核基安全 的英文怎麼說

中文拼音 [ānquán]
核基安全 英文
kernelized security
  • : 核構詞成分。
  • : Ⅰ形容詞1 (完備; 齊全) complete 2 (整個) whole; entire; full; total Ⅱ副詞(完全; 都) entirely...
  1. Based on the frequent occurrence of international aerial crimes, the rampancy and cruelty of criminals and the reality of brutal consequence, the essay analyses the features of the crime of aircraft hijacking, the crime of imperiling international civil aerial security and the crime of obstructing international aerial navigation with the component terms from three important international conventions on punishing aerial crimes in order to help people to appreciate the appearance and the essence of typical international aerial crimes deeply, to regard the motion of the crimes and to overwhelm the offence forcefully. based on the core of the legislative status of international civil aerial security, the jurisdiction of the aerial crimes, one emphasis of the article is to clarify concrete clauses on jurisdiction in the three conventions and analyses the important principle of " aut reddere, aut punire ". based on the problems on the jurisdiction of crimes in international society, it quests the implementation of t he principles of jurisdiction, pleading and extradition in the three conventions deeply

    於目前國際社會航空犯罪時有發生,犯罪分子猖獗狠毒,危害後果十分殘重的現實,本文從國際社會關于懲治航空犯罪的三個重要國際公約(東京、海牙、蒙特利爾公約)中規定的各種航空犯罪的定義入手,深入展開了對劫持航空器罪、危害航空器飛行罪、危害國際民用航空機場罪的犯罪特徵及其構成條件的分析,以期幫助人們更深刻認識這些典型的國際航空犯罪的表現及其實質,嚴密注視這些犯罪的動向,對其進行及時有力的打擊;鑒于國際民用航空法律地位問題的心是解決航空犯罪的管轄權問題,本文重點闡釋了三個公約關于管轄的具體規定,並側重分析了「或引渡或起訴」的重要原則;鑒于目前國際社會打擊國際航空犯罪管轄方面存在諸多實際問題,本文對公約規定的管轄、起訴、引渡原則的實現方式作了深入探討;鑒于各國在國內立法上對于空中犯罪的懲治、對違約國的制裁、對這類犯罪的預防措施等方面存在一些漏洞,本文根據目前掌握的一些資料,在獨立思考的礎上,提出了一些不成熟的看法及建議,以期對國際社會懲治航空犯罪貢獻自己微薄之力。
  2. Chapter 1 d emonstrates the stone of the strategy - the new security viewpoint, its reasons, main contents and primary characters and stresses that mutual confidence, benefices, equality and cooperate form the kernel of the viewpoint. guided by the viewpoint, chapter 2 analyses the ideological source of the new security viewpoint and the strategy and the strategy ' s essential grounds and main contents. to bring the strategy into reality, chapter 3 discusses the primary ways and puts forward some tactful advice to set up the cooperative security regime of the area

    論文第一章論述了我國亞太戰略的石? ?新觀產生的原因、主要內容和本特點,強調互信、互利、平等、合作是我國新觀的心;第二章分析了我國新觀和亞太戰略的思想淵源、中國制定亞太戰略的本依據和主要內容;第三章探討了實現該戰略的本途徑和建立亞太合作機制的若干策略建議。
  3. Finally, the stress and strain distributions of dam foundation in which there have glacis weak surfaces are studied by means of nonlinear fem. with deducing parameters of weak surfaces gradually, stability of the dam against deep sliding is verified. therefore safety of dam and foundation would be estimated

    5 、運用非線性有限元法研究了東張水庫重力壩含有緩傾角軟弱夾層的壩應力、應變情況,用逐步降低夾層材料參數的方法算大壩的抗滑穩定,以此評價大壩及壩性。
  4. This paper introduces the latest progress of high level radioactive waste disposal programs in the world, and discusses the key scientific issues as follows : ( 1 ) the precise prediction of the evolution of a repository site ; ( 2 ) the characteristics of deep geological environment ; ( 3 ) the behaviour of deep rock mass, groundwater and engineering material under coupled conditions ( intermediate to high temperatures, geostress, hydraulic, chemical, biological and radiation process, etc ) ; ( 4 ) the geochemical behaviour of transuranic radionuclides with low concentration and its movement with groundwater : and ( 5 ) the safety assessment of disposal system

    在介紹國內外最新研究進展的礎上,重點討論高放廢物地質處置的若干關鍵科學問題:處置庫場址地質演化的精確預測、深部地質環境特徵、多場耦合條件下(中(高)溫、地殼應力、水力作用、化學作用、生物作用和輻射作用等)深部巖體、地下水和工程材料的行為、低濃度超鈾放射性素的地球化學行為與隨地下水遷移行為及處置系統的評價。
  5. Instruction detection technology is core in instruction detection system, it include abnormity instruction and abused instruction detection, on the basis of traditional network security model, ppdr model, instruction detection principle and instruction technology analysis, the author has brought forward instruction detection method based genetic neural networks, adopted genetic algometry and bp neural networks union method, and applied in instruction detection system, solve traditional bp algometry lie in absence about constringency rate slowly and immersion minim value

    入侵檢測分析技術是入侵檢測系統的心,主要分為異常入侵檢測和誤用入侵檢測。作者在對傳統網路模型、 ppdr模型、入侵檢測原理以及常用入侵檢測技術進行比較分析的礎上,提出了一個於遺傳神經網路的入侵檢測方法,採用遺傳演算法和bp神經網路相結合的方法?遺傳神經網路應用於入侵檢測系統中,解決了傳統的bp演算法的收斂速度慢、易陷入局部最小點的問題。
  6. Several approaches are provided to construct secure operating systems. the paper mainly discusses diverse security policies in operating systems. by the gfac framework, we implement several security policies in linux kernel version 2. 2. 14, including hru model based fine grain discretionary access control, multi - level security policy based mandatory access control and biba model based integrity access control

    文章重點研究了如何在操作系統中實現多種策略,並在linux內版本2 . 2 . 14中根據訪問控制通用框架( gfac )方法,實現了於hru模型的細粒度自主訪問控制、於bell - lapadula模型多級規則的強制訪問控制以及於biba模型的強制訪問控制等多種策略,從而有效地增強了操作系統中信息的保密性和完整性。
  7. The thesis contres closely on a key subject ? conomical globlization and our ideological safety, and discusses thoroughly many important issues : economical globlization, ideology and mutual relations, many challenges with which our ideological safety confront, the importance on defending our ideological safety as an important component of our comprehensive safety, the strategic things and basic principles, the responding strategies of four important realms about ideological safety such as marxism ' s guiding position, socialistic culture building, network safety and media safely. the thesis includes perface, text ( eight chapter ) and concluding remarks. perface discusses origin and foundation of changing thesis, main argument and logic system. in addition, main content and conclude are summarized compactly

    論文緊緊圍繞經濟球化與我國的意識形態這一心主題,深入論述了以下重點問題:經濟球化與意識形態這兩個重要的概念及其相互關系,經濟球化背景下我國意識形態面臨的挑戰,確保我國意識形態的重要意義,意識形態是我國國家綜合的重要組成部分,確保我國意識形態的戰略思路與本原則,馬克思主義指導地位、社會主義文化建設、網路和傳媒等四個意識形態的重要領域具體的應對策略。
  8. The circulation function therapeutic instrument of brain based on direct digital synthesis ( dds ) technology uses the domestic newest scientific findings and others in foreign countries. adopting the dds technology directly, it produces the safe, valid treatment. through pasting heart electric electrode on body surface, it introduces electric current to cerebral fastigial nucleus ( fn ) without damage in order to improve the state of brain blood supply and nerve conducted and something of lacking proper care to lose the symptom of coordinating with a net, increase cerebral blood flow, reduce downright bad neuron figure, district of penumbra, lighten brain perinemotoma

    於直接數字頻率合成技術的智能腦電治療儀應用國內國際上最新科研成果,採用直接數字頻率合成技術,實現、有效的治療,通過粘貼于體表的電極,無創引入小腦頂,從而改善腦供血狀態和神經傳導失調失絡癥狀,增加大腦血流量,減少半影區壞死神經元數目,減輕腦水腫,最終達到改善腦循環功能的作用。
  9. Releasing many of america ' s nuclear secrets was seen as an essential part of this strategy., since it would signal a new global order in which nuclear know - how was suddenly and irreparably devalued and real security would lie in the collective knowledge that nobody was able to push weaponry beyond the known boundaries

    公布許多機密被視為這一戰略本的一個部分,因為這表明了一個新的球格局,在這樣一個格局中,技術突然間無可挽回地跌價了,真正的在於這樣一個集體認識:沒有人可以將武器的研製推到人類知識界限之外。
  10. Inquiry can be made through the personal credit information database only with the authorization in writing by the person involved when personal loan application or credit card application is being reviewed, offer of guarantee by an individual assessed, or personal loan or credit card monitored for credit risks on a continued basis

    建立個人信用信息礎數據庫既要實現商業銀行之間信息共享,方便群眾借貸,防範信貸風險;又要保護個人隱私和信息,只能經當事人書面授權,在審個人貸款、信用卡申請或審是否接受個人作為擔保人等個人信貸業務,以及對已發放的個人貸款及信用卡進行信用風險跟蹤管理,才能查詢個人信用信息礎數據庫。
  11. It is urgent necessity for the icbc to realize intensified operation, efficiency operation and security operation by taking the secondary branch as the main operation unit

    以二級分行為本經營算單位是工商銀行實現集約化經營、效益經營和性經營的迫切需要。
  12. Combining operation of new way of safety management in hengdaohezi branch of train affairs, the thesis explains some new methods, such as adding up of a hundred safety marks, check of joint liability and linear management, and analyzes thoroughly management information system of safety statistics for branch of train affairs in analysis on system demand, analysis on system structure and function, and analysis on system data and data process. in the system, data standard of two " two violation " accident of workers and leaders is classified into three levels a, b and c, which is convenient to computer management

    2 、結合橫道河子車務段管理新辦法的實施,論述了百分累計、連帶考、線性管理辦法的本思路和內容,從系統需求分析,系統組織結構與功能分析,系統數據與數據流程分析等方面,對車務段統計管理信息系統進行了詳細分析設計,將職工、幹部「兩違」事故數據標準分為a , b , c三類,便於使用微機管理。
  13. Nuclear criticality safety for fissile materials outside reactor nuclear criticality safety based on limiting and controlling moderators

    反應堆外易裂變材料的臨界於限制和控制慢化劑的臨界
  14. Made clear the task of financial management of social insurance fund, want to carry out executive country to concern law, code and guiding principle, policy seriously namely, raise money lawfully and use fund ; build system of sound financial management, the plan that makes good foundation hard, control, business accounting, analysis and assessment work, reflect condition of fund income and expenses according to the facts ; abide by discipline of finance and economics strictly, strengthen supervise and check, ensure the safety of fund

    明確了社會保險金財務治理的任務,就是要認真貫徹執行國家有關法律、法規和方針、政策,依法籌集和使用金;建立健財務治理制度,努力做好金的計劃、控制、算、分析和考工作,並如實反映金收支狀況;嚴格遵守財經紀律,加強監督和檢查,確保金的
  15. According to the results of this study, an ideal social support model that helps disadvantaged women to improve their quality of life was suggested : familial supports are the foundation of receiving other social supports ; community supports are in the core of the support system, and play the most strong functions in helping individuals to break away from plight ; market resources and occupational supports are the path that leads to a new life ; relatives, neighbors, friends and colleagues are the promoters of their interests, who form the basis of an individual ' s social support over the life course ; social security is the last support network that helps disadvantaged women to meet their basic needs in life

    根據研究結果,我們提出了一個有助於改善弱勢婦女群體生活狀況的理想社會支持模式:家庭支持是礎,是獲取各種社會支持的出發點和歸宿;社區支持是支柱,是整個支持系統的心部分,它發揮著最強大的作用;市場資源和職業支持是承重梁,承載著新生活的希望,是擺脫困境的重要途徑;親戚、鄰居、朋友、同事等是護航者,發揮著保駕護航的作用;社會保障是這個支持系統的最後一張網,它的健完善將能為廣大弱勢婦女群體起著遮風避雨的作用。
  16. A lot of papers about the report of probabilistic risk assessment of daya bay npp and system manuals has been read by the author and let as the basis. in this paper, based on the reliability analysis methods of failure mode and effect analysis and failure tree analysis, according to the result of event tree analysis of probabilistic risk assessment report of daya bay npp, the top events of the fault trees of reactor protection system and the success criteria were established. by using risk - spectrum procedure, the unavailability and the minimal cut - sets ( mcs ) of the fault trees were obtained

    本文在閱讀了大量的大亞灣電站pra報告和各種系統手冊等資料的礎上,採用fmea (故障模式和影響分析)和fta (故障樹分析)可靠性分析方法,依據大亞灣電站pra事件樹分析的結果,建立了以緊急停堆失效和專設設施驅動失效為頂事件的故障樹,利用risk - spectrum程序,對所建的故障樹進行定量分析,計算,得到系統故障樹的失效概率和最小割集,從而為大亞灣電站可視化風險分析軟體提供數據支持。
  17. At the stage of comparison of drafts, according to the fact of water resources in laiwu city, and the case of the water replenished together with used in qiaodian reservoir, it analyses that the water level heightened is necessary and feasible. it sums up an easy, rational and facile means that can be generalized in water design units at grass roots, according to choosing a best scheme by fuzzy comprehensive judgement. in the course of designing engineering, it has obtained the results such as the seepage of dam bottom, verifying the safety of dams, and the design of reinforcement, so that it ensures the safety on the engineering, and achieves the aims of prospective

    在方案論證階段,根據萊蕪市水資源狀況及喬店水庫來水用水情況,分析了抬高興利水位的必要性和可行性,採用模糊數學綜合評判的方法,總結探討出一種簡單合理,易於操作,在層水利設計單位具有一定推廣價值的方案優選辦法;在工程設計中,主要對大壩壩滲漏,大壩及加固設計進行了計算,並對大壩加固設計進行模糊優選,保證了工程,達到了預期的目的。
  18. Of the two new mechanisms, the former can act as the security infrastructure, which can be deployed on the internet core routers or key routers in local autonomic systems

    這兩種新機制中,前者部署在internet心路由器或者區域自治系統的關鍵路由器上,作為礎設施。
  19. As network processor become core hardware in the next generation network device. the research in this paper is security of network information transmission based - on network processor

    因此網路處理器將成為下一代網路設備的心硬體,本文的研究問題是於網路處理器的網路信息傳輸的性。
  20. Modifying the codes of bootloader, we boot the digital signal processor through spi, and display a jpeg logo picture as quick as possible. also, we modify the bootloader to support choosing one of two operation systems to load to support safe online upgrade, depending on the upgrade symbol

    對晶元商提供的bootloader進行修改,在bootloader第二階段前使用spi初始化dsp ,調用jpeg圖片顯示介面,為用戶展示友好的logo圖片;修改的bootloader提供可選擇加載不同內的功能,以支持於雙linux內在線升級。
分享友人