數據保護法 的英文怎麼說

中文拼音 [shǔbǎo]
數據保護法 英文
data protection act
  • : 數副詞(屢次) frequently; repeatedly
  • : 據Ⅰ動詞1 (占據) occupy; seize 2 (憑借; 依靠) rely on; depend on Ⅱ介詞(按照; 依據) according...
  • : Ⅰ動詞1 (保衛; 保護) defend; protect 2 (保持) keep; preserve; maintain in good condition 3 (...
  • : 動詞1. (保護; 保衛) protect; guard; shield 2. (袒護;包庇) be partial to; shield from censure
  • : Ⅰ名詞1 (由國家制定或認可的行為規則的總稱) law 2 (方法; 方式) way; method; mode; means 3 (標...
  • 數據 : data; record; information
  1. They are jinfo mountain in nanchuan county ( natural protection section ), wuling mountain in qianjiang county ( national emphases forest demonstration county which forest cover rate is beyond 50 % ) and zhongliang mountain in beibei county ( artificial destruction is very grave ). some main land use patterns i. e. woodland, garden, infield, abandon infield, shrub and grassplot are selected in those three sample sites. four aspects on soil fertility index of karst environment under different land use patterns in these three sample sites, are revealed in this paper, by using the field test, indoor measure and analysis, outdoor experiment and field investigation, and the knowledge and technique of soil, ecology, physics and chemistry etc. they are physical characteristic ( effective soil thickness, organic layer thickness, soil texture, water - stable aggregate and soil water etc. ), chemical fertility ( organism, omni - n, omni - p, omni - k, alkali - nitrogen, available p, available k and rapid available k etc. ), soil animalcule ( bacteria, fungi, actinomyces and their grosses ) and soil - seed - pool ( plant community diversity index ) in karst ecosystem

    本研究以重慶市的南川金佛山(自然區) 、黔江武陵山(國家重點退耕還林示範縣,森林覆蓋率50以上)和北碚中梁山(遭人為破壞嚴重)典型巖溶區為對象,選擇了幾種重要的利用方式,包括林地、果園、耕地、棄耕地和灌草坡,採用野外巖溶生態調查和室內試驗測量分析相結合的方,以不同土地利用方式巖溶土壤肥力為重點,對不同土地利用方式土壤肥力特徵進行量化分析,找出巖溶土壤肥力差異的主要方面及其根本原因,論文主要從土壤剖面物理退化指標(有效土層厚度、有機質層厚度、質地、團聚體、水分含量等) ,化學肥力退化指標(有機質、全n 、全p 、全k 、堿解n 、速效p和速效k等) ,樣地土壤微生物指標(細菌、真菌、放線菌量及總量)以及樣地土壤種子庫植物群落多樣性等4個方面對重慶典型巖溶區的土壤肥力特徵進行了較為詳細的分析研究,為巖溶地區士壤資源的合理利用及結構的調控管理提供依
  2. Form. taxus chinensis var. mairei is protecting plant in the first class, which is a precious and endangering plant in china in this paper, the quantitative characterics of form. taxus chinensis vsr. mairei population including age structure, spatial distribution pattern, growth dynamics of tree basal area, niche characterics, fractal dimension and competition between specises were studied using methods of mathematics ecology from the angle of population ecology of form. taxus chinensis var. mairei, then the prent state and the endangering causes were analysed. this research offers gist to protecting and enlarging the crude resourse of form. taxus chinensis vsr. mairei population, afforesting plantation and sustainable utilize for us

    本文從南方紅豆杉種群生態學的角度、主要應用學生態學的方探討南方紅豆杉種群的量特徵,包括南方紅豆杉種群年齡結構、種群空間格局(探討分佈格局動態規律與生境相互關系) 、不同立地條件下種群優勢度增長趨勢、生態位寬度、生態位相似比例、生態位重疊、空間占能力及種間競爭等,分析其目前現狀及瀕危原因,期望為南方紅豆杉野生資源的和擴大、營造人工林及可持續利用提供理論基礎,也為瀕危植物種群生態學的研究提供參考。
  3. The structure of this paper goes like this, the first chapter introduce the development of e - b / l in practice and in laws. and draw a conclution that the electrification of the b / l is a history tide. in the second chapter, on the basic of reseach the security trap in e - b / l running, 1 conclude six security elements of, e - b / l : the liability of the system, the authenticity of dealers ' identity. the integrity and secrecy of electronic data, and the validity and evidence effectiveness of electronic data. from the third chapter to the eighth, 1 reseach these elements one by one. the third chapter introduce the establishment of the e - b / l security system, and some related laws the fourth chapter introduce the certification authority of e - b / l. in the fifth chapter, 1 introduce the encrypt of electronic information and some countries ' control on use / import / export crytography. the sixth chapter introduce the concept and principle of digital signature, and reseach some related legal issues. the seventh chapter reseach the legal demand of validity, then come to a conclution that to establish a independent electronic information system is necessary. in the eighth chapter, 1 reseach some countries " regulation on the evidence effectiveness of electronic data

    第二章在分析電子提單運作中的安全隱患的基礎上,歸納出其六大安全要素,即系統的可靠性、交易者身份的真實性、電訊的機密性和完整性、電訊的合有效性以及交易者行為的不可抵賴性。第三章到第八章分別對這六大要素進行分析:第三章介紹了電子提單網路安全體系的建立以及系統安全規,第四章則介紹了電子提單的安全認證機構,第五章介紹了信息加密技術以及各國立對密碼技術的進出口及使用的控制,第六章介紹了字簽名的概念及原理,並以bolero為例介紹了字簽名的技術方式,對有關律問題作了論述;第七章首先論述了電子提單對有效性的律需求,然後結合國內和國際規則的規定論證了電訊制度產生的必然性;第八章通過對各國立對電子證律效力的規定,論述了對電子交易至關重要的電訊的不可抵賴性。
  4. According to the system technology require, adopting singlechip realize open loop digital control of hdclsm ; using v / f conversion and complex key - control method realize digital setting of system parameter, such as velocity ; using micro - stepping control insure the motor running more smoothly ; adopting debasing speed control method to eliminate the mechanical impact of distance termination effectively ; at the same time, analyzing main power circuits drive circuit and protect circuit of system, completing hardware design and facture and software programming and debugging ; at last, making a whole test in hybrid rotary step motor. the experiment result indicates that this control system reaches the qualities required and run smoothly also

    系統技術要求,採用單片機實現了混合式直流直線步進電動機的開環字控制;利用v f變換和復合鍵控方實現了系統轉速等參字設定;利用細分控制技術證了電機運行的平穩性,並進行了波形分析和理論研究;採用單片機軟體降速控制策略解決直線步進電機行程末端的機械沖擊問題;同時對主功率電路、驅動電路和系統電路進行了分析,完成了硬體設計、製作和軟體編程、調試,最後在混合式旋轉步進電動機上進行了全面測試。
  5. The investigation of a lot of parameters about treated sandstone, brick materials and earthen materials with fluorited polymers has been carried out, such as the formation of polymer, the penetration depth, porosity, capillary absorption and penetration coefficient, water uptake, compressive strength, drilling resistance, absorption isotherms of water vapor, water vapor diffusion, color changes as well as resistance to desegregation of water, frizzing - throwing cycles, worming - cooling cycles, and so on. in addition, the influence of salt crystallization, acid and base, and uv aging have also been assessed in order to better understand the protection effects and utilization possibility of two fluorinated polymers, mainly according to astm standard and the combination of international methods together with general technological

    分別以國家級文物單位的土質、砂巖和磚材文物樣品為對象,依astm標準及國際通用文物研究方與評估準則相結合,通過膠化物形成周期、滲透深度、孔隙度、毛細吸水和滲透系、持水量、抗壓強度、抗鉆強度、吸附水蒸氣的能力、透氣性、外觀顏色等系列參的測定,及凍融、冷熱循環、酸堿腐蝕后抗壓強度的衰減、可溶鹽對效果的影響、酸堿及光照對表面效果的影響,對兩種含氟聚合物及其與有機硅的共混物在文物加固和表面防中的可行性和效果給予了系統研究。
  6. The thesis is based on income question, forest coverage rate and grop production. to beging with, date envelopment analysis is proved that it can be applicated into grain for green in shan - bei district, and then in view of the fact, seven esential factors which have influence on the project are found out : expense of dam, expense of crop, expense of cash tree, expense of defense tree, other economic crop, expense of grass and graziery ; and the output factors include : income of gdp, pure income per captia, the area of decreasing land loss, graziery income, crop production, income of tree, the totle income of economic crop. after the date of each facts are puted into dea model, unefficiencial decision making units ( dmu ) found. the data that are got through adjusting unefficiencial dmus dy dea can offer guide in shanbei district upgrading of an industrial structure. at the same time, taking into account some possible problems in or after grain for green in shan - bei district, the thesis bring out some propesal to improve the circ umstance, enhance the life level and put the relation of population, resource and circumstance into a healthy orbit

    因此,加快退耕還林還草,調整土地利用結構和產業結構,已成為實現山川秀美工程和可持續發展戰略的必經之路。論文以解決陜北地區的收入問題,植被問題以及糧食產量問題為出發點,首先從理論上分析了包絡分析方在陜北地區退耕還林(草)中運用的可行性,然後結合陜北地區目前的實際情況,綜合分析出影響陜北地區退耕還林(草)的關鍵的七個因素作為輸入指標:水利水設施投入,農作物投入,經濟林種支出,防林支出,其它經濟作物,草類支出,畜牧業投入;以退耕還林所要解決的最終問題作為輸出指標: gdp收入、農民人均純收入、水土流失減少量、牧業總產值、糧食產量、林業總產值、其他經濟作物總產值。將各指標所對應的代入模型后,通過分析求解得出非有效的決策單元,再運用包絡分析方的一些基本原理對非有效的決策單元進行調整,由此所得的對陜北地區的實際投入具有很好的指導意義。
  7. Britain, alas, has some of the most toothless data - protection rules in the developed world : the government recently rejected a plan to make reporting of breaches compulsory

    英國,唉,有著發達國家裡最老掉牙的數據保護法:最近,政府還駁回了一項關于漏洞報告義務的提案。
  8. All jurisdictions with personal data protection legislation provide canadians with a general right to access and correct their personal information

    所有對個人有審判權的部門均為公民提供一種獲得和更正他們個人信息的一般性權利。
  9. Personal data protection law comes into effect in april

    個人數據保護法於4月開始生效。
  10. Based on the top module man - machine interface and the bottom module database, the other modules are linked between the two modules to accomplish different functions. this paper analyses the data related to the protection calculation, designs and realizes the database of this system via relation database design ' s method. by object modeling technique ( omt ), the meta graphics of devices in power plant are modeled into three types by different aspects, which are object model, dynamic model and functional model

    本文分析了發電廠整定涉及的,並用關系庫的設計方設計和實現了系統的庫;用面向對象建模的方為發電廠的設備圖元從三個不同的角度建立了對象模型、動態模型和功能模型,並且用c + +語言實現了這些模型;在定值單模塊的開發中,使用了通用報表工具excel ,並且用xll加載宏技術擴展其功能,實現了動態報表;為的安全性,系統為用戶提供了統一的界面。
  11. Data protection act 1998. most areas of the museum are protected by cctv video recording equipment

    數據保護法案, 1998 .博物館的大部分都由cctv錄像設備所
  12. Data protection - guide to the data protection act 1998 and related legislation

    .數據保護法案1998及相關律的指南
  13. Data protection - guide to the practical implementation of the data protection act 1998

    .數據保護法案1998的實施指南
  14. Among the possible approaches to the protection of copyrighted data, digital watermarking is receiving increasing attention, as it represent a viable solution to data protection in open, highly uncontrolled, environments where cryptographic techniques cannot be applied successfully

    在可能用於有版權的的方中,字水印已經受到越來越多的關注,因為它提供了一種在開放的,不可控制的環境中可行的,這是加密技術所不能做到的。
  15. The legal protection of database by the new copyright law

    庫的
  16. With the development of the internet, the security of computer security is playing an important role. one means of providing security in communications is though encryption

    隨著計算機聯網的逐步普及,計算機信息的密問題顯得越來越重要。密變換,或密碼技術,是對計算機信息進行的最實用和最可靠的方
  17. We endeavour to safeguard your data as laid down in the applicable data protection law

    我們會根適用的數據保護法中的條款努力維您的
  18. This law, which came into effect in april 2005, sets down rules requiring businesses that handle personal data to notify the individual what the information will be used for

    3 .個人數據保護法規於2005年4月生效,其中規定處理個人信息的企業必需就個人信息用途通告當事人。
  19. Any details of a personal nature obtained via our website is used under adherence to the applicable data protection law and protection of the private sphere of visitors to our website

    任何從我們網站上獲得的個人詳細資料是在遵守適當的數據保護法訪問我們網站的訪問者的隱私的前提下使用的。
  20. The shipper agrees that ups and other companies in the ups group of companies worldwide, including companies in countries which may not have the same level of data protection as the country where the shipment is presented to ups for carriage, may use any data provided by the shipper to ups for management analysis and monitoring, the purchase and supply of customer materials, administration of customer accounts and the advertising of services and products provided by ups companies. the shipper may have certain rights under the law to have access to, rectify, and object to the use for direct marketing of, data held by ups about it

    托運人同意ups或者ups集團內的其它公司,包括在那些將貨物提交ups承運的不具有相同水準的國家的ups公司,可以使用托運人提交的進管理分析和管控; ups使用這些包括建立客戶銷售資料,客戶帳目管理資料以及對ups的產品和服務做廣告。對于ups掌控的這些,托運人根相關律可能有權進入、修正或者反對直接用於市場開發。
分享友人