完整性系數 的英文怎麼說
中文拼音 [wánzhěngxìngxìshǔ]
完整性系數
英文
coefficient of sound degree- 整 : Ⅰ形容詞1 (全部在內; 完整) whole; all; complete 2 (整齊) neat; tidy; orderly Ⅱ動詞1 (整理; 整...
- 性 : Ⅰ名詞1 (性格) nature; character; disposition 2 (性能; 性質) property; quality 3 (性別) sex ...
- 系 : 系動詞(打結; 扣) tie; fasten; do up; button up
- 數 : 數副詞(屢次) frequently; repeatedly
- 完整性 : integrity; integrality; wholeness; completeness; perfection
- 系數 : [數學] coefficient; ratio; modulus; quotient; factor
-
The structure of this paper goes like this, the first chapter introduce the development of e - b / l in practice and in laws. and draw a conclution that the electrification of the b / l is a history tide. in the second chapter, on the basic of reseach the security trap in e - b / l running, 1 conclude six security elements of, e - b / l : the liability of the system, the authenticity of dealers ' identity. the integrity and secrecy of electronic data, and the validity and evidence effectiveness of electronic data. from the third chapter to the eighth, 1 reseach these elements one by one. the third chapter introduce the establishment of the e - b / l security system, and some related laws the fourth chapter introduce the certification authority of e - b / l. in the fifth chapter, 1 introduce the encrypt of electronic information and some countries ' control on use / import / export crytography. the sixth chapter introduce the concept and principle of digital signature, and reseach some related legal issues. the seventh chapter reseach the legal demand of validity, then come to a conclution that to establish a independent electronic information system is necessary. in the eighth chapter, 1 reseach some countries " regulation on the evidence effectiveness of electronic data
第二章在分析電子提單運作中的安全隱患的基礎上,歸納出其六大安全要素,即系統的可靠性、交易者身份的真實性、數據電訊的機密性和完整性、數據電訊的合法有效性以及交易者行為的不可抵賴性。第三章到第八章分別對這六大要素進行分析:第三章介紹了電子提單網路安全體系的建立以及系統安全保護法規,第四章則介紹了電子提單的安全認證機構,第五章介紹了信息加密技術以及各國立法對密碼技術的進出口及使用的控制,第六章介紹了數字簽名的概念及原理,並以bolero為例介紹了數字簽名的技術方式,對有關法律問題作了論述;第七章首先論述了電子提單對有效性的法律需求,然後結合國內法和國際規則的規定論證了數據電訊制度產生的必然性;第八章通過對各國立法對電子證據的法律效力的規定,論述了對電子交易至關重要的數據電訊的不可抵賴性。Digital signature operates the born and a series of sign and codes to constitute the electronics password to carry on the signature through a certain password, replace to the writing signature or an official seals, to confirm the body, the data source and integrities of signs, keeping data from burglarize to take, distort and break, thus to attain the purpose of protecting the data
數字簽名是通過某種密碼運算生成一系列符號及代碼組成電子密碼進行簽名,來代替書寫簽名或印章,確認簽名者的身份、數據來源和完整性,防止數據被竊取、篡改和破壞,從而達到保護數據的目的。Intrusion detection can monitor and analyze the behavior of users and system, audit the system configuration and holes, assess the integrality of data and sensitive system, recognize attack action, stat and audit the abnormal behavior, collect the patch related with system automatically, and record the hacker ' s action uses honey pot. intrusion detection helps system administrator monitor, audit and assess the system state easily and available
入侵檢測具有監視分析用戶和系統的行為、審計系統配置和漏洞、評估敏感系統和數據的完整性、識別攻擊行為、對異常行為進行統計和審計、自動地收集和系統相關的補丁、使用誘騙服務器記錄黑客行為等功能,使系統管理員可以較有效地監視、審計、評估自己的系統。Multithreading and message drive mechanism is applied to simulate the intercurrent and schedule of the multitask in power distribution system, which builds the foundation of the development based on real - time operation of the project. at the same time, the software deals with the real - time data by the means of memory database and uses the thread security class to maintain the data ' s integrity
利用windows的消息驅動和多線程機制模擬了配電系統中多任務的並發和調度過程,為課題在嵌入式實時操作系統下的開展打下了一定的基礎;同時,對系統中大量實時數據則採用內存數據庫管理方式,並利用線程安全類來保證讀取數據的完整性。The article points out the importance and necessity of the information - security from its actuality in our country. the resources in the information system, for instance, hardware, software, data, document, operator, meterial and so on, are evaluated and gived safety grade firstly. and then, it analyses the menace including the nonauthorized access, the information leak, the refused sevice, the internal objection which the system will take. the following are the corresponding control police : confirm the users " rights and duties, including the mode of using account, the limit of accessing resource, the application of password, the building of backup ; confirm the administrators " right and duties, including physical safety, system configuration, account configuration and usufruct, password management, audit and control, backup and individual intimity ; run - of - mill measure of security defence, including access control, symbol and identification, integrality control, password technique, firewall system, audit and resumption, safety of operating system, safety of database system, defence of computers " virus and resisting - deny protocol. in the end, the article offers the strategies of disposing the safety - accident and analyse after ithow. to report it, how to solve it in phase, and how to avoid it happening again. in a word, the article presents a holistic resolvent about keeping away the information system ' s security, and supplies a essential frame for its configuration, management and application
然後,對系統可能受到的威脅,包括非授權訪問、信息泄漏、拒絕服務和內部缺陷等進行分析,並提出了相應的控制策略:確定用戶的權力和責任,包括帳戶使用方式、資源訪問權限、口令應用以及建立備份等;確定系統管理員的權力和責任,包括物理安全、系統配置、帳戶設置及使用權限、口令管理、審計和監控、備份以及個人隱私等方面;一般性的安全防護措施:存取控制、標識和認證、完整性控制、密碼技術、防火墻系統、審計和恢復、操作系統安全、數據庫系統安全、計算機病毒防護和抗抵賴協議等。最後,對事故處理和事後分析提供策略,如何報告安全事故,如何協調解決安全事故,如何避免安全事故再次發生。總之,本文對信息系統安全防範工作給出一個整體的解決方案,為其在配置、管理和應用方面提供了基本的框架。According to this, the phase - matching conditions, effective nonlinear coefficients, acceptances of angle and wavelength for biaxial " crystals have been discussed in detail. thermal lens effect is an important factor which affects the quality of laser beam and the amount of output power
實驗上,採用了雙軸晶體lbo作為倍頻晶體,因此對雙軸晶體相位匹配、有效非線性系數的計算、允許角、允許波長給出了較完整的分析。The gis developed with the combination of mapx controls and object language, realizes the integral saving and management of spatial data and attribute data, and theoretically ensures the datashare and the integrality of data. such a system has been applied to the daily management of chongqing expressway, is proved to be of active contribution to the work efficiency and effect. it will surely promote the development of its in the future
基於oraclespatial ,運用mapx控制項和面向對象語言相結合開發的gis應用系統,實現對gis空間數據和屬性數據的一體化存儲和查詢,即不將地理信息存儲在原來的地理信息系統中,而是存到關系數據庫中,這種一體化技術實現了數據管理的規范化和數據操縱的標準化,使用戶可以比較方便的組織各類空間信息處理事務,在數據完整性方面提供了有效保證。The way to get ko was given in this paper. by this way, the turbulence control equations were constructed from reynold equations with static pressure supposition and boussinesq ' s turbulence viscidity coefficient supposition and the salinity transportation equations, which are representative of the matter transportation equations, are given. the integrated deduction and corresponding boundary conditions are also given
根據上述思想,從雷諾方程出發,採用靜壓假定和包辛內斯克的紊動粘性系數假說,建立了新坐標系中的紊流控制方程組,同時給出了對物質輸運過程具有代表性的鹽度輸運方程、相應的邊界條件及完整的推導過程。Round keys are taken from this expanded key in the following way : the first round key consists of the first nb nb block length words, the second one of the following nb words, and so on
安全性策略配置目標包括控制對數據的原始訪問、保護內核和系統軟體的完整性、防止有特權的進程執行危險的代碼,以及限制由有特權的進程缺陷所導致的傷害。8. when using the index of the rock mass integrity, the index of the grouted rock mass integrity has raised one rank according to the theory and stand raised by this article. 9. when grouting gallery of depth - curtain, lining and consolidation grouting to full - face of the gallery is necessary to meet the needs of the grouting pressure
8 、在利用巖體完整性指數評價高壓帷幕灌漿效果時,採用本課題提出的「八級分檔kv值與定性劃分巖體完整程度對應關系表」 ,灌漿后的巖體完整程度較灌前均提高了一個等級。7 ) in fsca, all operations of managers are recorded in system log, and digital watermark technology is used to ensure authoritativeness, accountability, integrity of the log
7 )採用數字水印日誌技術。 fsca系統嚴格記錄管理員的操作日誌,並且日誌採用數字水印技術保證其權威性、不可否認性和完整性。These file systems rely on restart - time utilities that is, fsck, which examine all of the file system s meta - data such as directories and disk addressing structures to detect and repair structural integrity problems
這些文件系統依靠重啟實用程序(也就是fsck ) , fsck檢查文件系統的所有元數據(例如:目錄和磁盤尋址結構)以檢測和修復結構完整性問題。The ability of keeping the ip packet ' s integrity, secrecy, authentication, data origination, anti - relay is discussed. the relationship of ipsec component authentication header ( ah ), encapsulating security payload ( esp ) and ike ( internet key exchange ) is also talked about. this discussion of ipsec makes the impression that ipsec make ip layer security enough
論述了ipsec在ip報文的完整性、機密性、數據來源認證和抗重播等方面的能力, ipsec的基本協議? ?認證報文頭( ah )和安全封裝載荷報頭( esp )與ipsec安全體系的其它組成部分如安全策略、加密和認證演算法、密鑰管理等如何合作,共同完成對ip報文的安全保護。The planeness and integrality of the flier - plate were ensured effectively by exerting restrictive pressure, controlling heating and cooling rate, lowering welding temperature or reducing welding time as much as possible, etc. theoretical model of creating quasi - isentropic compression via 93w - ofc - tc4 - a1 - mb2 system flier - plate with graded wave impedance was established, and numerical simulation of the impact process was then carried out
採取施加外部機械力、控制升降溫速率以及盡量降低焊接溫度或減少焊接時間(防止脆性金屬間化合物的過度增長)等措施,確保了焊接接頭的平整性和界面結構的完整性。建立起梯度飛片擊靶的理論模型,對93w - ofc - tc _ 4 - al - mb _ 2系波阻抗梯度飛片的擊靶過程進行了數值模擬計算。Facilities management ( fm ) is an important part of computerized government affairs, but there are many problems exits in present fm, such as the difficulty to maintain the integrity and greenness of data, the handicap exits in data exchanging and data sharing, the shortness to provide evidence for decision - making, and so on
城市設施管理是電子政務和數字城市的重要組成部分,但是現有管理系統存在很多問題,主要表現在數據的完整性和現勢性難以保證,數據的交換和共享困難,不能為領導決策提供支持等。The ibm information management system is ibms premier transaction and hierarchical database management system, the product of choice for critical online operational applications and data where support for high availability, performance, capacity, integrity, and low cost are key factors
Ims是ibm最早的事務和層次數據庫管理系統,它非常適合支持高可用性、高性能、高容量、高完整性和低成本的關鍵性聯機操作應用程序和數據。Although joint spacing is an important index in rock mass structure classification, it ca n ' t be obtained in some regions such as riverbed, so the practicability of using those indexes which characterizing the integrity degree of rock mass to class the rock mass structure is studied, and good coincidence is shown in rock mass structure classification by joint spacing, integrity coefficient and number of joints in dam abutment
本文研究了用表徵巖體完整程度的指標?完整性系數、 rqd及5m洞段節理條數j _ d (與體積節理數類似)劃分巖體結構類型的可行性。對兩岸壩肩部位,節理間距、完整性系數、 5m洞段節理條數這三項指標劃分的巖體結構類型基本一致;河床壩基部位主要用rqd指標來判斷巖體結構類型。Index of biological integrity and its application in health assessment of aquatic ecosystem
生物完整性指數與水生態系統健康評價In order to scientifically manage exploration data, three - dimensional database composed of rock mass quality indices is established under the geodetic reference frame. those indices are obtained from adits, drill holes and outcrops. to efficiently make use of exploration data, finite testing results are spread to the extent which they can control in term of the characters of gradual change of rock mass quality
利用實測資料,研究了單指標(節理間距、完整性系數、 5m洞段節理條數)劃分巖體質量等級的對應性,驗證了單指標(完整性系數k _ v 、節理間距d )和雙指標( k _ v d 1000 )劃分巖體質量等級的一致性。With the constant development of the network technology of the computer, the form of selling management is freed from out accounting checking and changed into a selling - management information system consisting of sales forecast, plans, accounting checking, supervises, controls, analysis and aid decision. this system can promote the scientific process and modernization of business administration
在設計過程中,深入探討了管理信息系統的需求分析方法、系統設計理論和技術,充分運用存儲過程、事務管理等機制將c / s和b / s部分有機結合在一起;充分考慮了數據的完整性、系統的安全性、容錯機制和工作效率等問題。分享友人