完整性系數 的英文怎麼說

中文拼音 [wánzhěngxìngshǔ]
完整性系數 英文
coefficient of sound degree
  • : Ⅰ形容詞1 (全部在內; 完整) whole; all; complete 2 (整齊) neat; tidy; orderly Ⅱ動詞1 (整理; 整...
  • : Ⅰ名詞1 (性格) nature; character; disposition 2 (性能; 性質) property; quality 3 (性別) sex ...
  • : 系動詞(打結; 扣) tie; fasten; do up; button up
  • : 數副詞(屢次) frequently; repeatedly
  • 完整性 : integrity; integrality; wholeness; completeness; perfection
  • 系數 : [數學] coefficient; ratio; modulus; quotient; factor
  1. The structure of this paper goes like this, the first chapter introduce the development of e - b / l in practice and in laws. and draw a conclution that the electrification of the b / l is a history tide. in the second chapter, on the basic of reseach the security trap in e - b / l running, 1 conclude six security elements of, e - b / l : the liability of the system, the authenticity of dealers ' identity. the integrity and secrecy of electronic data, and the validity and evidence effectiveness of electronic data. from the third chapter to the eighth, 1 reseach these elements one by one. the third chapter introduce the establishment of the e - b / l security system, and some related laws the fourth chapter introduce the certification authority of e - b / l. in the fifth chapter, 1 introduce the encrypt of electronic information and some countries ' control on use / import / export crytography. the sixth chapter introduce the concept and principle of digital signature, and reseach some related legal issues. the seventh chapter reseach the legal demand of validity, then come to a conclution that to establish a independent electronic information system is necessary. in the eighth chapter, 1 reseach some countries " regulation on the evidence effectiveness of electronic data

    第二章在分析電子提單運作中的安全隱患的基礎上,歸納出其六大安全要素,即統的可靠、交易者身份的真實據電訊的機密據電訊的合法有效以及交易者行為的不可抵賴。第三章到第八章分別對這六大要素進行分析:第三章介紹了電子提單網路安全體的建立以及統安全保護法規,第四章則介紹了電子提單的安全認證機構,第五章介紹了信息加密技術以及各國立法對密碼技術的進出口及使用的控制,第六章介紹了字簽名的概念及原理,並以bolero為例介紹了字簽名的技術方式,對有關法律問題作了論述;第七章首先論述了電子提單對有效的法律需求,然後結合國內法和國際規則的規定論證了據電訊制度產生的必然;第八章通過對各國立法對電子證據的法律效力的規定,論述了對電子交易至關重要的據電訊的不可抵賴
  2. Digital signature operates the born and a series of sign and codes to constitute the electronics password to carry on the signature through a certain password, replace to the writing signature or an official seals, to confirm the body, the data source and integrities of signs, keeping data from burglarize to take, distort and break, thus to attain the purpose of protecting the data

    字簽名是通過某種密碼運算生成一列符號及代碼組成電子密碼進行簽名,來代替書寫簽名或印章,確認簽名者的身份、據來源和,防止據被竊取、篡改和破壞,從而達到保護據的目的。
  3. Intrusion detection can monitor and analyze the behavior of users and system, audit the system configuration and holes, assess the integrality of data and sensitive system, recognize attack action, stat and audit the abnormal behavior, collect the patch related with system automatically, and record the hacker ' s action uses honey pot. intrusion detection helps system administrator monitor, audit and assess the system state easily and available

    入侵檢測具有監視分析用戶和統的行為、審計統配置和漏洞、評估敏感統和據的、識別攻擊行為、對異常行為進行統計和審計、自動地收集和統相關的補丁、使用誘騙服務器記錄黑客行為等功能,使統管理員可以較有效地監視、審計、評估自己的統。
  4. Multithreading and message drive mechanism is applied to simulate the intercurrent and schedule of the multitask in power distribution system, which builds the foundation of the development based on real - time operation of the project. at the same time, the software deals with the real - time data by the means of memory database and uses the thread security class to maintain the data ' s integrity

    利用windows的消息驅動和多線程機制模擬了配電統中多任務的並發和調度過程,為課題在嵌入式實時操作統下的開展打下了一定的基礎;同時,對統中大量實時據則採用內存據庫管理方式,並利用線程安全類來保證讀取據的
  5. The article points out the importance and necessity of the information - security from its actuality in our country. the resources in the information system, for instance, hardware, software, data, document, operator, meterial and so on, are evaluated and gived safety grade firstly. and then, it analyses the menace including the nonauthorized access, the information leak, the refused sevice, the internal objection which the system will take. the following are the corresponding control police : confirm the users " rights and duties, including the mode of using account, the limit of accessing resource, the application of password, the building of backup ; confirm the administrators " right and duties, including physical safety, system configuration, account configuration and usufruct, password management, audit and control, backup and individual intimity ; run - of - mill measure of security defence, including access control, symbol and identification, integrality control, password technique, firewall system, audit and resumption, safety of operating system, safety of database system, defence of computers " virus and resisting - deny protocol. in the end, the article offers the strategies of disposing the safety - accident and analyse after ithow. to report it, how to solve it in phase, and how to avoid it happening again. in a word, the article presents a holistic resolvent about keeping away the information system ' s security, and supplies a essential frame for its configuration, management and application

    然後,對統可能受到的威脅,包括非授權訪問、信息泄漏、拒絕服務和內部缺陷等進行分析,並提出了相應的控制策略:確定用戶的權力和責任,包括帳戶使用方式、資源訪問權限、口令應用以及建立備份等;確定統管理員的權力和責任,包括物理安全、統配置、帳戶設置及使用權限、口令管理、審計和監控、備份以及個人隱私等方面;一般的安全防護措施:存取控制、標識和認證、控制、密碼技術、防火墻統、審計和恢復、操作統安全、據庫統安全、計算機病毒防護和抗抵賴協議等。最後,對事故處理和事後分析提供策略,如何報告安全事故,如何協調解決安全事故,如何避免安全事故再次發生。總之,本文對信息統安全防範工作給出一個體的解決方案,為其在配置、管理和應用方面提供了基本的框架。
  6. According to this, the phase - matching conditions, effective nonlinear coefficients, acceptances of angle and wavelength for biaxial " crystals have been discussed in detail. thermal lens effect is an important factor which affects the quality of laser beam and the amount of output power

    實驗上,採用了雙軸晶體lbo作為倍頻晶體,因此對雙軸晶體相位匹配、有效非線的計算、允許角、允許波長給出了較的分析。
  7. The gis developed with the combination of mapx controls and object language, realizes the integral saving and management of spatial data and attribute data, and theoretically ensures the datashare and the integrality of data. such a system has been applied to the daily management of chongqing expressway, is proved to be of active contribution to the work efficiency and effect. it will surely promote the development of its in the future

    基於oraclespatial ,運用mapx控制項和面向對象語言相結合開發的gis應用統,實現對gis空間據和屬據的一體化存儲和查詢,即不將地理信息存儲在原來的地理信息統中,而是存到關據庫中,這種一體化技術實現了據管理的規范化和據操縱的標準化,使用戶可以比較方便的組織各類空間信息處理事務,在方面提供了有效保證。
  8. The way to get ko was given in this paper. by this way, the turbulence control equations were constructed from reynold equations with static pressure supposition and boussinesq ' s turbulence viscidity coefficient supposition and the salinity transportation equations, which are representative of the matter transportation equations, are given. the integrated deduction and corresponding boundary conditions are also given

    根據上述思想,從雷諾方程出發,採用靜壓假定和包辛內斯克的紊動粘假說,建立了新坐標中的紊流控制方程組,同時給出了對物質輸運過程具有代表的鹽度輸運方程、相應的邊界條件及的推導過程。
  9. Round keys are taken from this expanded key in the following way : the first round key consists of the first nb nb block length words, the second one of the following nb words, and so on

    安全策略配置目標包括控制對據的原始訪問、保護內核和統軟體的、防止有特權的進程執行危險的代碼,以及限制由有特權的進程缺陷所導致的傷害。
  10. 8. when using the index of the rock mass integrity, the index of the grouted rock mass integrity has raised one rank according to the theory and stand raised by this article. 9. when grouting gallery of depth - curtain, lining and consolidation grouting to full - face of the gallery is necessary to meet the needs of the grouting pressure

    8 、在利用巖體評價高壓帷幕灌漿效果時,採用本課題提出的「八級分檔kv值與定劃分巖體程度對應關表」 ,灌漿后的巖體程度較灌前均提高了一個等級。
  11. 7 ) in fsca, all operations of managers are recorded in system log, and digital watermark technology is used to ensure authoritativeness, accountability, integrity of the log

    7 )採用字水印日誌技術。 fsca統嚴格記錄管理員的操作日誌,並且日誌採用字水印技術保證其權威、不可否認
  12. These file systems rely on restart - time utilities that is, fsck, which examine all of the file system s meta - data such as directories and disk addressing structures to detect and repair structural integrity problems

    這些文件統依靠重啟實用程序(也就是fsck ) , fsck檢查文件統的所有元據(例如:目錄和磁盤尋址結構)以檢測和修復結構問題。
  13. The ability of keeping the ip packet ' s integrity, secrecy, authentication, data origination, anti - relay is discussed. the relationship of ipsec component authentication header ( ah ), encapsulating security payload ( esp ) and ike ( internet key exchange ) is also talked about. this discussion of ipsec makes the impression that ipsec make ip layer security enough

    論述了ipsec在ip報文的、機密據來源認證和抗重播等方面的能力, ipsec的基本協議? ?認證報文頭( ah )和安全封裝載荷報頭( esp )與ipsec安全體的其它組成部分如安全策略、加密和認證演算法、密鑰管理等如何合作,共同成對ip報文的安全保護。
  14. The planeness and integrality of the flier - plate were ensured effectively by exerting restrictive pressure, controlling heating and cooling rate, lowering welding temperature or reducing welding time as much as possible, etc. theoretical model of creating quasi - isentropic compression via 93w - ofc - tc4 - a1 - mb2 system flier - plate with graded wave impedance was established, and numerical simulation of the impact process was then carried out

    採取施加外部機械力、控制升降溫速率以及盡量降低焊接溫度或減少焊接時間(防止脆金屬間化合物的過度增長)等措施,確保了焊接接頭的平和界面結構的。建立起梯度飛片擊靶的理論模型,對93w - ofc - tc _ 4 - al - mb _ 2波阻抗梯度飛片的擊靶過程進行了值模擬計算。
  15. Facilities management ( fm ) is an important part of computerized government affairs, but there are many problems exits in present fm, such as the difficulty to maintain the integrity and greenness of data, the handicap exits in data exchanging and data sharing, the shortness to provide evidence for decision - making, and so on

    城市設施管理是電子政務和字城市的重要組成部分,但是現有管理統存在很多問題,主要表現在據的和現勢難以保證,據的交換和共享困難,不能為領導決策提供支持等。
  16. The ibm information management system is ibms premier transaction and hierarchical database management system, the product of choice for critical online operational applications and data where support for high availability, performance, capacity, integrity, and low cost are key factors

    Ims是ibm最早的事務和層次據庫管理統,它非常適合支持高可用、高能、高容量、高和低成本的關鍵聯機操作應用程序和據。
  17. Although joint spacing is an important index in rock mass structure classification, it ca n ' t be obtained in some regions such as riverbed, so the practicability of using those indexes which characterizing the integrity degree of rock mass to class the rock mass structure is studied, and good coincidence is shown in rock mass structure classification by joint spacing, integrity coefficient and number of joints in dam abutment

    本文研究了用表徵巖體程度的指標?完整性系數、 rqd及5m洞段節理條j _ d (與體積節理類似)劃分巖體結構類型的可行。對兩岸壩肩部位,節理間距、完整性系數、 5m洞段節理條這三項指標劃分的巖體結構類型基本一致;河床壩基部位主要用rqd指標來判斷巖體結構類型。
  18. Index of biological integrity and its application in health assessment of aquatic ecosystem

    生物與水生態統健康評價
  19. In order to scientifically manage exploration data, three - dimensional database composed of rock mass quality indices is established under the geodetic reference frame. those indices are obtained from adits, drill holes and outcrops. to efficiently make use of exploration data, finite testing results are spread to the extent which they can control in term of the characters of gradual change of rock mass quality

    利用實測資料,研究了單指標(節理間距、完整性系數、 5m洞段節理條)劃分巖體質量等級的對應,驗證了單指標(完整性系數k _ v 、節理間距d )和雙指標( k _ v d 1000 )劃分巖體質量等級的一致
  20. With the constant development of the network technology of the computer, the form of selling management is freed from out accounting checking and changed into a selling - management information system consisting of sales forecast, plans, accounting checking, supervises, controls, analysis and aid decision. this system can promote the scientific process and modernization of business administration

    在設計過程中,深入探討了管理信息統的需求分析方法、統設計理論和技術,充分運用存儲過程、事務管理等機制將c / s和b / s部分有機結合在一起;充分考慮了據的統的安全、容錯機制和工作效率等問題。
分享友人