e to e (end to end) 中文意思是什麼

e to e (end to end) 解釋
全長
  • e : (pl E s e s )1 英文字母表第五字母。2 【音樂】E調,E音。3 E字形。4 〈美國〉(順序)第五等,(成...
  • to : adv 到某種狀態;〈特指〉到停止狀態;關閉。 ★也常和動詞結合,略去其後賓語,而構成成語: The door i...
  • end : n 1 端,尖,末端,終點。2 邊緣;極點,極限。3 結局,結果。4 目的。5 最後,死。6 【紡織;印染】經...
  1. Db2 rollforward database sample to end of logs and complete recover dropped table 000000000000bb000002000d to e : - tmp

    現在,在被刪除表的ddl語句清單中創建被刪除的表。
  2. Germany were winning the match until just before the end when the other team equalized, i. e. scored another goal to make the scores equal.

    德國隊就要贏得這場比賽,而恰在終場前對方扳平,即射入另一個球使比分相等。
  3. Strip - shape underground structures such as the tunnels and tubes for various uses can be treated as a beam on elastic foundation under earthquake condition although there exists soil - structure interaction the foundation soil vibration is dominant in other words analysis of earthquake response of the soil is essential to this end simplified models ( i. e equivalent mass system models based on some equivalence criteria ) are proposed instead of a general 3 - d continuum model in this study equivalence criteria are proposed and the simplified models are compared the single - mass - string model is proved to be valid and therefore applied to the analysis of earthquake response of the pearl river immersed tunnel

    條裝地下結構如隧道、各種埋設管道等一般可看作彈性地基梁進行靜力及動力分析在地震條件下,結構與土相互作用,但土的振動成為主要因素為分析土的地震響應需把基土這一三維連續體作簡化處理,簡化成為等效多質點模型本文著重探討這種簡化模型的建立方法,推導等效方程,通過幾種簡化體系的分析比較,論證單質點串體系的合理性,並將其應用到廣州黃沙芳村珠江水下隧道工程的地震響應分析,為抗震設計提供依據
  4. Not impossibly, with 1 or 2 stripper cows, 1 pike of upland hay and requisite farming implements, e. g., an end - to - end churn, a turnip pulper etc

    有上一兩頭擠不出奶的母牛,一垛高地牧草和必要的農具,例如直流式攪乳桶和蕪青攪碎機等等。
  5. The first three remained constantly in a small waiting - room, ready to obey the summons of a small golden bell, or to receive the orders of the romaic slave, who knew just enough french to be able to transmit her mistress s wishes to the three other waiting - women ; the latter had received most peremptory instructions from monte cristo to treat haid e with all the deference they would observe to a queen. the young girl herself generally passed her time in the chamber at the farther end of her apartments

    那三個法國女人總是呆在一間小小的候見室里,只要聽到小金鈴一響,就立刻進去侍候,或是由那個希臘女奴從裏面傳話出來,希臘女奴略懂一點法語,足以向另外三個侍女轉達她女主人的命令,基督山吩咐過那三個法國侍女,她們對待海黛必須極其恭謹尊敬,要象侍奉一位王后一樣。
  6. 13 does the supplier perform the first piece approval process at the beginning of each shift, line change over, and after a major disruption to the production line ( e. g. boundary samples for appearance items, gage for dimensional items ), retain this first piece to the end of the production run / shift to compare with the last piece

    供應商是否在每班生產前、換線后、和生產線被中斷后執行首件批準程序(例如外觀件的邊界樣件、尺寸檢測的檢具) ,保留首件用於與班次/生產線結束的末件對比?
  7. To maximize the value to the customers, the service clusters will seek to provide services along the whole value chain ( e. g. from application for travel documents to purchase of airline tickets and travel insurance ) and adopt an end - to - end processing approach ( e. g. from e - bookinge - submission to e - payment )

    為充分發揮群組對用戶的價值,服務群組將盡量提供整條價值鏈的連帶服務(例如由申請旅行證件以至購買機票和旅行保險) ,並會採用端對端的方式處理交易(例如由電子預訂電子遞交以至電子付款) 。
  8. Provides an end - to - end solution connecting cellular phones, pdas, and other pervasive devices to e - business

    提供了一個連接手機、 pda和其他普及性設備與電子商務的端到端解決方案。
  9. This is difficult, though, and may end the experience completely, i. e., forcing a return to the waking state

    盡管這很困難,並會徹底結束這種經歷,即:迫使回到清醒狀態。
  10. In the electronic filing process, the return information will be end - to - end encrypted i. e. from the taxpayer to the department with strong encryption technology 128 - bit secure socket layer by using a " session " key and ird s public key

    報稅表資料在傳送到稅務局前,系統會使用強化加密技術128 - bit secure socket layer ssl ,以「對稱密碼匙」 session key一組由電腦隨機產生的數值及稅務局的「公開密碼匙」將資料作站對站式加密。
  11. In the return filing process, the return data will be end - to - end encrypted i. e. from the taxpayer to the department with strong encryption technology 128 - bit secure socket layer by using a " session " key and ird s public key so that data confidentiality can be preserved

    系統會使用強化加密技術128 - bit secure socket layer ssl ,以「對稱密碼匙」 session key一組由電腦隨機產生的數值及稅務局的「公開密碼匙」將資料作站對站式加密,以達保密效果。
  12. In this article, the author believes that japan is the target export market of cluft, while jinxi petrochemical company and jinzhou petrochemical company are the major rivals resulting from explaining the business of the company and its export situation along with the problems that exist in this respect, analyzing domestic business environment in the export of the petroleum coke including an account of the local petroleum coke export policy and export situation of the industry besides that of the major rivalry, analyzing the international environment covering also the international market structure, its salient points, the trend of market development and its behaviors. finally, the author briefs product policy, pricing policy, promotion policy and distribution policy in cluft ' s export of the petroleum coke. at present cluft should adjust product structure, guarantee product quality, strengthen after - sale service, maintain present price level, build up complete quote system as soon as possible, establish good public relations and suitable impelling system of the company, focus on end - user service, develop new customers and e - business to continuously eliminate the bottlenecks and create a more prosperous prospect in pet coke export

    通過闡述遼化聯貿公司企業概況及石油焦產品出口現狀和存在的問題;對國內經營環境包括國內石油焦產品出口政策、行業出口情況及國內競爭對手情況進行分析;對國際環境包括國際市場結構與特徵、國際市場發展趨勢及特徵等進行分析,作者最終確定了日本是遼化聯貿公司的目標市場,錦州石化分公司、錦西石化分公司是遼化聯貿公司的主要競爭對手,並提出在產品、價格、促銷及銷售渠道策略方面應採取調整產品結構、保證產品質量及加強售後服務;目前宜採取保價銷售的策略並應盡快形成完善的報價體系;建立良好的公共關系和激勵制度;著力做好終端銷售、大力開發新客戶等具體對策,從而不斷消除石油焦產品出口的「瓶頸」 ,創造遼化聯貿公司石油焦產品出口的新局面。
  13. The more we end on national defe e to protect our shores form foreign aggre ors ( gu ), the le we can end on personal goods to raise our standard of living at home ( butter )

    我們為保護邊岸不受外國的侵略而在國防上花費的錢越多(槍) ,在國內我們花費在提高生活水平的商品上的錢就越少(黃油) 。
  14. The change of potential from beginning to end ( the potentiometric difference, a e ) is made of quantifying parameter. different substrates such as gold planar, gold wire and silver wire is used to fabricate this immunosensor

    用自組裝單分子膜( sams )技術在金片、銀絲、金絲等不同的基底上固定igg抗體,分別制備了電位型無標記igg免疫傳感器。
  15. To that end, more involved data assimilation methods, e. g. three - dimensional or four - dimensional variational analysis and extended kalman filtering technique, will also be explored

    資料同化可能需要採用更深入的運算方法,如三維或四維變分法及增強卡爾曼濾波等技術。
  16. To terminate a computational process in accordance with some rule, e. g., to end the evaluation of a power series at a specified term

    根據某種規則終止一個計算過程,例如,對冪級數估值時,取到指定項就停止運算。
  17. The united natio is marking international women ' s day with calls for countries to do more to end rape, killings and other violence agai t women, e ecially during armed conflicts

    聯合國在國際婦女節之際呼籲世界各國更加努力制止強奸、殺害和其它針對婦女的暴行,特別是在武裝沖突期間。
  18. The major recommendations of the working group include enhancing enterprise awareness of business benefits, capabilities ( including the security aspects ) and service offerings of wireless solutions ; encouraging continuous development of information security technologies solutions, generic products based on open standards, and seamless end - to - end chinese language - supported it systems with wireless extensions ; continuing to promote wider use of wireless services within the government, a key it user, in line with established e - government policy ; and fostering closer co - operation between various ict sectors

    工作小組的主要建議包括:加強企業用戶對無線技術的好處、能力(包括保安能力) 、和產品種類的認識;鼓勵持續發展資訊保安技術方案、採用開放標準的通用產品、和支援中文並具備無線功能的資訊科技系統;繼續按既定的電子政府政策,推動作為主要資訊科技使用者的政府更廣泛採用無線服務;以及促進各資訊及通訊科技界別的更緊密合作。
  19. He provides thought leadership for e - business integration solutions with a focus on web services and end - to - end solutions

    他專門從事web服務和端到端解決方案的研究,為電子商務的集成解決方案提供思想指導。
  20. A encryption - employing the network and security measures under the esd platform, i. e. the end - to - end encryption methodology using secure sockets layer and public key infrastructure

    A加密應用已建立在公共服務電子化平臺上的網路及保安設施,包括採用保密插口層ssl及公匙基建pki的點對點加密技術。
分享友人