查询词典 users
- 与 users 相关的网络例句 [注:此内容来源于网络,仅供参考]
-
Company uphold the principle of "a brand-new technology, excellent products, good reputation, to seek survival and development of enterprises, with the vast number of users to work together to create a new era of" the principle of business strategy, the company has developed into the city machinery manufacturing industry key enterprises, companies and research institutes United, always with new technology, new well-equipped beneficiation process to first-class products, first-class quality, first-class service, and actively develop new markets, service users.
公司秉持&以崭新的技术、精良的产品、良好的信誉,求得企业的生存与发展,与广大用户携手开创新纪元&的经营战略方针,目前公司已发展成为本市机械制造行业的骨干企业,公司与科研院所联合,始终以新技术、新装备完善选矿工艺,以一流的产品、一流的质量、一流的服务精神,积极开拓市场,服务用户。
-
Due to its simple structure and easy operation, users could key to every genus by multi-approaches, such as choosing any character or several characters to begin, clicking the buttons on the tool column. There were many image pictures and notes information in the key, which should make users have more overall understanding to every genus of the Chalcididae; there were different fault-tolerant levels in the system in order to avoid the various mistakes.
其结构简单,使用方便,用户可以从任一特征开始选择,也可以进行多项选择或通过点击工具栏上的操作按钮等多种途径,对中国小蜂科各属进行灵活检索;检索表中包含了许多形象图片和文字信息,能够让用户对小蜂科各属有较全面的了解;系统还具有不同的容错功能,可以避免因各种原因导致的错误。
-
The information of users can be managed effectively, and users can be classed to be managed.
能够有效的管理用户的基本信息,而且能够管理用户组的基本信息。
-
So users can have a cognition of clear and apparent on the datas that are sended from field of working. It provides users the necessary guarantee to make out right decession.
从而使用户对从现场采集来的数据有一个清晰、直观的认识,为用户作出正确的判断提供了必要的保证。
-
through the existing analysis of network security and intrusion detection technology, this paper puts forward a cooperative intrusion detection method. this new method collects information distributedly, processes in multilateral cooperation, and constructs the large-network ids. then, it collects the information from dialing users to detect whether there are vulnerabilities and virus in individual or not. by means of such functions, this method only permits the users with reliable network repairing system or with the updated latest virus library to access to the campus network.
该文通过对现有校园网络安全及入侵检测技术的分析,提出一种基于协议分析的分布式入侵检测方法,采用分布收集信息,分布处理多方协作的方式,将基于主机的ids和基于网络的ids结合使用,构筑面向大型网络的ids;然后通过全局安全网络协作,收集拨号用户的信息,检查个体计算机是否存在漏洞、病毒,如果发现有就阻止其接入网络,强制其用到可信的网络修复系统或更新最新的病毒库后才可以正常接入校园网。
-
Essentially, this paper shows that the findability"s degree of network information resource and the satisfaction of user"s information need are two sides of one contradiction. The key of resolving the problem is not only the traditional information organization facing the network information resource itself but also needing the intelligence workers to consider users and the interactive between "World III" and "World II" more. The form of interactive is the information retrieval behavior of network users.
笔者指出:网络信息资源的可检索性程度和用户信息需求的满足本质上是一个问题的两个方面,而解决问题的关键不只在于面向网络信息资源本身的传统信息组织工作,更多地在于&世界三&与&世界二&之间的互动,而互动的形式就是网络用户的信息检索行为。
-
Basing the ancestorses" research, this part considers synthetically the dialectical relation between the way of network information organization and the findability"s degree of network information organization, puts forwards how organizing the network information resource to face users. In fact," facing users " increases naturally the findability of network information resource.
在基于前人研究的基础上,综合考虑面向用户的网络信息资源组织方法和网络信息资源的可检索程度之间的辩证关系,提出在网络环境下如何组织网络信息,使之真正实现&面向用户&,而真正地&面向用户&自然地就会提高网络信息资源的可检索性。
-
Character, paragraph and object styles which have been applied are prominently displayed at the top of the palette. Style Flocker removes the need of InDesign users to visit three different palettes to apply and view their styles and gives users a level of control they've never had before.
已应用了的字符、段落、对象样式被显著地列位于面板顶部,Style Flocker 解决了 InDesign 用户打开三个不同面板以应用、查看他们的样式的必要,给予了用户从所未有的级别控制。
-
Based on the theory of technical innovation and technical innovation diffusion elaborated, as well as fluxionary calculus and game theory, the thesis analyses corporation adoption with game theory in the process of technical innovation diffusion: analyzes in the situation of information symmetry and information asymmetry the gambling between the supplies and the latent users of innovation, discusses the mechanism of the phenomenon "reversion choice" with emphasis in the situation of information asymmetry, and also introduces signal transmission model and information screen model to realize Pareto improvement; at the same time it analyzes in the situation of complete rationality and limited rationality the gambling between the latent users of innovation.
依据已阐述的技术创新和技术创新扩散理论,以及微积分、博弈论等相关理论,对技术创新扩散中企业采用行为进行了博弈分析:分析了信息对称和信息不对称情况下创新供给者与创新潜在采用企业之间的博弈,重点讨论了信息不对称时&逆向选择&现象发生的机理,并引入信号传递模型和信息甄别模型以实现帕累托改进;同时分析了完全理性和有限理性情况下创新潜在采用企业间的博弈。
-
Grayware distributors make use of the useful features of the software to tempt users to install them, but users do not know what problems the software will bring about.
灰色软件的发布者用软件中的有用功能诱使用户安装该软件,用户在安装了这些软件后可能并不知道它们会给自己的带来什么样的问题。
- 相关中文对照歌词
- Users
- 推荐网络例句
-
This one mode pays close attention to network credence foundation of the businessman very much.
这一模式非常关注商人的网络信用基础。
-
Cell morphology of bacterial ghost of Pasteurella multocida was observed by scanning electron microscopy and inactivation ratio was estimated by CFU analysi.
扫描电镜观察多杀性巴氏杆菌细菌幽灵和菌落形成单位评价遗传灭活率。
-
There is no differences of cell proliferation vitality between labeled and unlabeled NSCs.
双标记神经干细胞的增殖、分化活力与未标记神经干细胞相比无改变。