網盾 的英文怎麼說

中文拼音 [wǎngdùn]
網盾 英文
eweb shied
  • : Ⅰ名詞1 (捕魚捉鳥的器具) net 2 (像網的東西) thing which looks like a net 3 (像網一樣的組織或...
  • : 名詞1. (盾牌) shield2. (荷蘭、越南、印度尼西亞等國的本位貨幣) guilder (荷蘭); dong (越南); rupiah (印度尼西亞)
  1. However, reverting to friend sinbad and his horrifying adventures who reminded him a bit of ludwig, alias ledwidge, when he occupied the boards of the gaiety when michael gunn was identified with the management in the flying dutchman, a stupendous success, and his host of admirers came in large numbers, everyone simply flocking to hear him though ships of any sort, phantom or the reverse, on the stage usually fell a bit flat as also did trains, there was nothing intrinsically incompatible about it, he conceded

    當邁克爾恩經營歡樂劇場時,路德維希主演漂泊的荷蘭人127獲得巨大成功,愛慕他的觀眾蜂擁而至,個個都只是為了聽聽他的聲音。盡管不論是不是幽靈船,一旦搬上舞臺,就跟火車一樣,通常會變得有點兒單調了。他承認那位水手所講的本質上沒有什麼相互矛的地方。
  2. When opened, the network shield coffer appeares as a virtual hard disk subarea

    這是因為當網盾保險箱被打開時,它是作為一個虛擬的硬盤分區出現的。
  3. Because the goals contradict each other, the authors can optimize network project scientifically and objectively by using the multi - goal decision theory

    由於各優化目標之間的矛性,用多目標決策理論可以科學客觀地優化路計劃。
  4. In order to solve this contradiction, reservoir engineering methods are used to estimate the exploitation process about the block, which including water drive curve method, the correlation experience method, the method of the flow pipe budgetary estimate and the method of well net density. on the basis of these method, the author studied the macrocospical distributing of remaining oil in each layer

    針對單元開發過程中存在的突出矛,運用水驅曲線法、相關經驗公式法、流管概演算法、合理井密度法等油藏工程方法對斷塊的開發歷程進行評價,在此基礎上進行各小層剩餘油的宏觀研究。
  5. Neural networks and extenics based contradiction problem solving study of high school students

    基於神經路和可拓學的高中生解決矛問題研究
  6. This paper analyses and studies the fundamental states and existing questions of wuyishan national natural protection areas, and argues the dialectical relationships of contradiction and unity between the protection of natural resources and environment and the development of economics. and proposes the value - increasing development strategy which will make wuyishan national natural protection areas sustainably develop in term of both time and space. and further illustrates these questions of population emigration, information - network construction, height - grade ecological tourism, etc

    本文針對武夷山自然保護區的基本情況和存在的問題進行了深入分析和研究,論證了保護自然資源和環境與發展經濟既相矛又相統一的辨證關系,提出了建立價值增長型的自然保護區的發展戰略,使武夷山自然保護區在時間上和空間上都能達到可持續地發展,並在此基礎上,闡述了人口的外遷、信息路建設、高品位生態旅遊等問題。
  7. After analyzing the character of risk, i introduce data mining method into risk management, to solve the contradiction between great capacity of data and lack of information, the methods include mathematics statistics and artificial neural network ( ann ). then, i study on the methods of risk management in risk identification, risk evaluation and risk disposal, what is advanced, fault tree analysis method based on fuzzy probability, stochastic simulation method and the topsis method based on interval number all consider the characteristic of risk. finally, i discussed the application of information system ( mis ) in project risk management, and developed a risk management information system

    論文在深入分析了風險特徵之後,將數據挖掘技術引入風險管理,用以解決海量數據與貧乏信息之間的矛,所採用的技術有數理統計和人工神經路( ann )兩種方法;接著,論文對風險識別、風險評價、風險處理中的風險管理方法進行了研究,所提出的基於模糊概率的故障樹技術、隨機模擬技術和基於區間數的topsis方法都體現了風險管理的特點;最後,論文對信息系統( mis )在工程項目風險管理中的應用進行了探討,開發出一個風險管理信息系統。
  8. Zhang lixia ( water conservancy engineering ) supervised by professor shi kebin this paper mainly discussed a method for multi - goal network ' s optimization. since the network plan was brought forward, the criterion for evaluating network was time cost resource all along. in this paper, through massive study on achievements the predecessors had done the author posed a new criterion : quality, and set up the network ' s quality model ; simultaneously, the author established the network ' s multi - goal model by synthesizing the existing optimum models, also found the finite not bad solution of the model ; because the four goals was in contradiction with each other, using the multi - goal decision theory can optimize the network project scientifically and objectively

    本文在對前人關于路計劃研究結論的總結分析的基礎上,探討了評價路計劃優劣的各準則,提出一種新的評判準則:工程質量,並建立了路計劃的工程質量模型;針對目前路計劃多是單目標的優化,綜合路計劃就各目標優化方法的研究理論,建立了路計劃的多目標模型,並將工程質量模型融入其中,根據路計劃的特點,解出該模型的有限個非劣解;由於各優化目標之間的矛性、不可公度性,用多目標決策理論的方法,科學而客觀地對路計劃進行了多目標優化,從而避免了人為決策的盲目性、主觀性。
  9. In recent years, the police departments had built their private computer network with the golden shield project working in many provinces. so the trunking system can be connected in a province using their private computer network. in this way a roaming trunking system were built in a province

    近年來,隨著國家金工程的實施,各個省自治區的公安系統都建立了自己專用的計算機路,這樣可以利用公安系統的ip專把原來的集群通信系統聯系起來,形成一個全省范圍內的專用集群通信路。
  10. As the network is increasingly extensive, network user is becoming more and more. and the data that transmits on net is more and more bigger, the contradiction of network resource shortage is stressed increasingly

    隨著以因特為代表的路應用的日益廣泛,路用戶越來越多,上傳輸的數據量越來越大,路資源短缺的矛日益突出。
  11. Koal software network shield 4. 0 can be used to downlaod the certain encryption certificate from ldap server

    可以用格爾網盾安全專家4 . 0從ldap服務器下載該人員的加密證書。
  12. We suggest you upgrade the anti - virus software or network shield

    建議升級防毒軟體或者網盾本身。
  13. Copyright of network shield information security software v2. 0

    網盾信息安全軟體v2 . 0軟體著作權證書
  14. If a user wants to use network shield coffer, he needs to have administration jurisdiction

    如果要使用網盾保險箱功能,必須有管理員權限才可以。
  15. There is a conflict between deletion - resistance function of network shield coffer and anti - virus software

    網盾的保險箱防刪除功能和防毒軟體沖突。
  16. I copied a coffer file from other computers. but when opening the network shield coffer list, i can t find this coffer file. what can i do

    我從別的機器上將保險箱文件拷貝過來,但是在打開網盾保險箱的列表中卻找不到該保險箱文件,我該怎麼辦?
  17. Coffer s code should be verified in order to delete network shield coffer. if the coffer is established through the encryption hardware, then the encryption hardware must be inserted for deletion

    刪除網盾保險箱需要校驗保險箱的密碼;如果用加密硬體(如usbkey )創建保險箱,必須插入創建保險箱的加密硬體才能刪除。
  18. Network shield coffer opens a private workaround in the computer for the user and encrypts the data in the workaround. only when a user passes the id verification, he can open the coffer

    網盾保險箱在計算機中為用戶開辟獨自的私有工作區,對工作區中的數據進行加密,用戶使用時必須通過身份認證后才能打開保險箱進行使用。
  19. Koal network shield desktop security sets is the only software encryption system approved by the bureau of the state cipher administration committee. it uses many advanced technologies and has several patents

    格爾網盾桌面安全套件是唯一一個獲得國家密碼管理委員會辦公室批號的軟體加密系統,它採用多種先進技術,擁有多項專利。
  20. Network shield pc protection is mainly used for hardware encryption equipment ( such as ic card or usb key ) to log on lan automatically and to protect computers. when the user draws the hardware encryption equipment, the pc protection will lock the computer shredder

    網盾pc保護程序主要用於使用硬體加密設備(如ic卡或usbkey )自動登錄局域與保護計算機,用戶拔出硬體加密設備則pc保護將鎖定計算機碎紙機。
分享友人