標識部分 的英文怎麼說

中文拼音 [biāozhìfēn]
標識部分 英文
identification section
  • : Ⅰ名詞1 [書面語] (樹梢) treetop; the tip of a tree2 (枝節或表面) symptom; outside appearance; ...
  • : 識Ⅰ動詞[書面語] (記) remember; commit to memory Ⅱ名詞1. [書面語] (記號) mark; sign 2. (姓氏) a surname
  • : Ⅰ名詞1 (部分; 部位) part; section; division; region 2 (部門; 機關或組織單位的名稱) unit; mini...
  • : 分Ⅰ名詞1. (成分) component 2. (職責和權利的限度) what is within one's duty or rights Ⅱ同 「份」Ⅲ動詞[書面語] (料想) judge
  • 標識 : [物理學] characteristic; identification; identifying標識碼 identification code; 標識位置 home position
  • 部分 : (整體中的局部或個體) part; section; portion
  1. Marks and mark - plates - part 5 : devices and armatures

    牌.第5:設備和配件
  2. Technical product documentation - lettering - part4 : diacritical and particular marks for the latin alphabet

    技術產品文件字體第4:拉丁字母的表示區別與特殊
  3. After scanning the object image and labeling the connected component, the background and foreground noise could be removed easily by threshold value area expunction

    該方法僅需對圖像作一次全掃描即可記物體所有連通,統計號,根據閾值面積消除法即可快速去除圖像中所有前景和背景噪聲。
  4. You also could use product ' s part identification to be a glittery point

    還可以藉助產品的作為訴求點。
  5. It is considered that trade name is an essential part of the name of commercial subject, and important indicia for distinguishing products or services of commercial subjects and bearing their business reputation

    筆者認為,商號是商事主體名稱的重要組成,是區商事主體商品或服務,並負載其商業信譽的重要
  6. The article points out the importance and necessity of the information - security from its actuality in our country. the resources in the information system, for instance, hardware, software, data, document, operator, meterial and so on, are evaluated and gived safety grade firstly. and then, it analyses the menace including the nonauthorized access, the information leak, the refused sevice, the internal objection which the system will take. the following are the corresponding control police : confirm the users " rights and duties, including the mode of using account, the limit of accessing resource, the application of password, the building of backup ; confirm the administrators " right and duties, including physical safety, system configuration, account configuration and usufruct, password management, audit and control, backup and individual intimity ; run - of - mill measure of security defence, including access control, symbol and identification, integrality control, password technique, firewall system, audit and resumption, safety of operating system, safety of database system, defence of computers " virus and resisting - deny protocol. in the end, the article offers the strategies of disposing the safety - accident and analyse after ithow. to report it, how to solve it in phase, and how to avoid it happening again. in a word, the article presents a holistic resolvent about keeping away the information system ' s security, and supplies a essential frame for its configuration, management and application

    然後,對系統可能受到的威脅,包括非授權訪問、信息泄漏、拒絕服務和內缺陷等進行析,並提出了相應的控制策略:確定用戶的權力和責任,包括帳戶使用方式、資源訪問權限、口令應用以及建立備份等;確定系統管理員的權力和責任,包括物理安全、系統配置、帳戶設置及使用權限、口令管理、審計和監控、備份以及個人隱私等方面;一般性的安全防護措施:存取控制、和認證、完整性控制、密碼技術、防火墻系統、審計和恢復、操作系統安全、數據庫系統安全、計算機病毒防護和抗抵賴協議等。最後,對事故處理和事後析提供策略,如何報告安全事故,如何協調解決安全事故,如何避免安全事故再次發生。總之,本文對信息系統安全防範工作給出一個整體的解決方案,為其在配置、管理和應用方面提供了基本的框架。
  7. The fourth chapter of this article firstly finish customers " quality classify on the basis of customer value and customer relationship value. the author builds the index system of the customers " evaluation and finish customers identify by two methods of analytic hierarchy process and mistiness judging. the article achieves the purpose of customer distinction

    本文的第四首先在客戶價值和客戶關系價值的基礎上,對客戶作了定性類;接著建立客戶評價指體系,運用層次析法和模糊綜合評判完成客戶別,實現客戶差別化的目
  8. Specification for resident population management information - part 18 : code of household nullification for resident population management

    常住人口管理信息規范.第18:常住人口注銷代碼
  9. Where goods reach their destination in specie, but by reason of obliteration of marks, or otherwise, they are incapable of identification, the loss, if any, is partial, and not total

    貨物以原有品種抵達目的地,只是由於之塗擦或者其他原因而無法別的,該損失,如果有的話,是損失而非全損。
  10. Giving the goal and conceptual design, this paper pays attention to expatiate how to practically use the techniques of image - processing, communication and recognition in remote image monitoring system, and discusses how to realize the key techiques such as terminal connection and frame design, platform decoding control and alarm, image communication and track, etc. in order to overcome most existing image monitoring systems " shortages - those systems are at low intelligent level, need overfull manual work and ca n ' t work all day, this paper has adopted the advanced image code / decode technology and digital image transmission technology, and has applied the intelligent image processing and recognition technique to the display, adjust and track of images

    本論文在設計圖像監控系統的建設目和總體方案的同時,重點闡述了圖像處理、通信與別技術在遠程圖像監控系統中的應用實現,給出了圖像監控系統中的終端接入和框架設計、雲臺解碼控制與報警、圖像通信和圖像跟蹤等關鍵技術的實現。針對現有的圖像監控系統大採用人工為主,機器為輔,智能化程度低,不能全天候工作的現狀,本文採用先進的數字圖像壓縮編解碼技術、數字圖像傳輸技術,將智能圖像處理與別技術應用於圖像的顯示、調整、跟蹤,克服了一般監控系統要求監控人員過多地干預、智能化程度低的缺陷,並總結了其特點和優勢。
  11. The hardware mainly consists of three parts : signal pre - amplifying and conditioning circuit is used to amplifying the microseismic signals which have detected, signal processing and target identifying circuit based on singlechip is used to convert the analog signals which have been amplified to digital signals and go through signal analysis, processing to identify the moving target, the sending and receiving setting is used to send the identifying result to the decision - making and he can take relevant action according to the result

    硬體主要由三組成:信號調理電路對檢測到的微弱地震動信號進行放大;基於單片機的信號析與目別電路將放大后的模擬信號進行a d轉換,進一步將得出的數字信號析、處理,實現目別;別結果發射與接收裝置將別結果發射給決策者,由其根據接收結果採取相應的措施。
  12. 11 partly erected / dismantled scaffold must have suitable warning signs posted in prominent locations, be barricaded off, or policed to prevent unauthorized entry. the use of scaffold tags is strongly recommended

    必須在安裝或拆卸的腳手架的顯眼位置上懸掛合適的警告語,或者加以警戒,以防未經授權的人員進入。強烈建議使用腳手架
  13. These are all of the outlet node names from the splitter leading to downstream supply air path components

    這里按照從離器主要到下游送風路徑組件的循序輸入所有出口節點名。
  14. An atm term. authority and format identifier : this identifier is part of the network level address header

    Atm術語。權限和符:該符是網路級地址報頭的一
  15. Ci ( corporate identity ) includes mi ( mind identity ), bi ( behavior identity ) and vi ( visual identity ). it is depended on visual design, logo shape, specifically color etc. to form a corporate visualize drawing market idea, behavior ruler, management characteristic, packaging style, operating ruler and strategy together. after the standardization of corporate name and logo, the information of the corporation could be communicated and spread from the corporation to the whole society

    企業形象( corporateidentity , ci )也叫企業別系統,它包括企業理念別( mindidentity , mi ) 、企業行為別( behavioridentity , bi ) 、企業視覺別( visualidentity , vi )三個,是指運用視覺設計手段,通過志的造型和特定的色彩等表現手法,使企業的經營理念、行為規范、管理特色、產品包裝風格、營銷準則與策略形成一種整體形象。
  16. Cad files can be viewed through pdm. coding system and pdm serve each other. referring to the theory and technology of a gt - based information classifying coding system framework, we design a part classifying coding system. it consists of identification code, classification code and feature items

    本文研究了一種以成組技術為基礎的製造企業信息類編碼理論及技術,針對啞鈴型企業設計了一個零件編碼系統,其結構為零碼、類碼和特徵項目。
  17. The video part of avs audio video coding standard has been finalized recently. it has adopted variable block size motion compensation to improve its coding efficiency

    Avs audio video coding standard是我國具備自主知產權的第二代信源編碼準,其視頻最近已經被確定為國家準,即將投入應用。
  18. Identifies a partially or fully qualified class name with its

    屬性標識部分或完全限定類名,使用它的
  19. Determines whether the flow of the windows identity portion of the current security context has been suppressed

    確定是否已取消當前安全上下文的windows標識部分的流動。
  20. Suppresses the flow of the windows identity portion of the current security context across asynchronous threads

    在異步線程間取消當前安全上下文的windows標識部分的流動。
分享友人