Eiafans.com_环评爱好者

 找回密码
 注册

QQ登录

只需一步,快速开始

2022年环境影响评价师辅导
发布环保竣工验收公示|发布环评公示
建设项目环评费用在线计算|收费标准
环评师招聘与应聘| 行业信息|预评审会
2024年环评工程师备考全程指导|报名时间汇总
2024年环评师考试交流|资料下载
2024年环境影响评价工程师考试培训!
低价环评考试用书教材|环评图书免运费
考前培训|继续教育
发布企业环境信息公开|发布应急预案公示
查看: 1966|回复: 8
收起左侧

[交流] 谁来帮我翻译一下,vnlnerability model application

[复制链接]
发表于 2010-3-14 16:03 | 显示全部楼层 |阅读模式
谁能告诉我有Vnlnerability应用模型吗,或者帮我翻译这句话“Environmental impact assessment of urban development plan by vnlnerability model application”  。谢谢了。

发表于 2010-3-14 16:09 | 显示全部楼层
直接翻译:环境城市发展规划的影响评估vnlnerability模型的应用。
 楼主| 发表于 2010-3-14 16:30 | 显示全部楼层
呵呵,谢谢!不过这样好像有不对耶。
发表于 2010-3-14 16:34 | 显示全部楼层
Vulnerability模型在城市规划环评中的应用
 楼主| 发表于 2010-3-14 16:41 | 显示全部楼层
谢谢!
发表于 2010-3-14 20:31 | 显示全部楼层
http://www.dictall.com/indu/240/239708385C4.htm

vulnerability model
脆弱性模型
1.After the analysis and comparison of the existing vulnerability analysis methods, a new vulnerability model of distributed systems based on reliability theory is proposed.
对现有的脆弱性分析方法进行分析和比较,提出基于可靠性理论的分布式系统脆弱性模型。
2.Used two methods to assess vulnerability: vulnerability model and vulnerability index of ground subsidence hazard.
采用两种评价方法进行脆弱性评价:一是应用脆弱性模型评价天津滨海新区自然灾害综合脆弱性;二是选取地面沉降灾害脆弱性指标,应用模糊综合评判评价地面沉降灾害脆弱性。
发表于 2010-3-15 07:50 | 显示全部楼层
81.2. Presentation of a Risk Event Likelihood Computing Method based on Fuzzy Comprehensive Evaluation (FCE) model. A Risk Event Likelihood Computeing Method is proposed in this paper by combining Threat likelihood, asset vulnerability and existing safety precautions and using the Fuzzy Comprehensive Evaluation (FCE) method.
2、给出了基于模糊综合评判决策模型的风险事件发生可能性计算方法 论文把风险评估要素威胁行为发生可能性、资产的脆弱程度、资产现有的安全措施三要素有机融合在一起,采用模糊综合评判方法,给出了风险事件发生可能性计算模型。收藏指正
82.In 'Peanuts' we are reminded that inherited wealth is indeed ephemeral and in 'Elder Brother 5th Sun-she', we see the vulnerability of our hold on sanity and how easy it is to drift away when our deepest emotion anchors are brutally yanked out.  
《落花生》提醒我们继承而来的财产是短暂的,而在《五孙舍哥》我们看到理智的脆弱,当内心深处的情感之舵受伤时,人们将轻易地飘游迷失。收藏指正
83.Based on the policy of deception in depth, this paper presents a new Defensive Network DeceptionSystem model (DNDS). DNDS builds the architecture with five layers of deception and control composed ofnetwork service simulation,vulnerability forgery, operation control,file system mirror,and information deception.
本文基于深度欺骗策略,提出了一个全新的防护性网络欺骗系统模型DNDS,建立了由网络服务仿真、安全漏洞伪造、操作控制、文件系统镜像和信息欺骗组成的五重欺骗与控制架构。收藏指正
84.Given his stature in the industry, Mann could cast whomever he wanted as Isabella, and although he considered American actresses, he finally chose Gong, whom he considers one of the five best actresses in the world, with a rare ability to combine both strength and vulnerability.
鉴于他在影坛的地位,曼可以找到任何人来饰演伊莎贝拉这个角色,尽管他也考虑过美国女演员,但他最终选择了巩俐,因为他认为巩俐是世界上最优秀的五位女演员之一,具有把力量和柔弱结合在一起的超凡能力。收藏指正
85.By using B2 climate scenario produced by model PRECIS (providing regional climates for impacts studies) and the rice yield data from model CERES-Rice, the sensitivity and vulnerability of rice to future climate change in China were studied based on the yield variation and GIS techniques.
采用PRECIS模型输出的B2气候情景,结合CERES-Rice作物模型数据,依据产量的变化率和GIS技术对我国未来(21世纪70年代)水稻的气候变化敏感性和脆弱性进行了研究。收藏指正
86.On the base of observating all the buildings in Xinzhou city, the authors classified themaccording to their structures, analysed their earthquake resistance, put forword the corre spending vulnerability matrix, and obtained the results of the seismic loss and casualties underthe different earthquakes in the unit of residential district and expected seismic loss in 50years.
在对忻州市现有房屋建筑进行调查研究的基础上,对房屋建筑按结构进行了分类,并对各类房屋进行了抗震分析,进而建立了相应的易损性矩阵,最终结果得到以小区为单元遭遇不同强度地震作用的地震损失和人员伤亡,以及50年地震期望损失。收藏指正
87.Based on the brief introduction of the complexity of power system, this paper introduces the application of system complexity theory in power system and the research status, including self-organized criticality, cascading failure model, structure vulnerability and the evolution of cascading failure in complex power systems, and then further proposes that research on complex theory may provide a new area for the exploration of security and reliability of inter-connected power grids.
摘要在简述电力系统复杂性的基础上,介绍了系统复杂性理论在电力系统中的应用以及研究概况,包括电力系统的自组织临界性、电力系统连锁故障模型和复杂电力网络的结构脆弱性和连锁故障演化等,进一步指出电力系统复杂性理论的研究可能为探索互联电力网络的安全性和可靠性提供一个新的方向。收藏指正
88.This paper pointed out a typical limitation of this cookie-based session management mechanism,described the principium of session penetration vulnerability based on cookie snooping in common Web environments,and gives some preventing and detecting measures. It also designed and implemented a LAN session penetration & IDS system,using network spoofing.
本论文指出了这种基于Cookie的Session管理机制的一种典型缺陷,阐述了目前常见的Web环境下基于Cookie欺骗的Session渗透入侵的实现原理和预防检测手段,提出并且实现了一个局域网下利用网络监听来实现Session渗透攻防和入侵检测的比较完整的系统。收藏指正
89.By analyzing the working principle of ARP protocol,discuss the security vulnerability existing in the process of mapping IP address to MAC address,give out the accomplishment of ARP Spoofing in internal network and external network,and propose the countermeasures like Static ARP Table,ARPWATCH and Transmission Encryption in order to protect against hacker attack.
通过分析ARP协议的工作原理,讨论了ARP协议从IP地址到物理地址解析过程中存在的安全隐患,给出了同一网段和跨网段ARP欺骗的实现过程,并针对如何应对黑客实施此类攻击,提出了设置静态ARP表,利用ARPWATCH工具进行跟踪和传输加密的防范方法。收藏指正
90.Based on the above, the indicators for genetic erosion as the genetic structure changes of germplasm conservation due to social reasons, the indicators of genetic vulnerability as the genetic structure changes of germplasm conservation due to environmental stresses, the measurement of genetic drift and genetic shift as the genetic structure changes of germplasm collection during reproduction or seed increase were reviewed and developed.
探讨了人为条件导致植物种质资源遗传结构改变的遗传流失、环境胁迫所致植物种质资源遗传结构改变的遗传脆弱性和种子扩繁所引发的植物种质资源遗传结构改变的遗传漂变和遗传漂移等的统计指标。收藏指正
91.Not a timely manner to facilitate the dissolution of auto parts fault detection, vulnerability directly on the surface of metal parts Nondestructive Testing of the fatigue crack, stress corrosion, crack, crack, etc. folded through "sound", "light" emergency instructions crack site to the maintenance staff promptly eliminate hidden dangers and guarantee the exercise of automotive safety.
及时方便不解体检测汽车部件故障,直接对易损金属部件表面进行无损检测,对出现的疲劳裂纹,应力腐蚀、裂纹、折叠裂纹等、通过“声”、“光”报警指示裂纹的部位,以使维修人员及时排除隐患,保证汽车安全行使。
发表于 2010-3-15 09:27 | 显示全部楼层
81.2. Presentation of a Risk Event Likelihood Computing Method based on Fuzzy Comprehensive Evaluati ...
好好人 发表于 2010-3-15 07:50

这是做什么?
发表于 2010-3-15 13:00 | 显示全部楼层
vnlnerability模型在都市规划环境影响评价中的应用
您需要登录后才可以回帖 登录 | 注册

本版积分规则

关闭

热点推荐上一条 /1 下一条

2022年环境影响评价师辅导

联系我们|业务合作|手机版|Archiver|环评爱好者 ( 鄂ICP备06016596号-1 )

京公网安备11010502035293号

关注官方公众号

GMT+8, 2024-4-29 18:17 , Processed in 0.075786 second(s), 26 queries .

Powered by Discuz! X3.4

© 2001-2023 Discuz! Team.

快速回复 返回顶部 返回列表