防火管理 的英文怎麼說

中文拼音 [fánghuǒguǎn]
防火管理 英文
fire prevention and control
  • : Ⅰ動詞(防鷥) provide against; defend against; guard against Ⅱ名詞1 (防守; 防禦) defence 2 (堤...
  • : fire
  • : Ⅰ名詞1 (管子) pipe; tube 2 (吹奏的樂器) wind musical instrument 3 (形狀似管的電器件) valve;...
  • : Ⅰ名詞1 (物質組織的條紋) texture; grain (in wood skin etc ) 2 (道理;事理) reason; logic; tru...
  • 防火 : fire prevention; fire safety; fireproof
  • 管理 : manage; run; administer; supervise; rule; administration; management; regulation
  1. Using cd, cu, zn and cr as experimental toxicants and crucian as experimental creature, we employed the environmental biotechniques ( flame atomic absorption spectrophotometry, the method of improved pyrogallol autoxidation and electron microscopy ) to study the acute toxicity and secure concentrations of heavy metals to crucian ; the accumulation and distribution of mixed heavy metals to fingling crucian ; the activities of superoxide dismutase ( sod ) of gill and liver tissues and the hispathological and ultrastructural change of superfine structure of liver and kidney of crucian after cadmium exposure. through which, we intended to fully and systemically study the toxic influence of heavy metals to fish, and preliminarily discuss the influence of heavy metals pollution to the diversified level of fish such as individual, organ, tissue, cell and molecule. thus we tried to provide scientific evidence to establish preventative management measures, avoid and relieve the harm of heavy metals pollution to aquicolous ecosystem in time

    隨后以這幾種重金屬作為實驗毒物,以鯽魚為實驗動物,應用環境生物技術、焰原子吸收分光光度法、鄰苯三酚自氧化法、透射電鏡等技術研究了重金屬cu 、 zn 、 cd和cr對鯽魚的急性毒性及其安全濃度評價、混合重金屬在鯽魚幼體組織內的積累和分佈、 cd對鯽魚鰓和肝臟中sod活性的影響、 cd對鯽魚肝細胞和腎細胞超微結構的影響等,全面和系統地研究了水環境中重金屬暴露對魚類的毒性影響,初步探討了重金屬污染對魚類的個體? ?器官? ?組織? ?細胞? ?分子等各水平層次的影響,為制定漁業生產上預性的措施提供科學依據,及時避免或減輕重金屬污染對水生生態系統造成的損害。
  2. Then this paper concerns about the network packet intercepting technology of linux os and gives a thoroughly overview of network hacking methods and some application protocol criterion, including http, ftp, telnet, nntp, pop3, smtp etc. then the system design scheme of the transparent proxy has been discussed, this system can be divided to 4 modules below : establishment of transparent charnel, implement of proxy service, gui configuration and management application, accessory filter functions ( such as url filter, command filter and logger etc ). we explain key techniques in all 4 main parts of this system, define the interfaces of each module, what is more the main data structures and software implements codes are all illustrated

    首先,論文陳述了墻的相關技術基礎,分析了透明代作為一種先進易用的墻技術的原,闡述了linux操作系統網路數據包攔截技術和http 、 ftp 、 telnet 、 nntp 、 pop3 、 smtp等應用層協議的協議規范和具體的工作流程。接著敘述了本透明代服務器的系統總體設計方案,將系統分為以下幾個部分:透明通道建立、代服務實現、 gui配置程序以及過濾功能(如url過濾、命令過濾和日誌審計等) 。論文然後分別介紹各個關鍵部分的具體實現要點,解釋了相互間的介面關系,列出了主要數據結構和實現流程。
  3. Management work, including weeding, pruning, applying fertilizers and creating of firebreak, has been carrying out regularly since the commencement of the planting project

    由種植開始,工作便已定期進行。工作包括除草、修枝、施肥和設立帶。
  4. The article points out the importance and necessity of the information - security from its actuality in our country. the resources in the information system, for instance, hardware, software, data, document, operator, meterial and so on, are evaluated and gived safety grade firstly. and then, it analyses the menace including the nonauthorized access, the information leak, the refused sevice, the internal objection which the system will take. the following are the corresponding control police : confirm the users " rights and duties, including the mode of using account, the limit of accessing resource, the application of password, the building of backup ; confirm the administrators " right and duties, including physical safety, system configuration, account configuration and usufruct, password management, audit and control, backup and individual intimity ; run - of - mill measure of security defence, including access control, symbol and identification, integrality control, password technique, firewall system, audit and resumption, safety of operating system, safety of database system, defence of computers " virus and resisting - deny protocol. in the end, the article offers the strategies of disposing the safety - accident and analyse after ithow. to report it, how to solve it in phase, and how to avoid it happening again. in a word, the article presents a holistic resolvent about keeping away the information system ' s security, and supplies a essential frame for its configuration, management and application

    然後,對系統可能受到的威脅,包括非授權訪問、信息泄漏、拒絕服務和內部缺陷等進行分析,並提出了相應的控制策略:確定用戶的權力和責任,包括帳戶使用方式、資源訪問權限、口令應用以及建立備份等;確定系統員的權力和責任,包括物安全、系統配置、帳戶設置及使用權限、口令、審計和監控、備份以及個人隱私等方面;一般性的安全護措施:存取控制、標識和認證、完整性控制、密碼技術、墻系統、審計和恢復、操作系統安全、數據庫系統安全、計算機病毒護和抗抵賴協議等。最後,對事故處和事後分析提供策略,如何報告安全事故,如何協調解決安全事故,如何避免安全事故再次發生。總之,本文對信息系統安全範工作給出一個整體的解決方案,為其在配置、和應用方面提供了基本的框架。
  5. The way to create a network that is safe at every point has gradually become a very hot topic in network security. " integerated defence system ", a project founded by electronic development funds of ministry of information industry, is a lucubration in this area

    由信息產業部支持的研究課題「網路集成禦系統」 ,通過對網路中各節點主機的墻進行,在實現多機聯合禦領域進行了探索研究。
  6. Robert s specialties include network infrastructure design with the cisco and nortel product line, network security design and management with ciscosecure and pix firewalls, network management and troubleshooting with ciscoworks, ciscosecure, sniffer - based technologies, and hpov

    Robert的專長包括使用cisco和nortel產品系列進行網路基礎設施的設計使用ciscosecure和pix墻進行網路安全性設計和使用ciscoworks ciscosecure基於嗅探器的技術以及hpov進行網路和故障診斷。
  7. Fsss ( furnace safeguard supervisory system ), which is used in e1der unit that has been brought into operation, of the 1arge and fnediumsized therma1 power p1ant. after understanding the system structure and characteristic of action, rea1izing the theory of fsss, quondam 1ogic of unit is ana1yzed a11 - - sided. based on these, a set of method, which is about technica1 retrofit, is found out

    本文以大中型電廠已投運老機組1的fsss系統為研究對象,在深入了解fsss的系統結構和運行特點,準確掌握fsss系統的論和爐膛燃燒方法的基礎上,對已有的機組邏輯進行全面的分析,並充分考慮了本系統中論與實際運行時的差別,在系統選型。
  8. Research on the design of firewall management system based on usm

    系統的研究與設計
  9. You as the authorized administrator need the configuration client to define a security policy and define network objects and log on to the firewall

    ) ,用戶作為授權員,需要配置客戶來定義安全策略(和定義網路對象以及登錄墻) 。
  10. ( ) i1 t [ lo basi s of " that, we make systemic rosoarcl1 ( ) n l f1o s ( ) cllr i ty ilrct1 i t. cc 1. ljre, dcs i gn out the securi ty so. l ut io11 ; 1l1t ] s l. ci ) i n i, rilc t. i cc ( ) f. s1 ) t } ( t i ; l l network according to the security archi tec turc fr ; tn1e, wi1 icl1 silt i si ! y the need of confidentia1 ity, integri ty, avai 1 abi l i ty, authentj cat ion, authorization and accountable of specia1 network information system

    特別是,論文作者在網路安全系統建設的過程中,獨立承擔了中心子網墻、網路入侵檢測系統、病毒護體系的安裝及工作,在詳細了解了ddn鏈路加密、 pki ca體系的建設和使用原的基礎上,參與了網路基礎設施的安裝調試以及各類服務器的配置,擬定了《計算機信息系統安全規定》 、 《網路ip地址規范》 ,為本單位網路安全建設規劃提出了意見和建議。
  11. Speech by the permanent secretary for economic development and labour labour, mr matthew cheung kin - chung, at the 2006 hong kong institute of human resource management annual conference building a happy, productive and talented workforceon november 22, 2006

    保安局局長李少光在香港物業公司協會周年晚宴上致辭全文十二月十四日保安局局長李少光出席2006 2007運動開幕禮上的致辭全文十二月十日
  12. Latest trojan in the block : supports sin, both ways connection, lan bypass, very small server created by builder. keylogger, filemanager, funstuff, flipper, undetected for now

    簡介:一個少見的,服務端很小的木馬程序,可以穿過墻, 2種連接方式,鍵盤記錄,文件,開玩笑的功能,不能被查殺。
  13. Proponents may propose to integrate the divisional fire station, physical training establishment office, ancillary facilities, fireboat station and fireboat pier with other buildings of wkcd, on the conditions that all the requirements stipulated in the ifp are complied with, and that the reprovisioned facilities are properly separated from other facilities of wkcd and provided with independent circulation systems so that they can be operated, maintained and managed independently

    建議者可建議把分區消總局、體能訓練組辦事處、附屬設施、滅輪消局和滅輪碼頭,與西九龍文娛藝術區的其他建築物結合起來,條件是有關建議必須符合發展建議邀請書所訂明的一切規定,而重置設施則必須與西九龍文娛藝術區的其他設施適當分隔,並且各自設有通道系統,以便可以獨立運作、保養和
  14. Just as burglar alarms alert homeowners when someone has broken through a locked window or door, intrusion - detection systems alert system administrators when hackers have gotten past a firewall, making it possible to thwart the attack and even track down the intruder

    正像有人破窗或破門而入時盜警報警告房屋主人那樣,當黑客突破墻時,入侵探測系統就警告系統員,使得有可能挫敗入侵,甚至也可能追捕入侵者。
  15. It is a large sized metallurgical joint enterprises of common and special steel. there are other factories including changlin machinery group co., jiangxi electrical machines plant, jiangxi steel cable plant, where. escalators, pipe - cutting machines, non - ferrous pressing and casting, stainless steel plastic compound pipes, hi - tech honeycomb porcelain, power fork trucks, power testing machines, hail - preventing and rain - producing rocket shells and other products with high content of technology have a promising market

    長林機械集團、江西電工廠、江西鋼絲廠等一批"軍轉民"企業,憑借其設備、技術和優勢,研製生產的自動扶梯、路不停輸開孔機、有色壓鑄、不銹鋼塑料復合材、蜂窩陶瓷、電動叉車、電源校表儀、雹增雨箭彈等產品科技含量高,市場前景看好。
  16. Fire precautions in the design, construction and use of buildings - managing fire safety

    建築物的設計施工和使用的消措施.安全
  17. By using the method of fault tree analysis, this paper analyses the causes of fire and explosion of catalying & cracking reactor and regeneration, draws the fault trees of fire and explosion accidents of catalyzing & cracking reactor and regeneration respectively, calculates the structure importance, makes the structure importance arrangement according to the structure importance and the least path set, puts forward the prevention measures, and provides the reliable theoretical basis for the safety control of enterprises

    摘要應用故障樹分析方法,對催化裂化反應器和催化裂化再生器發生災(爆炸)事故的原因進行分析,分別畫出催化裂化反應器和催化裂化再生器發生災(爆炸)事故的故障樹,得出最小徑集合,並計算其結構重要度,根據得出的最小徑集合及其結構重要度進行排序,提出預措施,為企業的安全提供了可靠的論依據。
  18. Discussing the fire safety management of the mall from the lesson of lu yang palace fire accident

    從廬陽宮災事故教訓看集貿市場消安全
  19. It is concluded that the analysis is conducive to setting up an effective risk protection and management for the oil depot

    依據故障樹分析的結論提出了降低頂事件概率的範措施,為油庫的風險提供科學依據,並可為其它油庫項目的災爆炸事故分析提供參考。
  20. The traditional fire alarm systems are composed of a controller and detectors, and always transmit signals in the way of wireline transmission. however, the problems of long construction period, high rate of hardware fault and high cost of transmission line puzzle the administrators of fire control. but wireless communication in place of wireline communication can solve these problems effectively

    傳統的集散式災自動報警系統由災報警控制器及災探測裝置組成,其信號傳輸方面多採用有線傳輸,但是這種形式下的災自動報警系統的施工工期長、硬體故障率高、傳輸線成本高等問題常常困擾著消人員,而以無線通信代替有線通信卻能夠很好地解決這些問題。
分享友人