未加密數據 的英文怎麼說

中文拼音 [wèijiāshǔ]
未加密數據 英文
clear data
  • : Ⅰ副詞1 (沒) did not; have not 2 (不) not Ⅱ名詞1 (地支的第八位) the eighth of the twelve ear...
  • : Ⅰ名詞1 (秘密) secret 2 [紡織] (密度) density 3 (姓氏) a surname Ⅱ形容詞1 (距離近; 空隙小)...
  • : 數副詞(屢次) frequently; repeatedly
  • : 據Ⅰ動詞1 (占據) occupy; seize 2 (憑借; 依靠) rely on; depend on Ⅱ介詞(按照; 依據) according...
  • 數據 : data; record; information
  1. With the rapidly development of computer network technology and the widely use of network technology in every walk of life, people transmit data through computer network more and more frequently, including all kinds of secret information ( for example, military secret ; bussiness secret ; personal private information ). today, as a result of poor security of our network system, we can not prevent the transmittied information from stealing and modifying unlawful. thus, the computer network technology is applied to our daily life restrictedly. recently, many network applications with voip ( for example msn messenger ; dialpad ; distributed multipoint multimedia conferences ) take no measures to encrypt their data

    隨著計算機網路技術的迅猛發展和網路技術在各行各業中的廣泛應用,人們通過計算機網路傳輸日益增,其中包含了各種機信息(例如軍事機信息、商業機信息、個人隱私信息等) 。由於目前的網路系統缺乏足夠的安全性,不能有效防止網路上所傳輸的信息被非法竊取和修改,因而極大地限制了計算機網路技術在日常工作中的應用。當前,基於voip技術的各種網路應用,如msnmessenger , dialpad ,以及一些分散式多媒體會議系統,竟然採取任何措施
  2. Using fumy cipher, transmission data are kept secret that can prevent others from reading or writing data without permit. it can ensure data security

    為了確保傳輸的安全性,運用流碼對進行傳輸,防止外來者的攻擊,經授權進行非法讀寫操作。
  3. Present methods generally based on the statistics of earthquake damage, expert experiences, theory analysis and experimental researches have obvious advantages, disadvantages and certain scopes of application ; ( 2 ) different prediction methods should be adopted against different building conditions, sites, intensity and experiences etc to predict earthquake damage of buildings for prospective accuracy, dependability and availability ; ( 3 ) earthquake damage matrix, which is the foundation of earthquake damage prediction, of 7 kinds of building in the urban areas of zhangzhou city under intensity 6 to 9 has been set up. the damage conditions of different buildings under different intensity are as followings : all kinds of structures are basically intact under intensity 6 ; the reinforced concrete structures are basically intact under intensity 7, but other kinds of structures are destroyed slightly ; the reinforced concrete structures are still basically intact while other kinds of structures are destroyed intermediately under intensity 8 ; the reinforced concrete structures are destroyed slightly, single - story factories and open houses are destroyed intermediately and other kinds of structures are destroyed seriously under intensity 9 ; ( 4 ) the results of earthquake damage predicting of buildings embody the damage when earthquake happens in the future. thus, further identifications and reinforcements should be considered to buildings that will be destroyed intermediately or more under the earthquake with 10 % exceeding probability in future 50 years ; ( 5 ) the direct economic losses caused by damage of buildings resting with the area, structural type, intensity and damage of all kinds of buildings are the main part of the losses of the city in an earthquake ; ( 6 ) the direct economic losses increased progressively toward high intensity by 2 or 3 times

    基於上述研究,得出的主要結論有:建築物震害預測是一個模糊的、系統的、復雜的問題,現有的方法很多一般都是以震害統計規律、專家經驗、理論分析和試驗研究為依,有其自身的優缺點和一定的適用范圍;應針對不同的建築物條件、場地條件、地震強度和已有經驗等,採用不同的預測方法進行建築物震害預測,以使預測結果達到預期的精確性、可靠性和可操作性;建立了漳州市區7類建築物在6度9度地震作用下的震害矩陣,成為指導抗震防災的重要依,各類結構的震害情況表現為: 6度地震作用下各類建築物基本完好; 7度地震作用下除鋼筋混凝土結構基本完好外其餘以建築輕微破壞為主; 8度地震作用下鋼筋混凝土結構仍以基本完好為主而其餘建築以中等破壞為主; 9度地震作用下鋼筋混凝土結構以輕微破壞為主,單層工業廠房和空曠房屋以中等破壞為主,其餘建築以嚴重破壞為主;建築物的震害預測結果體現了來地震來臨時的震害程度,在編制漳州市區抗震防災規劃時,對于遭遇50年超越概率10的地震影響發生中等以上破壞的建築物應考慮進行抗震鑒定和固;由建築物的破壞所造成的直接經濟損失是城市地震經濟損失的主要部分,重慶大學碩士學位論文中文摘要其主要與建築物總面積、結構類型、地震烈度和各類建築物的震害程度有關;不同烈度造成的直接經濟損失按2一3倍向高烈度方向遞增,漳州市區直接經濟損失由6度至9度的比例關系為1 : 2 . 8 : 8 . 6 : 22 . 8 ;遭遇基本地震設防烈度( 7度)時,漳州市區直接經濟損失約4 . 5億元,無家可歸人員約40000人,且以磚木結構和多層磚混結構的震害損失最大;地震造成的人員傷亡主要與建築物倒塌及嚴重破壞的程度和總面積以及震時的建築物室內人切相關,地震時無家可歸人員主要與住宅倒塌、嚴重破壞及中等破壞的程度和總面積以及城市人均居住面積切相關。
  4. The study paid attention to the change of teacher ' s sense of teaching efficacy teaching motivation and occupational stress under such realistic background. by analysis and explanation of investigation data, the study concludes the results as follows : 1 after implement of curricular reform, general teaching efficacy of teachers who have joined curricular reform compared to their past or to of what teachers who have n ' t joined curricular reform goes up significantly, while personal teaching efficacy ( significantly ) declines ; 2 after implement of curricular reform, intrinsic motivation of teachers who have joined curricular reform compared to their past ( significantly ) presents descending trend, while their outer motivation ( significantly ) rises apparently. so that their intrinsic motivation and outer motivation are significantly much higher than of what teachers who have n ' t joined curricular reform ; 3 after implement of curricular reform, occupational role and personal stress of teachers who have joined curricular reform compared to their past or to of what teachers who have n ' t joined curricular reform goes up significantly, while their relaxation of personal resource significantly declines, but have no remarkable difference at other aspects ; 4 the sense of teaching efficacy teaching motivation and occupational stress of teachers which belong to different characteristic and category exists remarkable difference before and after new curricular reform ; 5 teachers " sense of teaching efficacy teaching motivation and occupational stress tie together tightly, while the interaction of teaching motivation and occupational stress is prominence, occupational stress directly influences teaching motivation, and indirectly influences the sense of teaching efficacy

    通過對調查予以分析和說明,本研究得到如下結論: ( 1 )課程改革以後,參與課改的教師無論與自身縱向相比,還是與課改的教師橫向相比,其一般教育效能感顯著上升,而教師的個人教學效能感則(顯著)下降; ( 2 )課程改革以後,參與課改的教師與自身縱向相比其內部動機有較為顯著的下降趨勢,外部動機則有顯著地上升趨勢;其內部動機和外部動機都(顯著)高於課改的教師; ( 3 )課程改革以後,參與課改的教師無論是與自身縱向相比,還是與參與課改的教師橫向相比,其「職業任務」和「個體緊張反應」方面均呈現(非常)顯著地上升趨勢,而在「個體應對資源」方面除休閑是顯著降低外,其餘無顯著的差異; ( 4 )不同特徵和類別教師的「教學效能感」 、 「教學動機」和「職業緊張應對」在課改前後的變化狀況上存在(顯著)差異; ( 5 )教師教學效能感、教學動機和職業緊張應對切聯系,教學動機與教學效能感相互作用顯著;而職業緊張應對直接顯著影響教學動機,間接影響教學效能感。
  5. Because the text entered is not encrypted in any way, you should treat it as you would any other confidential data

    因為輸入的文本以任何方式進行,所以您應該像處理任何其他機一樣處理它。
  6. Sure, you don t have to encrypt the data - you can use a message authentication code - but most users are unlikely to anticipate this risk

    您確實不必您可以使用消息認證碼( mac )但大多用戶必預見到這一風險。
  7. Normal behavior and anomaly are distinguished on the basis of observed datum such as network flows and audit records of host. when a training sample set is unlabelled and unbalanced, attack detection is treated as outlier detection or density estimation of samples and one - class svm of hypersphere can be utilized to solve it. when a training sample set is labelled and unbalanced so that the class with small size will reach a much high error rate of classification, a weighted svm algorithm, i

    針對訓練樣本是標定的不均衡集的情況,把攻擊檢測問題視為一個孤立點發現或樣本度估計問題,採用了超球面上的one - classsvm演算法來處理這類問題;針對有標定的不均衡集對于目較少的那類樣本分類錯誤率較高的情況,引入了權svm演算法-雙v - svm演算法來進行異常檢測;進一步,基於1998darpa入侵檢測評估源,把兩分類svm演算法推廣至多分類svm演算法,並做了多分類svm演算法性能比較實驗。
  8. To remind ais that they should have adequate data security procedures, such as computer log - on and application - specific access passwords and data encryption technology, to protect against theft and unauthorised access of computer equipment or information in open - plan areas

    中提醒認可機構,要有足夠的資料保安程序,例如電腦的登入及接達特定應用程式的碼,以及技術,以防範在開放式范疇內的電腦設備或資料被盜取及被經授權取用。
  9. The main research contents are as follovvs : after the analyzing of the process of making train diagram, according with its character, and take into account the trend of innovation, chooses the total solution based on the b / s architecture, 3 - tier operation distributed and 2 - tier data distributed to separate the data from operation and simplify the development and maintenance ; the e - r data model that is accord with the 3nf criterion is designed after analyzing the data structure of the train diagram system. emphasis on the permission security of the distributed system, take the view schema, coupled with the login authentication and permissions validation, to ensure the data accessing domination, and take the synchronization, error control, and restore capability to advance the data security ; on the basis of b / s solution architecture, after comparing the existing transportation technologies, b - isdn and adsl is selected as the major solution architecture based on the package - svvitched networks. furthermore, error control, firewall, and encryption techniques are introduced to prevent the hacker attack and ensure the networks safety

    論文的主要研究內容包括:對目前我國列車運行圖管理體制和編制流程進行詳細分析,根其「幾上幾下」的特點,並結合來「網運分離」體制改革的變化預測,選擇採用與之相適應的基於b s體系架構、三層業務分佈、二層分佈的整體方案,實現業務與的分離,降低開發與應用過程的復雜度和總體成本;對列車運行圖系統的信息進行分析,設計符合3nf規范的e - r關系模型,並著重研究處于分散式系統中的列車運行圖信息的訪問權限和安全問題,提出以視圖模式結合用戶識別權限審定實現權限劃分,以並發處理、容錯技術、恢復技術提高系統的安全性;在基於b s架構的系統整體方案基礎上,對當前多種傳輸技術進行分析比較,採用b - isdn為主幹網、 adsl為接入端的基於公用網路分組交換技術的系統網路體系結構,並針對網路自身安全性和黑客攻擊與侵入問題,詳細討論綜合採用差錯控制、防火墻、等技術手段提高系統的網路安全性能。
分享友人