完整性規則 的英文怎麼說

中文拼音 [wánzhěngxìngguī]
完整性規則 英文
integrity rule
  • : Ⅰ形容詞1 (全部在內; 完整) whole; all; complete 2 (整齊) neat; tidy; orderly Ⅱ動詞1 (整理; 整...
  • : Ⅰ名詞1 (性格) nature; character; disposition 2 (性能; 性質) property; quality 3 (性別) sex ...
  • : Ⅰ名詞1 (畫圓形的工具) instrument for drawing circles 2 (規則; 成例) rule; regulation 3 [機械...
  • : Ⅰ名詞1 (規范) standard; norm; criterion 2 (規則) regulation; rule; law 3 (姓氏) a surname Ⅱ...
  • 完整性 : integrity; integrality; wholeness; completeness; perfection
  • 規則 : 1. (規定的制度或章程) rule; regulation; ordination; prescribed procedure; rope 2. (整齊) regular
  1. The structure of this paper goes like this, the first chapter introduce the development of e - b / l in practice and in laws. and draw a conclution that the electrification of the b / l is a history tide. in the second chapter, on the basic of reseach the security trap in e - b / l running, 1 conclude six security elements of, e - b / l : the liability of the system, the authenticity of dealers ' identity. the integrity and secrecy of electronic data, and the validity and evidence effectiveness of electronic data. from the third chapter to the eighth, 1 reseach these elements one by one. the third chapter introduce the establishment of the e - b / l security system, and some related laws the fourth chapter introduce the certification authority of e - b / l. in the fifth chapter, 1 introduce the encrypt of electronic information and some countries ' control on use / import / export crytography. the sixth chapter introduce the concept and principle of digital signature, and reseach some related legal issues. the seventh chapter reseach the legal demand of validity, then come to a conclution that to establish a independent electronic information system is necessary. in the eighth chapter, 1 reseach some countries " regulation on the evidence effectiveness of electronic data

    第二章在分析電子提單運作中的安全隱患的基礎上,歸納出其六大安全要素,即系統的可靠、交易者身份的真實、數據電訊的機密、數據電訊的合法有效以及交易者行為的不可抵賴。第三章到第八章分別對這六大要素進行分析:第三章介紹了電子提單網路安全體系的建立以及系統安全保護法,第四章介紹了電子提單的安全認證機構,第五章介紹了信息加密技術以及各國立法對密碼技術的進出口及使用的控制,第六章介紹了數字簽名的概念及原理,並以bolero為例介紹了數字簽名的技術方式,對有關法律問題作了論述;第七章首先論述了電子提單對有效的法律需求,然後結合國內法和國際定論證了數據電訊制度產生的必然;第八章通過對各國立法對電子證據的法律效力的定,論述了對電子交易至關重要的數據電訊的不可抵賴
  2. Furthermore, our legal institution for acquisition of listing company also has many shortcomings : its specific rules are not detailed enough, its logic is not strict, its inclination of value often self - contradict, its content is not integrated, the corporation law and securities law have n ' t supported it sufficiently, and the particularity of state - owned capital makes it unsuitable to the international consuetude

    同時,上市公司收購的法律制度也很不成熟:微觀層面上具體不夠詳盡、可行差,中觀層面上內在邏輯不嚴密、價值取向不清晰、內容不,宏觀層面上公司法與證券法體系未能提供足夠制度背景、特殊國有資產關系的介入又不符合國際慣常做法。
  3. A dynamic hierarchical description method for workflow is presented. the method provides a dynamic hierarchical way to define a workflow with non - determinate or dynamic factors. with this method, the main process defined at build - time can be reified and extended by the principle of the sub - organizations at either the build - time or the run - time. to ensure the consistency and integrity of the description, a series of constraint rules are also discussed to realize seamless integration between a decomposed process and its original one. this approach supports the description of unpredictable uncertainties, the dynamic hierarchy of business process, and the dynamic modification of enterprise organizations, and all of these improve the flexibility and extendability of workflow management systems dramatically

    為支持流程中不確定因素和動態因素的描述,提出了柔工作流的動態層次描述方法,使得流程設計人員在流程定義階段定義的主流程可以在任意時刻由子組織的負責人進行細化和擴充.為保證動態層次描述的正確,討論了動態層次描述的一系列約束,確保分解后的流程與原有流程實現無縫銜接.該描述方法支持對不可預知的非確定因素的描述,支持業務流程的動態層次描述以及組織機構的變化,極大地增加了工作流管理系統的柔和可擴展
  4. The cube models being queried should be valid according to the base rules and cube model completeness rules defined for the db2 cube views metadata

    按照基本和db2 cube views元數據定義的多維數據集模型完整性規則,查詢的多維數據集模型應該是有效的。
  5. Several approaches are provided to construct secure operating systems. the paper mainly discusses diverse security policies in operating systems. by the gfac framework, we implement several security policies in linux kernel version 2. 2. 14, including hru model based fine grain discretionary access control, multi - level security policy based mandatory access control and biba model based integrity access control

    文章重點研究了如何在操作系統中實現多種安全策略,並在linux內核版本2 . 2 . 14中根據訪問控制通用框架( gfac )方法,實現了基於hru模型的細粒度自主訪問控制、基於bell - lapadula模型多級安全的強制訪問控制以及基於biba模型的強制訪問控制等多種安全策略,從而有效地增強了操作系統中信息的保密
  6. An informal rule holding that the integrity of output is dependent on the integrity of input

    輸入輸出,無用輸入無用輸出一條不正式的,即輸出的依賴于輸入的
  7. Hart severely criticized two kinds of extreme rule patterns ormalism and skepticism with his own theory of rules as standard. he developed that legal interpreting principle was combined with " meaning concentration " and " open texture " ; dworkin strongly refuted hart ' s theory. he thought that law consists of rules, principles and policies and he expounded his elaborating and integrated legal interpretation theory

    哈特以說為基礎,嚴厲批評了形式主義和懷疑主義兩種極端的模式,提出了法律的解釋原是「意思中心」和「開放結構」形式的結合;德沃金堅決反對哈特的理論,認為法律是由、原和政策構成的法律模式體系,論述了他的闡釋的法律解釋理論。
  8. The fault samples with the signal of zero or one and the model of bp neural network are established, in accordance with nine faults of pulverizing system for chongqing power plant. during the course of the samples compilation, produce rule 、 neural network representation etc are synthesized to organize and express the fault sample of pulverizing system. before being putted into the database, the sample data is disposed to ensure sample data integrity and no redundancy

    本文針對重慶發電廠制粉系統九種故障建立了以0 、 1為徵兆量的故障樣本和相應的bp神經網路模型,且在制粉系統故障及其相關故障樣本編輯過程中,應用了神經網路產生式、框架式等知識表達方法,有效的表達制粉系統故障及其相關故障診斷知識,並且為保證數據的,減少數據冗餘,對數據庫進行了范化處理,簡化了數據結構和避免了數據沖突。
  9. You can enforce domain integrity to restrict the type by using data types, restrict the format by using check constraints and rules, or restrict the range of possible values by using foreign key constraints, check constraints, default definitions, not null definitions, and rules

    您可以強制域限制類型(通過使用數據類型) 、限制格式(通過使用check約束和)或限制可能值的范圍(通過使用foreign key約束、 check約束、 default定義、 not null定義和) 。
  10. During the course of compiling fault sample, multi - method of knowledge representation, as produce rule 、 frame 、 neural network representation etc are synthesized to organize and express the fault sample of pulverizing system. before being putted into the database, the sample data is disposed to ensure sample data integrity and no redundancy

    在編輯制粉系統故障樣本過程中,作者採用了產生式、框架式、神經網路產生式等知識表達方法,對制粉系統故障診斷知識進行了有效的表達,同時對數據庫進行范化處理,以保證數據的,減少數據冗餘。
  11. Consistency - every transaction must preserve the integrity constraints - the declared consistency rules - of the database

    一致每個事務必須保持數據庫的約束聲明的一致
  12. Considering the ability of rough sets theory to analysis of incompleteness and uncertainty in data, and that of ( fuzzy ) neural networks to pattern recognition, a solution of integration was presented for intelligent diagnosis. diagnosis decision system was reducted based on rough sets theory to find the key conditions for diagnosis, so that the cost can be reduced, and the efficiency can be raised

    該方案的基本思想是利用粗糙集理論對數據不和不確定的分析處理能力實現故障診斷知識發現,即從監測診斷數據或診斷案例中發現關鍵診斷條件,提取或優化診斷,在最優診斷決策系統的基礎上,設計神經網路或模糊神經網路,利用其模式識別能力實現故障診斷。
  13. In this dissertation, author has analyzed several dominating interconnect noises by fem - vfm, and summarized many ways and means of reducing these noises, which will provide reference with high - speed pcb design of our country

    希望該方法會給信號工程師提供一種新的思路,而開發出的這些會對國內歷史還不到十年的高速數字pcb設計領域有一定的指導意義。
  14. Referential integrity rules

    引用完整性規則
  15. As part of the foreign - key constraint, you can specify referential integrity rules that are applied at three points

    作為外鍵約束的一部分,可以指定在三個時候應用的引用完整性規則
  16. Otherwise, the database is likely to raise an error because referential integrity rules will prevent you from deleting a parent record while related child records still exist

    ,數據庫很可能引發錯誤,因為引用完整性規則將阻止您在相關子記錄仍存在的情況下刪除父記錄。
  17. If the database itself is enforcing relational integrity rules, then it will raise errors if you send the new child records to the database before the parent record has been created

    如果數據庫本身強制關系完整性規則,那麼當您在創建父記錄之前將新的子記錄發送到數據庫時,數據庫將引發錯誤。
  18. When querying through a view, the database engine checks to make sure that all the database objects referenced anywhere in the statement exist and that they are valid in the context of the statement, and that data modification statements do not violate any data integrity rules

    通過視圖進行查詢時,數據庫引擎將進行檢查以確保語句中任何位置被引用所有數據庫對象都存在,這些對象在語句的上下文中有效,以及數據修改語句沒有違反任何數據完整性規則
  19. The control policy of the behaviors such as avoiding and pursuing is the combination of potential field method and behavior fusion method. the reinforcement learning based on existing knowledge is used to modify the importance parameters of each behavior, which will avoid the disadvantage of rules

    在對行為層劃的研究中,運用基於勢場法思想的行為融合方法實現多機器人編隊的避碰和追蹤策略,並用嵌入先驗知識的強化學習方法對融合過程中的重要參數進行調,彌補了基於設計的不
  20. The main focus of this paper is to design a general - purposed embedded video digital signal processor. aimed at the general - purposed nature to different kinds of algorithms of this system, network architecture of parallel - processing multi - processors is studied, and the bottleneck problem of the system common bus is solved, thus establishing a detailed project of the system. to achieve the stability of the system, the signal integrity problem in the printed circuit board ( pcb ) is studied as its theoretical background, and the design rules of the high - speed circuit pcb are summarized, which have been applied in actual systems, and thus achieving good effects

    本文設計了一套通用的嵌入式視頻數字信號處理器:針對系統對多種演算法通用要求研究了多處理器的并行處理網路結構,解決了該系統的總線瓶頸問題,並確定了系統的詳細設計方案;針對系統對穩定要求,在理論上研究了印刷電路板中的信號問題,總結了高速電路印刷電路板的設計,並在實際系統中獲得了應用,取得了很好的效果。
分享友人