標識決定 的英文怎麼說

中文拼音 [biāozhìjuédìng]
標識決定 英文
decision marking
  • : Ⅰ名詞1 [書面語] (樹梢) treetop; the tip of a tree2 (枝節或表面) symptom; outside appearance; ...
  • : 識Ⅰ動詞[書面語] (記) remember; commit to memory Ⅱ名詞1. [書面語] (記號) mark; sign 2. (姓氏) a surname
  • : Ⅰ動詞1 (作出主張; 決定) decide; determine 2 (執行死刑; 殺死) execute a person 3 (裂開; 斷開...
  • : Ⅰ形容詞1 (平靜; 穩定) calm; stable 2 (已經確定的; 不改變的) fixed; settled; established Ⅱ動詞...
  • 標識 : [物理學] characteristic; identification; identifying標識碼 identification code; 標識位置 home position
  1. Knowledge is resource, capital and wealth in the values of knowledge to society ; the values of knowledge to human cover that the development of human is not decided by knowledge, but is allodium on the intercourse with knowledge, and that not only is the value of knowledge to human utilitarian, but also knowledge promotes free development of human ' s spirit

    一是知社會價值觀:知是資源、資本、財富;二是知人本價值觀:在知與人的關繫上,人與知的關系不是機械的關系,而是人與知的交往中按自己的方式尋求預的目。知在與人相遇時,人的需要和價值上升為根本性的依據,而不是相反。
  2. The article points out the importance and necessity of the information - security from its actuality in our country. the resources in the information system, for instance, hardware, software, data, document, operator, meterial and so on, are evaluated and gived safety grade firstly. and then, it analyses the menace including the nonauthorized access, the information leak, the refused sevice, the internal objection which the system will take. the following are the corresponding control police : confirm the users " rights and duties, including the mode of using account, the limit of accessing resource, the application of password, the building of backup ; confirm the administrators " right and duties, including physical safety, system configuration, account configuration and usufruct, password management, audit and control, backup and individual intimity ; run - of - mill measure of security defence, including access control, symbol and identification, integrality control, password technique, firewall system, audit and resumption, safety of operating system, safety of database system, defence of computers " virus and resisting - deny protocol. in the end, the article offers the strategies of disposing the safety - accident and analyse after ithow. to report it, how to solve it in phase, and how to avoid it happening again. in a word, the article presents a holistic resolvent about keeping away the information system ' s security, and supplies a essential frame for its configuration, management and application

    然後,對系統可能受到的威脅,包括非授權訪問、信息泄漏、拒絕服務和內部缺陷等進行分析,並提出了相應的控制策略:確用戶的權力和責任,包括帳戶使用方式、資源訪問權限、口令應用以及建立備份等;確系統管理員的權力和責任,包括物理安全、系統配置、帳戶設置及使用權限、口令管理、審計和監控、備份以及個人隱私等方面;一般性的安全防護措施:存取控制、和認證、完整性控制、密碼技術、防火墻系統、審計和恢復、操作系統安全、數據庫系統安全、計算機病毒防護和抗抵賴協議等。最後,對事故處理和事後分析提供策略,如何報告安全事故,如何協調解安全事故,如何避免安全事故再次發生。總之,本文對信息系統安全防範工作給出一個整體的解方案,為其在配置、管理和應用方面提供了基本的框架。
  3. On the base of unification of history and logic, this dissertation aim to illustrate the science value of historical institutionalism in political science on the standpoint of the developing of political science. the postulation of this dissertation is that political science is a special social science. this particularity decides that the standard about the knowledge of political science is the unification of practice and technicality

    本論文在歷史與邏輯相統一的方法論指導下的一個基本理論預設是,政治科學是一門特殊的科學,政治科學的這種特殊性了,衡量政治科學知體系的有效性時有著獨特的準,即政治科學的實踐性和學術性的統一。
  4. Firstly, by analyzing the shortcoming of the traditional methods, the paper sets up a new model which can be used to calculate the optimum assignment of fire power for heavy artillery weapons. secondly, using the model to study and calculate the optimum assignment of fire power for heavy artillery weapons and for ship - loaded heavy artillery guns at area targets. in the paper the software that can be used to evaluate the optimum assignment of fire power for heavy artillery weapons is set up

    本文從研究傳統最優火力分配模型的不足入手,應用高等數學、軍事運籌學以及炮兵射擊理論等知研究建立最優火力分配數學模型,爾后應用該模型研究對小幅員目和幅員目的最優火力分配問題:研究計算機最優火力分配的方法和軟體編制;研究船載炮射擊時的最優火力分配模型及模型應用問題,得出了一些有益的結論。
  5. All the connected units in the page are detected by search algorithm of connected region. the row - column mergence of the character is defined by fuzzy connectedness of the connected units at four orientations. the combination of punctuation we adopt the method of combination behind recognition due to great effect of mergence

    版面圖文分割主要採用自底向上的辦法,利用連通域搜索演算法檢測出文本頁面上的所有連通基元,通過對連通基元的四個方向上的連接度進行模糊化處理來文字行、列的合併,並對在文字行合併時影響較大的點符號採用先別后合併的方法。
  6. This article suggested : successful bid is determinated by the contractor ' s proportion of comparative advantage during tender, and we should keep hold of the dynamic comparative advantage theory. in order to create comparative advantage and keep up incincible position in ripening industry, we should without cease technology and supervise innovation upon intense market competition

    本文認為:建築項目中是由承包商在投中的比較優勢大小的,要把握比較優勢論的動態性,成熟行業應不斷技術和管理創新,才能有意地去創造出動態的比較優勢,並在激烈的市場競爭中立於不敗之地。
  7. In the same manner as air cargo shipments, clearance of rfid - tagged container could be processed prior to its arrival at a customs checkpoint. by examining the customs clearance history of the container and being satisfied that the integrity of the container has not been compromised in transit, local customs checkpoints could decide to let the container pass without stopping

    就像處理空運貨物的清關程序般,附有射頻簽的貨櫃在其抵達海關檢查站前已可進行清關手續,透過查閱貨櫃的海關清關記錄及確貨櫃在運輸過程中完整無損后,當地海關檢查站便可讓貨櫃不停站地通過。
  8. By examining the customs clearance history of the container and being satisfied that the integrity of the container has not been compromised in transit, local customs checkpoints could decide to let the container pass without stopping. with proper control and random checking, this regime of transit would help significantly reduce the waiting time of crossborder container traffic, while still maintaining the high vigilance required for customs examination

    就像處理空運貨物的清關程序般,附有射頻簽的貨櫃在其抵達海關檢查站前已可進行清關手續,透過查閱貨櫃的海關清關記錄及確貨櫃在運輸過程中完整無損后,當地海關檢查站便可讓貨櫃不停站地通過。
  9. Absolutizing the central statue of economy construction is the only aim of social development 3. unilatering the standard of the productive forces, believing that all methods can be offered only if it can enhance the advancement of the productive forces. it is because of these misunderstandings that the ideological - political work was put at the embarrassed circumstance of " saying is one thing, doing is another, and when busy it is miner important " on practice

    (三)思想政治工作在實踐中被弱化的思考,探討並分析經濟工作與思想政治工作「一手硬,一手軟」的深層次的認根源和理論根源:第一,把生產力的最終作用庸俗化,認為只要物質文明搞上去了,精神文明就自然會上去;第二,把經濟建設的中心地位絕對化,認為經濟建設是社會發展的唯一目;第三,把生產力準片面化,認為只要能促進生產力的解放和發展,一切方法手段都可以用。
  10. The first step is to build up the mind to satisfy the customers, nail down the direction of development and the mission of the enterprise, formulate the object which is composed of market, innovation, profit and society, and determine the direction of development. the following step is to analyze comprehensively the opportunities and threats from the external environment, and also the advantages and disadvantages in the internal environment, as to construct and foster the core competence of the flour manufacturers. the third step is to exert comprehensively the strategy of cost - leading strategy, difference strategy integrate strategy target - focus strategy and diversification strategy to foster and maintain the core competence

    麵粉製造企業的核心競爭力管理的過程包括: ( 1 )樹立顧客滿意的戰略思想,明確企業的發展方向和企業使命,並制由市場目、創新目、盈利目和社會目組成的戰略目麵粉製造企業核心競爭力的發展方向; ( 2 )對麵粉製造企業外部環境的機會和威脅、內部環境的優勢和劣勢進行綜合的戰略分析,構建和培育麵粉製造企業核心競爭力; ( 3 )綜合運用成本領先戰略、差別化戰略、集中目戰略、一體化戰略和多樣化戰略來培育和維護麵粉製造企業核心競爭力; ( 4 )制職能戰略、進行以企業核心競爭力為載體和顧客滿意為最終奮斗目的組織結構變革,提高企業領導人的核心競爭力意,維廣東工業大學管理學碩士學位論文護和發展麵粉製造企業核心競爭力: ( 5 )發展和再造麵粉製造企業核心競爭力等五個步驟。
  11. The sub - model for suitable sowing or transplanting date was developed according to the principle of determining variety maturity characters from planting style, variety type from variety maturity characters and user ' s requirement, and sowing date from variety and target yields

    根據種植制度(種植方式)品種熟性,由品種熟性與用戶要求品種,依據品種特性和產量目播種日期的原理建立播期確模型。
  12. Because the middle and small fund investors are lack of fund, information and knowledge, they are determined to take short term investment aiming to gain capital price differences

    我國股市的中小投資者由於在資金、信息和投資知存量上處於劣勢,了他們以獲取資本利得為主要目的短期投資行為和缺乏理性的投資行為特徵。
  13. Yet intellectual property ' s legal monopolization is a decisive factor of franchisor ' s right in restricting franchisee ' s activities in their contract to some extent. at the same time, franchise also involves three parties of franchisor, franchisee, and other relevant competitors and includes competitive relation in terms of the horizontal and vertical levels. besides, a franchisor tends to use his advantages to abuse his rights, restricting competition against the anti - monopoly law such as tied selling, resale price maintenance and regional restrictions, when he signs a contract with a franchisor

    因為特許經營與壟斷專營有相似之處,在特許經營中,特許人(或稱特許權人)通過特許經營合同將其所擁有的商、商號、專利或專有技術等使用權授予被特許人,這就涉及到知產權、產品銷售權、技術技巧等的轉讓,而知產權本身的合法壟斷性質了特許人在特許經營合同中有權對被特許人的活動進行一的限制;同時,特許經營又涉及特許人、被特許人和其他相關競爭者,包含橫向、縱向兩個層次的競爭關系,特許人與被特許人簽訂特許經營合同時,極有可能利用其優勢地位濫用特許權,做出搭售、維持轉售價格、區域限制等與反壟斷法相抵觸的限制競爭行為。
  14. Based upon the above analysis, the author made a historical analysis of manufactory code supply, described the institution evolution of the bar code and reached the conclusion that there exists market failure for the bar code - there being no stimulation, based on the practice of article numbering center of china and the view of public goods supply and public department, this thesis put forward some approaches in supply efficiency enhancing of our country ' s article numbering organization on the point of promoting internationalization level in goods code in our country

    以公共品供給理論和公共部門理論為指導,結合我國編碼組織的工作實踐,從促進我國商品國際化水平的角度提出改進我國商品編碼組織供給效率的有效途徑,指出將成本分擔與年產值關聯起來實行以年產值為基礎的二部收費法在一程度上能夠解商品條碼系統成員之間搭便車的現象,因而具有帕雷托改進的性質。最後分析了商業模式演變、產業結構和體制環境對我國編碼組織的影響。
  15. Rules with negative scores indicate attributes of legitimate mail ; rules with positive scores indicate attributes of unsolicited mail. as initially configured, few rules have a high enough score to identify a message as spam on its own. this is by design, as most spams will trigger several or even dozens of rules

    正如開始時所設的,幾乎沒有哪個規則具有足夠高的分數只憑消息本身就可以將消息為垃圾郵件,但這是由設計的,因為大多數垃圾郵件將觸發多個(或甚至是許多)規則。
  16. The thoughts and methods in the uml have the directly guided significance and practically applied value for the activities of requirements engineering, as well as for those of software engineering. uml is a kind of explicit, modeling and documenting the software system, common and visional modeling language. it is a sort of method, using unified and standard sign and definition to realize object oriented software analysis and design, capturing the decision - making and acquaintance of the system to understand, design, browse, configure, maintain and control the information of system

    Uml是一種直觀化、明確化、構建和文檔化軟體系統產物的通用可視化的建模語言,它是運用統一的、準化了的記和義來實現面向對象的軟體分析和設計的一種方法,它捕獲了被構建系統的有關策和認,用來理解、設計、瀏覽、配置、維護以及控制系統的信息。
  17. It solves these problems by using neural network based on fuzzy decison and neural network group. compared with traditional network, neural network based on fuzzy decison has simple structure, clear logic layer and short training time, while for network group, it is more intelligence and fuses uncertain information better without longer training time

    就此本文提出了基於模糊策的神經網路和帶有加權融合的神經網路組兩種目別方法,與傳統的神經網路相比,基於模糊策的神經網路結構簡單,邏輯層次分明,學習訓練演算法簡潔,而神經網路組在不增加訓練時間的基礎上,提高了網路的智能特性,能夠更加合理地對不確性信息進行融合。
  18. This article proposes the objective way of calculating the importance of each attribute based on rough set to get the weight of each indicator and unify these two methods above to finally determine the target weight

    本文將粗集理論中屬性重要度的概念引入網路課程評價中的權重確過程,提出將策者先驗知的權重同粗集理論確的屬性重要度結合起來作為最終確網路課程評價指權重的方法。
  19. Because to calculate the shadow prices of the agriculture production factors give the feasible methods to help government use economic lever to effectively dispose the agriculture production factors, so it is significant in theory and in practice. 2. approaches to use the interrelated index to compare the history trends, so we can recognize the situation about the scarce agriculture production factors, to use the principle logical to analyze the supply - demand mechanism of the main agriculture production factors in china, to use stochastic frontier production function and marginal productivity theory to calculate the shadow prices of the production factors, to use drc index to assess international competitive of the china main agriculture products

    本文的主要研究方法為:在分析中國主要生產要素的稀缺度變化時,進行同類指的歷史變化比較研究,從而認主要農業生產要素稀缺性變化的趨勢與規律;在分析中國主要生產要素的供需機制時,進行相關概念為基礎的理論邏輯分析,建立供需機制的理論模型;在測算農業生產要素的價格時,使用邊際生產力理論和隨機前沿生產函數方法;在評價中國主要農產品的國際競爭力時,使用國內資源成本系數方法。
  20. Each bluetooth service on a machine needs a unique identifier, so i decided to give this service the uuid universal unique identifier of 8841 it could be any four - digit number you choose

    機器上的每臺藍牙設備都需要惟一的符,所以我將這個服務的uuid (統一惟一符)為8841 (可以是任意四位數字) 。
分享友人