查询词典 actualization
- 与 actualization 相关的网络例句 [注:此内容来源于网络,仅供参考]
-
As the first stage of electronic commerce actualization, adoption is very important.
这一过程中,电子商务采纳作为首要步骤,地位举足轻重。
-
On the other hand grammatical metaphorical actualization of meaning potentials in news reporting is intimately relevant to the situational and linguistic contexts, and such a grammatical metaphorical alternative as opposed to its agnate counterparts is actually a consequence of choice in three metafunctional systems.
本文所采用的系统认知模式强调新闻报导中语法隐喻的动态特征,因为任何语篇的构建和解读都是实时的认知处理和词汇语法层选择的结果,而选择的过程无疑是一个动态过程。
-
To realize the value function that constitution restrict national power and protect attainder, To realize nomocracy of constitution, Judicatory actualization of constitution is needed now.
为实现宪法制约国家权力、保护公民基本权利的价值功能,为最终实现宪政法治,我国的宪法司法化十分必要。
-
The research on design education in this thesis, included in fine art education of curriculum project in middle school, relate to the significance, characteristic and direction of education, curriculum construction, strategy in course actualization and so on.There are four parts in this thesis.
结合基础美术教育课程改革的不断深化,对在普通中学美术教育中开展的设计方面教育的意义、特征、目标方向、课程建构和课程实施策略等作较深入研究是十分有必要的。
-
The innovation in this article is: PKM's actualization and give an example, a main framework for a characteristical search engine, PKM's dynamic concept in the environment of E-Learning.
本文的主要创新之处包括以下三个方面:一是独创了E—Learning 环境下PKM 的具体实施过程及实施案例;二是设计了一个个性化搜索引擎的流程图来支持E—Learning环境下的PKM;三是E—Learning 环境下PKM 的动态观念。
-
The actualization of latent structure to realized structure is to give the underlying cognitively determined type a concrete form.
在这实现过程中就是去给基底认知的决定种类一个具体的型态。
-
A graphic representation of theoretical, cumulative frequency distribution of variation in latent structure and actualization or realized form is shown in Fig.
图9.1展现了潜在结构与实现形式理论上的变异累加次数分布。
-
Actualization of individual account is a transition of social insurance system from pay-as-you-go and social-planning system to the combination of social planning and individual account. It is desired to deal with the defrayal crisis caused by the increasingly severe situation of aging of the population as well as to realize individual rights to own their own accounts. It is also the prerequisite to the market-oriented investment and operation of the funds in individual accounts in order to preserve and increase the value.
个人账户实账化是实现由现收现付、社会统筹的社会保险制度向社会统筹与个人账户相结合的社会保险制度转变,以应付我国日益严重的人口老龄化带来的支付危机的要求;是实现个人对个人账户权益的需要;是开展个人账户基金市场化投资运营,实现保值增值的前提。
-
The static model describes the relationship among user, permission and role and imports integrated inheritance to actualize the relationship between local role and global role. The dynamic model completes access control by session diffluence based on the static model. The actualization for the model is researched based on the analysis of the content and the rule of the model. A self-adapted RBAC wrapper based on agent model is presented according to the heterogeneous databases'demand for wrapper.
该模型比较全面地解决异构数据库系统的局部数据对象和全局数据对象的综合访问控制。I-RBAC模型包括静态模型和动态模型两个部分,静态模型主要描述用户、权限、角色(特别是全局角色与局部角色)之间的关系,动态模型是在静态模型中角色层次关系的基础上通过会话分流实现动态的访问控制。
-
In this paper, the concept of network security and security structures of OSI and Internet is introduced, and various threats confronting the computer network are also discussed. Several kinds of network information security technologies, including firewall technology, virtual private network, intrusion detection system, data encryption technology, identity authentication and security protocol etc. are also examined. The security of internal network is the biggest problem in the construction of each network. The solution to this problem lies in setting up a firewall. The theory of a firewall and the approach to its actualization is studied. Intrusion detection system, an important part of the computer network security system, has gained extensive attention. IDS monitors the computer and network traffic for intrusion and suspicious activities. It not only detects the intrusion from the extranet hacker, but also the intranet users. The emergence of virtual private network paves the way for realizing secure connection of LAN quickly and at a relatively low cost. The concept, function, key techniques, including the tunnel technology, and the ways to realize VPN are expounded in this paper. Also introduced is the data encrypt network technology, which is called the soul of computer network security, such as digital digest, digital signature, digital certificate, digital encrypt arithmetic and so on. At the same time, the principle and the process of implementing network security by digital certificate and digital signature, the basic principle and characters of security protocols, and finally, three of the security protocols, concerning the security problems in network, IPsec, SLL and SET are analyzed in detail Computer network system should be a system of dynamic defence, both dynamic and static, passive as well as active, and even offensive, combined with management and technology.
本文系统地介绍了网络安全的概念、OSI及Internet的安全体系结构,并讨论了计算机网络面临的各种安全威胁;内部网络的安全问题是每个建网单位面临的最大问题,可以认为防火墙技术是解决网络安全的一个主要手段,本文研究了防火墙的原理及其实现手段;作为一种主动的防御措施,入侵检测系统作为网络系统安全的重要组成部分,得到了广泛的重视,TDS对计算机和网络资源上的恶意使用行为进行识别和响应,不仅检测来自外部的入侵行为,也监督内部用户的未授权活动;虚拟专用网技术的出现,为实现网络间的连接提供了快速安全但又相对便宜的手段,本文较深入的探讨了实现VPN的隧道技术,并对VPN的概念、功能、实现途径、基本构成、关键技术及发展前景等问题进行了全面论述;数据加密技术是网络安全核心技术之一,本文从数据加密算法、数字摘要、数字签名及数字证书等几方面简要介绍了数据加密技术,并分析用数字证书和数字签名实现网络安全的原理和过程;对安全协议的基本原理、主要特点进行了较为深入的研究,并就网络的安全性问题剖析了三种安全协议:IPsec协议、SLL协议和SET协议。
- 推荐网络例句
-
The split between the two groups can hardly be papered over.
这两个团体间的分歧难以掩饰。
-
This approach not only encourages a greater number of responses, but minimizes the likelihood of stale groupthink.
这种做法不仅鼓励了更多的反应,而且减少跟风的可能性。
-
The new PS20 solar power tower collected sunlight through mirrors known as "heliostats" to produce steam that is converted into electricity by a turbine in Sanlucar la Mayor, Spain, Wednesday.
聚光:照片上是建在西班牙桑路卡拉马尤城的一座新型PS20塔式太阳能电站。被称为&日光反射装置&的镜子将太阳光反射到主塔,然后用聚集的热量产生蒸汽进而通过涡轮机转化为电力