完整性子系統 的英文怎麼說

中文拼音 [wánzhěngxìngzitǒng]
完整性子系統 英文
integrity subsystem
  • : Ⅰ形容詞1 (全部在內; 完整) whole; all; complete 2 (整齊) neat; tidy; orderly Ⅱ動詞1 (整理; 整...
  • : Ⅰ名詞1 (性格) nature; character; disposition 2 (性能; 性質) property; quality 3 (性別) sex ...
  • : 子Ⅰ名詞1 (兒子) son 2 (人的通稱) person 3 (古代特指有學問的男人) ancient title of respect f...
  • : 系動詞(打結; 扣) tie; fasten; do up; button up
  • : Ⅰ名詞1 (事物間連續的關系) interconnected system 2 (衣服等的筒狀部分) any tube shaped part of ...
  • 系統 : 1. (按一定關系組成的同類事物) system 2. (有條理的;有系統的) systematic
  1. The structure of this paper goes like this, the first chapter introduce the development of e - b / l in practice and in laws. and draw a conclution that the electrification of the b / l is a history tide. in the second chapter, on the basic of reseach the security trap in e - b / l running, 1 conclude six security elements of, e - b / l : the liability of the system, the authenticity of dealers ' identity. the integrity and secrecy of electronic data, and the validity and evidence effectiveness of electronic data. from the third chapter to the eighth, 1 reseach these elements one by one. the third chapter introduce the establishment of the e - b / l security system, and some related laws the fourth chapter introduce the certification authority of e - b / l. in the fifth chapter, 1 introduce the encrypt of electronic information and some countries ' control on use / import / export crytography. the sixth chapter introduce the concept and principle of digital signature, and reseach some related legal issues. the seventh chapter reseach the legal demand of validity, then come to a conclution that to establish a independent electronic information system is necessary. in the eighth chapter, 1 reseach some countries " regulation on the evidence effectiveness of electronic data

    第二章在分析電提單運作中的安全隱患的基礎上,歸納出其六大安全要素,即的可靠、交易者身份的真實、數據電訊的機密、數據電訊的合法有效以及交易者行為的不可抵賴。第三章到第八章分別對這六大要素進行分析:第三章介紹了電提單網路安全體的建立以及安全保護法規,第四章則介紹了電提單的安全認證機構,第五章介紹了信息加密技術以及各國立法對密碼技術的進出口及使用的控制,第六章介紹了數字簽名的概念及原理,並以bolero為例介紹了數字簽名的技術方式,對有關法律問題作了論述;第七章首先論述了電提單對有效的法律需求,然後結合國內法和國際規則的規定論證了數據電訊制度產生的必然;第八章通過對各國立法對電證據的法律效力的規定,論述了對電交易至關重要的數據電訊的不可抵賴
  2. It uses xml encryption, xml signature and ssl technology to design and implement the solution of transmission of tender and evaluation documents separately which are based on the different security requirement. the solutions guarantees the secrecy, incontestability, integrity and identity authentication in the transmission of the bidding documents

    在標書傳遞中根據不同的安全需求,使用xml加密、 xml簽名和ssl技術分別為投標書和評標書設計並實現了安全傳遞的方案,確保了標書傳遞中的保密、長期不可否認、時間有效和用戶身份正確
  3. A dynamic hierarchical description method for workflow is presented. the method provides a dynamic hierarchical way to define a workflow with non - determinate or dynamic factors. with this method, the main process defined at build - time can be reified and extended by the principle of the sub - organizations at either the build - time or the run - time. to ensure the consistency and integrity of the description, a series of constraint rules are also discussed to realize seamless integration between a decomposed process and its original one. this approach supports the description of unpredictable uncertainties, the dynamic hierarchy of business process, and the dynamic modification of enterprise organizations, and all of these improve the flexibility and extendability of workflow management systems dramatically

    為支持流程中不確定因素和動態因素的描述,提出了柔工作流的動態層次描述方法,使得流程設計人員在流程定義階段定義的主流程可以在任意時刻由組織的負責人進行細化和擴充.為保證動態層次描述的正確,討論了動態層次描述的一列約束規則,確保分解后的流程與原有流程實現無縫銜接.該描述方法支持對不可預知的非確定因素的描述,支持業務流程的動態層次描述以及組織機構的變化,極大地增加了工作流管理的柔和可擴展
  4. The paper mainly designs the electronic official document transport system, analyzes the framework, key technologies and securities. this paper put forward to the scheme about these key technologies, such as the user ' s certificate exchange, secret key management, red - header document and seal processing, files " inputting, and datum compressing. the paper introduces the detailed implement of the project with a demonstration

    對電公文傳輸的功能需求、關鍵技術以及安全進行了深入研究和分析,本文重點對電公文中的傳輸作了詳細的需求分析和結構設計,該設計全面考慮了電公文在傳輸過程以及收發文過程的機密、真實以及不可否認等特,提出保障的機密、真實及不可否認的解決方案。
  5. Facilities management ( fm ) is an important part of computerized government affairs, but there are many problems exits in present fm, such as the difficulty to maintain the integrity and greenness of data, the handicap exits in data exchanging and data sharing, the shortness to provide evidence for decision - making, and so on

    城市設施管理是電政務和數字城市的重要組成部分,但是現有管理存在很多問題,主要表現在數據的和現勢難以保證,數據的交換和共享困難,不能為領導決策提供支持等。
  6. The key subsystems that influence the cultivation and promotion of core competence are in systems of technology and r & d, human resource, organization and culture. based on the strategic priority of core competence, the paper builds a synthesis analysis framework which focous on the pmi of human resource, culture, organization system, technology and r & d. the analysis framework of pmi is described as below : firstly, the main task of core competence based human resource integration is to keep the key employee stabilization

    從上述四個視角來看,企業核心能力內化于企業的個組織體中,主要體現為關鍵的技術和技能、企業內部的獨特的知識集合、組織和管理機制、獨特的企業文化等幾個方面,其載體是個人和組織兩個層次,因而影響核心能力的培育和提升的企業關鍵在於技術和研發、人力資源、組織和企業文化之中,因此,本文基於核心能力的戰略優先級,選取以人力資源合、文化合、組織機制合、技術和研發合四個建立一個比較的綜合的分析框架,這也是通過並購來培育和提升企業核心能力重點關注的領域。
  7. The second subsystem is supervisory system of power & environment. this paper provided the structure of supervisory system of power & environment. further more developed an design and implemented the design. the third subsystem is a suit of software for background management. we focused how to integrate some functions intio this comprehensive system, such as service management, billing, flow pick - up and performance analysis, so that we can take an effective control on management quality and service quality

    第三個為后臺管理的軟體,主要研究了如何將業務管理、計費信息、流量採集、能分析等功能集成到一個,從而對個數據中心的業務開展和機房運行進行有效的管理,提高管理效率和服務質量。
  8. A set of access control system is proposed to achieve the requirements of both electrons government affairs and securities and integrity ; these performances are realized in c + + and the system has put into use

    提出並實現一套訪問控制使其既能滿足現實電政務的應用要求,又能滿足信息的機密要求;用c + +語言實現以上的全部功能,此已在中船重工集團獲得使用。
  9. Beginning with the key requirements for crm by internet and network economy, it designs the integrated framework of the crm system, which focuses on customer and covers and integrates an enterprise ' s sales business, marketing business, customer services and supports. then, sales force automatization, marketing automatization, customer services automatization and customer contact center are interpreted in detail from their functions, business processes, effects etc. furthermore, the integration scheme of crm and an enterprise ' s core business system is given

    接下來以internet和網路經濟對客戶關管理的關鍵要求為出發點,構建了以客戶為中心的涵蓋和合企業銷售業務、市場營銷業務和客戶服務與支持業務的的客戶關管理體構架,並對構架中銷售自動化、營銷自動化、客戶服務自動化和客戶接觸中心等的功能組成、業務流程和所起作用進行了詳細闡述。
  10. In this dissertation, the author, who hypothesizes that development - oriented poverty reduction model is most optimum in efficiency on condition that the chinese government implements a long - term development - oriented anti - poverty strategy, takes the factual implementing model of the strategy as his study object. in the light of the theories of developmental economics, interest group, game and power distribution, by employing means of normative analysis, system analysis, participatory observation, and methods of induction and abstraction based on a series of positive analyses of the poverty reduction practice and experience in rural china, he has successfully differentiated the concept of poverty - reduction in its broad sense and the one in its narrow sense and has advanced that the poverty reduction model in rural china is composed of four subsystems, namely the decision - making system, the transferring system, the reception system and the monitoring system. the four subsystems have distinctive principal structures and operating mechanisms, yet they correlate with one another closely and together make up an integral whole

    本文在中國將繼續長期堅持開發式扶貧戰略的前提下,假定開發式扶貧戰略效率最優,選擇中國農村開發式扶貧戰略的具體實施模式作為主要研究對象,運用發展經濟學的模式理論、利益集團理論、博弈理論以及地方分權等理論,在對中國農村扶貧實踐進行參與觀察、實證分析和理論抽象的基礎上,採用了規范分析、分析、案例分析等研究方法,從廣義扶貧模式概念出發,構建了一個相對的扶貧模式理論分析框架,將中國農村開發式扶貧模式具體分為決策、傳遞、接受、監控四個內部組織,這四個既有不同的主體結構和運行機制,又存在嚴密的內在關聯
  11. Traditional design ways already ca n ' t give a reliable solution for these systems, especially when ddr ( double data rate ) memories come into fact. high - end designers must pay special attention to the signal integrity problems

    尤其是隨著ddr ( doubledatarate )存儲器等高速器件的誕生,傳的電路設計方法已經無法保證的可靠,信號分析已經成為高級電設計人員非常關心的問題。
  12. He stresses that the resources within government control should be fully - utilized and government mechanisms, market mechanisms as well as the participation of non - governmental organizations should be simultaneously mobilized. in addition, he suggests that the beneficiary capacity building as well as the monitoring system construction should be given first priority in order to promote the participation of rural communities and poor households. regulations and laws to be enacted for the model is necessary and helpful to lessen the conflicts of the subsystems and promote their relations

    在此基礎上,本文進一步認為,扶貧模式內部的關聯要求扶貧政策要具有,模式的體改進要突出發展主體建設,以提高農村社區與貧困農戶的參與度;善模式運作機制,以提高模式內部各之間的關聯度;規范模式內部制度建設,以改善模式內部的博弈狀況;進行適度的決策分權,以適應地方分權體制的需要。
  13. In the first chapter in this dissertation, the possibility and certainty of traditional letter of credit electronicsization have been discussed. in the second chapter, first of all simply introduced the model that electronic letter of credit preceeds. then according to this model, put forward the probably existing safe trouble : the systematic reliability ; secrecy and completeness of data telecommunications ; the social status authenticity of business person and the nature that business action cannot be denied ; the legal effectiveness of the data telecommunications as evidence

    本文第一章論述了傳信用證電化的可能與必然;第二章首先簡單介紹了現在國際上電信用證運做的模式,然後根據此運做模式提出可能存在的安全隱患;的可靠;數據電訊的機密;交易者身份的真實及交易行為的不可抵賴;數據電訊作為證據的合法有效
  14. Finally, we analyzed the security of this system completely which can be used to provide service involving confidentiality, integrality, certificate - based identity authentication and digital signature, etc. this system is consisted of two sub - systems : center of certificate mangement and client based military email transferring component, proposing two methods namely " two - level encryption " and " certification carrying " to ensure the confidentiality of system as well as identity authentication and key distribution with offline method. it uses hash function to allow the integrality of the email transfer and digital signature technology to allow the no - denying of email tranfer, which forms a complete military email transferring system

    包括證書管理中心和用戶端軍用電郵件傳輸組件兩個,提出了「兩級加密」和「證書攜帶」兩種方式,以確保的機密及離線方式下的身份認證、密鑰分發,利用雜湊函數實現郵件傳輸的,採用數字簽名技術實現了郵件傳輸的不可否認,形成了一個的軍用電郵件傳輸
  15. In order to generally analyze the performance of the horizontal directional drill ( hdd ), several subsystem models, e. g. mechanical subsystem model, hydraulic subsystem model, strength model and control subsystem model are built and integrated into a whole virtual hdd model through parameter associations

    摘要為了全面分析水平定向鉆的能,針對不同領域,分別建立了機械、液壓、強度和控制等模型,通過參數關聯形成了一個一致的水平定向鉆機虛擬樣機模型。
  16. Through using si analyse in the hardware design of a dtv set top box ( stb ), the main contribution of this paper is to give a series of solutions for si problems according to theoretically analyse and real works. advanced measuring systems have also been shown in the paper. with the help of this paper, the stb system of a world famous corporation has successfully get wide using of ddr sdram

    本文的主要工作是在針對消費類電( consumerelectronics )領域中的數字電視接收機頂盒進行硬體設計的過程中,引入信號分析的設計方法進行高速數字電路的設計,利用理論分析作為設計指導,通過測量、模擬和實際布板的結果進行驗證,得出一列針對信號問題的解決方案和設計流程,成功地解決了某世界著名企業的機頂盒中ddr存儲器工作頻率無法提高的問題,在新一代的機頂盒產品中廣泛使用ddr存儲器,在很大程度上提高了能,滿足了市場的需求。
  17. Electronic archival storage - specifications relative to the design and operation of information processing systems in view of ensuring the storage and integrity of the recordings stored in these systems

    檔案存儲.從確保在這些檔案中記錄的存儲和存儲考慮制定的與信息處理設計和操作相關的規范
  18. Based on an elaborate analysis of the principal structures, operating mechanisms and operating efficiency of the subsystems and their mutual relationships, influencing elements as well as the overall efficiency of the model, the author distinguishes the core from the non - core of the model and puts forward that within the model, centralized and decentralized decision - making in the decision - making system is the premise ; restructuring and enhancing the efficiency of the transferring system is the core ; building the reception system governance and beneficiary capacity is the key and establishing and perfecting the monitoring system is the guarantee. the close relationship of the subsystems demands the anti - poverty policies be systematic and sustainable

    本文通過對模式內部四個主體結構、運作機制、運作效率、相互關聯以及模式體運行的外在影響因素和運行效率等進行分析認為:決策的集中決策和分散決策是開發式扶貧模式啟動的基本前提;傳遞合與效率提高是開發式扶貧模式有效運行的核心環節;接受主體的能力建設和參與是開發式扶貧模式有效運行的關鍵因素;監控的建立與善是開發式扶貧模式成功運行的根本保證。
  19. The combination of the subtree - based storage model with the document - based to ensure the efficiency and integrality of the data retrieval for all sorts of heterogeneous and context mixed data to the fullest extent ; 2. dynamically branching and merging combined with the data mapping mechanism, supports the xml document efficiently and can improve the operation capability of the system to some extent ; 3. referring to the characteristic of xquery, it presents a new operation language for xml data, xqul, which supports the query operation as well as the update operation on xml ; 4

    本文提出了一套較為通用的非結構化信息的nativexml文檔存儲訪問策略和實現方案作為對非結構化信息存取機制研究的探索和嘗試,主要包括下列理論及技術: 1 .基於樹和基於文檔的存儲模式相結合,以最大程度保證底層各類形式異構和內容混雜的數據存取的有效; 2 .動態分枝合成技術和數據映像機制的引入,實現對xml文檔的有效支持,並在一定程度上提高處理能; 3 .結合xquery查詢語言特點,提出一種新型xml數據操作語言xqul ,支持xml數據的查詢以及更新操作; 4 .三種索引(文檔索引、結構索引、值索引)的建立,為xml數據提供從站點到文檔,從文檔到元素的多級訪問策略。
  20. The safety refers to four layers : the physical layer, the network layer, the system layer and the application layer, which includes many contents such as network insulation, encryption, safety detection and monitoring, safety audit, virus protection, access control, identity certification, data copy and recovery, security management, etc. starting with the application layer of safety system, this article, based on j2ee, researches the privacy protection, completeness, facticity, availability and controllability of information in e - government

    其安全涉及到物理級、網路級、級和應用級四個層次,具體包括網路隔離、加密、安全檢測與監控、安全審計、防病毒、訪問控制、身份認證、數據備份與恢復、安全管理等幾十項內容。此課題從安全體的應用層出發,基於j2ee技術,對電政務中信息的保密、真實、可用和可控等方面進行研究。
分享友人