計算機保護 的英文怎麼說
中文拼音 [jìsuànjībǎohù]
計算機保護
英文
cyber protection- 計 : Ⅰ動詞1 (計算) count; compute; calculate; number 2 (設想; 打算) plan; plot Ⅱ名詞1 (測量或計算...
- 算 : Ⅰ動詞1 (計算數目) calculate; reckon; compute; figure 2 (計算進去) include; count 3 (謀劃;計...
- 機 : machineengine
- 保 : Ⅰ動詞1 (保衛; 保護) defend; protect 2 (保持) keep; preserve; maintain in good condition 3 (...
- 護 : 動詞1. (保護; 保衛) protect; guard; shield 2. (袒護;包庇) be partial to; shield from censure
- 計算機 : computer; calculator; calculating machine; computing machinery; electronic wizard; processor; pro...
- 計算 : 1 (求得未知數) count; compute; calculate; reckon; enumerate 2 (考慮; 籌劃) consideration; pla...
-
Physical equipment as opposed to programs, procedures, rules, and associated documentation ; chip level solutions that hook onto back plane of computer to protect it
與程序、過程、規則和相關文件相對的物理設備;固定於計算機背板上的晶元保護裝置。According to trusted compeer seeffiity evaluation standard ( tgskt ), tfae security level of ^ armostall dbms is c2, and it is not eueuglrto safeguarded ^ it is necessary and pressing to afford a credible system to protect infomation resource
按照可信計算機評估標準tcsec看,當前多數dbms系統只具備c2級安全性,這種安全性對數據的保護是不夠的。提供一個可靠的mlsdbms系統來保護系統信息資源是必要的,迫切的。It is still possible with windows 98 and its ilk to protect a computer against a network
使用windows 98及其同類產品來保護計算機免受網路攻擊還是有可能的。At the same time, the starter has diversified functions of motor protecting, and realizes the intercommunication with central master computer
同時,還具備了各種電動機保護功能,並實現與主控計算機的雙向通信。With the development of electronics and microcomputer, microprocessor - based protection has advanced. but much of than are just the republication of the electromechanical and electronic protection. many advantages of the computer, such as nunerical evaluation data storage and logical decision, is n ' t used
異步電動機保護的研究由來已久,隨著電子和微機技術的發展,異步電動機微機保護也得到了大力的發展,但很多僅是機電式和電子式保護的翻版,沒有真正利用微機所具有強大的數值計算能力、數據存儲能力和邏輯判斷能力,使保護更加的精確、可靠和智能化。With the development of electronics and microcomputer, microprocessor - based protection has advanced. but some of them are just the republication of the electromechanical and electronic proteciton. they can not fully utilize the computing capability and logic judgement that the computer has and most of the microprocessor - based protection is running isolated
異步電動機保護的研究由來已久,隨著電子和微機技術的發展,異步電動機微機保護也得到了快速的發展,但很多僅是機電式和電子式保護的翻版,沒有充分利用微機所具有的強大的計算能力和邏輯判斷能力,而且目前的異步電動機保護裝置大都是單臺運行,與外界進行數據交換很少。For the protection of system resource, need to establish a active defence machine different from firewall and antivirus software to detection intrusion. by monitoring network or computer systematic development behavior feature intrusion detection system ( ids ) judge whether have invade take
為保護系統資源,需要建立不同於防火墻和防病毒軟體的主動防禦機制檢測入侵。入侵檢測系統( intrusiondetectionsystem )就是監控網路或計算機系統的動態行為特徵並據此判斷是否有入侵的主動防禦措施。Be familiar with hv, mv and lv power distribution systems and power factor correction study & harmonic analysis, ups and dc power systems, power fiscal metering, and all necessary calculations to one project including short circuit calculation and protective device coordination study, lightning protection calculation, generator power calculation etc
熟悉項目中的高、中、低壓配電系統和功率因素補償研究及諧波分析, ups和直流電氣系統,功率計量,相關計算(包括短路計算和保護裝置協調分析,照明保護計算,發電機功率計算等) 。The new utility model referrs to a kind of cleaning guard board for computer keyboard and keyboard cover
本實用新型是一種用於計算機鍵盤鍵帽的保潔護板。2 ) based on the study and analysis of many security architecture standards, the security region and the defense layer are introduced, the information category, the threatening level and the security protection level ( spl ) are put forward, the methods and requires of the security analysis are discussed in this paper. 3 ) based on the security architecture model and the security analysis, the graded requires of the security management and the security technology is presented, so the security design of the cissa and the choice of security produces can be done conveniently. 4 ) a cooperative communication platform is designed and implemented to ensure the dynamic and cooperative ability of above cissa model
針對計算機信息系統安全體系模型和實施標準的不足,本文緊密圍繞分層、分級、動態防禦以及協同通信平臺等關鍵技術開展研究工作,所做的工作主要集中在: 1 )在深入研究了當前各種流行的安全體系模型基礎上,提出了用於指導計算機信息系統安全體系建設的動態縱深防禦安全體系模型; 2 )在對各種安全體系標準進行研究與分析的基礎上,引入了安全域和安全防護層次的概念,提出了信息類別、威脅級別和安全保障級別的定義,闡述了進行計算機信息系統安全分析的方法和要求; 3 )在安全體系模型和安全分析的基礎上,提出了安全管理及安全技術的分級要求,從而便於進行計算機信息系統的安全設計以及產品的選型; 4 )設計並基本實現了用於保障上述安全體系動態協同能力的協同通信平臺。The algorithms of microprocessor distance protection emulated and calculated in this paper are used to realize the inverse time characteristic of microprocessor distance protection
本課題模擬計算的保護演算法用於實現高壓線路微機距離保護的反時限。微機距離保護是高壓線路的重要保護之一。For gamma knife treatment, first let the patient lie on his or her back on the surgical bed, and then fix the head of the patient and make some necessary measures to protect his or her sensitive parts and finically start up the control system
治療開始,病人進入治療室並仰臥于治療床上,固定好病人頭部並做好敏感部位的保護后,啟動控制系統。控制臺按照接受到的治療方案在計算機自動控制下對病人進行治療。Setup functions enable user - defined adaptation of a wide variety of options such as display contrast, record printout, saving data on the computer, general code, temperature calibration, acoustic signal, date and time, id, data transfer, update fix programs, language, screen saver, c f changeover, check programme, battery change, diagnosis data, printing programs, seal test, service functions for maintenance
設置功能允許使用人員對多種選項進行定義和調節,例如顯示屏幕對比度列印記錄把數據記錄到計算機上總碼溫度校正音響信號日期和時間識別傳輸數據固定程序升級語言屏幕保護攝氏和華氏溫度轉換檢查程序更換電池診斷數據列印程序測試密封保養用服務功能The factory has possessed advanced production equipments and wire cable check equipment at domestic. first class technology will provide you wire cable with fluorin polymer used in in aviation spaceflight, electric cables, control cables, computer cables, compensatory wire cables, fire - proof cables with high temperature, general plastic cables that classified into sixteen species and over one thousand specifications. cables for " hongyuan " brand are widely used in the fields of spaceflight, national defence, electric petroleum chemistry, steel, public establishments, environmental perfection and architecture. temperature - proof cables with " hongyuan " brand were awarded with famous products in 2001 which are widely sold all through the world and have been won customers trust
一流科技力量為您提供航天用含氟電線電纜電力電纜耐熱防腐硅橡膠電纜耐高溫電纜控制電纜計算機網路電纜補償用電線電纜船用電纜橡套電纜阻燃防火電纜等十六大類,一千多種規格產品,並可根據擁護特殊要求,自行設計生產,以滿足顧客要求,多年來「宏源」牌電線電纜廣泛用於航空航天國防軍工電子原件電力石化鋼鐵冶金公共設施環保建築等領域,深受廣大用戶高度評價和信賴。Its support for granular access control, inheritance, and delegation of administrative task gives you the flexibility to secure resources without compromising your network ' s purpose
它支持管理任務的粒狀通路控制、繼承和授權,使用戶能靈活保護資源而不會泄露計算機網路目的。This topic provides recommendations to help you protect your visual studio tools for office solutions against possible threats, and contains information about programming outlook add - ins to run on computers that have the outlook object model guard enabled
本主題提供幫助您保護visual studio tools for office解決方案以抵禦可能威脅的建議,並包含有關編寫在啟用outlook對象模型保護的計算機上運行的outlook外接程序的信息。The advent of the internet and the wide availability ofcomputers, scanners and printers make digital data acquisition, exchange and transmission a simple task. however, making digital data accessible to others through networks also creates opportunities for malicious parties to make salable copies of copyrighted content without permission of the content owner. digital watermarking is likely to be a potential solution to this problem. digital watermarking has been proposed as a solution to the problem of copyright protection of multimedia documents in networked environments. it makes possible to embed a watermark ( such as identification data, serials number, text or image etc. ) to multimedia documents allowing copyright protection, secret communication, document authentication and so on. in this paper, we present a new digital image watermarking method based on svd ( singular value decomposition ), and then give some theoretical analysis about the algorithm. extensive experimental results show that this method is much more robust than other methods presented before
隨著計算機和網路技術的飛速發展,數字圖像、音頻和視頻產品愈來愈需要一種有效的版權保護方法,另外通信系統在網路環境下的信息安全問題也日益顯露出來.數字圖像水印技術為上述問題提供了一個潛在的解決方案.所謂水印技術就是將數字、序列號、文字、圖像標志等版權信息嵌入到多媒體數據中,以起到版權保護、秘密通信、數據文件的真偽鑒別和產品標志等作用.本文提出了一種新的基於奇異值分解的數字水印演算法並且對該方法的理論基礎給出分析.實驗結果表明這種方法要比目前提出的流行演算法魯棒In order to avoid impersonation attacks, you should ban duplicate names and secure computer names by creator
為了避免偽裝攻擊,應禁止重復的名稱,創建者應保護計算機名稱的安全。In computer security, automatic termination and protection of programs and / or processing systems when a hardware or software failure is detected in an automated information system
在計算機保安技術中,自動化信息系統發現硬、軟體故障或錯誤時,為使系統不致於癱瘓而自動終止程序或處理系統的運行,以便保護它們。After you install this item, you may have to restart your computer. other critical security updates are available
為了幫助您盡早將計算機保護起來,我們及時提供了本更新程序。分享友人