完整性模型 的英文怎麼說
中文拼音 [wánzhěngxìngmóxíng]
完整性模型
英文
clark-wilson integrity model- 整 : Ⅰ形容詞1 (全部在內; 完整) whole; all; complete 2 (整齊) neat; tidy; orderly Ⅱ動詞1 (整理; 整...
- 性 : Ⅰ名詞1 (性格) nature; character; disposition 2 (性能; 性質) property; quality 3 (性別) sex ...
- 模 : 模名詞1. (模子) mould; pattern; matrix 2. (姓氏) a surname
- 完整性 : integrity; integrality; wholeness; completeness; perfection
- 模型 : 1 (仿製實物) model; pattern 2 (制砂型的工具) mould; pattern3 (模子) model set; mould patter...
-
In addition, a security model with embedded authentication and role - based access control is proposed in this paper to solve these problems. this model is based on an embedded pki which achieves nic device - level security authentication that is irrelative to hosts, and role - based pmi to take charge for role - based access control
模型採用嵌入式pki完成基於網卡設備的安全認證,認證過程與主機無關,有效的防範了身份證書和密鑰被盜取的威脅;使用基於角色的pmi實現系統中的訪問控制,保證了策略傳輸的機密性,完整性。The cube models being queried should be valid according to the base rules and cube model completeness rules defined for the db2 cube views metadata
按照基本規則和db2 cube views元數據定義的多維數據集模型完整性規則,查詢的多維數據集模型應該是有效的。Several approaches are provided to construct secure operating systems. the paper mainly discusses diverse security policies in operating systems. by the gfac framework, we implement several security policies in linux kernel version 2. 2. 14, including hru model based fine grain discretionary access control, multi - level security policy based mandatory access control and biba model based integrity access control
文章重點研究了如何在操作系統中實現多種安全策略,並在linux內核版本2 . 2 . 14中根據訪問控制通用框架( gfac )方法,實現了基於hru模型的細粒度自主訪問控制、基於bell - lapadula模型多級安全規則的強制訪問控制以及基於biba模型的強制訪問控制等多種安全策略,從而有效地增強了操作系統中信息的保密性和完整性。The main contents of testing the strength of subgrade abamurus using earthquake wave velocity are as follows : the influence of the lithology and strength of flag stones and the shape of block upon wave velocity, the influence of the strength of cement mortar upon earthquake wave velocity, the estimation standards of the strength and completion of abamurus. this paper puts forward an accurate no - destructive testing using the different reflect of elastic wave velocity for abamurus stones, the strength of mortar, the plumpness of mortar and the type of abamurus, on the basis of laboratory tests and field tests. it can be used to accurately distinguish the completion of abamurus
地震波速法檢測路基擋墻強度,研究的主要內容有:片石巖性和強度及塊體形體對波速的影響;水泥砂漿強度對墻體波速的影響;擋墻整體強度和完整性的評估標準。應用彈性波速度對擋土墻石材、砂漿強度、砂漿飽滿度及擋墻類型的不同反映,在室內外模型試驗和現場生產試驗的基礎上,提出了一種正確的無損檢測法,可以正確判別漿砂片石擋墻墻身的完整性。Due to the incompleteness of model library and uncertainty of modeling knowledge, qualitative compositional modeling is a process of " generate and test " during which the composed model must be modified and improved. there are two separate sub - tasks about cm, model composition and model simulation, which communicate with each other through qualitative differential equations ( qde )
定性模型的特點,決定了定性組合建模是一個需要重復調整和完善的迭代過程,建模與模擬是通過定性微分方程相關聯的兩個子任務,建模是模擬的基礎,模擬是對建模結果的檢驗。The planeness and integrality of the flier - plate were ensured effectively by exerting restrictive pressure, controlling heating and cooling rate, lowering welding temperature or reducing welding time as much as possible, etc. theoretical model of creating quasi - isentropic compression via 93w - ofc - tc4 - a1 - mb2 system flier - plate with graded wave impedance was established, and numerical simulation of the impact process was then carried out
採取施加外部機械力、控制升降溫速率以及盡量降低焊接溫度或減少焊接時間(防止脆性金屬間化合物的過度增長)等措施,確保了焊接接頭的平整性和界面結構的完整性。建立起梯度飛片擊靶的理論模型,對93w - ofc - tc _ 4 - al - mb _ 2系波阻抗梯度飛片的擊靶過程進行了數值模擬計算。Pki is a transparent and seamless platform for the network system provided the service of confidentiality, integrity, authentication and non - repudiation, while ca is a necessary and important component in pki, pki ' s modules, functions and its applications are firstly described in this dissertation, with specially emphases on the issuing certificates, issuance mechanisms of revoked certificates, message format and hierarchy of cas as well as the performance of the system
Pki可以為網路上的各種應用提供機密性、完整性、身份鑒別和不可抵賴性的安全保障,簽證機關是pki系統中的重要組件。本文闡述了pki系統的模型、功能和應用,重點討論了簽證機關的證書發布、層次結構、消息格式、撤銷證書的發布機制等問題,以及它們對系統性能的影響。The fault samples with the signal of zero or one and the model of bp neural network are established, in accordance with nine faults of pulverizing system for chongqing power plant. during the course of the samples compilation, produce rule 、 neural network representation etc are synthesized to organize and express the fault sample of pulverizing system. before being putted into the database, the sample data is disposed to ensure sample data integrity and no redundancy
本文針對重慶發電廠制粉系統九種故障建立了以0 、 1為徵兆量的故障樣本和相應的bp神經網路模型,且在制粉系統故障及其相關故障樣本編輯過程中,應用了神經網路產生規則式、框架式等知識表達方法,有效的表達制粉系統故障及其相關故障診斷知識,並且為保證數據的完整性,減少數據冗餘,對數據庫進行了規范化處理,簡化了數據結構和避免了數據沖突。The 3 - d finite element models of the experimental motors are established. the structural integrity of the experimental motors under internal pressure and lateral overload is analyzed. the influence of lateral overload on the structural integrity of motor is discussed
建立了試驗發動機的三維有限元模型,分析了內壓和橫向過載聯合作用下發動機結構完整性,討論了橫向過載大小對發動機結構完整性的影響。And it would be applied to other blast furnaces after some modifications. to improve the quality of the model, some methods should be used in future : l. impoving the database and making it have more information. 2. considering the mass and thermal accumulation and calculating the effect of the data of every period
2 、模型在作動態計算時,使用日平均數據來調整參數,而用即時的數據來計算預測值,這種方法盡管有一定的科學性,但要提高模型的準確性,必須考慮到高爐內物料和熱量的積累,考慮各個時段入爐物料對化學平衡和熱平衡的影響,根據專家系統和神經元網路的方法,得到更為完善的模型。Through identifying better and apperceiving earlier organizational politics behaviors, in order to reduce all sorts of kickbacks to nadir, in our research according to ferris organizational politics perception model, combining the practice of key disciplines of the university, based on integrated, scientific, objective, precise, measurable principle, we construct cause and effect model of knowledge - intensive organizational politics perception
為了更好的識別和盡早感知組織政治行為,將其給組織帶來的種種不良後果減少至最低,本研究參照ferris組織政治知覺模型,並結合我國大學重點學科的實際,依據完整性、科學性、客觀性、精確性、可測性原則,構建了知識密集性組織組織政治知覺前因及後果模型。Symbol logic method is unable to guarantee the complement of knowledge description, which leads to complicated deducing process. we introduce fuzzy cognitive map into agent modeling and deducing, substitute symbolic description and inference with simple mathematical computing, achieving agent intelligent decision - making in complex environment
針對現有符號邏輯描述方法難以保證知識表達的完整性,推理過程陷於復雜的邏輯演繹的問題,作者引入了模糊因果關系的網路模型,基於模糊認知圖理論構造agent推理模型,用簡單的數值計算代替復雜符號系統的表示和演繹推理過程,實現了復雜環境下的agent智能決策。These osds have to be checked on completeness, consistency and level of detail before the model can be handed over to the incremental design and build stage
該等物件順序圖的完整性、一貫性和詳細程度必須先予以查核,然後該模型才可進入遞增設計和建設階段。System functions of gsmb based on " godson " cpu was programmed by the discussion of " godson " cpu micro - system structure finalization and by the introduction of " godson " cpu performance requirements. this essay also specified on gsmb board level system structure, bios level solving and selection of important chips. moreover, problems related to high speed circuit design such as mensurability, pcb layout signal integrity, electromagnetic coexist were researched
通過對「龍芯1號」 ( godson ) cpu微體系結構定型的討論和關于「龍芯1號」 cpu所需達到的的性能指標的介紹,規劃了基於「龍芯1號」 cpu的高速服務器主板gsmb的系統功能,並敘述了根據系統功能所設計的gsmb板級系統結構、 bios級解決方案和重要晶元的選型;另外還研究了高速電路設計所涉及的如可測試性、信號完整性、電磁兼容性等一系列問題,並依據研究構建了基於ibis的軟體模擬模型,同時藉助eda模擬分析工具對關鍵線網與關鍵模塊進行了板級模擬。Base on the object - oriented theory of software engineering, one object - oriented model of led lamp is presented. lamp database is used for the fundament of led simulating system in the designing of led lighting system. and the author has developed one kind of led lamp database
燈具庫作為led燈光模擬系統的基礎,在照明設計中它可以為led模擬系統提供有關產品的數據,並保證led燈具的模型數據的完整性,作者研究並提出了led燈光模擬系統中led燈具庫的建立方式。Model of data remote transmittal based on ca authentication is compound by ca authentication and sensitive data security. on one hand, ca authentication is developed on the basis of openssl function libraries, which provide secure and reliable channel for sensitive data between two communication terminals ; on the other hand, sensitive data in server database is encoded by fields, which keep invisibility for non - correlation persons
基於ca認證的數據遠程存取模型是我們利用基於openssl函數庫開發的ca認證過程來為通信兩端提供安全可靠的通信通道,具有信息保密、信息完整性、身份認證等功能,同時,對企業重要數據欄位進行加密,來保證數據庫端的數據安全。Topics include : relational databases, sql ( structured query language ) ; types, relations, relational algebra, integrity, view ; functional dependency theory, normalization, semantic modeling, entity - relationship modeling, conceptual database design ; concurrency control, security ; database and web connectivity, xml
主題包括:關聯式資料庫、 sql (結構查詢語言) ;資料類型、關聯、關聯式代數、完整性、景觀表;功能依附理論、正規化、語義塑模、實體關聯塑模、概念性資料庫設計;同時操作控制、安全;資料庫與網頁連結、 xml (可擴展標示語言) 。Our third strategy one table per concrete class has some mapping limitations, and the underlying data model can t use referential integrity, meaning that you re not using the relational database engine to its full potential
第三個策略(每個具體類一個表)有一些映射限制,而底層數據模型不能使用參照完整性,這意味著您不能發揮關系數據庫引擎的所有潛力。In this dissertation, on the basis of the analysis of the dimension effect of engineering drawings, a dimension model based on functional semantics is advanced. a new scheme for constructing and adjusting the initial dimension model is put forward, meeting the dimensioning requirement of integrality and rationality
本文在分析工程圖紙尺寸作用的基礎上,建立了基於功能語義的尺寸模型,介紹了尺寸模型的初始生成方法,提出了尺寸模型的調整策略,從而滿足尺寸的完整性和合理性要求。Third, based on the thorough research of the multilevel security models, integrity models and role - based access control models ( rbac ), a modified blp model ( mblp ) is designed and applied in a secure operating system developed independently. then, a well - integrated model of blp model, clark - wilson model, dte model and rbac models is proposed, leading to a prominent dynamic authorization access control model ( daacm ), which supports diverse security policies, including confidentiality, integrity and authorization
第三,在深入研究多級安全模型、完整性模型、基於角色的授權模型等基礎上,首先提出了一個修改blp模型( mblp )的方案,並在一個自主開發的安全操作系統中得到了應用;然後通過將blp模型、 clark - wilson模型、 dte模型、 rbac模型有機地集成應用,提升出一個支持機密性、完整性和授權等多安全策略的,可實現動態授權的訪問控制模型( daacm ) 。分享友人