實用密技 的英文怎麼說

中文拼音 [shíyòng]
實用密技 英文
psp
  • : Ⅰ形容詞1 (內部完全填滿 沒有空隙) solid 2 (真實; 實在) true; real; honest Ⅱ名詞1 (實際; 事實...
  • : Ⅰ動詞1 (使用) use; employ; apply 2 (多用於否定: 需要) need 3 (敬辭: 吃; 喝) eat; drink Ⅱ名...
  • : Ⅰ名詞1 (秘密) secret 2 [紡織] (密度) density 3 (姓氏) a surname Ⅱ形容詞1 (距離近; 空隙小)...
  • : 名詞(技能; 本領) skill; ability; trick; technique
  1. The structure of this paper goes like this, the first chapter introduce the development of e - b / l in practice and in laws. and draw a conclution that the electrification of the b / l is a history tide. in the second chapter, on the basic of reseach the security trap in e - b / l running, 1 conclude six security elements of, e - b / l : the liability of the system, the authenticity of dealers ' identity. the integrity and secrecy of electronic data, and the validity and evidence effectiveness of electronic data. from the third chapter to the eighth, 1 reseach these elements one by one. the third chapter introduce the establishment of the e - b / l security system, and some related laws the fourth chapter introduce the certification authority of e - b / l. in the fifth chapter, 1 introduce the encrypt of electronic information and some countries ' control on use / import / export crytography. the sixth chapter introduce the concept and principle of digital signature, and reseach some related legal issues. the seventh chapter reseach the legal demand of validity, then come to a conclution that to establish a independent electronic information system is necessary. in the eighth chapter, 1 reseach some countries " regulation on the evidence effectiveness of electronic data

    第二章在分析電子提單運作中的安全隱患的基礎上,歸納出其六大安全要素,即系統的可靠性、交易者身份的真性、數據電訊的機性和完整性、數據電訊的合法有效性以及交易者行為的不可抵賴性。第三章到第八章分別對這六大要素進行分析:第三章介紹了電子提單網路安全體系的建立以及系統安全保護法規,第四章則介紹了電子提單的安全認證機構,第五章介紹了信息加術以及各國立法對術的進出口及使的控制,第六章介紹了數字簽名的概念及原理,並以bolero為例介紹了數字簽名的術方式,對有關法律問題作了論述;第七章首先論述了電子提單對有效性的法律需求,然後結合國內法和國際規則的規定論證了數據電訊制度產生的必然性;第八章通過對各國立法對電子證據的法律效力的規定,論述了對電子交易至關重要的數據電訊的不可抵賴性。
  2. For this reason, the ultrahigh density optical disk data storage technologies based on the solid immersion lens technology and the sb film super resolution technology, which appear more promising to industrialize in the short term, have been studied in this paper. the aim of this paper is to develop the key technologies for next generation optical disc data storage system

    本文圍繞超高度光盤數據存儲術中的固體浸沒透鏡存儲術以及基於sb多層膜的介質超分辨高度光存儲術展開研究,其目的在於通過對這兩種最接近化的近場高度光存儲術的研究,掌握和發展下一代超高度光存儲設備的關鍵術。
  3. The company the author worked in is applying a practical patent for the " prestress anchor ribbed beam support system ". so far this technology is still a technical and commercial secret. so there is a special announcement here, this thesis is only offered to professors for examination, so any copy and spread to the same project companies is not allowed, the author gave a gratefulness to the professors who hold this thesis here

    筆者所在公司正在就「預應力錨桿肋梁支護術」申請國家級專利,該術暫屬術和商業機,因此特別聲明:本文僅作為碩士論文供教授評審使川,論文不能翻印或傳至同行業其他單位中,筆者特向擁有本人論文的教授們表示感謝。
  4. This paper discusses some important technologies closed to dtv receiving system deeply, base on scn and cctv. it includes mpeg - 2 system level, dvb service information, conditional acceptance. it also describes how to realize epg, ca, upgrade on line etc based on the dtv service information technology at lengtho now, the production of this design is applied to the digital tv products of cctv and sichuan tv net

    本論文結合數字電視在四川廣電網和cctv的具體應情況,深入研究探討了與數字電視接收系統緊相關的部分關鍵術,包括mpeg - 2系統層結構分析、 mpeg - 2和dvb業務信息分析、數字電視條件接收基本原理和加解擾及加解術,並詳細敘述了如何運數字電視業務信息現了電子節目指南、條件接收、在線升級等基本業務。
  5. Meanwhile, a method for rapid thermal fixing is presented, which has some advantages over conventional technique in stability and repeatability, while shortened the fixing time. secondly, we have designed and made a compact practical holographic system that consists of angular - fractal multiplexing system and thermal fixing equipment, including a crystal repositioner with precision less than 0. 001

    另一方面,圍繞高度全息存儲設計復存儲術,製作了有較大存儲能力的小型熱固定全息系統,包括角度一維度復系統、離線加熱的晶體夾持器和復位裝置、適合離線與在線加熱的溫控加熱裝置。
  6. This dissertation implements an access vpn cryptographical system and illustrates an application example. futhermore, there are more research work need to be done, include incorporating with ipsec protocol and firewall technology

    本文在對各項術討論和改進的基礎上,採kerberos協議、 socks協議和國內專碼演算法,現了一個遠程訪問vpn碼系統,並給出了該碼系統的際應
  7. Finally, we present the corresponding algorithm. the compiled srams realize highspeed data - read and consume low power with the density ranging from 128kbit to imbit

    通過模擬,運compiler術設計的sram在128kbit 1mbit度范圍內兼容,現了高速數據讀取和較低的功耗。
  8. The company has close technological cooperation with the experts of zhejiang province precise casting association precise casting special committee, has stronger ability in designing, development and making mould, can design or process according to the drawing or real kind according to user ‘ s enquiry, the products material adopts the spectrum analysis instrument which is produced in france to analyse in front of carrying on the stove, guarantee that the products material accords with the international steel grade standard, product quality gets the unanimous favorable comment of every large manufacturer both at home and abroad

    公司與浙江省鑄協精鑄專秀會專家緊術協作,具有較強的設計、開發、製作模具的能力,可根據戶要求按圖紙或樣進行設計,加工,產品材質採法國產光譜分析儀進行爐前分析,確保產品材符合國際鋼號標準,產品質量受到國內國際各大廠商的一致好評。
  9. Based on the foundation " liquefaction test study on the rapid railroad bed " supported by the railway department, some works on the liquefaction of silty soils have been carried out. in this dissertation, after making a short review of the works on seismically induced soil liquefaction, some research results are presented, which include the following contents. ( 1 ) depending on the dynamic triaxial test, the liquefaction strength of the silty soils is studied and two new models are proposed to evaluate the pore water pressure and the strain of the saturated silty soils during earthquake

    結合鐵道部發展基金項目: 「高速鐵道液化土地基試驗測試研究」 ,本論文概括總結了地震液化的研究現狀,就滬蓉高速鐵路徐州段可液化場地粉土地基的液化特性問題開展了一些研究工作,內容如下: ( 1 )提出了基於目的的粉土的孔隙水壓力增長模式和永久應變勢計算模型,並把此兩模型應於場地的地震反應分析和地震液化性能的評價中;依靠循環振動三軸試驗術,對粉土地基的地震液化強度進行了試驗研究;驗證了度是粉土液化的重要影響因素。
  10. The management and staff of merger and acquisition international limited operate with the highest standard of integrity and confidentiality, independence, skills, and reasonable care

    供購國際有限公司的管理層及雇員運最高度的誠獨立術以及熱誠,並符合專業慣例的原則。
  11. By the algorithm, we can make our life more automatical. encryption techniques of digital images are very practical and crucial techniques. this thesis makes a depth research on these two fields, and its major contributions are as follows : 1st

    數字圖像加術是隨著計算機網路多媒體術和現代電子商務的不斷發展,在機要、軍事、政府、金融和私人通信等領域中逐漸形成的一項非常又亟待快速發展的關鍵術。
  12. The definition of trade secret information means the technique information and the management information, which can bring the economic benefits and have the function to the possessors ; the information ca n ' t be known by other people

    商業秘是指不為公眾所知悉、能為權利人帶來經濟利益、具有性並且經權利人採取了保措施的術信息和經營信息。
  13. The anti - unfair - competitive law of our country stipulates that trade secret is technical information and operating information that people not know, can bring economic benefit to obligee, is practical and is kept secret by the obligee

    我國反不正當競爭法規定,商業秘是指不為公眾所知悉,能為權利人帶來經濟利益、具有性並經權利人採取保措施的術信息和經營信息。
  14. According to our law, only those technological and commercial information which is not known by the public and can bring the economic interests for the proprietors, which has great usefulness and protected by the proprietors can be called the trade secrets

    根據我國法律規定,只有那些不為公眾所知悉、能為權利人帶來經濟利益、具有性並經權利人採取保措施的術信息和經營信息才是商業秘
  15. Business secrets in this article refer to the technical information and operational information which is not known to the public, which is capable of bringing economic benefits to the owners of the rights, which has practical applicability and which the owners of the rights have taken measures to keep secret

    本條所稱的商業秘,是指不為公眾所知悉、能為權利人帶來經濟利益、具有性並經權利人採取保措施的術信息和經營信息。
  16. This kind of method which appraises and evaluates in accordance with comparable level achievements and affects after trial subsequent, drove development personnel s research and development work closely related to the production reality, closely related to the market, thought much of technical productive forces function which used of innovation, and impelled technical personnel positively to engage in the technical achievement the productive forces transforming productivity and new products promoted application

    並在考察期內取得的新增利潤中提取10 %撥入中心獎勵基金,以作中心內部的獎勵開支的來源,這種以可比水平的成果評定和以觀後效的評獎辦法,激勵開發人員的研發工作切聯系生產際,切聯系市場,重視創新術的生產力作,並促使術人員積極從事術成果的生產力轉化和新產品的推廣應
  17. Compared with the traditional manufacturing technology the components fabricated by lsf have better mechanical properties. this paper has made a systematically research on the lsf ' s processing characteristic

    術能夠現緻金屬零件的快速製造,零件的性能優于傳統加工方法,因而具有光明的應前景。
  18. The security request of the mobile - agent system is to protect the agent from the attack of the malicious machine and agent as well as to protect the machine from the attack of the hostile agent. hierarchical integratedsecure model in jade provides effective, extensible security framework for mobile agent by integrating bi - direction authentication, authorization, java security policy, environment based key generation, and audit log

    Made移動代理系統的層次化的集成安全模型在現有的安全術基礎上,將雙向身份驗證、資源存取授權及控制、 java語言安全設施以及基於環境的鑰產生法和核查日誌等方法有機地結合起來,為移動代理和運行環境提供了一個的可擴展安全環境。
  19. The thesis is organized as below : in chapter 1, the background knowledge is given which is needed for study on bluetooth security mechanism and implementation. first bluetooth technology is overviewed including its develop history, radio interface, physical links, interference, network topology, core protocol, etc. next communication security is introduced according to the model of network security architecture from osi. finally some primary cryptographic techniques are discussed based on symmetric encryption, asymmetric encryption and advanced encryption standard published years ago

    本文研究了利藍牙術提供各種安全服務和現的課題,並通過一些具體現的例進行闡述,具體安排如下:在第一部分,本文首先回顧了藍牙術及發展情況,主要包括藍牙發展簡史、藍牙標準的射頻介面、物理鏈路、干擾情況、網路拓撲結構以及核心協議等;然後介紹了通信安全的基礎知識,討論了osi系統中的四層網路安全結構模型;最後給出了各種加術的基本理論,包括對稱加體制如des和blowfish 、非對稱加體制( rsa公鑰演算法、數字簽名和身份證明等)以及新一代的高級加標準( advancedencryptionstandard , aes )等。
  20. Encryption technology is an applied subject. it has very long history

    術是一門術,有著悠久的歷史。
分享友人