identification limit 中文意思是什麼

identification limit 解釋
鑒定極限
  • identification : n. 1. 認出,識別,鑒定,驗明(罪人正身等)。2. 【心理學】自居作用。3. 身分證。4. 【數學】黏合,同化。
  • limit : n. 1. 界限,界線;邊界。2. 極限,限度;限制。3. 〈pl. 〉范圍,范域。4. 限價;限額;賭注限額;獵物限額。vt. 1. 限制,限定。2. 減少。adj. -able
  1. The article points out the importance and necessity of the information - security from its actuality in our country. the resources in the information system, for instance, hardware, software, data, document, operator, meterial and so on, are evaluated and gived safety grade firstly. and then, it analyses the menace including the nonauthorized access, the information leak, the refused sevice, the internal objection which the system will take. the following are the corresponding control police : confirm the users " rights and duties, including the mode of using account, the limit of accessing resource, the application of password, the building of backup ; confirm the administrators " right and duties, including physical safety, system configuration, account configuration and usufruct, password management, audit and control, backup and individual intimity ; run - of - mill measure of security defence, including access control, symbol and identification, integrality control, password technique, firewall system, audit and resumption, safety of operating system, safety of database system, defence of computers " virus and resisting - deny protocol. in the end, the article offers the strategies of disposing the safety - accident and analyse after ithow. to report it, how to solve it in phase, and how to avoid it happening again. in a word, the article presents a holistic resolvent about keeping away the information system ' s security, and supplies a essential frame for its configuration, management and application

    然後,對系統可能受到的威脅,包括非授權訪問、信息泄漏、拒絕服務和內部缺陷等進行分析,並提出了相應的控制策略:確定用戶的權力和責任,包括帳戶使用方式、資源訪問權限、口令應用以及建立備份等;確定系統管理員的權力和責任,包括物理安全、系統配置、帳戶設置及使用權限、口令管理、審計和監控、備份以及個人隱私等方面;一般性的安全防護措施:存取控制、標識和認證、完整性控制、密碼技術、防火墻系統、審計和恢復、操作系統安全、數據庫系統安全、計算機病毒防護和抗抵賴協議等。最後,對事故處理和事後分析提供策略,如何報告安全事故,如何協調解決安全事故,如何避免安全事故再次發生。總之,本文對信息系統安全防範工作給出一個整體的解決方案,為其在配置、管理和應用方面提供了基本的框架。
  2. The foreigners who fabricate, alter, enter under false name, transfer, and trade with visa and identification paper can be punished by fine 1, 000 to 10, 000 yuan in the meantime, the illegal income will be confiscated and whose original visa or identification paper will be withdrawn ; or punished to detain by 3 to 10 days, and also can be coerced leaving the country within time limit at the same time

    對偽造、塗改、冒用、轉讓、買賣簽證、證件的外國人,在吊銷或者收繳原簽證、證件並沒收非法所得的同時,可以處1000元以上、 10000元以下的罰款;或者處3日以上、 10日以下的拘留,也可以並處限期出境。
  3. The thought of slope safety and landslide prevention based on risk management processes is discussed from the risk factors identification, risk assessment, risk control, and risk prevention measures of the landslide in this paper, and it is pointed out that the risk management technique is a efficient method, which helps manager to cope with the possible risk preparedly and rationally and to adopt measures to reduce the risk in a maximum limit and finally to avoid and reduce the loss of property finally

    從滑坡的風險因素識別、風險評價、風險控制、滑坡風險防範措施等風險管理流程入手,對基於風險管理技術的邊坡安全與滑坡預防思想進行了論述,指出應用風險管理技術是幫助管理者有準備地、理性地面對所可能遇見的風險,並採取措施最大限度地減少風險,最終減少或避免財產損失和人員傷亡的預防手段。
  4. Because of above demands, the program of simulation of response of the impact load is generated by fepg, deeply analysis to the program shows the meanings of parameters, function of subroutines and interface files, and compared with the result of experimentation, which indicate the difference is small enough, so can generate the computing source program of the grid structure. as the beginning research of the load identification, this thesis discusses the recognisation of cantilever beam by ga, and the result is well, but the program is limit by number of the parameters. finally show the path of accuracy improvement

    基於上述要求,本文利用fepg對格柵結構在沖擊載荷作用下的響應進行了數值模擬,生成了計算源程序,並對源程序做了詳細而細致的分析,對內部各程序中的變量含義、子程序功能和文件介面做了詳細說明,並將模擬結果與實驗結果作了比較,結果表明, fepg在格柵結構的計算結果與實驗結果相差較少,可以用來生成計算源程序,為下一步的格柵結構載荷重構研究提供參考。
  5. The thesis, in the probability analysis and computation, considers the failure history of space frames and trusses, adopts the bound criterion and algorithms on the base of system ' s critical strength, and introduces the soft self - adaptation control bound into the identification of dominant failure modes ; at the same time, with the incremental load method and differential equalized recursive method, computes the limit - state function of failure mode and probability index precisely under no leaking the dominant failure modes

    文中在可靠性分析和計算部分,考慮空間剛桁架結構系統的失效演化歷程,採用基於系統臨界強度的約界準則和約界演算法,將柔性自適應控制邊界引入失效模式識別過程;同時,用荷載增量法和微分等價遞歸演算法相結合,確保在嚴格不遺漏主要失效模式的情況下,快速準確地求解失效模式的極限狀態方程和可靠度指標。
  6. Photocopy of age identification should be submitted if there is an age limit

    如課程有年限制,必須提供年證明副本。
  7. Based on the comparison and analysis of the theories and practices of professional liability of both domestic and abroad, this thesis analyses the definition, characters and catalog of “ professional ”, the scope of “ third party ” and focuses on the doctrine of “ assumption of fault ”, the identification of “ negligence ” and “ the causation relation ” in a professional ’ s tort by negligence. this thesis also discusses how to reasonably limit the professional ’ s liability taking the high risk of the profession into account and proposes the professional liability insurance

    通過比較分析國內外的理論和實踐,本文論述了專家的概念、特徵和分類,第三人的范圍;並重點論述了「專家過失」侵權時適用的過錯推定原則,以及對專家「過失」 、 「因果關系」的具體認定;鑒于專家行業的高風險性,文章還對如何合理限制其責任進行了探討,主要論述了專家責任保險制度。
  8. And then the lower limit of the frequency decrease rate was derived, and the last identification method of site liquefaction from surface acceleration records was proposed

    基於強震記錄快速識別場地液化的方法,並用實際地震記錄對其可靠性進行了分析。
  9. Only sufficient number of measured points is needed to satisfy the identification precision of to identify the ratio of the orthogonal polynomials, and there is no special limit on th positions of measuered points

    該方法只須獲取足夠的測量點的響應來識別分佈載荷正交多項式的系數,滿足識別的精度要求,同時對測量點的位置無特殊限制。
分享友人