追蹤機構 的英文怎麼說

中文拼音 [zhuīzōnggòu]
追蹤機構 英文
follow umechanism
  • : Ⅰ動詞1 (追趕) chase after; run after; pursue; catch up with 2 (追究) trace; look into; get to...
  • : 名詞(腳印; 蹤跡) footprint; track; trace; trail
  • : machineengine
  • : Ⅰ動詞1 (構造; 組合) construct; form; compose 2 (結成) fabricate; make up 3 (建造; 架屋) bui...
  • 追蹤 : have in the wind; follow the trail of; track; trace; pursue
  • 機構 : 1 [機械工程] (機械的內部構造或一個單元) mechanism 2 (機關; 團體) organ; organization; institu...
  1. We first constructed five traceable opratores and confined the detailed syntax of these five opratores so that we can explain each result of opratores and can construct the multi - opratores data cleaning program. through propagate the key information of each opratores, the mechanism of data lineage can trace the data cleaning program, which construct over the traceable oprators so that we can analysis and explain the cleaning result. according to the analysis and research of the incremental mode and conflict of data modification, we can correct and improve the exceptions which appear during the data modification

    接下來的數據沿襲制通過傳遞各個操作的標識值,實現了對造于可溯操作基礎上的數據清理程序的,從而提供了對數據清理程序執行過程及結果的分析和解釋功能;同時利用互動式數據修改功能以及時糾正和改進數據清理過程中所出現的異常,並對數據修改過程中所涉及到的增量執行模式及操作沖突進行了充分地分析與研究。
  2. Based on fem analysis software ansys, a cylindrical latticed dome of an aerodrome is analyzed as an example. the progress of load - displacement for the whole structure - - cylindrical latticed dome & columns is record

    本文利用結分析軟體ansys ,以某場航站樓單層柱面網殼結為例,了柱面網殼+支承柱這一整體結的荷載-位移全過程。
  3. During the investigation of these cross - border crimes, our officers visited numerous countries and cities in all five continents ? from japan in the east to honduras in the west, from new zealand in the south to norway in the north. they collected evidence, traced the suspects, and extradited them back to hong kong for trial with the assistance of our overseas law enforcement partners

    面對這類跨境案件,廉署人員在進行調查時,曾踏足五大洲不同的國家和城市,東至日本,西至宏都拉斯,南至紐西蘭,北至挪威,在海外各執法的協助下搜集證據,罪犯及把逃犯引渡回港受審。
  4. During the investigation of these cross - border crimes, our officers visited numerous countries and cities in all five continents from japan in the east to honduras in the west, from new zealand in the south to norway in the north. they collected evidence, traced the suspects, and extradited them back to hong kong for trial with the assistance of our overseas law enforcement partners

    面對這類跨境案件,廉署人員在進行調查時,曾踏足五大洲不同的國家和城市,東至日本,西至宏都拉斯,南至紐西蘭,北至挪威,在海外各執法的協助下搜集證據,罪犯及把逃犯引渡回港受審。
  5. Many regulators have decided they can keep in touch with hedge funds by monitoring the activities of the prime brokers that serve them

    許多金融專家決定監督服務于對沖基金的經紀的活動,藉此來對沖基金的信息。
  6. In addition, simultaneously interpenetrating polymer networks ( sin ) damping materials were originated from polysiloxane oligomer - containing different molar ratio methylphenylsiloxane and different methacrylate. applying the weight method and ftir monitor on line, the synthesis reaction procedure of polyacrylate copolymer and sin was traced. the polymerization mechanism of the functional groups with vulcanizing capability, aid - vulcanization action of bim as well as the sin structures were elucidated by 1h nmr and 13c nmr

    採用稱量法和ftir在線,對合成聚丙烯酸酯共聚彈性體和sin的反應動力學進行了研究,並用~ 1hnmr和~ ( 13 ) cnmr等對硫化官能團的引入,雙馬來酰亞胺助硫化理,和sin的結進行了表徵。
  7. Secondly, to achieve the independent regulation of active and reactive power output from the generator side which is designed for the purpose of tracing the maximum wind - energy capturing. the paper has analyzed the mathematic model of the ac excited doubly - fed machine and the stator field orientation control strategy of the motor as vscf wind power generator. thirdly, it has put forward and designed the dual pwm converter with the capacity of energy flowing bidirectional aimed at the demand of rotor energy bidirectional flow. the author constructed reliable and integrated experimental system and did a series of experimental study including no - load, cutting - in network and power generation at, below and above the synchronous speed

    論文首先分析了風運行特性及其最佳風能利用原理,通過模擬及實驗驗證了採用直流電的輸出特性模擬風力的最大輸出功率曲線的可行性,並給出了模擬系統的硬體結;然後為了實現交流勵磁發電有功、無功功率獨立調節理,分析了交流勵磁雙饋發電的數學模型和在最大風能捕獲變速恆頻風力發電時必需的定子磁鏈定向矢量控制策略;針對雙饋發電轉子能量雙向流動的要求,提出並設計了具有能量雙向流動能力的雙pwm交流勵磁用變頻器;最後為實現從理論到實踐的全面研究,研製出了一套小功率完整的雙pwm變頻器交流勵磁的雙饋風力發電實驗系統,進行了空載、並網、同步速及上、下的發電運行等一系列的運行實驗;所完成的模擬和實驗研究均驗證了理論、模型和控制策略的正確性、可行性。
  8. Links within tv station to finalize the corrective measures ; lastly, in view of the moving trend of the satisfaction of stakeholder and its changed expectations, assesses the post - corrective action performance to proceed with the next turn improvements. the fourth section restates the issue which should be noticed during the course of the sustainable development of tv industry, clarifies tv industry should rather meet the healthy demanding and expectations from the audience than the unlimited expectations of the audience, insists to find a balanced trade - offs of expectations of stakeholders to materialize the maximization of value of tv industry

    首先,論述了專門的和優秀的人力資源是電視業可持續發展的保證;其次,從收集、確定、列出、分組和評級利益相關方的期望開始,結合本電視臺的使命和競爭對手的情況,制定出戰略目標;再次,把戰略目標與電視臺內部關鍵環節和過程相對應,通過對指標的和分析,確定出改進措施;最後,對實施后的改進措施進行績效評審,結合利益相關方的滿意度變化趨勢和變化了的利益相關方的期望,進行下一輪的改進。
  9. Software asset management ( sam ) solves this problem, implementing software inventories, tracking and reporting on systems while also providing the framework for audits, documentation, and licence managing procedures together with the incorporation of individual organisation workflow

    我們的軟體資產管理服務便能為客戶解決這方面的問題。它能提供軟體清單、和報告系統並設立管理架以進行核查、編制文件和根據個別的工作流程,編訂使用權管理程序等。
  10. According to standard & poor ' s leveraged commentary and data, a part of the rating agency that tracks the loan market, credit - investment institutions backed by pension funds, mutual funds and insurance companies have mushroomed in recent years, replacing banks in loan - syndication deals

    標普杠桿評論和數據是這家評級中介貸款市場的一部分,根據它的研究,由養老金基金,共同基金以及保險公司支持的信貸投資在最近幾年迅速增長,代替銀行參與辛迪加貸款交易。
  11. Set in the aftermath of the massacre of 11 israeli athletes at the 1972 munich olympics, the story follows a secret israeli squad assigned to track down and kill the 11 palestinians suspected to have planned the munich attack - and the personal toll this mission of revenge takes on the team and the man who led it

    故事發生在1972年的慕尼黑奧運會上,巴勒斯坦恐怖分子潛入奧運會選手村,屠殺11名以色列運動員。以色列情報mossad隨即進行報復行動,並向十名屬于黑色九月恐怖組織成員進行報復
  12. In this paper, the mechanism, methods of and countermeasures to denial of services attacks are discussed. after that, several packet marking schemes for traceback are reviewed and some improvements to the basic packet marking scheme are given, which reduce the workload and false positive rate in the attack tree reconstruction. knowing that in existing packet marking schemes, router marks packets with fixed probability, which results in that many packets are required in path reconstruction and that attacker could encumber path reconstruction via spoofed marking information

    在本文中,我們首先研究了拒絕服務攻擊的攻擊制、方法及其對策,並對以包標記的方式拒絕服務攻擊的來源的各種方法進行了深入的研究,分析了它們各自的優缺點,並對基本包標記方案作了改進,使得其攻擊路徑重時的運算量和重的誤報率在原有基礎上大為降低,達到或超過了其他一些方案的水平。
  13. It reframes the traceback problem as a polynomial reconstruction problem, and uses techniques from algebraic coding theory to provide robust methods of transmission and restriction. the scheme is a new solution to the traceback problem during a dos attack ; the honeypot for ddos, which is a tool of traceback, lures the attacker to believe that he successfully compromised a slave for his needs, convincingly simulating the architecture of a potential ddos attack ; the source - based approach to ddos defense, which is a useful adjunt to traceback systems, deploys a ddos defense system at source - end networks. attacks are detected by monitoring two - way traffic flows, and the attacks originating from source networks are stopped by rate - limiting ; the routing mechanism based on pushback treats ddos attacks as a congestion - control problem

    最後,就有關ddos攻擊反向問題,從四個方面對其解決方案進行了研究:在分析比較幾種反向演算法的基礎上,著重研究了代數方法編碼反向信息的方案,該方案把問題當作多項式重問題,使用代數編碼理論技術提供魯棒的傳送和重方法,是dos攻擊過程中的反向問題的一種新的解決方法; ddos陷阱作為反向的工具,引誘攻擊者相信自己成功與所需的傀儡主通話,令人信服地模擬出潛在ddos攻擊體系結;基於源的ddos防禦方法作為反向有用的補充,將防禦系統部署在源網路,通過監控雙向流量檢測攻擊和限制速率終止來自源的攻擊;基於向後倒推的防禦ddos的路由制把ddos攻擊看作擁塞控制問題,添加功能到每個路由器來檢測並優先丟棄可能屬于攻擊的包,通過向後倒推上級路由器也得到通知而把這樣的包丟棄。
  14. The operational method ( 1 ) set up new organization, let the model manager act as team leader of multi - functional innovative task force ; ( 2 ) do business process reconstruction by setting order information flow as a core, make sales order work as tracking tool for evaluating the performance of model manager, and other functional manager ; ( 3 ) change the traditional relationship between employee and their supervisor, prior operation and next operation to inner market relationship ; ( 4 ) set up and run sbu system of setting the target, performance measurement and incentive method ; ( 5 ) advocate the cultural atmosphere of creativity and innovation

    操作方法: ( 1 )建立新型矩陣組織結,使型號經理成為橫向跨職能產品創新團隊的主體; ( 2 )實施以定單信息流為核心的業務流程再造,使定單成為型號經理與主流程、支持流程職能經理之間市場支持關系的工具。 ( 3 )將典型組織中的上下級關系、前後工序關系改造為內部市場關系; ( 4 )建立和運行sbu目標設定、業績衡量和激勵體對海爾有效實施產品創新「市場鏈」制的探索系; ( 5 )營造「創業」 、創新的企業文化氛圍。
  15. Analyzing facts, tracking down economic developments, stimulating public debate : the institut der deutschen wirtschaft k ? ln ( iw ) conducts research, provides information and gives advice to public sector and private institutions

    分析事實、經濟發展、激發公眾爭論:德國經濟研究所進行研究、為公共或私人提供信息和建議。
  16. The global language monitor, a non - profit group that tracks words and phrases in the media, > blogosphere, compiles an annual list of the top fashion cities

    負責在媒體、網際網路和博客圈「」新詞的非贏利組織全球語言監控編撰了此項全球時尚城市年度排行。
  17. The global language monitor, a non - profit group that tracks words and phrases in the media, on the internet and throughout the blogosphere, compiles an annual list of the top fashion cities

    負責在媒體、網際網路和博客圈「」新詞的非贏利組織全球語言監控編撰了此項全球時尚城市年度排行。
  18. The global language monitor, a non - profit group that tracks words and phrases in the media, on the internet and throughout the compiles an annual list of the top fashion cities

    負責在媒體網際網路和博客圈「」新詞的非贏利組織全球語言監控編撰了此項全球時尚城市年度排行。
分享友人