在我看来,这项技术可以应用于军事、医药和公共安全等领域。
The technology, in my opinion, could have applications in such fields as military, medicine and public safety.
去年,国家游乐场安全计划在全国范围内走访了3000多个游乐场后,将国家游乐场的安全等级定为 “C” 级。
Last year the national program for playground safety gave the nation's playgrounds a grade of "C" for safety after visiting more than 3,000 playgrounds nationwide.
在文化、军事、安全等领域的交流也不断拓展。
The exchanges in culture, military affairs, and security have been increasing.
同样地,这个距离,△r的模也不完全等于它跨过的弧长。
Similarly, this distance, the length of delta r is not exactly the length along the curve.
另外,还需要注意全0权重的情况,这种情况被视作全等。
You also need to take care of the all-zeros weights case, which is considered as all-equal.
第7章介绍寻址、可靠通讯、元数据交换、安全等其它相关高级概念。
Chapter 7 covers advanced concepts related to addressing, reliable messaging, metadata exchange, security, and more.
社会救助项目如营养和食物安全等贷款也将增加一倍,达到8亿美元。
Lending for social protection, nutrition and food security is also set to double to US$800 million.
我要指出的是,它们是完全等价的,它们在能量上等价,在形状上等价。
So I want to mention also, these are exactly equivalent, they're equivalent in energy, they're equivalent in shape.
其他人认为是社会化搜索,而且这种合并可能使得社交网络与搜索完全等同!
Others point to social search and that kind of amalgamation could throw our search vs. social networking equation entirely!
您可以改写成下面这样,如果考虑到处理程序的工作原理,它们是完全等价的。
As XSLT newcomers frequently do, you can write the following code, which is strictly equivalent if you factor in the work of the processor.
昨天整个凌晨教堂周围的保卫工作明显加强,安全等级之高为这座城市前所未见。
Yesterday, security around the church increased exponentially throughout the early morning, until it became the largest security operation the city had ever seen.
要采取有力措施,为重大基础设施项目建设提供政策、金融、安全等方面的可靠保障。
Both sides should take effective measures to offer reliable policy, financial and security guarantees to major bilateral infrastructure projects.
通常来说,30 km仍可划入安全等级。但此次地震能量巨大,以往的经验概不管用。
Normally, that would still put it in the class of safe earthquakes, but it was so powerful that the usual rules did not apply.
你可以使用初等的几何知识例如三角形的三个内角各为180度和三角形全等的规则(边-角-边等)。
You may only use elementary geometry, such as the fact that the angles of a triangle add up to 180 degrees and the basic congruent triangle rules (side-angle-side, etc.).
很多SOA实现在架构的几个层级都要求技术专家:业务流程、业务规则、数据服务、安全等。
Many SOA implementations require technology expertise in several layers of the architecture: business processes, business rules, data services, security, etc.
提出关于这种类型迁移的一种设计策略,它包含并行、同步、存储、灵活、多租赁和安全等概念。
A design strategy for this type of migration, one that includes the concepts of parallelism, synchronization, storage, elasticity, multi-tenancy, and security.
系统管理,包括用户管理、打印机配置、X11、包管理、建立内核、系统初始化和安全等主题。
System administration covering topics such as user management, printer configuration, X11, package management, building a kernel, system initialization, and security.
这样可以通过禁用浏览器脚本和IE底安全等级的设置,保护浏览器免受通过已知漏洞发起的攻击。
This should protect against all known exploits of this vulnerability by disabling scripting and disabling less secure features in IE.
事件在当业务流程被建模的时候出现,同时在模型中也会展示系统的其它方面,比如管理与安全等。
Events appear when business processes are modeled, and also in models showing other aspects of the system, such as management and security.
在Mike看来,构成SOA实现的技术特性有很多种,涉及不同的方面,如平台、工具、安全等。
According to Mike, there are a myriad technical attributes that make up an SOA implementation that cover various aspects such as platform, tools, security etc.
要编写分布式应用,程序员必须学习和使用针对跨层通信、数据编制、同步和安全等领域的底层类库。
To write distributed applications, programmers must learn and use a large variety of lower-level libraries for cross-tier communication, data marshaling, synchronization, and security.
显然,简单的原因一部分是因为协议,而WCF提供的其他特性(线程、安全等)又为我们节省了时间。
It turns out that the protocol is the easy part; it's the other attributes (threading, security, etc.) where WCF will save you time.
所以,尽管我们有种种担心和顾虑,但在求职时,外表的含义并不总是完全等同于天生无可挑剔的美丽。
So despite our fears, looks in the hiring arena do not always equal perfect bone structure.
灵活的:过滤器在Web处理环境中的应用很广泛,涵盖诸如日志记录和安全等许多最公共的辅助任务。
Flexible: the application of filters to a Web processing environment is broad, covering many of the most common auxiliary's tasks such as logging and security.
人工执行者在当业务流程被建模的时候出现,同时在模型中也会展示系统的其它方面,比如管理与安全等。
Human actors appear when business processes are modeled, and also in models showing other aspects of the system, such as management and security.
在其苏黎世研究实验室,来自20多个国家的约300位科学家主攻微电子学、纳米技术和计算机安全等领域。
At its Zurich Research Laboratory around 300 scientists representing over 20 nationalities concentrate on areas such as microelectronics, nanotechnology and computer security.
第五,培育新的合作亮点,拓展气候变化、能源安全等领域的沟通与协调,并使之造福于中美两国以及国际社会。
Fifth, cultivate new cooperation points and expand communications and coordination on climate change and energy security so as to benefit both countries and the international community as well.
第五,培育新的合作亮点,拓展气候变化、能源安全等领域的沟通与协调,并使之造福于中美两国以及国际社会。
Fifth, cultivate new cooperation points and expand communications and coordination on climate change and energy security so as to benefit both countries and the international community as well.
应用推荐