隱式控制 的英文怎麼說

中文拼音 [yǐnshìkòngzhì]
隱式控制 英文
implicit control
  • : Ⅰ動詞(隱瞞; 隱藏) hide; conceal Ⅱ形容詞1 (隱藏不露) hidden from view; concealed 2 (潛伏的; ...
  • : 名詞1 (樣式) type; style 2 (格式) pattern; form 3 (儀式; 典禮) ceremony; ritual 4 (自然科...
  • : 動詞1 (告發;控告) accuse; charge 2 (控制) control; dominate 3 (使容器口兒朝下 讓裏面的液體慢...
  • : Ⅰ動詞1 (製造) make; manufacture 2 (擬訂; 規定) draw up; establish 3 (用強力約束; 限定; 管束...
  • 控制 : control; dominate; regulate; govern; manage; check; cybernate; manipulate; encraty; rule; rein; c...
  1. The structure of this paper goes like this, the first chapter introduce the development of e - b / l in practice and in laws. and draw a conclution that the electrification of the b / l is a history tide. in the second chapter, on the basic of reseach the security trap in e - b / l running, 1 conclude six security elements of, e - b / l : the liability of the system, the authenticity of dealers ' identity. the integrity and secrecy of electronic data, and the validity and evidence effectiveness of electronic data. from the third chapter to the eighth, 1 reseach these elements one by one. the third chapter introduce the establishment of the e - b / l security system, and some related laws the fourth chapter introduce the certification authority of e - b / l. in the fifth chapter, 1 introduce the encrypt of electronic information and some countries ' control on use / import / export crytography. the sixth chapter introduce the concept and principle of digital signature, and reseach some related legal issues. the seventh chapter reseach the legal demand of validity, then come to a conclution that to establish a independent electronic information system is necessary. in the eighth chapter, 1 reseach some countries " regulation on the evidence effectiveness of electronic data

    第二章在分析電子提單運作中的安全患的基礎上,歸納出其六大安全要素,即系統的可靠性、交易者身份的真實性、數據電訊的機密性和完整性、數據電訊的合法有效性以及交易者行為的不可抵賴性。第三章到第八章分別對這六大要素進行分析:第三章介紹了電子提單網路安全體系的建立以及系統安全保護法規,第四章則介紹了電子提單的安全認證機構,第五章介紹了信息加密技術以及各國立法對密碼技術的進出口及使用的,第六章介紹了數字簽名的概念及原理,並以bolero為例介紹了數字簽名的技術方,對有關法律問題作了論述;第七章首先論述了電子提單對有效性的法律需求,然後結合國內法和國際規則的規定論證了數據電訊度產生的必然性;第八章通過對各國立法對電子證據的法律效力的規定,論述了對電子交易至關重要的數據電訊的不可抵賴性。
  2. On an object destructor syntax in c and c

    (在c #和c + +中為析構函數語法)可提供隱式控制
  3. The article points out the importance and necessity of the information - security from its actuality in our country. the resources in the information system, for instance, hardware, software, data, document, operator, meterial and so on, are evaluated and gived safety grade firstly. and then, it analyses the menace including the nonauthorized access, the information leak, the refused sevice, the internal objection which the system will take. the following are the corresponding control police : confirm the users " rights and duties, including the mode of using account, the limit of accessing resource, the application of password, the building of backup ; confirm the administrators " right and duties, including physical safety, system configuration, account configuration and usufruct, password management, audit and control, backup and individual intimity ; run - of - mill measure of security defence, including access control, symbol and identification, integrality control, password technique, firewall system, audit and resumption, safety of operating system, safety of database system, defence of computers " virus and resisting - deny protocol. in the end, the article offers the strategies of disposing the safety - accident and analyse after ithow. to report it, how to solve it in phase, and how to avoid it happening again. in a word, the article presents a holistic resolvent about keeping away the information system ' s security, and supplies a essential frame for its configuration, management and application

    然後,對系統可能受到的威脅,包括非授權訪問、信息泄漏、拒絕服務和內部缺陷等進行分析,並提出了相應的策略:確定用戶的權力和責任,包括帳戶使用方、資源訪問權限、口令應用以及建立備份等;確定系統管理員的權力和責任,包括物理安全、系統配置、帳戶設置及使用權限、口令管理、審計和監、備份以及個人私等方面;一般性的安全防護措施:存取、標識和認證、完整性、密碼技術、防火墻系統、審計和恢復、操作系統安全、數據庫系統安全、計算機病毒防護和抗抵賴協議等。最後,對事故處理和事後分析提供策略,如何報告安全事故,如何協調解決安全事故,如何避免安全事故再次發生。總之,本文對信息系統安全防範工作給出一個整體的解決方案,為其在配置、管理和應用方面提供了基本的框架。
  4. M ( 4 ) do a deep research on the privilege management of the engineering database system co - s _ dbs, and aimed at the requirements of the cooperative design for the privilege management, purpose a privilege management model s _ pmm. this model can not only provide the well - designed structure of the privilege control table and the paniculate privilege control, but also support role mechanism, positive and negative privilege mechanism, concealed privilege mechanism, which well satisfies the requirements of the cooperative design

    ( 4 )對co - s _ dbs工程數據庫系統的權限管理進行了深入的研究,針對協同設計對權限管理的要求設計了權限管理模型s _ pmm ,該模型提供了設計良好的權限製表結構,細粒度的權限,支持角色機、正負權限機權限機,很好的滿足了協同設計的要求。
  5. In chapter three, the all sub - circuits including uvlo, current bias, ldo, oscillator, green mode, slop compensation, power limiting, pwm, ovp, blanking time generator, logic controller are designed and simulated. as a result, all of the sub - circuits are satisfied the requirements

    本文第三章對集成電路內各個模塊包括欠壓保護、電流偏置、 ldo 、振蕩器、綠色模、斜坡補償、功率限、脈寬調、過壓保護、前沿消、邏輯電路等進行了設計與模擬,且達到了預定的設計目標。
  6. ( l ) the three - dimensional equations for tidal flow are derived from the navier - stokes equations based on some assumptions. the model is based on the vincenzo casulli method, and semi - implicit finite difference scheme has been used

    ( 1 )從navier - stokes方程上經過假設和簡化得到的三維潮流方程,以vincenzocasulli法,採用半顯半差分格,建立了一個三維潮流數值模型。
  7. The dominant allele usually controls the normal form of the gene, while mutations are generally recessive

    顯性基因通常基因的一般形,而突變通常是性的。
  8. Soft client server is secretly installed on isp, wan, host computer of important and sensitive part needed to be controlled to collect network data. after transmitting in real - time to email monitor center, pop3, information such as smtp and web - mail from these data are analysis and retrievable, password intercepted, classified and alert, mean wile the center can monitor in real - time on over 1000 nodes by controlling working status and filter condition and software refreshment etc. the system occupies less than 4 percent of system recourse under the condition of without losing package

    客戶端採用安裝方在需要的敏感地區的isp 、局域網、網吧以及上網主機上安裝,對進出的網路數據進行採集,然後將採集的數據實時發送至電子郵件監中心,電子郵件監中心對這些數據中的pop3 、 smtp以及web - mail電子郵件信息進行分析還原、口令截獲、歸類及報警,並根據情況對客戶端的工作狀態、過濾條件、軟體更新等進行操作,從而實現了對高速網路( 100mbps以上) 、 10000個監節點以上網路數據的實時有效監
  9. In this paper, river water quality prediction is integrated with water pollution control measures. two parameters, water environmental capacity and pollution index are selected for pollution control measures. the objective is achieved after the development of simulation model using one - dimensional advection dispersion equation. the model algorithm and computer program is an improvement over the existing water quality models, since the model solution involves four point implicit upwind schemes for water quality prediction and pollution control measures at each grid point. model simulation results the assessment of water environmental capacity that yield the acceptable and realistic pollutants concentration in order to maintain water quality objectives. the pollution and overall pollution index of the river is suggested for integrating number of contaminants variables into one index. study provides the mathematical and scientific procedure for water quality management. the new approach is helpful for the water pollution control and to study the impacts of waste effluents on the river system for strategic planning purposes

    本文將水質預測及水污染措施有機地結合,選取水環境容量和污染指數作為水污染的參數.這樣,一維對流-擴散水質方程的求解除就是實現本研究目的的關鍵.本研究採用的模型在現有的水質模型基礎上有所改進,因為其採用四點對水質進行預測,推求可接納污染物的環境容量值及為保證水質而限定的污染物濃度值,從而定相應的水污染措施.為整體考慮各種污染物的情況,建議採用河流的污染指數進而推求綜合污染指數.總之,本研究為水質保護提供了科學的計算方法,該法對水污染及污水對河道水質的影響是實用有效的
  10. Abstract : in this paper, river water quality prediction is integrated with water pollution control measures. two parameters, water environmental capacity and pollution index are selected for pollution control measures. the objective is achieved after the development of simulation model using one - dimensional advection dispersion equation. the model algorithm and computer program is an improvement over the existing water quality models, since the model solution involves four point implicit upwind schemes for water quality prediction and pollution control measures at each grid point. model simulation results the assessment of water environmental capacity that yield the acceptable and realistic pollutants concentration in order to maintain water quality objectives. the pollution and overall pollution index of the river is suggested for integrating number of contaminants variables into one index. study provides the mathematical and scientific procedure for water quality management. the new approach is helpful for the water pollution control and to study the impacts of waste effluents on the river system for strategic planning purposes

    文摘:本文將水質預測及水污染措施有機地結合,選取水環境容量和污染指數作為水污染的參數.這樣,一維對流-擴散水質方程的求解除就是實現本研究目的的關鍵.本研究採用的模型在現有的水質模型基礎上有所改進,因為其採用四點對水質進行預測,推求可接納污染物的環境容量值及為保證水質而限定的污染物濃度值,從而定相應的水污染措施.為整體考慮各種污染物的情況,建議採用河流的污染指數進而推求綜合污染指數.總之,本研究為水質保護提供了科學的計算方法,該法對水污染及污水對河道水質的影響是實用有效的
  11. The 4th generation fighters are designed to have the ability of supersonic cruise. stealth and supermaneuverability which is based on the high - tech achievements of various fields including advanced aerodynamics, modern control theory and so on. in order to achieve the air superiority in modern air combats

    為了在現代空戰環境和空戰方下取得空中優勢,第四代戰斗機設計提出了超音速巡航、身、超機動性等設計目標,綜合了多學科先進技術,包括:先進的空氣動力學、理論、航空電子技術等。
  12. This paper begins with the drawbacks of the traditional reading practice, emphasizes on the designing programs and principles of computers. such as " the discoloring design of characters " leaping - type ", " the hiding design of characters " leaping - type ", " the regulator ' s design of reading speed ", " the time - limited automatic page - turning design ", " sound - controlling design of characters " discoloration " etc. then makes further statements about the advantages of reading practice design with assistance of computer, namely, the arousal of students " reading interest using fresh reading materials with vital forms ; the efficient controls of reading procedure, the realization of reading individualization, the realization of sounds " visualization

    本文從分析傳統閱讀訓練的缺陷入手,重點介紹計算機「文字躍進變色的設計」 、 「文字躍進匿的設計」 、 「閱讀速度調節器的設計」 、 「限時自動翻頁的設計」 、 「聲文字變色的設計」等設計方案及其設計原理,進而闡述計算機輔助閱讀訓練的優勢,即用形活潑的閱讀材料激發學生的閱讀興趣,有效地學生的閱讀過程,實現閱讀的個性化,實現朗讀聲音的可視化。
  13. Because you control these steps in the process manually, internal transactions can be thought of as manual or explicit transactions, whereas external transactions are automatic or implicit

    由於您手動進程中這些步驟,因此可以將內部事務視為手動或顯事務,而將外部事務視為自動或事務。
  14. Implicit learning of distributed decision group in dynamic system control task

    分散群體在動態系統決策中的內學習
  15. Cool wall wizard dreaming to automatically download various colors wallpaper to work intensely all day into your computer, no longer feel monotonous and boring ; extremely rich in the network wallpaper, the 12 classification, support manually download new wallpaper ; intelligent frame rapid trimming technology, adaptive various popular display size ; timing can be manually or replacement of desktop wallpaper, different timing of the transformation also supports random transform mode ; circle player in the process, support the insertion of local wallpaper, wallpaper and local networks of pictures that turn ; to hide / show desktop icons, wallpaper and user - friendly viewing ; since the launch set to boot, the first time you gave surprise ; cool wall wizard provide three kinds of styles console skin ( white fashion, classic black, gray and elegant ) ; wallpaper borders can set the color to the background transparent desktop text

    雪狐酷壁精靈自動下載各類絢麗的壁紙,讓整天對著電腦埋頭工作的你,不再感到單調、無聊;極豐富的網路壁紙庫,十二大分類,支持手動下載新壁紙;智能邊框快速切邊技術,能自適應各種流行的顯示器尺寸;可以定時或手動更換桌面壁紙,提供不同變換時間的選擇,還支持隨機變換模;循環播放過程中,支持插入本地壁紙,實現網路壁紙和本地圖片的交替顯示;可藏/顯示桌面圖標,方便用戶觀賞壁紙;允許設定開機自啟動,第一時間就給你驚喜;酷壁精靈提供有3種風格的臺皮膚(白色時尚、黑色經典、灰色典雅) ;還能設置壁紙邊框的顏色,讓桌面文字的背景透明。
  16. Because these datu are too large and discrete, it is a difficult and complex task to analysis categorize, index and look up them with traditional artificial methods. and it is more difficult to research into the implicit laws which hide in quality control and management. so, to explore the enterprise ' s information resources efficiently is impossible, and the quality of production can not be pledged well, not to mention make decision - making scientifically

    眾所周知,在水泥生產製造過程中,會產生大量的質量數據,但由於這些數據類繁、量大且分散,以至傳統的人工處理方對其進行分析、歸類、檢索和查找成為一項艱巨復雜的工作,更難于揭示歷史數據中所含的質量和管理規律,從而難以對企業質量信息資源進行充分開發利用,致使企業產品質量難以提高,嚴重地影響質量決策的科學性。
  17. Based on the aerodynamics, control, structural dynamics model of smart rotor in frequency domain deduced and the determination for the number of neurons in hidden layer, the neuro - emulator using multiple independent miso neural networks with its deduced matrix expression for the smart rotor is set up. the rate of training is improved by introducing the orthogonal selection applying for smart rotor to the selection of training cases in neural modeling

    試驗結果驗證了該方法的可行性,在建立了帶有主動后緣附翼的智能旋翼系統氣動--結構動力學數學模型的基礎上,提出了適用於智能旋翼建模的多神經網路並聯型的頻域模型,並推導出其矩陣表達,探討了含層神經元數的確定方法。
  18. To reappear stochastic waveform on esvrst in time field, the minimum variance implicit self - tuning regulators of siso and mimo systems are deduced based on carma models in this paper. the robustness of the regulator being used to control esvrst is validated good

    本文推導了在時域內對電液伺服道路模擬試驗臺進行隨機波形再現時,基於carma模型的,單輸入單輸出系統和多輸入多輸出系統的,最小方差自校正調節器。
  19. You can read standard input, write to standard output and standard error ; use any foreground and background colors you wish ; resize, reposition, hide, retitle the console window, flip between full - screen and windowed operation, and on and on and on

    你可以讀取標準的輸入,寫標準輸出和標準錯誤輸出;使用任意的前景色和背景色;調整大小、位置,臺窗口,在全屏和窗口模間切換,等等。
  20. With the introduction of two variables ? “ shareholders ’ supervision, portfolio of salary and control rights ”, we construct a new tmt “ principle ? agent ” optimizing model ; moreover, basing on mathematical analysis of company performance mechanism, a linear model of corporate performance and tmt incentive portfolio is built ; and also, variables of incentives and control rights are introduced to help parsing tmt incentive problems in the view of the shareholders ’ supervision and we succeed in separating the contribution of tmt ’ s ability to corporate performance from their endeavor. so we propose three ways to inspirit tmt ? annual salary design based on implicit value, performance - based bonus and stock ownership, and non - material incentive portfolio mode as well, which can overcome shortcomings of traditional single explicit material incentives system

    引入公司股東監督變量、薪酬與權激勵組合變量構建新型的高級管理層激勵組合委託-代理優化模型;結合公司績效產生機理的數學分析,構建了公司績效線性模型與高級管理層線性激勵組合模型;引入股票期權激勵與公司權激勵變量,解析基於股東監督的高級管理層激勵問題,成功實現了公司高級管理層能力變量與努力變量對公司績效貢獻的分離解釋;提出了基於性價值的年薪設計、基於績效的獎金與股權設計、基於性需求的非物質性激勵組合模,克服了傳統的單一的物質性顯性激勵的局限性。
分享友人