英语人>网络例句>不安全 相关的搜索结果
网络例句

不安全

与 不安全 相关的网络例句 [注:此内容来源于网络,仅供参考]

Although the concept of a secure network is appealing to most users, networks cannot be classified simply as secure or not secure because the term is not absolute—each group defines the level of access that is permitted or denied.

虽然一个安全网络的概念喜欢多数用户,网络和安全或不安全因为无法简单地被分类期限不是绝对各个小组定义被允许或被否认通入的水平。

Unsafe acts can typically be recognized as failure to de-energize electric equipment for maintenance or derepairs, intentional use of obviously defective and/or unsafe tools, or the use of tools or equipment too close to energized parts.

典型的不安全操作的例子有:在保养或维修时不断开电气设备的典型的不安全操作的例子有:电源,有意使用明显有故障和或不安全的工具,或使用的工具电源,有意使用明显有故障和或不安全的工具,或使用的工具(设备离带电部件太近。

The outcome indicates that the accuracy is 100% when the tool is identifying unsafe functions in the library, and that there are a few cases of misreport with regard to common unsafe functions.

结果表明原型工具在识别库中不安全函数时准确度达100%,在识别普通的不安全函数时有少量误报情况;原型工具在监控不安全函数参数时对被监控程序性能的影响取决于所监控函数数目和所监控函数在被监控程序中的调用频度。

The results showed that employees with less work experience, shorter setout time, lower income, bad ear, and higher BMI score were liable to occupational injuries.

结果表明:工龄较短、准备时间较短、月收入较低、听力较差、BMI较高者发生伤害的危险性较高;安全认知状况是职业伤害的危险因素,病例组工人更倾向于认为所从事的工作不安全,事故的发生是偶然的;不安全行为也是职业伤害的危险因素,且安全认知与安全行为互相影响。

In this thesis, the digitization, informationization, modelization and videotex of research on ecological environment security were achieved by using RS-GIS-EIS integrated technology.

论文的创新和特色在于,首次提出土地生态环境安全的概念,将生态安全研究的理论与方法引入土地生态环境安全研究中,并在这些理论和方法的指导下进行了吉林西部土地生态环境安全的研究;首次在吉林西部地区进行了土地生态环境敏感性评价,从土壤退化和土地盐碱化敏感性评价反映了吉林西部土地生态环境不安全的潜在危机;构建了土地生态环境安全评价的压力-状态-响应指标体系,该体系既体现了指标总体上的因果关系,又渗透了生态环境与经济的可持续发展;在土地生态环境安全评价过程中,本文提出用栅格点状评价单元和行政区面状评价单元结合的方法进行土地生态环境安全评价,使评价结果和分区更加精确;首次进行生态安全预警的研究。

He will then be sure to bring up the unsafe people he witnessed being unsafe in an unsafely unsafe manner did we mention they were unsafe?

然后他们会在下一次的靶场会员大会上提出这些被他们看到的不安全人的不安全习惯(我们有没有说过他们本身就是不安全的?)。

The model has the following features: 1 The security information provided by the assessment result is more dependable because of the consideration of some main uncertain factors; 2 The improved analytic method of power system DSR and the dynamic equivalent technologies are applied to reduce the computing time and to make the model more practical; 3 Step-up assessment strategy is adopted in order to balance the precision and computing time requirements; 4 Decompounding of system insecurity indexes to each system component, or to each generator and consumer, and the visualization of assessment results, will help the operators to understand the security status of the power system more clearly; 5 The assessment results can be beneficial to the preventive control in traditional power systems and the security pricing in power market environments.

模型具有如下特点: 1由于综合考虑了一些不确定因素对系统安全性的影响,使得评估结果更加可靠; 2采用求解电力系统动态安全域的改进解析法,结合动态降维技术,大大减少了动态安全域的计算时间,使得模型比较实用; 3采取逐步递进的评估策略,以适应计算精度和计算时间要求; 4可定量分解出各元件或各发电与用户对系统不安全的贡献,配以形象直观的评估结果显示,使操作人员清楚了解系统的安全状况; 5评估结果在传统电力系统可帮助制定预防控制措施,在电力市场可用于安全性定价。

Because cryptology technology is the most important method to insure information against filched, next this thesis introduces development status of cryptology theory and some traditional cryptology.

首先本文介绍了计算机信息安全系统的脆弱性,针对计算机信息系统存在的不安全因素,论述计算机安全系统的管理措施和安全等级划分标准,并以此作为信息安全系统的设计准则。

With some insecure factors existing Short Message Service system which is on the basis of wireless network, such as the short message will be filched, intercepted and lost.

针对当前基于无线网络的短消息系统的一系列不安全的因素(如数据包被窃取、截获及丢失),提出基于GSM Modem设备的安全短消息系统,引入安全短消息协议,利用证书以及安全认证因子两种方式对手机终端和安全短信网关进行安全认证,调用加解密算法对短消息数据包进行加密传输。

Sources of insecurity are varied, but include the following: continued incursions and attacks by the LTTE; disappearances, abductions and looting; threats and attacks upon individuals by irregular and armed groups such as the Tamil Makkal Viduthalaip Puligal, including infiltration of camps at night; incomplete or delayed mine-clearance; approaches used by security forces in response to security incidents, including roundups, methods to identify suspects, and detention of individuals without proper notification of family members of the reasons for and location of the individual's detention.

来源不安全的,是各不相同,但包括以下几个方面:继续侵入和袭击猛虎组织;失踪,绑架和抢劫;威胁和攻击,对个人来说,由非正规武装团体如泰米尔makkal viduthalaip puligal,其中包括渗透营地在夜间;不全或延迟清除地雷;办法所采用的安全部队在响应安全事件,其中包括roundups ,方法,以确定嫌疑人,拘留个人未经适当通知,家庭成员的原因和地点的个人的拘留。

第1/100页 1 2 3 4 5 6 7 8 9 ... > 尾页
推荐网络例句

Next time I see you,I shall give you a black eye.

下次我看见你,我会打你一顿。

In this paper,design scheme of classification system of wood surface color is established.

提出了木质板材颜色分类的系统设计方案。

With a few exceptions (a sea-monster attack seems to go on forever), this is where the film outdoes its predecessor.

不出什么意外(似乎永远都有海怪的攻击),这可能是这部片优于前作的地方了。