新策略系统排队服务模型特点;
新策略系统在队列容量有限时的队列状态转移规律;
The queue status transition regularity of limited capacity new strategy system;
认为采取全球CO2循环策略系统是降低大气中CO2含量的一条有效途径。
It is believed that the global CO2 recycling is a potential strategy to decrease the content of CO2 in the atmosphere.
合作学习是一种教学理论与策略系统,该系统需要小组工作作为一项主要形式。
Cooperative learning is a kind of teaching theory and strategy system, which takes group work as a main form.
为了提高足球机器人策略系统的智能,提出了基于进化方法的足球机器人策略系统。
The soccer robot strategy system based on evolutionary methods to improve the intelligence of soccer robot strategy system.
本文首先分析了VPN安全策略系统所面临的问题,论述了安全策略系统的发展趋势。
This paper analyses the current problems of the security policy system of VPN at first, discuss the security policy system's trend of development.
为了在机器人足球策略系统中获得良好的角色分配效率,提出了基于组合最优的角色分配算法。
To gain excellent efficiency of role assignment in robot soccer strategy system, a role assignment algorithm based on combinatorial optimization is presented.
观念与方法结合在一起,并在外界因素(环境因素,学习者因素)的推动下,形成语言学习者的语言学习策略系统。
Beliefs combine with actions, and under the influence of outside factors (situational factors and learner factors), the system of language learning strategies is formed.
构建了GX实验学习策略系统:由GX实验学习策略、相关因素(学习者因素和环境因素)、课堂学习效益三个子系统构成。
Constructs the learning strategy system of "GX" Experiment, which consists of three subsystems: learning strategies, relevant factors (learner and environment), and classroom learning efficiency.
最后,本文详细阐述了VPN安全策略系统设计及实现的总体思想,描述了各个模块的划分、模块的功能以及他们之间的调用关系。
At last, we describe the design and the whole idea of the VPN security policy system, discuss the divide of each module, the function of the module and the relation between the call.
现在,很显然,假如你正使用一个如“Priceaction”策略系统这样的高概率交易方法的话,你是绝对不会损失72%的交易的。
Now, obviously if you are using a high-probability trading method like price action strategies , youaren't likely to lose 72% of the time.
根据这篇文章的观点,由于植物无法逃离危险,所以将能量投入到能够识别威胁并感知疼痛的身体系统中,是一个非常糟糕的进化策略。
Plants can't run away from danger, so investing energy in a body system which recognizes a threat and can feel pain would be a very poor evolutionary strategy, according to the article.
您可能想知道这个策略对系统有什么好处。
You may be wondering how this strategy would benefit your system.
因此,为了研究包装和重构策略,必须对这些系统进行自底向上的分析。
Hence, a bottom-up analysis of these systems also has to be conducted in order to investigate wrapping and refactoring strategies.
业务策略描述系统将如何对某些组合中或在某些时间发生或未发生的事件做出反应。
Business policies describe how your system will react to events occurring or not occurring in certain combinations or at certain times.
策略描述系统将如何对某些组合中或在某些时间发生或未发生的事件做出反应。
The policies describe how your system will react to events occurring or not occurring in certain combinations or at certain times.
如果没有这种策略,系统产生的日志消息就有可能无益于问题的分析和解决。
Without one, the log messages produced by the system may not be useful for problem resolution.
通常的构造策略是将系统分层,将用户界面逻辑、商业逻辑、系统逻辑和持久性逻辑彼此分开。
A common architectural strategy is to layer your system, separating your user interface logic, business logic, system logic, and persistence logic from each other.
相反,你的时间可以用来设计安全策略,目录树,以及系统标签。
Instead your time can be dedicated to designing security policies, category trees, and the system labels.
EA关注于对齐it系统和业务策略。
EA is concerned with aligning it systems with business strategy.
当今日益复杂的IT系统及其相关业务策略组成了任何 IT系统的核心。
Today's ever more complex IT systems and associated business policies form a central piece of any IT system.
根据工作负载需求超出阈值水平的量,阈值策略指示系统创建必要资源的实例。
The policy tells the system to create instances of the necessary resources depending how much workload demands exceed the threshold level.
数据库安全管理员通过创建安全策略来配置LBAC系统。
The database security administrator configures the LBAC system by creating security policies.
此时建立系统的性能策略非常重要。
It is important here to establish performance policies for the system.
使用方面可以让系统的管理策略保持模块化。
策略3:系统备份和恢复。
策略1:刷新操作系统安装。
branch—系统订阅的策略组。
系统的策略可以描述系统的进程、功能、性能或可靠性。
Policies of a system can describe the system's process, functionality, performance, or robustness.
有时候通过策略编码系统的安全性更为有效,但策略通常与安全特定的策略及测试特定的策略不同。
Sometimes it might be more effective to code the security of a system through policies, but policies are generally different from security-specific and testing-specific policies.
应用推荐