完整性子系統 的英文怎麼說
中文拼音 [wánzhěngxìngzixìtǒng]
完整性子系統
英文
integrity subsystem- 整 : Ⅰ形容詞1 (全部在內; 完整) whole; all; complete 2 (整齊) neat; tidy; orderly Ⅱ動詞1 (整理; 整...
- 性 : Ⅰ名詞1 (性格) nature; character; disposition 2 (性能; 性質) property; quality 3 (性別) sex ...
- 子 : 子Ⅰ名詞1 (兒子) son 2 (人的通稱) person 3 (古代特指有學問的男人) ancient title of respect f...
- 系 : 系動詞(打結; 扣) tie; fasten; do up; button up
- 統 : Ⅰ名詞1 (事物間連續的關系) interconnected system 2 (衣服等的筒狀部分) any tube shaped part of ...
- 系統 : 1. (按一定關系組成的同類事物) system 2. (有條理的;有系統的) systematic
-
The structure of this paper goes like this, the first chapter introduce the development of e - b / l in practice and in laws. and draw a conclution that the electrification of the b / l is a history tide. in the second chapter, on the basic of reseach the security trap in e - b / l running, 1 conclude six security elements of, e - b / l : the liability of the system, the authenticity of dealers ' identity. the integrity and secrecy of electronic data, and the validity and evidence effectiveness of electronic data. from the third chapter to the eighth, 1 reseach these elements one by one. the third chapter introduce the establishment of the e - b / l security system, and some related laws the fourth chapter introduce the certification authority of e - b / l. in the fifth chapter, 1 introduce the encrypt of electronic information and some countries ' control on use / import / export crytography. the sixth chapter introduce the concept and principle of digital signature, and reseach some related legal issues. the seventh chapter reseach the legal demand of validity, then come to a conclution that to establish a independent electronic information system is necessary. in the eighth chapter, 1 reseach some countries " regulation on the evidence effectiveness of electronic data
第二章在分析電子提單運作中的安全隱患的基礎上,歸納出其六大安全要素,即系統的可靠性、交易者身份的真實性、數據電訊的機密性和完整性、數據電訊的合法有效性以及交易者行為的不可抵賴性。第三章到第八章分別對這六大要素進行分析:第三章介紹了電子提單網路安全體系的建立以及系統安全保護法規,第四章則介紹了電子提單的安全認證機構,第五章介紹了信息加密技術以及各國立法對密碼技術的進出口及使用的控制,第六章介紹了數字簽名的概念及原理,並以bolero為例介紹了數字簽名的技術方式,對有關法律問題作了論述;第七章首先論述了電子提單對有效性的法律需求,然後結合國內法和國際規則的規定論證了數據電訊制度產生的必然性;第八章通過對各國立法對電子證據的法律效力的規定,論述了對電子交易至關重要的數據電訊的不可抵賴性。It uses xml encryption, xml signature and ssl technology to design and implement the solution of transmission of tender and evaluation documents separately which are based on the different security requirement. the solutions guarantees the secrecy, incontestability, integrity and identity authentication in the transmission of the bidding documents
在標書傳遞子系統中根據不同的安全需求,使用xml加密、 xml簽名和ssl技術分別為投標書和評標書設計並實現了安全傳遞的方案,確保了標書傳遞中的保密性、完整性、長期不可否認性、時間有效性和用戶身份正確性。A dynamic hierarchical description method for workflow is presented. the method provides a dynamic hierarchical way to define a workflow with non - determinate or dynamic factors. with this method, the main process defined at build - time can be reified and extended by the principle of the sub - organizations at either the build - time or the run - time. to ensure the consistency and integrity of the description, a series of constraint rules are also discussed to realize seamless integration between a decomposed process and its original one. this approach supports the description of unpredictable uncertainties, the dynamic hierarchy of business process, and the dynamic modification of enterprise organizations, and all of these improve the flexibility and extendability of workflow management systems dramatically
為支持流程中不確定性因素和動態因素的描述,提出了柔性工作流的動態層次描述方法,使得流程設計人員在流程定義階段定義的主流程可以在任意時刻由子組織的負責人進行細化和擴充.為保證動態層次描述的正確性和完整性,討論了動態層次描述的一系列約束規則,確保分解后的流程與原有流程實現無縫銜接.該描述方法支持對不可預知的非確定性因素的描述,支持業務流程的動態層次描述以及組織機構的變化,極大地增加了工作流管理系統的柔性和可擴展性The paper mainly designs the electronic official document transport system, analyzes the framework, key technologies and securities. this paper put forward to the scheme about these key technologies, such as the user ' s certificate exchange, secret key management, red - header document and seal processing, files " inputting, and datum compressing. the paper introduces the detailed implement of the project with a demonstration
對電子公文傳輸系統的功能需求、關鍵技術以及安全性進行了深入研究和分析,本文重點對電子公文系統中的傳輸子系統作了詳細的需求分析和系統結構設計,該設計全面考慮了電子公文在傳輸過程以及收發文過程的機密性、完整性、真實性以及不可否認性等特性,提出保障系統的機密性、完整性、真實性及不可否認性的解決方案。Facilities management ( fm ) is an important part of computerized government affairs, but there are many problems exits in present fm, such as the difficulty to maintain the integrity and greenness of data, the handicap exits in data exchanging and data sharing, the shortness to provide evidence for decision - making, and so on
城市設施管理是電子政務和數字城市的重要組成部分,但是現有管理系統存在很多問題,主要表現在數據的完整性和現勢性難以保證,數據的交換和共享困難,不能為領導決策提供支持等。The key subsystems that influence the cultivation and promotion of core competence are in systems of technology and r & d, human resource, organization and culture. based on the strategic priority of core competence, the paper builds a synthesis analysis framework which focous on the pmi of human resource, culture, organization system, technology and r & d. the analysis framework of pmi is described as below : firstly, the main task of core competence based human resource integration is to keep the key employee stabilization
從上述四個視角來看,企業核心能力內化于企業的整個組織體系中,主要體現為關鍵的技術和技能、企業內部的獨特的知識集合、組織和管理機制、獨特的企業文化等幾個方面,其載體是個人和組織兩個層次,因而影響核心能力的培育和提升的企業子系統關鍵在於技術和研發子系統、人力資源子系統、組織子系統和企業文化子系統之中,因此,本文基於核心能力的戰略優先級,選取以人力資源整合、文化整合、組織機制整合、技術和研發整合四個子系統建立一個比較完整的綜合性的分析框架,這也是通過並購來培育和提升企業核心能力重點關注的領域。The second subsystem is supervisory system of power & environment. this paper provided the structure of supervisory system of power & environment. further more developed an design and implemented the design. the third subsystem is a suit of software for background management. we focused how to integrate some functions intio this comprehensive system, such as service management, billing, flow pick - up and performance analysis, so that we can take an effective control on management quality and service quality
第三個子系統為后臺管理的軟體子系統,主要研究了如何將業務管理、計費信息、流量採集、性能分析等功能集成到一個完整系統,從而對整個數據中心的業務開展和機房運行進行有效的管理,提高管理效率和服務質量。A set of access control system is proposed to achieve the requirements of both electrons government affairs and securities and integrity ; these performances are realized in c + + and the system has put into use
提出並實現一套訪問控制系統使其既能滿足現實電子政務的應用要求,又能滿足信息的機密性和完整性要求;用c + +語言實現以上的全部功能,此系統已在中船重工集團獲得使用。Beginning with the key requirements for crm by internet and network economy, it designs the integrated framework of the crm system, which focuses on customer and covers and integrates an enterprise ' s sales business, marketing business, customer services and supports. then, sales force automatization, marketing automatization, customer services automatization and customer contact center are interpreted in detail from their functions, business processes, effects etc. furthermore, the integration scheme of crm and an enterprise ' s core business system is given
接下來以internet和網路經濟對客戶關系管理的關鍵性要求為出發點,構建了以客戶為中心的涵蓋和整合企業銷售業務、市場營銷業務和客戶服務與支持業務的完整的客戶關系管理系統整體構架,並對構架中銷售自動化、營銷自動化、客戶服務自動化和客戶接觸中心等子系統的功能組成、業務流程和所起作用進行了詳細闡述。In this dissertation, the author, who hypothesizes that development - oriented poverty reduction model is most optimum in efficiency on condition that the chinese government implements a long - term development - oriented anti - poverty strategy, takes the factual implementing model of the strategy as his study object. in the light of the theories of developmental economics, interest group, game and power distribution, by employing means of normative analysis, system analysis, participatory observation, and methods of induction and abstraction based on a series of positive analyses of the poverty reduction practice and experience in rural china, he has successfully differentiated the concept of poverty - reduction in its broad sense and the one in its narrow sense and has advanced that the poverty reduction model in rural china is composed of four subsystems, namely the decision - making system, the transferring system, the reception system and the monitoring system. the four subsystems have distinctive principal structures and operating mechanisms, yet they correlate with one another closely and together make up an integral whole
本文在中國將繼續長期堅持開發式扶貧戰略的前提下,假定開發式扶貧戰略效率最優,選擇中國農村開發式扶貧戰略的具體實施模式作為主要研究對象,運用發展經濟學的模式理論、利益集團理論、博弈理論以及地方分權等理論,在對中國農村扶貧實踐進行參與觀察、實證分析和理論抽象的基礎上,採用了規范分析、系統分析、案例分析等研究方法,從廣義扶貧模式概念出發,構建了一個相對完整的扶貧模式理論分析框架,將中國農村開發式扶貧模式具體分為決策、傳遞、接受、監控四個內部組織子系統,這四個子系統既有不同的主體結構和運行機制,又存在嚴密的內在關聯性。Traditional design ways already ca n ' t give a reliable solution for these systems, especially when ddr ( double data rate ) memories come into fact. high - end designers must pay special attention to the signal integrity problems
尤其是隨著ddr ( doubledatarate )存儲器等高速器件的誕生,傳統的電路設計方法已經無法保證系統的可靠性,信號完整性分析已經成為高級電子設計人員非常關心的問題。He stresses that the resources within government control should be fully - utilized and government mechanisms, market mechanisms as well as the participation of non - governmental organizations should be simultaneously mobilized. in addition, he suggests that the beneficiary capacity building as well as the monitoring system construction should be given first priority in order to promote the participation of rural communities and poor households. regulations and laws to be enacted for the model is necessary and helpful to lessen the conflicts of the subsystems and promote their relations
在此基礎上,本文進一步認為,扶貧模式系統內部的關聯性要求扶貧政策要具有系統性,模式的整體改進要突出發展主體建設,以提高農村社區與貧困農戶的參與度;完善模式運作機制,以提高模式內部各子系統之間的關聯度;規范模式內部制度建設,以改善模式內部的博弈狀況;進行適度的決策分權,以適應地方分權體制的需要。In the first chapter in this dissertation, the possibility and certainty of traditional letter of credit electronicsization have been discussed. in the second chapter, first of all simply introduced the model that electronic letter of credit preceeds. then according to this model, put forward the probably existing safe trouble : the systematic reliability ; secrecy and completeness of data telecommunications ; the social status authenticity of business person and the nature that business action cannot be denied ; the legal effectiveness of the data telecommunications as evidence
本文第一章論述了傳統信用證電子化的可能性與必然性;第二章首先簡單介紹了現在國際上電子信用證運做的模式,然後根據此運做模式提出可能存在的安全隱患;系統的可靠性;數據電訊的機密性和完整性;交易者身份的真實性及交易行為的不可抵賴性;數據電訊作為證據的合法有效性。Finally, we analyzed the security of this system completely which can be used to provide service involving confidentiality, integrality, certificate - based identity authentication and digital signature, etc. this system is consisted of two sub - systems : center of certificate mangement and client based military email transferring component, proposing two methods namely " two - level encryption " and " certification carrying " to ensure the confidentiality of system as well as identity authentication and key distribution with offline method. it uses hash function to allow the integrality of the email transfer and digital signature technology to allow the no - denying of email tranfer, which forms a complete military email transferring system
該系統包括證書管理中心和用戶端軍用電子郵件傳輸組件兩個子系統,提出了「兩級加密」和「證書攜帶」兩種方式,以確保系統的機密性及離線方式下的身份認證、密鑰分發,利用雜湊函數實現郵件傳輸的完整性,採用數字簽名技術實現了郵件傳輸的不可否認性,形成了一個完整的軍用電子郵件傳輸系統。In order to generally analyze the performance of the horizontal directional drill ( hdd ), several subsystem models, e. g. mechanical subsystem model, hydraulic subsystem model, strength model and control subsystem model are built and integrated into a whole virtual hdd model through parameter associations
摘要為了全面分析水平定向鉆的性能,針對不同領域,分別建立了機械、液壓、強度和控制等子系統模型,通過參數關聯形成了一個完整一致的水平定向鉆整機虛擬樣機模型。Through using si analyse in the hardware design of a dtv set top box ( stb ), the main contribution of this paper is to give a series of solutions for si problems according to theoretically analyse and real works. advanced measuring systems have also been shown in the paper. with the help of this paper, the stb system of a world famous corporation has successfully get wide using of ddr sdram
本文的主要工作是在針對消費類電子( consumerelectronics )領域中的數字電視接收機頂盒進行硬體設計的過程中,引入信號完整性分析的設計方法進行高速數字電路的設計,利用理論分析作為設計指導,通過測量、模擬和實際布板的結果進行驗證,得出一系列針對信號完整性問題的解決方案和設計流程,成功地解決了某世界著名企業的機頂盒系統中ddr存儲器工作頻率無法提高的問題,在新一代的機頂盒產品中廣泛使用ddr存儲器,在很大程度上提高了系統的性能,滿足了市場的需求。Electronic archival storage - specifications relative to the design and operation of information processing systems in view of ensuring the storage and integrity of the recordings stored in these systems
電子檔案存儲.從確保在這些檔案系統中記錄的存儲和存儲完整性考慮制定的與信息處理系統設計和操作相關的規范Based on an elaborate analysis of the principal structures, operating mechanisms and operating efficiency of the subsystems and their mutual relationships, influencing elements as well as the overall efficiency of the model, the author distinguishes the core from the non - core of the model and puts forward that within the model, centralized and decentralized decision - making in the decision - making system is the premise ; restructuring and enhancing the efficiency of the transferring system is the core ; building the reception system governance and beneficiary capacity is the key and establishing and perfecting the monitoring system is the guarantee. the close relationship of the subsystems demands the anti - poverty policies be systematic and sustainable
本文通過對模式內部四個子系統主體結構、運作機制、運作效率、相互關聯性以及模式整體運行的外在影響因素和運行效率等進行分析認為:決策系統的集中決策和分散決策是開發式扶貧模式啟動的基本前提;傳遞系統的整合與效率提高是開發式扶貧模式有效運行的核心環節;接受主體的能力建設和參與是開發式扶貧模式有效運行的關鍵性因素;監控系統的建立與完善是開發式扶貧模式成功運行的根本保證。The combination of the subtree - based storage model with the document - based to ensure the efficiency and integrality of the data retrieval for all sorts of heterogeneous and context mixed data to the fullest extent ; 2. dynamically branching and merging combined with the data mapping mechanism, supports the xml document efficiently and can improve the operation capability of the system to some extent ; 3. referring to the characteristic of xquery, it presents a new operation language for xml data, xqul, which supports the query operation as well as the update operation on xml ; 4
本文提出了一套較為通用的非結構化信息的nativexml文檔存儲訪問策略和實現方案作為對非結構化信息存取機制研究的探索和嘗試,主要包括下列理論及技術: 1 .基於子樹和基於文檔的存儲模式相結合,以最大程度保證底層各類形式異構和內容混雜的數據存取的有效性和完整性; 2 .動態分枝合成技術和數據映像機制的引入,實現對xml文檔的有效支持,並在一定程度上提高系統處理性能; 3 .結合xquery查詢語言特點,提出一種新型xml數據操作語言xqul ,支持xml數據的查詢以及更新操作; 4 .三種索引(文檔索引、結構索引、值索引)的建立,為xml數據提供從站點到文檔,從文檔到元素的多級訪問策略。The safety refers to four layers : the physical layer, the network layer, the system layer and the application layer, which includes many contents such as network insulation, encryption, safety detection and monitoring, safety audit, virus protection, access control, identity certification, data copy and recovery, security management, etc. starting with the application layer of safety system, this article, based on j2ee, researches the privacy protection, completeness, facticity, availability and controllability of information in e - government
其安全性涉及到物理級、網路級、系統級和應用級四個層次,具體包括網路隔離、加密、安全檢測與監控、安全審計、防病毒、訪問控制、身份認證、數據備份與恢復、安全管理等幾十項內容。此課題從安全體系的應用層出發,基於j2ee技術,對電子政務系統中信息的保密性、完整性、真實性、可用性和可控性等方面進行研究。分享友人