重點訪問 的英文怎麼說

中文拼音 [zhòngdiǎnfǎngwèn]
重點訪問 英文
focused interview
  • : 重Ⅰ名詞(重量; 分量) weight Ⅱ動詞(重視) lay [place put] stress on; place value upon; attach im...
  • : Ⅰ名詞1 (液體的小滴) drop (of liquid) 2 (細小的痕跡) spot; dot; speck 3 (漢字的筆畫「、」)...
  • : 動詞1. (訪問) call on; interview; visit 2. (調查; 尋求) inquiry into; seek by inquiry [search]; try to get
  • : Ⅰ動詞1 (請人解答) ask; inquire 2 (詢問; 慰問) question; ask about [after]; inquire about [aft...
  • 重點 : keynote; key point; focal point; stress; emphasis
  • 訪問 : visit; call on; interview; access; addressing; reference to
  1. If given some access rights, wherever the users are, legal users can access or control the remote industrial workstation so as to do something like remote scheduling, remote diagnosing, remote maintenance, etc. this is one way to break the communication gap between management network and control network

    進行適當網路配置后,授權用戶就可以在任一internet終端實現對監控主機的和控制,以進行調度優化,遠程診斷與維護。目前,這套工業遠程信息監控系統已在省計算機實驗室進行了運行測試,系統工作正常,達到了預期要求。
  2. Harold bloom, a monumental and legendary figure of literary criticism at yale university, a name that cannot be avoided in poetry criticism, is one of the strongest and definitely the most prolific critics of his generation or of several past generations. professor xu jing, correspondent of foreign literature studies, interviewed professor bloom in may 2006. this interview focuses on his theory of poetry that was explosively brought forth in the 1970s by his famous tetralogy : the anxiety of influence, a map of misreading, kabbalah and criticism, and poetry and repression. bloom regards his theory of " the anxiety of influence " as his most important contribution to literary criticism, and uses " dancing " to explain his famous yet baffling six rations of " misprision. " always preoccupied with his own theory, bloom here again traces the precursors of emily dickinson and makes a brief comparison between walt whitman and wallace stevens. looking back to his past, bloom gives a summation of his life ' s trajectory as a critic : a revivalist of romantic poetry, a theoretician of poetry, and a critic for the general public. bloom began his career as a critic of british romantic literature in the afterglow of the new criticism. in the 1970s, bloom brought forth his explosive " theory of poetry " in the tetralogy publised in very quick succession in the 1970s. since the 1980s, bloom has become less technical and hopes to reach a wider readership. his literary criticism and what he calls his " criticism of religion " for the general public have made harold bloom a household name in america as well as in the world. at present, the 76 - year - old harold bloom is intensely engaged in the writing of what he hopes to be his masterpiece, the anatomy of influence, which is to be published in 2008 by princeton university press

    哈羅德?布魯姆教授是耶魯大學具有里程碑意義和傳奇色彩的文學批評家,一個詩歌批評界的一個不可迴避的名字,是他那一代人或幾代人中最猛烈的、也無疑是最多產的批評家之一.本刊特約記者徐靜於2006年5月對布魯姆教授進行了采.本次談的是布魯姆在20世紀70年代以《影響的焦慮》 、 《誤讀的地圖》 、 《卡巴拉與批評》 、 《詩歌與壓抑》四部曲的形式相繼提出的、具有爆炸性的"詩歌理論" .布魯姆認為"影響的焦慮"是他對文學批評最要的貢獻,並用舞蹈這一形象的比喻來解釋了他那著名的卻常常令人困惑的關于"誤讀"的"六個定量" .在談中,布魯姆還追溯了幾位對愛米莉?狄金森頗有影響的前輩詩人,並簡單比較了惠特曼和史蒂文斯.布魯姆將他的批評生涯概括為三個階段:浪漫主義詩歌的復興者,詩歌理論家以及面向大眾的批評者.在新批評的余輝中,布魯姆以對英國浪漫主義詩歌的批評開始了其批評生涯. 20世紀70年代布魯姆提出了他那爆炸性的、以四部曲的形式相繼世的"詩歌理論" .進入80年代后,布魯姆的批評不再艱深難懂,他希望能擁有更廣大的讀者群.他為普通大眾所寫的文學批評及"宗教批評" (布魯姆語)使得哈羅德?布魯姆成為了美國以及全世界的一個家喻戶曉的名字.目前, 76歲的布魯姆正全力寫作《影響的解剖》一書,將於2008年由普林斯頓大學出版社出版
  3. In " the campus visiting " the earlier period, propagandizes and conducts the correlation with emphasis the preheating course

    在「校園」前期,宣傳並舉辦相關的預熱講座。
  4. Focus on the method of driver usb device in labview develop environment, three ways ( i / o, cin, clf ) were discussed, and the way of using visa ( visual instrument software architecture ) to communicate with usb device was used that can easily develop instruments driver and application software and improve the applicability of instruments on various operating systems

    分析了常用的labview開發環境下驅動自製數據採集卡的三種方式:直接寄存器方式;調用c語言源代碼方式;調用動態連接庫函數的方式。提出了利用visa ( visualinstrumentsoftwarearchitecture )來直接驅動usbraw設備,簡化驅動程序和虛擬儀器軟體的開發難度,提高儀器在多種操作平臺上的通用性。
  5. In chapter 4, several key techniques used in the development of the software are introduced briefly, such as the setup of the development condition, dhtml technology, active server pages ( asp ) development technology, and the interface technology, by which web server can access the back - end database

    第4章對本系統開發過程中涉及的關鍵技術作了簡要說明,討論了開發環境設置、 dhtml技術、活動服務器頁面( asp )開發技術和數據庫技術。
  6. This scheme integrates universual data accesss technology of microsoft, which plays a more and more important role in three - lay c / s ( client / server ) and uses the technology of ado ( active data access ), adopts the asp script language in display the results and uses stored procedure of sql server in databases design. in the system of b / s, client realizes a high efficient access to the server database through displaying diversified active controls in browser and using ado to access the data source. the disposing of data accures under the database not in the font of this system. this kind of scheme cannot only bring the system a higher real time response, but also decrease data runoff of the networks, lower the possibility that web server becomes bottleneck of the system and make the system more transplantable

    當前的web數據庫技術正處于發展階段,針對這種情況,本文通過分析當前各種流行的web數據庫方案的優缺,結合在三層次的c / s系統中扮演越來越要的角色的中間件技術,採用了microsoft公司所提出的一致數據技術,利用ado控制項,結合當前的asp語言,底層數據庫採用了sqlserver7 . 0的存儲過程技術,設計了一種自己的web數據庫方案,即在browser / server系統當中,客戶端通過顯示在瀏覽器中的各種activex控制項,通過了ado連接數據庫,數據的處理利用了存儲在數據庫內部執行,實現對後端數據庫的高效,並且這種方案在給系統帶來較高的實時響應性能的同時,減少了網路數據流量,降低了web服務器成為系統瓶頸的可能性,也增強了系統的可移植性。
  7. Several approaches are provided to construct secure operating systems. the paper mainly discusses diverse security policies in operating systems. by the gfac framework, we implement several security policies in linux kernel version 2. 2. 14, including hru model based fine grain discretionary access control, multi - level security policy based mandatory access control and biba model based integrity access control

    文章研究了如何在操作系統中實現多種安全策略,並在linux內核版本2 . 2 . 14中根據控制通用框架( gfac )方法,實現了基於hru模型的細粒度自主控制、基於bell - lapadula模型多級安全規則的強制控制以及基於biba模型的強制控制等多種安全策略,從而有效地增強了操作系統中信息的保密性和完整性。
  8. Through the analysis of the user access characteristics in the net, the " file burst access, fba " and the " server tide access, sta " characteristics are discovered. based on these two characteristics and some existing technology, a file - oriented distributed system " dftp " model is built to solve the problems in the lans. this system is built upon the application level, it is transparent to the end users

    本文分析了目前在這類網路中文件下載服務存在的一些題,並對其自身特和用戶對文件的進行統計分析,提出了「文件的爆發( fileburstaccess , fba ) 」和「服務器的潮汐( servertideaccess , sta ) 」這兩個網路中用戶的基本
  9. Therefore, based or a great number of literature reviews, this paper employs questionnaires, on - the spot interview, mathematical statistic approach and logical deductive approach, etc to have a research on the health education of the key middle schools in shandong province. here, the author draws the following tentative conclusions : 1. in shandong province, the health education has n ' t been paid much attention to yet, few schools have set the leading office for health education and the leading personnel have less authority

    為此,本文從調查山東省中學的健康教育現狀的入手,在佔有大量文獻資料的馴上,採用卷調查法、專家談法、數理統計法、邏輯歸納法等多種研究方法,對山東省中學健康教育進行研究,初步得出以下結論: 1 、山東省中學的健康教育尚禾得到克分視,設有健康教育領導機構的學校較少,領導機構成員的權威不高。
  10. First, the paper introduces the basic knowledge of the image processing technique, emphasizes the image processing method that is used in the measur - ement system, such as edge detection operator, curve fitting algorithm, espe - cially hough change in detail, etc. second, the paper introduces the vc + + 6. 0 program language, analyses its peculiarity and advantage, explains the form of the image in the computer and dib visiting functions

    首先,介紹了圖像處理方法的基礎知識,特別講述了在本系統中將會應用到的一些圖像處理方法,如邊緣檢測運算元、曲線擬合演算法等等,尤其是對于哈夫變換的方法,進行了詳細闡述。其次,介紹了本系統所應用的編程語言vc + + 6 . 0 ,分析了其特和優,並說明了模擬圖像數字化后,在計算機里的存儲格式以及相應的設備無關位圖函數。
  11. Being a widely utilized public ip platform, it is susceptible to security attacks of all nature, as outlined in the following areas : the open nature of the ip internet systems - increase of foreign attacks, for example dos / ddos attacks ; the current weakness of the existing operating system ' s internet protocol ; mainframe, and lack of an evaluation standard for back office systems, the inevitable problem of illegal internal access, the lack of guidelines for record keeping and post attack documentation processes, hi addition, still in existence, are managerial problems including the lack of securit y knowledge amongst the workforce and the inexistence of a complete set of security guidelines. to guarantee china telecom ' s 163 / 169 system ' s reliable functions, to protect the user ' s interests, at the same time, insuring quality service, it is necessary to adapt p2dr model as a solution to the current security issues. supported by the modern secure theory and made the secure implementation abundant project practices, this paper gives the general secure design for the chongqing public ip network using p2dr secure model

    中國電信建設的公眾ip網對我國internet的發展起著決定性作用,慶電信163 / 169網際網路是國家骨幹網在本地的延伸,擁有7個核心節(採用cisco12012 、 2 * 2 . 5gdpt環) ,三十八個匯接節,能提供寬帶,窄帶多種接入方式的公眾ip網,現擁有近20萬用戶,佔全市網際網路用戶四分之三以上,作為這樣一個擁有眾多用戶,開放的ip平臺,會受到各種各樣的安全威脅,主要表現在ip網路的開放性,來自外部的攻擊增多,如dos / ddos攻擊;所使用的操作系統運行的網路協議自身的脆弱性;主機、網路設備的配置是否缺乏評估手段;不可避免的內部非法;缺乏必要的攻擊審計作為犯罪取證,出此之外,還有管理上的一些題,如人員安全意識不強,安全制度不夠健全等多方面原因。
  12. In the third part, by the medium of questionnaires and interviews with edm including those studying in the campus and those having graduated, the author chiefly finds out the condition of environmental construction of school modern educational technology in their own regions and the situation of their mastering and using modem educational technology before and after their enrollments. on the basis of this, the author pertinently probes into the ways to cultivate and develop edm on fundamental theories and methods of modem educational technologies, even into the existing technological problems and countenneasures against these problems

    第三部分通過對我校在讀和已經畢業教育碩士的卷調查和談,了解了教育碩士所在地區和學校現代教育技術環境建設情況及其在入學前後掌握和運用現代教育技術的情況,在此基礎上對如何培養和提高教育碩士現代教育技術基本理論、方法和技術以及存在的題和對策進行了有針對性的探討。
  13. 5 hong x l, jing t, xu j y, bao h y, gu j. cnb : a critical - network - based timing optimization method for standard cell global routing

    即:每隻螞蟻各自維護一個列表,記錄已經過的結,以此避免同一個結
  14. New and consistent competition advantages all result from custom ' s satisfactory and changing innovations. a thorough procedural reproduction contains three phrases. first of all, by market researching, inter - communication and other methods, we need to find problems and begin to rearrange all procedures ; secondly, by reorganizing the management procedure of valued customers, the structure of luzhou telecom corp., front and back sla service protocol and kpi performance evaluation items, it support, we can correct problems after segmental test

    一個完整的流程再造工作包括三個階段:第一,通過市場調研、內部談等對所有流程進行梳理,找出題,確定優化流程;第二,設計瀘州電信新的大客戶管理流程和組織結構、前後端sla服務水平協議和kpi績效考核指標、 it支撐,通過局部試用,發現題,新調整;第三,設計計費與賬務處理流程、網路資源調配流程、滾動性網路投資流程、 it支撐,內部推廣,全面推進企業的流程再造工作。
  15. Indeed it is a great privilege to be able to see - even in such a short visit - so many of your historic places ; to have the chance to witness at first hand so many of the important developments here in china ; to have been welcomed with such kindness for which i am grateful ; and to have the special privilege of discussing with your leaders all the important issues that effect the future of our global economy

    盡管此次日程的時間非常短暫,我還是很榮幸地參觀了貴國著名的歷史古跡,並親眼目睹了中國許多方面的要發展;我非常感謝貴國如此友好的接待;並很高興與貴國領導人就影響未來全球經濟的許多要觀進行了廣泛磋商。
  16. In the paper, the engendering and development, business flow and function of logistics distribution are analyzed, that logistics distribution is important link and assurance of realizing e - commerce are analyzed, the problems existed in e - commerce logistics distribution in china is put forward by the actuality of e - commerce logistics distribution in china, and the above study establish the basement of later study. logistics distribution ' s demand to e - commerce, the feature of e - commerce logistics distribution, the way of reducing cost of e - commerce logistics distribution, actuality of the mode of e - commerce logistics distribution in china are analyzed, and the mode of e - commerce logistics distribution in china is put forward ; by selectively studying the theory and method of logistics distribution and studying the principle and method of dividing the group of places, the model logistics distribution allowing visiting repeated of multiple places is established, the model is used to solve rational distribution sequence to reach lest cost to allowing visiting repeatedly, and an actual example is taken. the model logistics distribution in emergency has been established on the base of studying the necessity of logistics distribution in emergency in logistics distribution center

    本文分析了物流配送的產生和發展、物流配送的業務流程和功能及物流配送是實現電子商務的要環節和保證,並結合我國電子商務物流配送現狀,指出了我國電子商務物流配送存在的題,為進一步研究奠定了基礎;分析了電子商務對物流配送的要求、電子商務物流配送的特徵和降低物流配送成本的途徑,並結合我國電子商務物流配送模式實際,提出了我國電子商務物流配送模式構想;通過對電子商務物流配送理論方法選擇研究,在站群的劃分原則和方法的基礎上,建立了多站可以的物流配送模型,運用該模型,可以求解合理的配送次序,使可以時配送費用最少,並列舉了實例;通過研究緊急情況下物流配送的必要性,建立了緊急情況下的物流配送模型,運用該模型,可以解決配送中心在缺貨的情況下,選擇合理的供貨及運輸方式的題,使供貨時間最短、供貨費用最少,並列舉了實例、編制了相應的軟體。
  17. Based on qualitative research, the thesis applies to the methods of questionnaire, interview, group discussion and specialized - study etc. it selects shang jiahe middle school in tongwei county as the case to makes the in - depth interview. through this process the thesis studies their conditions of family education and school livings, and the educational concept of their parents " or custodians so as to fully demonstrate the contradiction and problems in such a group. the study shows the problems existing in the unattended children are the followings

    研究運用質的研究方法,同時採用卷法、談法、專題研究法、小組討論法等多種方法,以通渭縣上家河中學為個案,通過對初中年級留守學生的談,深入考察了其家庭教育狀況及留守子女的父母、代養人的教育觀念和他們的學校教育狀況,力圖揭示出存在於留守子女家庭教育、學校教育中的各種矛盾和題。
  18. And introduced the information discover technology, which includes topology discovery, host scan and host os detection, etc. and is needed by the isolation technology. and then introduced the principal of end host isolation technology based on ospf, put forward two methods of isolation : configure ip address and configure the routing table. and the compared the use area and the speed of this two methods

    然後介紹了末端隔離技術所需要的網路信息獲取技術原理,包括拓撲發現和主機探測技術,接著介紹了基於ospf的末端隔離技術的原理,提出兩種隔離方式:配置主機ip和配置路由表方式,並對比分析了這兩種方式的使用范圍和速度,介紹了隔離效果驗證與對隔離節定向技術。
  19. If errors are spotted or users lodge complaints, the site must be updated with immediate, localized changes that do not interrupt current site visitors by restarting the server

    如果出現錯誤或者用戶發出抱怨,那麼站會進行快速和局部化的更改而得到更新,同時這些更改並不會因為新啟動服務器而中斷當前的站者。
  20. Symp. advances in spatial and temporal databases, angra dos reis, brazil, 2005, pp. 328 - 345

    眾所周知, df搜索有一個回溯操作,導致了一些結
分享友人