英语人>网络例句>on-line working 相关的网络例句
on-line working相关的网络例句

查询词典 on-line working

与 on-line working 相关的网络例句 [注:此内容来源于网络,仅供参考]

Firstly, based on the theory research, the author analyses the theories on working value and production factor, reviews the development course on Chinese distribution system, and introduces the characters on Hesperian hospital and Chinese health institution.

本文首先基于学习理论研究,对劳动价值理论和生产要素理论进行了分析,回顾了我国分配制度的发展进程,介绍了现阶段国内外医疗卫生单位分配制度的特点。

Combining the experimental results and theoretical analysis, the following work has been accomplished.(1) Reasons of the decrease of interelectrode capacitance and the increase of discharge gap caused by the powder suspended in dielectric fluid are explained. And the mechanism that surface quality of workpiece improved by powder-mixed EDM is analyzed from this viewpoint.(2) The variation regularity of the percentage of silicon on the machined surface of workpiece has been summarized according to the experiment results when silicon powder was added into the working fluid. The entropy is introduced to explain the reasons for this variation regularity by thermodynamics.(3) The dimensional accuracy is greatly influenced by the overcut resulting from discharge gap and electrode wear in practice application. Empirical formulas for the overcut in EDM and powder-mixed EDM are established based on the experimental results using the ternary linear regressive method in this paper.(4) The influence of main factors on the machined surface characteristics has been evaluated based on the orthogonal experimental design method.

通过一系列普通电火花加工与混粉电火花加工的对比实验,运用工艺实验和理论分析相结合的方法,重点做了以下工作:(1)探讨了粉末颗粒导致极间电容减小、放电间隙增大的原因,并从这个角度解释了混粉电火花加工可以改善工件表面质量的机理;(2)以混合硅粉的电火花加工为例,实验得出峰值电流和脉冲宽度对加工表面层成分中硅元素含量的影响规律,并引入熵的概念从热力学的角度对硅元素含量变化的原因寻找了理论依据;(3)在实际加工中,由于粉末的加入使放电间隙变大,这使得混粉电火花加工的尺寸精度难以控制,本文利用三元线性回归的方法,在实验数据的基础上,建立了两种电火花加工过切量的计算公式;(4)将正交试验法应用于混粉电火花加工实验研究,并通过对实验指标极差的直观分析,得出各电参数对加工指标影响的敏感程度。

The security of PKI system itself is especially emphasized during the system design and implementation process, which is in accordance with the pervasive characteristic of PKI. Second, the concept of a Trusted Key Management Center is introduced for the first time. This technology greatly strengthens key management practices and allows for smooth transition from PKI to Key Management Infrastructure. Third, certificate status mechanisms are investigated in depth, and a certificate revocation performance simulation system is devised. All these work will provide guides to practice and employment of PKI applications. Based on time constraints, a new taxonomy for authenticated dictionaries is proposed. Fourth, formal analysis ofOCSP protocol is carried out; then an efficient and scalable OCSP system is developed. Fifth, the special requirements caused by the working environments of Wireless PKI are analyzed. Based on communicative hashing and dynamic Merkle hash tree, an efficient certificate status validation method suitable for WPKI is presented. Sixth, one important kind of fair exchange protocols is studied, and a new CEMBS based on RSA cryptosystem is proposed. Afterwards, a novel fair exchange protocol totally based on RSA signature scheme is devised.

在系统设计和实现的过程中,考虑到PKI作为普适性安全基础平台的特点,特别强调PKI系统自身的安全性;第二,首次在PKI系统的设计中提出了"可信密钥管理中心"的概念,这一独特设计大大地强化了密钥管理功能的实施,为PKI向密钥管理基础设施的平滑过渡提供了良好的技术准备;第三,对证书状态验证机制进行了深入研究,设计了证书状态模拟系统,以指导PKI系统和应用的部署和实施;在此基础上,基于时间约束首次给出了认证字典的一种新的分类方法;第四,对OCSP协议进行了形式化分析,设计和实现了一种高效、可扩展的OCSP系统;第五,分析了WPKI工作环境对设计安全基础平台提出的特殊要求,结合无线移动设备的具体特点,基于可交换杂凑函数和动态Merkle杂凑树设计出了一种适用于WPKI环境的高效证书状态查询机制;第六,对一类公平交换协议进行了深入的研究,从设计公平交换协议的密码基础结构出发,提出了一种新型的基于RSA密码体制的高效CEMBS;在此工作的基础上,设计了一种基于RSA密码体制的最优化公平交换协议。

The security of PKI system itself is especially emphasized during the system design and implementation process, which is in accordance with the pervasive characteristic of PKI. Second, the concept of a Trusted Key Management Center is introduced for the first time. This technology greatly strengthens key management practices and allows for smooth transition from PKI to Key Management Infrastructure . Third, certificate status mechanisms are investigated in depth, and a certificate revocation performance simulation system is devised. All these work will provide guides to practice and employment of PKI applications. Based on time constraints, a new taxonomy for authenticated dictionaries is proposed. Fourth, formal analysis of OCSP protocol is carried out; then an efficient and scalable OCSP system is developed. Fifth, the special requirements caused by the working environments of Wireless PKI are analyzed. Based on communicative hashing and dynamic Merkle hash tree, an efficient certificate status validation method suitable for WPKI is presented. Sixth, one important kind of fair exchange protocols is studied, and a new CEMBS based on RSA cryptosystem is proposed. Afterwards, a novel fair exchange protocol totally based on RSA signature scheme is devised.

在系统设计和实现的过程中,考虑到PKI作为普适性安全基础平台的特点,特别强调PKI系统自身的安全性;第二,首次在PKI系统的设计中提出了"可信密钥管理中心"的概念,这一独特设计大大地强化了密钥管理功能的实施,为PKI向密钥管理基础设施的平滑过渡提供了良好的技术准备;第三,对证书状态验证机制进行了深入研究,设计了证书状态模拟系统,以指导PKI系统和应用的部署和实施;在此基础上,基于时间约束首次给出了认证字典的一种新的分类方法;第四,对OCSP协议进行了形式化分析,设计和实现了一种高效、可扩展的OCSP系统;第五,分析了WPKI工作环境对设计安全基础平台提出的特殊要求,结合无线移动设备的具体特点,基于可交换杂凑函数和动态Merkle杂凑树设计出了一种适用于WPKI环境的高效证书状态查询机制;第六,对一类公平交换协议进行了深入的研究,从设计公平交换协议的密码基础结构出发,提出了一种新型的基于RSA密码体制的高效CEMBS;在此工作的基础上,设计了一种基于RSA密码体制的最优化公平交换协议。

His replacement, Young Buck, stepped up soon afterward, and the group continued its activity, working on yet more mixt recordings and scoring some big-time success on the "G Unit Remix" to 50's "P.I.M.P.," which also featured Snoop Dogg and got heavy rotation on MTV. Meanwhile, G Unit recorded their debut album, Beg for Mercy, over the course of 2003, and Interscope finally rush-released the album on November 14, preceding it with a lead single,"Stunt 101." 1. G-Unit

三名成员在一起也是非常努力的创作和表演音乐,彼此间的配合也非常默契,同时他们还曾经录制国在小范围内播放的,非常受欢迎的磁带,但是在不久之后Tony Yayo因为非法持有枪支而被宣判入狱服刑,然后就由Young Buck代替了他在G-Unit乐团中的位置,并且一直继续表演和创作说唱音乐。

In this thesis, the methods of surrounding rock masses stability classification on the basis of the geological documentation of muck and the boring parameters of TBM are approached, especially as follows:①The geological documentation of muck and the boring parameters of TBM in the Yellow River Diversion Project.of shanxi province is summarized systematically;②Based on the geological documentation of muck and the boring parameters of TBM, that whether the common methods of surrounding rock masses stability (the methods of regular factor classification) classification are feasible, is carried on the discussion;③According to the corresponding relation of muck and the boring parameters of TBM and the surrounding rock masses stability type, the extension assessment method of tunnel surrounding rock masses stability classification is set up, also the corresponding fortran calculation procedure worked out, and not only rational result in conformity with the reality can be obtained, but also the stability situation of surrounding rock masses in front of the working range can be predicted according to the change of the dependent value in the application instance of Yellow River Diversion Project;④Combining with the application instance of Yellow River Diversion Project, extension assessment method in the application of surrounding rock masses stability classification is compared and verificated in detail by applying fuzzy synthesis method by forefathers, and a certain degree discussion and summary about the application achievement of surrounding rock masses stability classification, which is assessed by extension assessment method and fuzzy synthesis method, are carried on.

本文基于渣料和TBM掘进参数的地质编录提供的地质信息进行了围岩稳定分类方法的探讨,重点进行:①对引黄工程中渣料和TBM掘进参数的地质编录的系统整理;②基于渣料和TBM掘进参数的地质编录获得的地质信息,对常用围岩稳定分类方法是否能够进行围岩稳定分类进行了探讨;③根据渣料和TBM掘进参数与围岩稳定类型的对应关系,应用可拓理论,建立了隧洞围岩稳定分类的可拓评价方法,还编制了相应的fortran计算程序,并在引黄工程的应用实例中不仅取得了与客观实际相符的合理结果,而且根据其关联度值的变化能够预测临近掌子面前方围岩的稳定情况;④结合引黄工程的应用实例运用模糊综合评判方法对可拓评判方法在围岩稳定分类中的应用进行了详细的验证、比较,并对前人在运用可拓学和模糊数学进行岩体稳定评判的应用成果方面,进行了一定的探讨、总结。

Primarily, the thesis assays the condition of network framework, the network was divided into three levels in terms of network management in order to establish the distributed method ,and still pointing out the intention and denotation of studying the Topology Discovery.Next, the thesis analyzes SNMP protocol minutely, including its development, principle, and the Network Management system that established on the SNMP protocol. Have analysed MIB in detail and the application way of MIB in network management .The thesis also assays the ICMP protocol, describing its working principle and the format of datagram minutely , and describing two important tools of ICMP- Ping and TraceRoute in detail. On the base of upper analysis, the thesis expounds a kind of distributed Topology Discovery project, and book it in one autonomy system. Topology Discovery was divided into two levels in terms of network management, and analyses the way of linking up between the two level. The thesis minutely assays Router-Level Topology Discovery technology basing on SNMP and Subnet-Level Topology Discovery technology basing on ARP and ICMP. According to these analyses, the thesis explores the specific methodology and the technology of XML data object which using the WinSNMP API to achieve topology discovering system on the development platform of Visual C++, and also analyses the technology of topology analysis and topology graph minutely. Moreover, the thesis assays the technology of basic firewall and Topology Discovery response strategy. Finally, the thesis analyses the underlying blind problem of the topology finding, and also analyses the reason that the blind problem produced and the way that reduced. The distributed algorithm that this paper puts forward has a certain directive significance in wireless network or other fields.

本文首先分析了网络结构状况,将网络从网络管理的角度划分为三个层次,为分布式的方法奠定了基础,同时还指出拓扑发现研究的目的及意义;接着本文分析了SNMP协议,详细分析了SNMP协议的发展状况,协议的工作原理,以及由SNMP协议基础上建立的SNMP网络管理体系,详细分析了MIB,以及MIB在网络管理上的应用方式;本文又分析了ICMP协议,详细描述了ICMP的工作原理和数据报格式,并详细描述了ICMP的两个重要工具-Ping 和TraceRoute;然后本文在结合上述分析的基础上,提出了一种分布式的拓扑发现方案,将拓扑发现拟订在一个自治系统内,将拓扑发现从网络管理角度划分为路由器级和子网级两个层次,分析了两个层次之间的衔接方式,同时从拓扑地域的角度将拓扑发现过程分布化,分析了分布式算法的具体方法和分布式结点之间的数据通讯方法,本文详细分析了基于SNMP的路由器级拓扑发现技术和基于ARP和ICMP的子网级拓扑发现技术;根据这些分析,本文利用XML数据对象作为分布式算法中的数据对象,分析了XML的技术,本文使用Visual C++开发平台实现网络拓扑发现系统,详细分析了使用WinSNMP API实现基于SNMP的路由器级拓扑发现和基于ARP的子网级拓扑发现,分析了使用Winsock编程实现基于ICMP的子网级拓扑发现,本文还对拓扑分析和拓扑图的绘制技术作了较细致的分析;本文最后还分析了基本防火墙技术,分析了几种类型的防火墙对拓扑发现带来的影响,以及在拓扑发现时的应对策略,本文还分析了拓扑发现中可能产生的盲点问题,分析了盲点产生的原因以及拓扑发现中减少盲点的方法。

Recalling that in its resolution 49/214 of 23 December 1994 it expressly put on record its expectation of achieving the adoption of a declaration on indigenous rights within the International Decade and that in its resolution 50/157 of 21 December 1995 it decided that the adoption by the General Assembly of a declaration on the rights of indigenous people constituted a major objective of the Decade, and noting the progress made in the recent rounds of negotiations in the open-ended intersessional working group of the Commission on Human Rights charged with elaborating a draft declaration on the rights of indigenous people, established pursuant to Commission resolution 1995/32 of 3 March 1995

回顾其在1994年12月23日第49/214号决议中明确表示希望在国际十年期间通过一项土著人民权利宣言,并在1995年12月21日第50/157号决议中将争取大会通过一项土著人民权利宣言定为十年的主要目标,同时注意到人权委员会1995年3月3日第1995/32号决议所设负责拟订土著人民权利宣言草案的委员会不限成员名额闭会期间工作组在最近几轮谈判中取得的进展

On control method, develop under the control of from hand movement to autocontrol; On the control function, arrive at intellectualized under the control of from developing simplely under the control of; Develop on the busy, from scheme weight to informatization treatment; On controlling principle, touch the relay logic navar working a telephone switchboard stiffly from unitary having developing to centering on microprocessor or microcomputer network-rization autocontrol system.

控制方法,开发的控制之下,从手运动的自动控制;在控制功能,达到智能化的控制之下,来自发展中国家单纯的控制之下;开发的繁忙,体重从计划向信息化的待遇;控制原则,触摸继电器逻辑navar工作电话总机招待了从单一发展以围绕微处理器或微机网络化自动控制系统。

Granger describes how he learned his craft as he went on to star in a number of films, giving an insider's view of working with Hitchcock on Strangers on a Train and Rope, Luchino Viscoti on Senseo, and Nick Ray on They Live by Night.

法利·格兰杰在书中叙述了他是如何在各类影片中不断积累演技,慢慢成长为一代巨星的,还有他与悬念大师希区柯克一起工作的故事。

第26/100页 首页 < ... 22 23 24 25 26 27 28 29 30 ... > 尾页
相关中文对照歌词
Working On A Tan
Working On The Highway
Working On A Dream
Working On It
Working On A Building
I've Been Working On The Railroad
Working On The Building
Love Working On You
Mr. President (Have Pity On The Working Man)
Lord Have Mercy On The Working Man
推荐网络例句

We have no common name for a mime of Sophron or Xenarchus and a Socratic Conversation; and we should still be without one even if the imitation in the two instances were in trimeters or elegiacs or some other kind of verse--though it is the way with people to tack on 'poet' to the name of a metre, and talk of elegiac-poets and epic-poets, thinking that they call them poets not by reason of the imitative nature of their work, but indiscriminately by reason of the metre they write in.

索夫农 、森那库斯和苏格拉底式的对话采用的模仿没有一个公共的名称;三音步诗、挽歌体或其他类型的诗的模仿也没有——人们把&诗人&这一名词和格律名称结合到一起,称之为挽歌体诗人或者史诗诗人,他们被称为诗人,似乎只是因为遵守格律写作,而非他们作品的模仿本质。

The relationship between communicative competence and grammar teaching should be that of the ends and the means.

交际能力和语法的关系应该是目标与途径的关系。

This is not paper type of business,it's people business,with such huge money involved.

这不是纸上谈兵式的交易,这是人与人的业务,而且涉及金额巨大。