• What this thesis studies is to protect the security mining method under the condition of thickness collapsible loss.

    本文研究就是湿陷性黄土层条件保护地表安全开采方法

    youdao

  • At the moment, this process costs more than ten times as much as conventional mining, but some countries might regard that as a small price to pay for security of supply.

    目前来说,这个工艺成本于传统的开采铀矿不过一些国家可能会看作是供应安全付出小小代价

    youdao

  • My research areas include, but are not limited to, databases, data mining, security, social networks, Internet applications and some mathematics.

    应该会在2010年毕业。我的研究领域包括数据库数据挖掘安全社会网络互联网应用以及数学和其他

    youdao

  • The security situation at Aynak is better than at many other potential mining sites, but there are other problems. Water is scarce and inspires fierce tribal rivalry.

    许多其它潜在的矿藏点相比Aynak安全局势要好一些,但是那里还有其它问题缺水由此激起的严重的部落敌对。

    youdao

  • However, as the amount of the log audit date is too large, we can apply data mining technology into security mode rule extraction.

    由于这些日志审计数据非常庞大因此采用数据挖掘技术从中进行安全模式规则提取

    youdao

  • Mining the ore in pillars above the mine-out area comes down to the security of production, mining methods and putting in practice.

    采空区上部预留矿柱的回采工作影响整个矿山安全生产采矿方法及其实施

    youdao

  • Echoing the debates now common in western societies, many in China are beginning to bristle at the intrusiveness of nosy employers, data-mining marketers and ubiquitous security cameras.

    西方现今司空见惯辩论影响,很多中国人开始发泄对八卦老板,窃取私人信息的商人无处不在安全摄像头的怨气。

    youdao

  • The model integrates one backup-restore and data mining module for the data of security audit.

    模型针对安全审计数据融合了一个备份恢复数据挖掘模块

    youdao

  • The impacts on the security of Xifeihe River left embankment under coal mining are evaluated with elastoplastic model, two-exponent rheological model and probability integral method.

    然后利用数值模拟软件中的弹塑性模型流变模型概率积分开展煤层开采对西大堤安全影响评价

    youdao

  • Data mining is emerging as one of the key features of many American homeland security bills.

    数据挖掘出现美国许多本土安全法案重要特征之一

    youdao

  • Analysis of real-time financial data, process control, rule observance, security application are fields in which data mining based embedded mobile database can be used.

    金融数据实时分析过程控制规章遵守安全应用这些都是基于嵌入式数据库的数据挖掘可以应用领域

    youdao

  • Large areas of emptied stopes pose great dangers to the security production upon decades of mining.

    某钨矿经过几十开采留下大量采空区,并存在较大安全隐患

    youdao

  • Through the tests and the analysis result, confirmed that the use of the data mining theory to the security audit analysis is feasible and effective.

    通过测试结果分析验证数据挖掘理论融入安全审计分析可行有效的。

    youdao

  • It is proposed to decrease exposure time of mining excavation to minimum and fill the excavation quickly using new filling method for security.

    确保采矿安全,减少采场空顶时间采用了“强采方法提出了快速充填具体办法。

    youdao

  • Discussing the research method that resolve the adaptation of security system using distributed object technique and data mining.

    探讨利用分布式对象技术数据挖掘技术解决网络安全系统适应性研究思路

    youdao

  • The technique of intrusion detection based on data mining is a hot research to network security.

    基于数据挖掘入侵检测技术当前网络安全研究一个热点

    youdao

  • If the mined zone go into the security coal pillar, the house crack could be thought caused by mining.

    房屋裂缝是否煤矿采煤引起,主要采空区是否进入村庄保安煤柱

    youdao

  • In order to solve these problems, the dissertation works out a scheme of the network security audit based on data mining and realizes it.

    为了解决这些问题本文提出基于数据挖掘网络安全审计系统的方案加以实现。

    youdao

  • What's more, all the products in our corporation have got the certification from the nation mining security.

    公司生产所有规格隔爆型硫化接头机均取得国家煤矿安全认证

    youdao

  • Because this system only transfer the middle results of data mining, it reduces the transferred data greatly and strengths the security and privacy of the data.

    因为系统传送数据挖掘中间结果所以大大减少了网络的数据传输量,加强数据的安全性保密性

    youdao

  • So the article presents the new architecture of Enterprise Security Management Center based on log mining which is distributed and supports multi-protocol. It is extensible, reusable and migratory.

    为此本文企业安全管理方法和机制进行了研究,提出了一新型分布式的、支持多种协议的企业安全管理框架,即基于日志挖掘的企业安全管理中心

    youdao

  • Secondly, it puts forward a solution of network security audit based on data mining and builds a system model to solve the problems existing in current network security audit.

    其次根据目前网络安全审计存在问题提出基于数据挖掘网络安全审计系统实现方案建立了系统模型图。

    youdao

  • The right of mining is a sort of the qualified right in rem, and it contains usufructuary right and security interest.

    采矿权他物权,是用益物权担保物权统一。

    youdao

  • Mining at the requirement of network security analysis, a flexible method to generate attack graph is presented.

    针对网络安全分析研究要求,在已有研究的基础上,提出了一种灵活的网络攻击生成方法

    youdao

  • Therefore, setting up security cultural system, promoting security supervision is the most important task for mining companies and the related administration.

    建设安全文化体系提高安全管理水平煤矿企业及其相关管理部门重要任务

    youdao

  • On this basis, further information on the classic frequent pattern mining algorithm and income security systems of telecommunications architecture is introduced.

    基础上进一步介绍了频繁模式挖掘经典算法以及电信收入保障系统体系结构。

    youdao

  • For the scurviness of mining system, the security environment of mining system is focus of people.

    当前由于矿井所处恶劣环境矿井生产安全一直人们十分关注的问题。

    youdao

  • It can also determine the evaluation index membership of systemic security according to the setting system-level structure based on the mining systemic characters of Tonglushan mine.

    充填采矿系统特征建立铜绿山矿充填采矿法系统安全性层次结构确定充填采矿法系统安全性评价指标模糊隶属度

    youdao

  • The gas is one of the most important factors which endanger the security of the mining production.

    瓦斯危害矿井安全生产重要因素之一

    youdao

  • The gas is one of the most important factors which endanger the security of the mining production.

    瓦斯危害矿井安全生产重要因素之一

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定