英语人>网络例句>功能体系 相关的搜索结果
网络例句

功能体系

与 功能体系 相关的网络例句 [注:此内容来源于网络,仅供参考]

Then positively ana.lyzed transmission effect of monetary policy of China in recent years, and with relative theories, discussed rr~ore deeply the existing principal problems on transmission mechanisms of monetary policy in our state under the realistic institutional situation of economy and finance:(1)Monetary policy tools lag behind the economic and financil background;(2)Separated and uneven money markets, the lack of transaction agents and defect in the relation between money markets and c~potal markets, have rendered the transaction of monetary policy lack on effective channel;(3)over-speculating, illegal operation and insufficient competition have severely weakened the transmission fumction;(4) systematic defect of state -owned commercial bank, asymmetry between financial and economic composition have made monetary policy lose an effective carrier;(5) factors beyond the financial system, such as soft cornstraint over state - owned enterprises policy decision, imperfect social insurance system, etc.

接下来对我国近年来的货币政策传导效果进行了实证分析,在此基础上运用相关传导机制理论并结合我国实际经济、金融制度与环境论述了我国当前货币政策传导机制的主要问题:(1)货币政策工具相对于经济、金融环境显得落后;(2)货币市场的分割、不平衡、交易主体不全以及货币市场与资本市场的联系机制缺位使得货币政策缺乏一个有效的场所;(3)资本市场特别是股票市场的过渡投机、违规操作以及不充分竞争严重地削弱了证券市场的传导功能;(4)国有商业银行现行体制的缺陷,金融结构与经济结构的非对称使得货币政策传导受阻;(5)金融体系外的因素(如国企决策行为软约束、社会保障制度不健全)。

Then positively ana.lyzed transmission effect of monetary policy of China in recent years, and with relative theories, discussed rr~ore deeply the existing principal problems on transmission mechanisms of monetary policy in our state under the realistic institutional situation of economy and finance:(1)Monetary policy tools lag behind the economic and financil background;(2)Separated and uneven money markets, the lack of transaction agents and defect in the relation between money markets and c~potal markets, have rendered the transaction of monetary policy lack on effective channel;(3)over-speculating, illegal operation and insufficient competition have severely weakened the transmission fumction;(4) systematic defect of state -owned commercial bank, asymme try between financial and economic composition have made monetary policy lose an effective carrier;(5) factors beyond the financial system, such as soft cornstraint over state - owned enterprises' policy decision, imperfect social insurance system, etc.

接下来对我国近年来的货币政策传导效果进行了实证分析,在此基础上运用相关传导机制理论并结合我国实际经济、金融制度与环境论述了我国当前货币政策传导机制的主要问题:(1)货币政策工具相对于经济、金融环境显得落后;(2)货币市场的分割、不平衡、交易主体不全以及货币市场与资本市场的联系机制缺位使得货币政策缺乏一个有效的场所;(3)资本市场特别是股票市场的过渡投机、违规操作以及不充分竞争严重地削弱了证券市场的传导功能;(4)国有商业银行现行体制的缺陷,金融结构与经济结构的非对称使得货币政策传导受阻;(5)金融体系外的因素(如国企决策行为软约束、社会保障制度不健全)。

In this ***, the prototype of Organization Manager, Right Manager andAccess Control Definer is designed and implemented in client, and theResource Services, User Services and Authorization Services is designed andimplemented in server. This *** also provides the main function, designmodule, detailed algorithms and data structure.

论文中实现了组织管理器、体系权限管理器、以及入程定义工具中的拜访权限和业务约束设置组件,实现了工作流执行服务中的资源服务、用户服务、授权服务组件,并详细描述了上述组件的主要功能和相互调用关系,给出了详细的实现计划、主要算法和相关数据构造。

At last, the structure and functions are described in details as well as application mode of the system.

最后对系统的体系结构、功能和应用模式进行了详细描述。

So it's desiderative to develop the reusable information system facing PLM, which carry on the uniform definition and description of product model through reusing techniques, to establish the integrity and highly consistent integration product information, ultimately achieve the reusing and sharing of the information in all grades.

本文根据以上叙述需求,以国家自然科学基金项目"基于集成产品模型的可重用设计理论和方法研究"(50375161)为支撑,在对PLM的内涵、流程体系和功能组件,及可重用理论、重用方式和重用实施研究的基础上,对建立可重用信息系统需要的关键技术进行了深入研究。

The Devonian Period or its system of deposits.In SNA network, an NCP that provides gateway functions for a 9370 distributed network.

在系统网络体系结构中存在的一种网络控制程序,它可以为诸如9370这样的分布型网络提供网关功能。

Based on the distributed peculiarities of DFP and guiding principles of the access control security of DFP, the access control model of DFP was established.

根据角色的网络资源访问控制的理论,以及统一身份认证的体系结构和功能模型实现了本文的原型系统。

The main purpose of this diesis is as to observe the historical evolving process of social control in ancient Chinese society from the angle of legal sociology as, based on it, to reveal the various social control ways in ancient china, especially the function and relationship among three mam means-law, morality and religion It also provides some basic clues for people to understand and observe social control condition in ancient China bv the induction of the historical facts and the description of the fundamental situation of social control system, as well as by the summery and conclusion of the features, essence and developing regularity of social control in ancient China.

本文的主旨就在于从法社会学的角度,对中国古代社会控制的历史演进过程进行考察,在此基础上,揭示中国古代社会各种社会控制手段,尤其是法律、道德、宗教三种主要手段的功能和作用及其相互之间的关系,通过对历史事实进行归纳和综合,描绘中国古代社会控制体系的基本状况,总结和概括中国古代社会控制的特点、本质和发展规律,为人们了解和观察中国古代社会控制状况提供一些基本的线索。

In this paper, the concept of network security and security structures of OSI and Internet is introduced, and various threats confronting the computer network are also discussed. Several kinds of network information security technologies, including firewall technology, virtual private network, intrusion detection system, data encryption technology, identity authentication and security protocol etc. are also examined. The security of internal network is the biggest problem in the construction of each network. The solution to this problem lies in setting up a firewall. The theory of a firewall and the approach to its actualization is studied. Intrusion detection system, an important part of the computer network security system, has gained extensive attention. IDS monitors the computer and network traffic for intrusion and suspicious activities. It not only detects the intrusion from the extranet hacker, but also the intranet users. The emergence of virtual private network paves the way for realizing secure connection of LAN quickly and at a relatively low cost. The concept, function, key techniques, including the tunnel technology, and the ways to realize VPN are expounded in this paper. Also introduced is the data encrypt network technology, which is called the soul of computer network security, such as digital digest, digital signature, digital certificate, digital encrypt arithmetic and so on. At the same time, the principle and the process of implementing network security by digital certificate and digital signature, the basic principle and characters of security protocols, and finally, three of the security protocols, concerning the security problems in network, IPsec, SLL and SET are analyzed in detail Computer network system should be a system of dynamic defence, both dynamic and static, passive as well as active, and even offensive, combined with management and technology.

本文系统地介绍了网络安全的概念、OSI及Internet的安全体系结构,并讨论了计算机网络面临的各种安全威胁;内部网络的安全问题是每个建网单位面临的最大问题,可以认为防火墙技术是解决网络安全的一个主要手段,本文研究了防火墙的原理及其实现手段;作为一种主动的防御措施,入侵检测系统作为网络系统安全的重要组成部分,得到了广泛的重视,TDS对计算机和网络资源上的恶意使用行为进行识别和响应,不仅检测来自外部的入侵行为,也监督内部用户的未授权活动;虚拟专用网技术的出现,为实现网络间的连接提供了快速安全但又相对便宜的手段,本文较深入的探讨了实现VPN的隧道技术,并对VPN的概念、功能、实现途径、基本构成、关键技术及发展前景等问题进行了全面论述;数据加密技术是网络安全核心技术之一,本文从数据加密算法、数字摘要、数字签名及数字证书等几方面简要介绍了数据加密技术,并分析用数字证书和数字签名实现网络安全的原理和过程;对安全协议的基本原理、主要特点进行了较为深入的研究,并就网络的安全性问题剖析了三种安全协议:IPsec协议、SLL协议和SET协议。

The extent of the government credit function has a direct impact on social credit system building.

政府信用功能发挥的程度,直接影响社会信用体系建设的成效。

第16/46页 首页 < ... 12 13 14 15 16 17 18 19 20 ... > 尾页
推荐网络例句

The split between the two groups can hardly be papered over.

这两个团体间的分歧难以掩饰。

This approach not only encourages a greater number of responses, but minimizes the likelihood of stale groupthink.

这种做法不仅鼓励了更多的反应,而且减少跟风的可能性。

The new PS20 solar power tower collected sunlight through mirrors known as "heliostats" to produce steam that is converted into electricity by a turbine in Sanlucar la Mayor, Spain, Wednesday.

聚光:照片上是建在西班牙桑路卡拉马尤城的一座新型PS20塔式太阳能电站。被称为&日光反射装置&的镜子将太阳光反射到主塔,然后用聚集的热量产生蒸汽进而通过涡轮机转化为电力