非系統人員 的英文怎麼說

中文拼音 [fēitǒngrényuán]
非系統人員 英文
non-system personnel
  • : Ⅰ名詞1 (錯誤) mistake; wrong; errors 2 (指非洲) short for africa 3 (姓氏) a surname Ⅱ動詞1 ...
  • : 系動詞(打結; 扣) tie; fasten; do up; button up
  • : Ⅰ名詞1 (事物間連續的關系) interconnected system 2 (衣服等的筒狀部分) any tube shaped part of ...
  • : 員名詞1. (指工作或學習的人) a person engaged in some field of activity 2. (指團體或組織中的成員) member Ⅱ量詞(用於武將)
  • 系統 : 1. (按一定關系組成的同類事物) system 2. (有條理的;有系統的) systematic
  1. It is as follows : the overlay of endowment insurance is narrow, the most individual indust - - ries, the private enterprise and non - agriculture persons still have not brought into the current endowment insurance system ; the levy level descends, the phenomenon of arrearage still cannot be forbidden ; the level of orchestration is low and lack of adjustment necessarily ; " the difference in amount appropriates different insurance fee " the problem still exists ; the retirement age is so early " the phenomenon of reti - - rement in advance is more serious ; the degree of socialization is low, the onus of the state - owned enterprise is overweight and so on

    主要表現在;養老保險覆蓋面窄,大多數個體工商戶和私營企業以及農業還沒有那入到現行的養老保險體;征繳水平下降,欠費現象屢禁不止;籌層次低,缺乏必要的調劑; 「差額繳撥」問題依然存在;退休年齡鍋灶, 「提前退休」現象比較嚴重;社會化程度低,國有企業負擔過重等諸多方面。
  2. The article points out the importance and necessity of the information - security from its actuality in our country. the resources in the information system, for instance, hardware, software, data, document, operator, meterial and so on, are evaluated and gived safety grade firstly. and then, it analyses the menace including the nonauthorized access, the information leak, the refused sevice, the internal objection which the system will take. the following are the corresponding control police : confirm the users " rights and duties, including the mode of using account, the limit of accessing resource, the application of password, the building of backup ; confirm the administrators " right and duties, including physical safety, system configuration, account configuration and usufruct, password management, audit and control, backup and individual intimity ; run - of - mill measure of security defence, including access control, symbol and identification, integrality control, password technique, firewall system, audit and resumption, safety of operating system, safety of database system, defence of computers " virus and resisting - deny protocol. in the end, the article offers the strategies of disposing the safety - accident and analyse after ithow. to report it, how to solve it in phase, and how to avoid it happening again. in a word, the article presents a holistic resolvent about keeping away the information system ' s security, and supplies a essential frame for its configuration, management and application

    然後,對可能受到的威脅,包括授權訪問、信息泄漏、拒絕服務和內部缺陷等進行分析,並提出了相應的控制策略:確定用戶的權力和責任,包括帳戶使用方式、資源訪問權限、口令應用以及建立備份等;確定管理的權力和責任,包括物理安全、配置、帳戶設置及使用權限、口令管理、審計和監控、備份以及個隱私等方面;一般性的安全防護措施:存取控制、標識和認證、完整性控制、密碼技術、防火墻、審計和恢復、操作安全、數據庫安全、計算機病毒防護和抗抵賴協議等。最後,對事故處理和事後分析提供策略,如何報告安全事故,如何協調解決安全事故,如何避免安全事故再次發生。總之,本文對信息安全防範工作給出一個整體的解決方案,為其在配置、管理和應用方面提供了基本的框架。
  3. A dynamic hierarchical description method for workflow is presented. the method provides a dynamic hierarchical way to define a workflow with non - determinate or dynamic factors. with this method, the main process defined at build - time can be reified and extended by the principle of the sub - organizations at either the build - time or the run - time. to ensure the consistency and integrity of the description, a series of constraint rules are also discussed to realize seamless integration between a decomposed process and its original one. this approach supports the description of unpredictable uncertainties, the dynamic hierarchy of business process, and the dynamic modification of enterprise organizations, and all of these improve the flexibility and extendability of workflow management systems dramatically

    為支持流程中不確定性因素和動態因素的描述,提出了柔性工作流的動態層次描述方法,使得流程設計在流程定義階段定義的主流程可以在任意時刻由子組織的負責進行細化和擴充.為保證動態層次描述的正確性和完整性,討論了動態層次描述的一列約束規則,確保分解后的流程與原有流程實現無縫銜接.該描述方法支持對不可預知的確定性因素的描述,支持業務流程的動態層次描述以及組織機構的變化,極大地增加了工作流管理的柔性和可擴展性
  4. Booz allen hamilton is a leading international management consulting company headquartered in the u. s. with a history of 90 years, 14, 000 employees on six continents and an average annual revenue over us $ 2. 5 billion, bah provides services in strategy, organization, operations, systems and technology to the world s leading corporations, government, emerging growth companies and ngos

    公司橫跨六大洲,雇達一萬四千,每年收入超過二十五億美元。博思艾倫為世界頂尖企業、政府、新興企業和牟利組織就策略、組織、營運、和科技等方面提供諮詢服務。
  5. The continuing operation of a cooling - water system that may service an item of equipment is either essential or non - essential to the survival of the facilities or personnel, in event of a fire

    試譯如下:冷卻水在發生火災時繼續發揮其性能的能力是設施或安全的主要因素或主要因素。
  6. Neither the bank, its associates, nor any of their directors, officers or employees, shall be liable to the customer for any expenses, loss or damage suffered by or occasioned to the customer by reason of any action taken or omitted to be taken by any one or all of the bank, its associates, their directors, officers, employees or agents pursuant to these conditions or in connection therewith other than as a result of the fraud, wilful default or negligence of the bank, its associates, their directors, officers, employees or agents ; the bank s failure in good faith to honour any stop - payment instructions given by the customer ; the presentation to the bank of any cheque or other payment order which is post - dated ; the bank failing to honour any draft drawn on it by the customer, but the bank shall immediately return such draft to the customer through the normal channels giving the reason for the dishonour ; any loss, damage, destruction or misdelivery of or to the securities howsoever caused unless the same shall result from the negligence of, or theft by, the bank or its associates or any of their directors, officers or employees, in which event the extent of the liability of the bank shall be limited to the market value of such securities at the date of discovery of the loss and even if the bank has been advised of the possibility of such loss or damage ; unauthorised use or forging of any authorised signature as a result of the negligence, wilful default or fraud of the customer ; subject to condition 5. 5, any act or omission, or insolvency of, any person not associated with the bank including, without limitation, a third party nominee or depositary ; viii the collection or deposit or crediting to the custodian accounts of invalid, fraudulent or forged securities or any entry in the custodian accounts which may be made in connection therewith ; any malfunction of, or error in the transmission of information caused by, any electrical or mechanical machine or system or any interception of communication facilities, abnormal operating conditions, labour difficulties, acts of god, or any similar or dissimilar causes beyond the reasonable control of the bank and notwithstanding paragraph, the error, failure, negligence, act or omission of any other person, system, institution or payment infrastructure

    本行其聯士其各董事高級或雇均毋須向客戶因以下理由而使客戶蒙受或產生之任何開支損失或虧損負責: i本行其聯士其董事高級或代理根據此等條件採取或遺漏採取有關之行動,但由於本行其聯士其董事高級或代理之欺詐行為故意失責或疏忽所造成者除外ii本行本真誠地未能依約替客戶執行止付指示iii向本行提交任何遠期支票或其他付款指示iv本行未能兌現由客戶開出之匯票,但本行將立即透過正常渠道將該匯票退回客戶,並解釋拒付之理由v無論如何導致之任何證券之損失損毀毀壞或錯誤交付除上述各項乃因本行或其聯士或其任何董事高級或雇之疏忽或盜竊所引致,而在該等情況下,本行的責任將只限於在發現損失當日該等證券之市值,以及即使本行已獲知該等賠償之可能性vi因客戶之疏忽故意失責或欺詐行為而導致的任何偽造授權簽名或不獲授權使用該簽名vii在第5 . 5 a條之規限下,與本行無關者之任何行動或遺漏或無償債能力包括但不限於第三者代名或寄存處viii代收或存入或貸存於保管賬戶的無效偽造或假冒證券或在保管賬戶記入可能與此有關之賬項ix任何電子機械或失靈或因該等機件或產生的資料傳送錯誤或任何通訊設施之終斷不正常操作情況勞工問題天災或本行所能合理控制之任何類似或類似原因及x盡管有第ix項,任何其他機構或付款設施的錯誤故障疏忽行動或遺漏。
  7. As a crucial embedded development tool, the embedded system debugger is usually used to debug and test embedded software 。 a embedded system debugger consists of a cross debugger and a debugger agent, which characteristic lies in the separation of running environments between the cross debugger and the debuggee and the dependence on the gdb agent in the debug session 。 with the development of embedded technique, various embedded debug techniques continuously advance and all kinds of embedded system debuggers are playing a more and more important role in the embedded software development 。 the gnu debugger, gdb as a tool in the gnu toolkits, is an extremely powerful source - level debugger 。 among gdb ’ s many noteworthy features, its ability to debug programs “ remote ” is fascinating 。 this capability is not only essential when porting gnu tools to a new operation system or microprocessor, but it ’ s also useful for developers who need to debug an embedded system based on a processor that gnu already supports 。 gdb is the preferred solution in embedded development because it provides portable, sophisticated debugging over a broad rang of embedded systems 。 this paper discusses the status quo of various embedded system debuggers ; deeply analyses the overall structure of gdb and the debugging mechanism of gdb based on its source codes ; introduces the gdb ’ s remote debug technique and gdb / mi, which are usually used to develop the gdb - based embedded system debugger 。 then dwells on how to use gdb / mi to develop a gui front and how to use rsp 、 stub and gdbserver to design a debug agent, in order to expatiate on the design method of the gdb - based embedded system debugger 。 in the end, provides a concrete implementation of the gdb - based embedded system debugger of “ embedded simulation development platform ”, the project of the innovation fund for technology based firms 。

    這個特性不僅在將gnu工具移植到一個新的操作和微處理器的時候很有用,對于想調試一個基於gnu支持的晶元的嵌入式的開發來說,也是常有用的。由於gdb提供了在大多數嵌入式上的可移植的、復雜的調試功能,它已成為嵌入式開發的首選解決方案。本文討論了當前的各種嵌入式調試器的現狀,結合源代碼詳細分析了gdb的結構和調試原理,介紹了開發基於gdb的嵌入式調試器常用的遠程調試技術和gdb / mi介面;然後詳細闡述了如何使用gdb / mi開發gdb的圖形前端和怎樣使用rsp協議、 stub和gdbserver設計一個調試代理,從而較深入地討論了基於gdb的嵌入式調試器的設計方法;最後,結合國家中小型企業創新基金項目「嵌入式模擬開發平臺」 ,給出了一個基於gdb的嵌入式調試器具體實現。
  8. Being a widely utilized public ip platform, it is susceptible to security attacks of all nature, as outlined in the following areas : the open nature of the ip internet systems - increase of foreign attacks, for example dos / ddos attacks ; the current weakness of the existing operating system ' s internet protocol ; mainframe, and lack of an evaluation standard for back office systems, the inevitable problem of illegal internal access, the lack of guidelines for record keeping and post attack documentation processes, hi addition, still in existence, are managerial problems including the lack of securit y knowledge amongst the workforce and the inexistence of a complete set of security guidelines. to guarantee china telecom ' s 163 / 169 system ' s reliable functions, to protect the user ' s interests, at the same time, insuring quality service, it is necessary to adapt p2dr model as a solution to the current security issues. supported by the modern secure theory and made the secure implementation abundant project practices, this paper gives the general secure design for the chongqing public ip network using p2dr secure model

    中國電信建設的公眾ip網對我國internet的發展起著決定性作用,重慶電信163 / 169網際網路是國家骨幹網在本地的延伸,擁有7個核心節點(採用cisco12012 、 2 * 2 . 5gdpt環) ,三十八個匯接節點,能提供寬帶,窄帶多種接入方式的公眾ip網,現擁有近20萬用戶,佔全市網際網路用戶四分之三以上,作為這樣一個擁有眾多用戶,開放的ip平臺,會受到各種各樣的安全威脅,主要表現在ip網路的開放性,來自外部的攻擊增多,如dos / ddos攻擊;所使用的操作運行的網路協議自身的脆弱性;主機、網路設備的配置是否缺乏評估手段;不可避免的內部法訪問;缺乏必要的攻擊審計作為犯罪取證,出此之外,還有管理上的一些問題,如安全意識不強,安全制度不夠健全等多方面原因。
  9. With either shelf - life system, it is important that staff be properly trained to handle sterile products

    不管使用哪一種有效期常重要的一點是受到正確培訓。
  10. Through interview and investigation to the audiences and the principles from 6 volleyball clubs in 2005 - 2006 national league matches ’ season, the results indicate that most of the clubs don ’ t have a unified criterion in ticket layout designing. since the advertisement is usually combined with the ticket, it is not convenient for the consumers to get the relative information ; most of the clubs grade the tickets, but the price is usually above audiences ’ expectation which generally is concentrated in 20bmb and 30 ? 50 rmb ; the booking channel is not sufficiently unobstructed in some degree, and 37. 29 % of the interviewed audiences felt inconvenient, 3. 32 % met difficulty buying the ticket. those who consider convenient account for 59. 39 % ; advertisement is taken by most of the clubs as the common promotion strategy, while another promotion way that is to utilize public relation doesn ’ t get enough recognition ; most of the clubs don ’ t launch any market investigation before they make ticket marketing strategy and what ’ s more 4ps strategy unit lacks scientific theoretical basis

    通過對2005 - 2006賽季全國排球聯賽6個排球俱樂部的門票經營負責和現場觀眾進行訪問、調查,結果表明:大部分俱樂部的門票版面設計不科學、不合理,缺乏一的標準,門票和廣告多為聯體型,消費者不易從中獲取信息;大部分俱樂部都制定了不同檔次的門票,門票定價不盡合理,有些偏高,現場觀眾願意接受的全國排球聯賽門票價格集中在20元左右;售票渠道還不夠通暢,在購買門票時仍有37 . 29 %的消費者感到不方便,有3 . 32 %的消費者感到常難,感到購買門票方便的消費者佔59 . 39 % ;在選擇門票促銷方式時,廣告已經成為大多數俱樂部普遍採用的促銷方式,利用公共關進行促銷還沒有得到各俱樂部的足夠重視;大部分俱樂部在制定門票市場營銷策略時都沒有經過市場調研, 4ps策略還缺乏科學的理論指導。
  11. It includes the establishment of the collaborative system, the research of the work mode of the group and the relevant technology that support group works, the development of the application system etc. by establish collaboration circumstance, ameliorate the manner by which people exchange their information, we can clear up the obstacle which generated because of the distance of the time and the space, and so we can save the time and energy of the workers, and improve the result and the efficiency

    它包括協同工作的建立、群體工作方式研究和支持群體工作的相關技術研究、應用的開發等部分。通過建立協同工作的環境,改善們進行信息交流的方式,消除或減少們在時間和空間上的相互分隔的障礙,從而節省工作的時間和精力,提高群體工作質量和效率。海洋石油開發生產調度是一項常復雜的工程,需要綜合處理水文氣象、地理環境、海上鉆井平臺現場設備監控等諸多方面的信息。
  12. The icac made full and extensive use of their powers, including electronic surveillance, search warrants and public and private hearings with the result that there was evidence to suggest that two councillors were involved in soliciting substantial bribes from developers, through go - betweens, in return for supporting their development proposals

    廉署在調查這宗矚目的案件期間,充分運用其權力,包括利用電子監視、執行搜查令,以及舉行公聽會及公開聆訊。最後,證據顯示兩名議透過中間向發展商索取巨額賄款,作為支持其發展計劃的報酬。
  13. This subject is based for the subject topic of 863 program named " vegetable planting agriculture expert system developing frame " ( project number : 863 - 306 - zd05 - 01 - a ). after a long - term research which can be divided into three phases as follows : synthetic analysis of expert systems in agriculture area ; components research and design of knowledge acquisition, representation, and reasoning result explanation ; integration of all the components, the system aimed for non - computer major technicians has been developed. lately, client / server ( c / s ) calculation based on distributed transaction concepts, is gradually becoming popular

    本課題以國家863計劃智能計算機主題關鍵技術課題「蔬菜栽培農業專家開發框架」 (項目編號: 863 - 306 - zd05 - 01 - a )為研究背景,通過對領域應用專家的綜合分析,在研究設計知識獲取、知識表示、推理求解、推理結果解釋、機界面等構件的基礎上,按集成的要求,完成了蔬菜栽培專家開發框架的研究,提交計算機專業能夠直接使用。
  14. Being beaten the coal measures is together achieved program control and the industry tv monitoring system and is beaten the coal measures dependability together to the raise, automation degree, decreases personnel staff in post with they labour intensity, strengthening is beaten coal process operation administration and the. save energy administration, achieving the condition maintenance havees the very much significant sense

    輸煤實現程序控制和工業電視監視對提高輸煤的可靠性、自動化程度,減少崗位和他們的勞動強度,加強輸煤過程的運行管理和節能管理,實現狀態檢修具有常重要的意義。
  15. Relatively - cheap, high - performance, broadcast - acceptable digital cameras and related digital edit and effects post - production systems are now available to more and more creative young programme - makers, who are consequently able, therefore, to pay the membership fee for entrance into what used to be a very exclusive members club

    現在,越來越多的年輕富有創造力的節目製作者能利用相對便宜、高性能、與廣播兼容的數碼攝像機和相關的數碼編輯和後期效果製作;繼而,他們也因此能夠支付會費,有資格進入過去常排外的電視製作俱樂部。
  16. Therefore it is very significant to make the user interface simple and direct by using graphic methods and oriented to non - specialists

    因此,採用圖示化簡單、直觀的建模用戶界面,並面向專業的用戶界面建模具有十分重要的意義。
  17. The shanghai science and technology committee ' s project - fashion design and processing public service platform aims at providing a uniform resource and information sharable platform that is integrated with design, processing and service, at the same time, it will provide information service and intelligent style design based on internet this essay focuses on the intelligent style design oriented to non - professional designers based on internet it designs the structure of the system, and analyzes the background database design and remote data access module, the realization also been given

    上海市科委項目? ? 「服裝加工公共服務平臺」目的就是實現一個集設計、加工和服務於一體的一資源信息共享平臺,為中小型企業提供信息服務和網路化的智能款式設計。本文研究網路化環境下的面向專業的智能服裝款式設計。主要設計了的體結構,對后臺數據庫設計和遠程數據獲取模塊進行了詳細分析,並給出了具體實現。
  18. Specific measures include the intervention services provided by the welfare and healthcare sectors, such as the territory - wide elderly suicide prevention programme ( espp ) run by the hospital authority ( ha ), and the elderly suicide preventive training courses arranged by swd for both professionals and non - professionals

    針對性的措施則包括一些由福利和醫療提供的介入性服務,如醫院管理局(醫管局)提供的全港性防止長者自殺計劃,和由社署提供的有關長者自殺問題的專業和專業培訓計劃。
  19. Intercom : repeat. a bomb has been detected. all non - eod ( explosive ordnance disposal ) personnel must evecuate immediately

    對講:重復。發現一個炸彈。所有排彈立刻撤離。
  20. In this condition, there is a big gap between encoder and decoder, maybe hard encode but easy decode. the new of this article is : do not think from algorithm but from to build a expert system to help the developer who are not skilled in this field, to flatten the big gap between encoder and decoder, to lower the development ’ s cost

    本文的主要工作是:不是從演算法角度來加強圖片加密的強度,而是通過實現一個圖片加密強壯性評估的,來幫助專業背景的圖片加密開發通過直觀的操作來模擬解密過程,填平加密與解密之間的鴻溝,減小專業的開發代價,增強圖片加密的強度。
分享友人