能系統發展戰略;然從微觀角度運用生命周評價方法對一個假想的,卻極有可能在未來實施的燃料電池汽車氫能系統案例的所有可行方案從能源、環境和經濟三方面進行評價,選出優方案並討論改進方向;對燃料電池汽車氫能系統的性進行評價並總結現有工作中存在的問題,展望氫能系統評價的發展方向。
  3. Speaker : the resulting action, known now by all the world, has marked sunday. september the third, 1939, as a date to be long remembered. at eleven - fifteen this morning the prime minster, speaking to the nation from number ten downing street, announced that great britain is at war with germany. meanwhil the london public are earnestly reminded of the emergency orders already issued. no light of any descrption should be visible after blackout time. no dogs or cats will be allowed to roam the streets after dark and it should be remembered that pets will not be permitted in public air raid shelters. gas masks and warm clothing should be placed at hand before retiring and it is suggested that a warm drink in a thermos would be of great comfort to small children who might have to be awakened at an unusual hour. every effort should be made to quiet the nerves of those children who still remain in london despite the evacuation which will continre until a late hour this evening

    揚聲器:現在世界都知道了,一會的決議標志著1939年9月3日星日將成為一個永遠值得紀念的日子,今天上午11點15分,首相在唐寧街10號向國宣布英國對德國宣戰,在次我們提醒倫敦市民認真遵守已發布的緊急狀態命令:在燈火管制時間里不得有任何燈光,天黑以不得有狗貓在街上游蕩.並且切記在公共防空洞里不得有寵物.睡覺前應將防毒面具和于寒衣物放在順手的地方,我們建議暖瓶中都沖好熱水或飲料,這對定在非常?不得不被叫醒的兒童非常有溢.應該盡量穩定那些仍留在倫敦的兒童的情緒.疏散工作將繼續進行.直到深夜
  4. Carletonville, south africa ( ap ) - - singing and dancing despite exhaustion, the last of 3, 200 miners trapped deep underground for more than a day emerged safely thursday night, delivering a happy ending but raising questions about the safety of south africa ' s important gold mines

    南非卡拉托威爾(美聯社) ? ?星四晚深陷地下一天多的3200名礦工中的一批人脫險,他們不顧極度疲勞載歌載舞,陶醉於皆大歡喜的結局,但南非重要金礦的問題也隨之而來。
  5. On the basis of robert solow " s economics development model ( " the rest value method " ), the paper has studied and analyzed the interrelation between technical improvements and gdp of p. r. c, shaanxi province and xi ' an city in the year of 1985 ? 000. as well as the interrelation between fdi and gdp, that among fdi, technical improvements and technical level of p. r. c and xi ' an city in the same period. in the end, the paper put forward some proposal

    本文採用諾貝爾經濟學獎獲得者、美國經濟學家r ?索洛的經濟增長模型( 「余值法」 )測算了1985 ? 2000年間國、陜西省和西市技術進步與經濟增長( gdp )之間的關系,並進行了綜合分析;從定量和定性兩方面分析了國和西市同的外商直接投資( fdi )與國內生產總值( gdp )之間的關系、國和西市fdi與技術進步和技術水平之間的關系等問題;根據測算結果,提出了政策建議。
  6. The slope geometry is variable quantities, and the reliable safety and reliability are main limiting factors. according to the above factors, a optimized model for designing high loess slope is established. this model ' s concept is precise, and its physical meaning is confirm, people who do designing work can see this model as a means

    ,為了使邊坡設計獲得佳工程效果,本文在崔政權建立的優化公式: c = a + pf ? b的基礎上,面考慮施工造價和風險造價,運用數學原理和優化理論,用費用?效益分析方法,以小總望造價為目標函數;以坡型、坡比為設計變量,以可靠為主要約束條件,建立了黃土高邊坡的優化模型。
  7. This paper deeply analyzed the principal safety accidents and itsreasons which are prone to happen at high - mechanized construction sites. the proposals on management of construction machine safety are presented based on the projects construction stages as follows : the beginning of construction, during the construction and after completion of the constraction

    文章具體分析了建設施工機械化程度較高的施工現場容易潛伏發生的主要事故及其原因,參照有關機械化施工方法和建設機械的管理方式,提出在建設工程施工任務開始時、施工間、任務完成如何做好建設機械的管理的建議。
  8. This program was implemented bi - yearly aiming at presenting our sincere thanks to all volunteers and agencies that had provided service to our students and elderly through the delivery of the long service awards, certificates of appreciation and souvenirs to them. during the function, interesting performances were presented by our students and elderly and had won the applause of all participants. we also arranged all volunteers to tour around the agency to let them have a close look at different service sections so that they may choose to join more service according to their interest

    為了表彰及答謝義工朋友為本院各部門服務之熱誠和努力,當日除了頒發長服務獎嘉許狀及紀念品外,我們更排了學生及長者院友表演節目,精彩之處博得埸掌聲,排義工朋友分組到各服務部門參觀,了解各服務之運作及所需義工服務內容,使義工們可互相交流或按照興趣再考慮選擇加入其他服務,整個活動為時三小時,約下午五時許于愉快的氣氛下結束。
  9. The security of the algorithm is analyzed from the randomness, linear complexity of the chaotic sequence and the intensity of initial key. the results show the randomness of the key sequence pass the frequency test, sequential test, poker test, autocorrelation test, runs test, etc. and the total level is better than the binary sequence generated by the prng of delphi 7. 0, logistic chaotic system and rc4, the linear complexity comes up to the expectation, the initial key has very strong intensity

    本文從混沌序列的隨機性、線性復雜度和初始密鑰的強度三個方面對演算法進行了性分析,結果表明演算法產生的密鑰序列的隨機性完通過了頻數檢驗、序列檢驗、撲克檢驗、自相關檢驗和遊程檢驗等5種統計檢驗方法的檢驗,而且整體水平要好於delphi7 . 0中的偽隨機數發生器、 logistic混沌系統和rc4三種方法產生的二進制序列,線性復雜度達到了數學望值。
  10. The research paper is based on the the latest softwares of the managing inventory, its research subject is about simulating the most appropriate inventory quantity and ordering quantity by statisticing the probability of the random require quantity. its purpose is to provide the relied basement for determining the most appropriate inventory quantity and ordering quantity, the deterring policy quality will be raised, so the damage caused by unfit inventory quantity and the benefit of the entrerpreneur will be raised. the research method is by building the inventory management information system, the system includes automated management of parts entering and going out the datasbase. requesting the records of parts entering and going out the datasbase and displaying the sygonal when the inventory quantity is short out. computer calculating the fix period remaining, requesting remaining at any time and displaying if goods need ordering, all the partsof certain a product going out of basement and at the same time checking if the storaging quantity is enough. then simulating the most appropriate inventory quantity and ordering quantity simulating method is as follows : statisticing the random required quantity. calculating the probability, standing for the values with data range producing random data by function accordingly calculating the random required quantity. thenext step is simulating all the projects after pressing in the simulating conditions. finally selecting the best

    本文通過分析國內外關于庫存管理軟體的發展情況,提出在線統計貨物出庫情況的基礎上利用模擬方法確定優存儲方案,其目的是為制定合理的貨物庫存量和訂貨量提供可靠的依據,提高企業管理人員的決策質量,從而減小資金的佔用和缺貨損失,提高企業的經濟效益。通過研製庫存管理信息系統使庫存信息管理自動化,也就是實現貨物入出庫管理計算機管理、自動查詢貨物入出庫情況並在缺貨時給予提示、使用計算機貨物余額定結算、貨物余額實時查詢並顯示是否需要訂貨、裝配出庫管理使得只要輸入需要裝配產品代號和數量,組成它的所有零件就會自動檢庫和出庫。然庫存量和訂貨量進行模擬,模擬方法是首先自動統計貨物在過去某一段時間內的需求量,計算出概率,用隨機數的范圍表示其概率數值的大小,利用隨機函數產生隨機數、從而間接的產生隨機需求量,給定模擬天數和其他模擬條件模擬各種方案,從眾多的存儲方案中找出優存儲方案。
  11. The implementation of operational security was illustrated by the practice of personal operations, public operations and bank certificates operations, etc. under the endeavors of the author and other colleagues, through the using of call center system as the operation working platform and the website www. 95599bj. com. cn as the main accessing net station for clients, e - banking system of beijing agriculture bank has successively developed such services as finance information, introduction for financial products, enterprise and personal finance operation disposals, bank certificates operations, funds, long - term trade for foreign exchange, internet electricity purchasing, capital checking bulletins for administration for industry and commerce, integrated financing cards, the opening of all the above services has built up a favorable image for our bank

    目前,北京農行網上銀行系統以已經投產的callcenter系統為業務處理平臺,以我行www . 95599bj . com . cn站點為對外客戶訪問的主網站,相繼開通了金融信息、金融產品知識介紹、企業和個人金融業務處理、銀證通業務、基金、外匯買賣遠交易、網上購電、工商局驗資公示、綜合理財卡等服務,為我行樹立了良好形象。,本文提出了網上銀行系統業務的不足之處,提出了學習信息的收獲及我國網上銀行業務發展對策。
  12. This thesis based on the task study deals with design and realization of cc criteria security risk assessment system first presents the concepts and statuses of information security and risk assessment. it then expounds risk assessment ' s two main parts, criteria and process & methods. and it discusses deeply in the theory research results of the task prophase include cc criteria and cc evaluation process & methods, especially in cc ' s main idea, the applications of cc, work of the three phases in cc evaluation process and the applications of the cem documents together with cc in evaluation phase used in this security risk assessment system

    本文以基於cc標準的風險評估系統的設計和開發課題為背景,首先對信息及風險評估的相關概念及現狀做了介紹,其次詳細的闡述了風險評估概念及兩個重要組成? ?標準體系以及評估的過程和方法,然總結了評估系統在設計時所涉及到的課題前理論研究成果包括cc評估標準以及cc評估過程和方法等內容,特別是對cc標準的核心思想、 cc標準的具體應用、 cc評估過程三個階段的工作以及cc標準的伴隨文檔cem作為評估方法依據在執行評估階段的具體應用等方面做了深入研究和詳細論述,並指出這些理論依據當前存在的不足,本文以前面的理論研究成果為依據,闡述了cc評估系統的組成部分以及總體的設計方案,並對已完成的實現部分做了介紹。
  13. In the last part, the situation of the application of ec is outlined, and the facts that impeded the development of ec are presented : the imbalance of supply and demand with regard to the infrastructure of network, the lackey of confidence of consumer and firms on ec because of the lackey of credit in economy life, and the difficulties of how to adapt to and protect the new product style of ec by state legal system. we pointed out that, several aspects, such as fiscal tax revenue, law and enactments, the safety of information, admission of market, the perspectives of information, and technolocrats, will persistently impeded the development of ec. in china, the application of ec should be dominated by firms and conducted by government, which should as soon as possible enact the relative law regarding to taxation, electronic paying, digital signature, certification authority, intellectual property on web, etc. the national physical distribution system, the financial monitory system, the system of credit of firms as well as consumers should be completed

    一個部分,文章簡述了我國電子商務應用的現狀,用博弈論方法分析了制約我國電子商務應用發展的幾個主要原因:網路基礎設施的供需失衡、經濟生活中的信用意識缺乏導致的消費者和企業對電子商務應用中的普遍的不信任及國家法律制度如何適應和保護電子商務這種新的生產方式等,並指出,財政稅收、法律法規、信息、市場準入、信息觀念、技術人才等幾個方面的問題將是長阻礙電子商務發展的因素,電子商務在我國的應用要走企業為主體、政府引導的路子,政府應盡快制定有關稅收、電子支付、電子簽名、身份認證、網上知識產權等方面的法律法規,建立覆蓋國的現代化物流配送體系,健和完善金融監管體系,特別是企業信用體系和消費者信用體系的建設,大力推進企業信息化建設,創造發展環境,完善保障機制,加快人才培養。
  14. The article breaks the traditional theory and clarifies the legal effect of agency by estoppel. the article expounds the legislative status quo and problems of system of agency by estoppel of china and analyses the rationality of the relevant legal provisions and judicial explanations in detail. at last, the article inquires into the legislative defect and developing tendency from the macroscopic and microcosmic angles in order to realize the aim of system of agency by estoppel - safeguarding the safet y of transactions and supporting transactions, perfect the legal system of agency by estoppel of china

    文章突破傳統理論闡明表見代理的法律效果,論述我國表見代理制度的立法現狀和存在的問題,對有關法律規定和司法解釋的合理性作了詳細的分析,從微觀和宏觀兩個角度探討立法缺陷及發展趨勢,以有利於實現表見代理制度宗旨? ?維護社會交易和鼓勵交易,完善我國表見代理制度的法律體系。
  15. I am a physician ~ your circumstance explains you were not pregnant had better be in after ~ safety period, had better be to contain ability of contraceptive measure ~ to make ~ of no risk at all must not of carelessness ~ endure hardships is a woman

    我是個內科醫生~你的情況說明你沒有懷孕~以好在好是帶有避孕措施~才能作到萬無一失~千萬不要大意~受罪的是女人
  16. Charlie flew 75 combat missions over vietnam before a ground - to - air missile hit his plane and blew it up. but he ejected, landed safely, and would spend six years as a vietnam prisoner of war. after the war, charlie returned home

    在越戰間,他參加了七十五次飛行任務,他的戰機被敵軍防空炮火擊落,但他及時從機上彈射而出,並著地,被囚禁了六年。
  17. And then, the writer focuses on analyzing the four kinds of current female crimes and their features. after that, the causes of current female crime will be dissected deeply in the traditional angles of social group 、 social culture and social change on the level of theory. at last, according to the commonly regularity of female crime in the process of modernization, the writer makes a thorough inquiry into the trends of future china ' s female crime and tries setting up the social control system and relief valve mechanism for it

    本文以回顧國內外女性犯罪研究的歷史為起點,提出重構女性犯罪社會學研究的理論主張;然轉入描述轉型中國女性犯罪的現狀並揭示其在當前表現出的特點,並且重點分析了當前女性犯罪的四種類型及其特徵;隨后在理論層面從社會群體、社會變遷和社會文化三個社會學傳統研究領域對女性犯罪的原因進行深入剖析;,基於現代化進程中女性犯罪的一般規律,探尋我國未來女性犯罪的變化趨勢,同時構築女性犯罪的社會控制體系和建立女性犯罪的社會閥機制。
  18. After simply compared the two refonning schemes of connecting the cscs of gehp to the cscs of tgcdc from technology and economy, this paper selected a reforming scheme which is most safety and economic for implementation and reforming, and meets the desire of no operator on duty operation mode and is appropriate to the desire of operation management mode that is on active service

    論文對二江電廠計算機監控系統接入三峽梯調監控系統的兩套改造方案進行了簡單的技術經濟比較,優選出了滿足無人值班要求、適應現行運行值班管重慶大學碩士學位論文中女摘要理模式運作要求、實施系統接入和改造、經濟的方案。
  19. At last, a practical examination is executed on each functional module of the router with a result that is consistent with the designing target

    本文還對路由器及ip層的各功能模塊做了實際測試,並取得了與設計預相符的結果。
  20. At first, some basic knowledge in stream cipher and cellular automata has been introduced ; second, properties of one kind of cellular automata such as its periodicity, its topologies and the connection between its states have been deeply researched ; third, the algorithms base on cellular automata and their security have been discussed ; finally, i have implemented one simple cellular automata and one simple linear feedback shift register, and have analyzed the advantage and the disadvantage of cellular automata

    文章首先介紹了序列密碼及細胞自動機的相關知識;然對一類簡單的加法細胞自動機的周性、拓撲結構以及各狀態之間的相互關系進行了研究;對利用細胞自動機構造序列密碼和分組密碼的方式及其性進行了研究;實現了一類簡單的ca和lfsr ,分析了細胞自動機在硬體實現上的優點。
分享友人