整性 的英文怎麼說

中文拼音 [zhěngxìng]
整性 英文
integrality
  • : Ⅰ形容詞1 (全部在內; 完整) whole; all; complete 2 (整齊) neat; tidy; orderly Ⅱ動詞1 (整理; 整...
  • : Ⅰ名詞1 (性格) nature; character; disposition 2 (性能; 性質) property; quality 3 (性別) sex ...
  1. The safety index system was given out based on the understanding of the current military specifications and airworthy requirements of aircraft structures, the theoretical fundamental and practice experience of these indexes were illuminated also

    摘要在理解現行國軍標和適航條例的基礎上,給出保證結構完整性的安全指標體系,並且說明指標的理論和實踐依據。
  2. Signal integrity simulation with allegro for pcb board design

    級的信號完整性模擬
  3. The structure of this paper goes like this, the first chapter introduce the development of e - b / l in practice and in laws. and draw a conclution that the electrification of the b / l is a history tide. in the second chapter, on the basic of reseach the security trap in e - b / l running, 1 conclude six security elements of, e - b / l : the liability of the system, the authenticity of dealers ' identity. the integrity and secrecy of electronic data, and the validity and evidence effectiveness of electronic data. from the third chapter to the eighth, 1 reseach these elements one by one. the third chapter introduce the establishment of the e - b / l security system, and some related laws the fourth chapter introduce the certification authority of e - b / l. in the fifth chapter, 1 introduce the encrypt of electronic information and some countries ' control on use / import / export crytography. the sixth chapter introduce the concept and principle of digital signature, and reseach some related legal issues. the seventh chapter reseach the legal demand of validity, then come to a conclution that to establish a independent electronic information system is necessary. in the eighth chapter, 1 reseach some countries " regulation on the evidence effectiveness of electronic data

    第二章在分析電子提單運作中的安全隱患的基礎上,歸納出其六大安全要素,即系統的可靠、交易者身份的真實、數據電訊的機密和完整性、數據電訊的合法有效以及交易者行為的不可抵賴。第三章到第八章分別對這六大要素進行分析:第三章介紹了電子提單網路安全體系的建立以及系統安全保護法規,第四章則介紹了電子提單的安全認證機構,第五章介紹了信息加密技術以及各國立法對密碼技術的進出口及使用的控制,第六章介紹了數字簽名的概念及原理,並以bolero為例介紹了數字簽名的技術方式,對有關法律問題作了論述;第七章首先論述了電子提單對有效的法律需求,然後結合國內法和國際規則的規定論證了數據電訊制度產生的必然;第八章通過對各國立法對電子證據的法律效力的規定,論述了對電子交易至關重要的數據電訊的不可抵賴
  4. My fantasies were a moral bulwark that enabled me to feel i was keeping my emotional integrity whole.

    我的種種幻想都是一種道義上的保障,使我感到我在保持自己感情尊嚴的完整性
  5. Digital signature operates the born and a series of sign and codes to constitute the electronics password to carry on the signature through a certain password, replace to the writing signature or an official seals, to confirm the body, the data source and integrities of signs, keeping data from burglarize to take, distort and break, thus to attain the purpose of protecting the data

    數字簽名是通過某種密碼運算生成一系列符號及代碼組成電子密碼進行簽名,來代替書寫簽名或印章,確認簽名者的身份、數據來源和完整性,防止數據被竊取、篡改和破壞,從而達到保護數據的目的。
  6. The mechanism enhancement of the optical brightener is not known. shapiro et al. postulated that selected brightener including m2r inhibit or alter the chitinous peritrophic membrane ( pm ), creating gaps in the membrane or gut lining and perhaps allowing more virions to pass from the gut lumen into the hemocoel

    光增白劑對桿狀病毒的增效作用的機理存在兩種推測一種觀點認為光增白劑是通過破壞圍食膜結構的完整性,促使更多的病毒粒子穿越圍食膜而發動感染的;另一種意見認為光增白劑能延遲中腸上皮細胞的脫落,促進病毒的復制繁殖。
  7. If you would understand the true sense … of a controverted scripture, then look well into the coherence, the scope and the context thereof

    你若想明白一段有爭議經文的真正意思的話,要留意經文的完整性,其主題,和上下文。
  8. Chapter 3, introduces the cryptogram technology which the e - signature stamper system will use

    其中,數字簽名技術尤為重要,它是提供信息完整性、機密、不可抵賴的基礎。
  9. Public key cryptography, combined with the traditional symmetric cryptograph and the message digest technology, can provide confidentiality, integrity and proof of origin. it ' s the foundation of many secure applications

    公鑰密碼技術結合傳統的對稱密碼技術及信息摘要技術,可提供信息的保密、完整性和信源確認,是多種安全應用的基礎。
  10. Gross crystalline imperfections like twinning are apparent to the unaided eye.

    粗的晶體不完整性,如孿生體可用肉眼看出。
  11. Forest landscape restoration ( flr ) is a process that aims to regain ecological integrity and enhance human well - being in deforested or degraded forest landscapes

    摘要森林景觀恢復( flr )是一個過程,旨在恢復採伐跡地或退化森林景觀的生態完整性,提高人類福利。
  12. In this paper, the folio wings are introduced briefly : holonomic theory ; the basic idea that d. zeilberger used to prove identities using holonomic theory. and wu method is generalized to the non - commutative weyl algebra. furthermore, dialytic method of elimination is replaced by wu method, so the prove can be extended from the single - variable hypergeometric identities to multi - variable ones

    本文簡要介紹了完整性理論, d . zeilberger利用完整性理論證明恆等式的基本思想,將吳方法推廣到不可交換的weyl代數上,用吳方法取代了d . zeilberg在證明完整性函數恆等式的理論框架中的析配消元法,從而將這種證明理論由單變量超幾何恆等式的證明擴展到多變量超幾何恆等式的證明。
  13. Check control box it is connected completeness and exactness

    2檢查電器控制箱電源接線的完整性和正確
  14. Without a guarantee on the integrity and identity of shared content, a p2p application runs the risk of introducing so many security holes that microsoft outlook - never a good example of security - will look like fort knox by comparison

    沒有對共享內容的完整性和同一的保證,一個p2p應用就會冒引入許多安全漏洞的風險,以至於microsoft outlook從來不是一個安全的好示例相比之下就會像fort knox一樣。
  15. The quaternary system is characterized by high geothermal gradient, with low scope of overpressure in its deep and shale caprock saturated with formation water of high salinity

    第四系具有較高的地溫梯度,深部發育了低幅超壓;甘森泉小柴旦基底斷裂影響氣藏構造的完整性;第四系飽含高礦化度地層水泥巖構成的蓋層可以起到一定的封蓋作用。
  16. The inevitability of its doom is as apparent to me now as a consequence of the imperfection inherent in every human being, thus i redesigned it based on your history to more accurately reflect the varying grotesqueries of your nature

    它的必然毀滅現在對我而言很明確, (是因為)每個人類有與生俱來的不完整性的結果,從而我根據你們的歷史重新設計, (這樣會)比較正確地反映你們各種怪異的天
  17. Analysis of signal integrity of high - speed interconnects on meshed ground plane

    網孔狀地參考面上高速互連的信號完整性分析
  18. This is because the determinants of heredity maintain their integrity generation by generation.

    這是因為遺傳因子一代又一代地保存它們的完整性
  19. Hf acid detecting paint to ensure valve integrity

    用於保證閥門完整性的氫氟酸檢測漆。
  20. Intrusion detection can monitor and analyze the behavior of users and system, audit the system configuration and holes, assess the integrality of data and sensitive system, recognize attack action, stat and audit the abnormal behavior, collect the patch related with system automatically, and record the hacker ' s action uses honey pot. intrusion detection helps system administrator monitor, audit and assess the system state easily and available

    入侵檢測具有監視分析用戶和系統的行為、審計系統配置和漏洞、評估敏感系統和數據的完整性、識別攻擊行為、對異常行為進行統計和審計、自動地收集和系統相關的補丁、使用誘騙服務器記錄黑客行為等功能,使系統管理員可以較有效地監視、審計、評估自己的系統。
分享友人