英语人>网络例句>不安全的 相关的搜索结果
网络例句

不安全的

与 不安全的 相关的网络例句 [注:此内容来源于网络,仅供参考]

Unsafe acts can typically be recognized as failure to de-energize electric equipment for maintenance or derepairs, intentional use of obviously defective and/or unsafe tools, or the use of tools or equipment too close to energized parts.

典型的不安全操作的例子有:在保养或维修时不断开电气设备的典型的不安全操作的例子有:电源,有意使用明显有故障和或不安全的工具,或使用的工具电源,有意使用明显有故障和或不安全的工具,或使用的工具(设备离带电部件太近。

But first find out for yourself if you are insecure, what it means...

但是首先自己去找出你是否是不安全的,安全在生理上。。。

Another factor is that standard run-time library routines sometimes rely on initialization that can happen only in a user-mode application and are sometimes implemented in a thread-unsafe or multiprocessor-unsafe way.

另外一个事实就是:标准的运行时间库程序有时候依赖于初始化,那可能只发生在一个用户模式应用中,并且有时候执行预一个不安全的线程或者不安全的多进程方式中。

The security evaluation of eco-geological environment in Zhujiangyuan by this means indicated that the eco-geological environment of Zhujiangyuan is unsafety.

用此方法对珠江源区生态地质环境安全进行评估,结果表明其生态地质环境是不安全的,属于复合型不安全。

In this thesis, the digitization, informationization, modelization and videotex of research on ecological environment security were achieved by using RS-GIS-EIS integrated technology.

论文的创新和特色在于,首次提出土地生态环境安全的概念,将生态安全研究的理论与方法引入土地生态环境安全研究中,并在这些理论和方法的指导下进行了吉林西部土地生态环境安全的研究;首次在吉林西部地区进行了土地生态环境敏感性评价,从土壤退化和土地盐碱化敏感性评价反映了吉林西部土地生态环境不安全的潜在危机;构建了土地生态环境安全评价的压力-状态-响应指标体系,该体系既体现了指标总体上的因果关系,又渗透了生态环境与经济的可持续发展;在土地生态环境安全评价过程中,本文提出用栅格点状评价单元和行政区面状评价单元结合的方法进行土地生态环境安全评价,使评价结果和分区更加精确;首次进行生态安全预警的研究。

He will then be sure to bring up the unsafe people he witnessed being unsafe in an unsafely unsafe manner did we mention they were unsafe?

然后他们会在下一次的靶场会员大会上提出这些被他们看到的不安全人的不安全习惯(我们有没有说过他们本身就是不安全的?)。

The model has the following features: 1 The security information provided by the assessment result is more dependable because of the consideration of some main uncertain factors; 2 The improved analytic method of power system DSR and the dynamic equivalent technologies are applied to reduce the computing time and to make the model more practical; 3 Step-up assessment strategy is adopted in order to balance the precision and computing time requirements; 4 Decompounding of system insecurity indexes to each system component, or to each generator and consumer, and the visualization of assessment results, will help the operators to understand the security status of the power system more clearly; 5 The assessment results can be beneficial to the preventive control in traditional power systems and the security pricing in power market environments.

模型具有如下特点: 1由于综合考虑了一些不确定因素对系统安全性的影响,使得评估结果更加可靠; 2采用求解电力系统动态安全域的改进解析法,结合动态降维技术,大大减少了动态安全域的计算时间,使得模型比较实用; 3采取逐步递进的评估策略,以适应计算精度和计算时间要求; 4可定量分解出各元件或各发电与用户对系统不安全的贡献,配以形象直观的评估结果显示,使操作人员清楚了解系统的安全状况; 5评估结果在传统电力系统可帮助制定预防控制措施,在电力市场可用于安全性定价。

With some insecure factors existing Short Message Service system which is on the basis of wireless network, such as the short message will be filched, intercepted and lost.

针对当前基于无线网络的短消息系统的一系列不安全的因素(如数据包被窃取、截获及丢失),提出基于GSM Modem设备的安全短消息系统,引入安全短消息协议,利用证书以及安全认证因子两种方式对手机终端和安全短信网关进行安全认证,调用加解密算法对短消息数据包进行加密传输。

Empowered to remove from site any personnel not complying with safety requirements or to stop any site activity executed in unsafe conditions.

对现场不遵守安全要求人员驱逐出现场,阻止任何不安全的指挥工作。

Sources of insecurity are varied, but include the following: continued incursions and attacks by the LTTE; disappearances, abductions and looting; threats and attacks upon individuals by irregular and armed groups such as the Tamil Makkal Viduthalaip Puligal, including infiltration of camps at night; incomplete or delayed mine-clearance; approaches used by security forces in response to security incidents, including roundups, methods to identify suspects, and detention of individuals without proper notification of family members of the reasons for and location of the individual's detention.

来源不安全的,是各不相同,但包括以下几个方面:继续侵入和袭击猛虎组织;失踪,绑架和抢劫;威胁和攻击,对个人来说,由非正规武装团体如泰米尔makkal viduthalaip puligal,其中包括渗透营地在夜间;不全或延迟清除地雷;办法所采用的安全部队在响应安全事件,其中包括roundups ,方法,以确定嫌疑人,拘留个人未经适当通知,家庭成员的原因和地点的个人的拘留。

第1/100页 1 2 3 4 5 6 7 8 9 ... > 尾页
推荐网络例句

The absorption and distribution of chromium were studied in ryeusing nutrient culture technique and pot experiment.

采用不同浓度K2CrO4(0,0.4,0.8和1.2 mmol/L)的Hoagland营养液处理黑麦幼苗,测定铬在黑麦体内的亚细胞分布、铬化学形态及不同部位的积累。

By analyzing theory foundation of mathematical morphology in the digital image processing, researching morphology arithmetic of the binary Image, discussing two basic forms for the least structure element: dilation and erosion.

通过分析数学形态学在图像中的理论基础,研究二值图像的形态分析算法,探讨最小结构元素的两种基本形态:膨胀和腐蚀;分析了数学形态学复杂算法的基本原理,把数学形态学的部分并行处理理念引入到家实际应用中。

Have a good policy environment, real estate, secondary and tertiary markets can develop more rapidly and improved.

有一个良好的政策环境,房地产,二级和三级市场的发展更加迅速改善。