識別級限 的英文怎麼說

中文拼音 [zhìbiéxiàn]
識別級限 英文
identification threshold
  • : 識Ⅰ動詞[書面語] (記) remember; commit to memory Ⅱ名詞1. [書面語] (記號) mark; sign 2. (姓氏) a surname
  • : 別動詞[方言] (改變) change (sb. 's opinion)
  • : Ⅰ名詞1 (等級) level; rank; grade 2 (年級) any of the yearly divisions of a school course; gra...
  • : Ⅰ名詞(指定的范圍; 限度) limit; bounds Ⅱ動詞(指定范圍, 不許超過) set a limit; limit; restrict
  • 識別 : 1 (辯別; 辯認) discriminate; distinguish; discern; tell the difference; spot 2 [計算機] identif...
  1. Seen from the marxism philosophy perspective, there are not only reasonable factors but also unreasonable factors in communitarianism basic points ; its basic points are the reflection of capitalist class ' s ideology, un - denying, however, its basic points can be used as reference for our socialist politics system reform, especially, for the construction of socialist collectivism

    從馬克思主義哲學的眼光來看,社群主義的基本思想既具有一定的合理性又有其局性;從其最終的意義而言,社群主義的基本觀點是資產階形態的反映,但無可否認,社群主義的基本思想對社會主義政治體制改革特是社會主義集體主義建設具有一定的借鑒意義。
  2. For example, when a user logs on to a network, the directory would recognize the user ' s name, department, location and rank within the company, and bind this information with the user ' s network access or restriction policies

    例如,當一用戶登錄上網時,目錄將會出用戶的名字、所在的部門、地點及在公司中的,把這些信息與用戶的網路訪問或制政策捆綁在一起。
  3. It solves payment issue through sharing pos and brush card. it solves info sharing and exchanging problem by enterprise application integration it adopts research method of software engineering and uses touch - screen, network, database technology and so on to carry through total design of the system and build the software : it uses user status identify and responsibility control to ensure database and application program ' s security ; it strengthen the code by coding optimize ; it captures and discards application runtime error to enhance the system ' s stability ; it uses multimedia voice and moving picture to show help information, thus makes the system easy to use ; it greatly reduces the maintenance work of the system by self - updating function ; it is an opening system by using star - model network top structure, supporting standard network communication protocol ? tcp / ip and offering standard software interfaced criterion

    論文採用軟體工程的研究方法,使用觸摸屏、網路、數據庫等技術,進行了系統總體方案設計和軟體開發:通過對數據庫和應用程序的用戶身份和權控制,保證數據存取和應用程序的安全性;通過對代碼進行優化提高了代碼的健壯性;通過捕捉並拋出系統運行時的異常錯誤提高了系統的穩定性;通過多媒體語音、圖形和動畫提示幫助信息來增強系統的易用性;客戶端程序自動升功能提高了系統的可維護性,有效地減少了維護工作量;系統採用星型的網路拓撲結構,支持標準的tcp ip網路通訊協議和規范的軟體介面標準,具有良好的開放性。
  4. To sum up, there are several innovative researches in this paper as follows : 1. this paper researches on the standard of security operating system. with the features of the embedded system such as resource limit, security safeguard functions of embedded operating sysmtem are defined in terms of b1 level

    文中著重對以下幾個方面進行探索和創新: 1 ) 、研究安全操作系統的安全標準並結合嵌入式系統資源有等特徵,界定了b1安全嵌入式操作系統應提供的安全保障功能; 2 ) 、研究了嵌入式網路安全的重要性及其保護措施,出了嵌入式操作系統層面最後一道網路安全門檻,在socket層實現了強制訪問控制。
  5. An employee may have a grudge against the company, and while employees have tremendous levels of internal access and system knowledge, they probably have limited resources and hacking skill

    雇員可能對公司有攻擊動機,雖然雇員有非常高的內部訪問和系統知,但他們的資源和黑客技能可能很有
分享友人