Mobile
Log In Sign Up
Home > chinese-english > "事后分析" in English

English translation for "事后分析"

after-the-fact analysis
back-analysis
ex post analysis
postmortem analysis


Related Translations:
事后适应:  postadaptation
事后丸:  morning-after pill
事后剖析:  post-mortem
事后日期:  postdate
事后批准:  ex post facto approval
事后无效:  void after the fact
事后维护:  maintenance after failure
事后测验:  post testposttestt
事后审核:  post audit
事后调查:  post survey
Example Sentences:
1.Ex - post analysis shows that the right kind of preparation followed by skillful use of mathematical optimization during negotiation usually leads to a better outcome for all parties to the negotiation
事后分析表明:事前正确准备,在谈判期间巧妙运用经过数学优化的方案,通常能达成各方更满意的成果。
2.It integrated the advantages of physical clock and logical clock so that it can not only represent the time duration but also preserve the partial order of events . a postmortem clock adjustment algorithm has been designed
结合物理时钟和逻辑时钟的优点,设计了一个事后分析的时钟调整算法,证明了其正确性和收敛性。
3.The tradional audit mechanism are introduced . comparing with feathure of embedded filesystem , the paper presents a multiple - level security audit system . flexible method of the audit storing enhances the dependability of audit information
通过灵活的审计存储方法,提高了审计信息的可信度;同时,通过审计的两级实时报警和对审计信息的事后分析,提高了审计信息的利用率。
4.In fact , in order to realize image data real - time collecting and rapid storage , uniting pci bus and scsi bus which make system hold high speed data throughput provides sufficiency observation data
在实际的工作中,把pci局部总线和scsi系统总线结合起来,使整个系统拥有高速的数据吞吐量,以期实现图象数据的实时采集和快速存储,为实时处理和事后分析工作提供充分的观测数据。
5.We can detect , alarm and record intrusion activities with ids that also could be used in analysis after intrusion events and help user to find system leaks . it also can stop intrusion activities with the linkage of other security technology
通过入侵检测系统,可实现对入侵行为的及时发现、告警、记录,还可进行事后分析和漏洞查询,通过与其他安全产品的联动还可实现对入侵行为的有效阻止。
6.Flexible method of the audit storing enhances the dependability of audit information . two - level real - time alarm and second analysis of audit information enhance the utility of audit information . and the audit cache reduces the time spending caused by auditing
通过灵活的审计存储方法,提高了审计信息的可信度;同时,通过审计的两级实时报警和对审计信息的事后分析,提高了审计信息的利用率。
7.The new train actual graph information management system can provide some new ways to analyse and manage the train actual running data , and greatly improve the work efficiency of the railway management of different railway departments , such as locomotive and dispatch department
列车实绩运行图信息管理系统的建立,将为机务、调度等部门进行事后分析管理提供新的方法,较大地改善目前列车实绩运行图管理的落后现状。
8.The article points out the importance and necessity of the information - security from its actuality in our country . the resources in the information system , for instance , hardware , software , data , document , operator , meterial and so on , are evaluated and gived safety grade firstly . and then , it analyses the menace including the nonauthorized access , the information leak , the refused sevice , the internal objection which the system will take . the following are the corresponding control police : confirm the users " rights and duties , including the mode of using account , the limit of accessing resource , the application of password , the building of backup ; confirm the administrators " right and duties , including physical safety , system configuration , account configuration and usufruct , password management , audit and control , backup and individual intimity ; run - of - mill measure of security defence , including access control , symbol and identification , integrality control , password technique , firewall system , audit and resumption , safety of operating system , safety of database system , defence of computers " virus and resisting - deny protocol . in the end , the article offers the strategies of disposing the safety - accident and analyse after ithow . to report it , how to solve it in phase , and how to avoid it happening again . in a word , the article presents a holistic resolvent about keeping away the information system ' s security , and supplies a essential frame for its configuration , management and application
然后,对系统可能受到的威胁,包括非授权访问、信息泄漏、拒绝服务和内部缺陷等进行分析,并提出了相应的控制策略:确定用户的权力和责任,包括帐户使用方式、资源访问权限、口令应用以及建立备份等;确定系统管理员的权力和责任,包括物理安全、系统配置、帐户设置及使用权限、口令管理、审计和监控、备份以及个人隐私等方面;一般性的安全防护措施:存取控制、标识和认证、完整性控制、密码技术、防火墙系统、审计和恢复、操作系统安全、数据库系统安全、计算机病毒防护和抗抵赖协议等。最后,对事故处理和事后分析提供策略,如何报告安全事故,如何协调解决安全事故,如何避免安全事故再次发生。总之,本文对信息系统安全防范工作给出一个整体的解决方案,为其在配置、管理和应用方面提供了基本的框架。
9.Through forming a framework of domestic rate of cost , the thesis has analyzed the competitive advantages from three levels , resource allocation efficiency of fresh fruits , latent competitive advantages and protective level and distorting degree from the government firstly . then , the thesis post - analyzed and examined the comparative advantages of china ' s apple and orange with tsc and kca . it consider that apple , orange , pear in china gave higher competitive advantages but the competitive advantage of fruits is decreasing in general , mandarin orange and golden orange ' s export competitiveness is stronger while aurantium , lemon and bitter orange have no export competitiveness at all
本文通过建立国内资源成本分析框架,应用国内资源成本分析法( drc ) 、社会效益分析法( nsp ) 、有效保护率法( erp ) ,从几种鲜果生产的资源配置效率,潜在的比较优势和政策保护水平以及扭曲程度3个层面对中国苹果和柑橘的比较优势进行了事前分析;然后运用净出口指标(贸易专门化系数, tsc )分析法, “显性比较优势系数” ( rca )分析法对中国苹果和柑橘的比较优势进行事后分析和检验。
Similar Words:
"事后对策管理" English translation, "事后反馈" English translation, "事后犯意" English translation, "事后分层抽样" English translation, "事后分离" English translation, "事后付款系统" English translation, "事后付款制" English translation, "事后概率法则" English translation, "事后公离" English translation, "事后归因谬误" English translation