• 接下来需要定义第二安全约束

    Next, you need to define a second security constraint.

    youdao

  • 单击add添加一个新的安全约束

    Click add to add a new security constraint.

    youdao

  • 第二配置资源应用安全约束

    The second step is to configure the resources to apply security constraints. Three separate configuration Settings are defined in these stanzas, as follows.

    youdao

  • 安全约束条件附加实现构件的。

    The security constraints and conditions are attached to the implementation artifacts.

    youdao

  • 需要定义Web应用程序安全约束

    You will need to define a security constraint for the Web application.

    youdao

  • 登录页面配置安全约束

    Configuring a security constraint for the login page.

    youdao

  • 这个Web应用程序添加一项安全约束

    Add a security constraint for this Web application.

    youdao

  • 接下来定义目录安全约束如清单8

    Next, define the security constraints on directories, as shown in Listing 8.

    youdao

  • 元素描述保护页面集合关联安全约束

    This element describes the collection of pages to be secured and associated security constraints.

    youdao

  • 4显示了表单登录页面定义安全约束

    Figure 4 shows the security constraint we defined for our form-login page

    youdao

  • 第三部分:REST服务定义一个安全约束

    Stanza 3: Defining a security constraint for a RESTful service

    youdao

  • 提出结合关键安全约束备用调度定价新方法

    Operating reserve procurement and pricing method is put forward combined with security assessment indicators.

    youdao

  • 利用该模型乘员安全约束系统优化问题进行研究

    A research on optimization of occupant restraint system has been done.

    youdao

  • 网架结构薄弱安全约束问题影响区域市场交易重要因素。

    Weak network configuration and security constraints have great impact on the bid and bargain of regional electricity market.

    youdao

  • 5显示为SecureServletWeb资源定义安全约束

    Figure 5 shows the security constraint we defined for the SecureServlet Web resource.

    youdao

  • 干预商店中的购物车安全约束系统使用对照商店要多。

    The increase in safety-restraint use in shopping carts was greater in the intervention stores than in the control group of stores.

    youdao

  • 如果准备外部用户公开服务需要某种安全约束保证只有授权的用户才能访问服务。

    If you're going to expose services to external users, you need some kind of security constraints that make sure that only authorized users can access the services.

    youdao

  • 提供使用定义安全约束保护资源能力然后定义可以访问保护资源的用户角色

    It gives you the ability to protect a resource with a defined security constraint and then define the user roles that can access the protected resource.

    youdao

  • 算法采用连续潮流(CPF)技术考虑了系统静态安全约束暂态稳定约束

    Firstly, this method USES the continuation power flow (CPF) technique and both of static security and transient stability constraints are considered.

    youdao

  • file - realm - demo展示如何使用用户平面文件设置安全约束

    File-realm-demo: Demonstrates how to setup security restrictions using a flat file of users and groups.

    youdao

  • 为了实现电力市场优化运营,关键建立安全约束经济调度节点边际定价机制。

    To optimize the operation of power system, it is necessary to establish security constrained economic dispatch(SCED) and introduce locational marginal pricing(LMP)method.

    youdao

  • 声明方法需要通过web. xml文件应用程序服务器特定的部署文件,来添加安全约束

    The declarative method involves adding security constraints through the web.xml file and through the application server-specific deployment files.

    youdao

  • 基于粒子优化算法(PSO),提出求解动态电压安全约束预防控制方法

    A particle swarm optimization (PSO) technique based novel approach for solving the dynamic voltage security constrained preventive control problem is proposed.

    youdao

  • 本文利用带上、下界的修正单纯形法,求解安全约束最优化问题之一有功安全校正问题。

    In this paper, a revised simplex algorithm with lower and upper bounds is used for solving the problem of active power security control which is one kind of the security constrained optimization.

    youdao

  • 种方法提供另外Web服务过滤禁用的 Web 服务请求,并提供登录安全约束

    One way to do this is to provide an additional web service layer that filters out forbidden web service requests and supplies logging and security constraints.

    youdao

  • 通过修改安全约束定义,使得安全约束之间始终协调的,并给出一种高效密级分配算法

    Security constraints are consistent by modifying security constraint definition, and an effective classification assignment algorithm is given in this paper.

    youdao

  • 通过满足电压安全约束无功发电调节负荷代价最小化问题,来表示暂态电压安全风险

    Transient voltage risk can be calculated by optimizing the total cost for generator adjustment and load shielding under restrictions of transient security.

    youdao

  • 通过部署描述符中的安全约束可以应用程序资源(ejb方法web页)声明需要授权才能进行访问

    Application resources like EJB methods and Web pages can be declared to require authorization for access by means of security constraints in deployment descriptors.

    youdao

  • 当然,”感激因为此刻,已经开始又是又是尖声大叫,好在一些安全约束措施已经就位。

    'Sure,' I said gratefully. Good thing the safety restraints were on because she began kicking and screaming.

    youdao

  • 自动发电控制(agc)安全约束调度(SCD)确保电力系统安全优质经济运行重要手段

    Automatic generation control (AGC) and security constrained dispatching (SCD) are both the crucial measures to keep power system secure, economical and of sufficient quality.

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定