計算機全息術 的英文怎麼說

中文拼音 [suànquánshù]
計算機全息術 英文
computer holography
  • : Ⅰ動詞1 (計算) count; compute; calculate; number 2 (設想; 打算) plan; plot Ⅱ名詞1 (測量或計算...
  • : Ⅰ動詞1 (計算數目) calculate; reckon; compute; figure 2 (計算進去) include; count 3 (謀劃;計...
  • : machineengine
  • : Ⅰ形容詞1 (完備; 齊全) complete 2 (整個) whole; entire; full; total Ⅱ副詞(完全; 都) entirely...
  • : Ⅰ名詞1 (呼吸時進出的氣) breath 2 (消息) news 3 (利錢; 利息) interest 4 [書面語] (子女) on...
  • : 術名詞1. (技藝; 技術; 學術) art; skill; technique 2. (方法; 策略) method; tactics 3. (姓氏) a surname
  • 計算機 : computer; calculator; calculating machine; computing machinery; electronic wizard; processor; pro...
  • 計算 : 1 (求得未知數) count; compute; calculate; reckon; enumerate 2 (考慮; 籌劃) consideration; pla...
  1. With the rapid increase of society, it has been become more and more anxious requirement of security for people " s life. how we use techniques of the modern cybernation, and computer networks, and manage of the information system, which build our new security automation system will come into view one of important and active area of research

    防範系統是智能建築的一個子系統,隨著社會的發展,人們對安保障的需求也越來越高,如何利用現代控制技、網路技管理技構築新一代的安防範系統是人們關注的熱點之一。
  2. With the rapidly development of computer network technology and the widely use of network technology in every walk of life, people transmit data through computer network more and more frequently, including all kinds of secret information ( for example, military secret ; bussiness secret ; personal private information ). today, as a result of poor security of our network system, we can not prevent the transmittied information from stealing and modifying unlawful. thus, the computer network technology is applied to our daily life restrictedly. recently, many network applications with voip ( for example msn messenger ; dialpad ; distributed multipoint multimedia conferences ) take no measures to encrypt their data

    隨著網路技的迅猛發展和網路技在各行各業中的廣泛應用,人們通過網路傳輸數據日益增加,其中包含了各種密信(例如軍事密信、商業密信、個人隱私信等) 。由於目前的網路系統缺乏足夠的安性,不能有效防止網路上所傳輸的信被非法竊取和修改,因而極大地限制了網路技在日常工作中的應用。當前,基於voip技的各種網路應用,如msnmessenger , dialpad ,以及一些分散式多媒體會議系統,竟然未採取任何加密措施
  3. The industrial development in shandong should be located on the above - mentioned superior industries, known as the industries which is " inoculated " by the high and new technology and upgraded such as the leading industry like mechanism, electron, petrifaction and etc, or the traditional industry like energy source, textile, foodstuff, metallurgy and etc, or the high and new technique industry like electronic message, biological engineering, ocean and etc. correspond with the development and grandness of these strategic industry, the famousbrand products including the products of the household appliances, the utility type sedan, the refine chemical industrial products, computer software, halobios pharmacy, industrial revelation ware and etc should be created gradually, and then improve the structure of the industrial products

    山東省工業發展應定位於上述優勢產業,即經過高新技「嫁接」和換代升級的械、電子、石化等主導產業,能源、紡織、食品、冶金等傳統產業,電子信、生物工程、海洋等高新技產業。相應于這些戰略產業的發展和壯大,逐步創造出包括家電、經濟型轎車、精細化工產品、軟體、海洋生物制藥、工業新材料製品等在內的名牌產品,並進而改善工業產品結構。隨著中國加入世貿,為應對經濟球化的挑戰,關于產業競爭力的研究成為一大熱點,但以往的研究都側重於從國家或企業的角度考慮問題,本文試圖從區域經濟的角度研究產業競爭力,探索提升產業競爭力的途徑,為研究中國產業國際競爭力提供借鑒和參考。
  4. It is possible to modify and combine existing laser, holographic and computer technology for intraoral use.

    改進和綜合現有的激光、,以便用於口腔內是完有可能的。
  5. Home automation is a combination of the modern computer technology, auto - control technology, communication technology, multimedia technology and modern architecture art by controlling the home devices and managing the information resource, home automation not only can give the services of information and the secure, comfortable and convenient environment but also can meet the need of the fast development of the information technology

    家庭自動化是指運用現代、自動控制技、通信技、多媒體技和現代的建築藝相結合,通過對電設備的自動控制,對信資源的管理,向用戶提供信服務及安、舒適、便利的環境服務,適合當今信高速發展需求特點的一種技
  6. The article points out the importance and necessity of the information - security from its actuality in our country. the resources in the information system, for instance, hardware, software, data, document, operator, meterial and so on, are evaluated and gived safety grade firstly. and then, it analyses the menace including the nonauthorized access, the information leak, the refused sevice, the internal objection which the system will take. the following are the corresponding control police : confirm the users " rights and duties, including the mode of using account, the limit of accessing resource, the application of password, the building of backup ; confirm the administrators " right and duties, including physical safety, system configuration, account configuration and usufruct, password management, audit and control, backup and individual intimity ; run - of - mill measure of security defence, including access control, symbol and identification, integrality control, password technique, firewall system, audit and resumption, safety of operating system, safety of database system, defence of computers " virus and resisting - deny protocol. in the end, the article offers the strategies of disposing the safety - accident and analyse after ithow. to report it, how to solve it in phase, and how to avoid it happening again. in a word, the article presents a holistic resolvent about keeping away the information system ' s security, and supplies a essential frame for its configuration, management and application

    然後,對系統可能受到的威脅,包括非授權訪問、信泄漏、拒絕服務和內部缺陷等進行分析,並提出了相應的控制策略:確定用戶的權力和責任,包括帳戶使用方式、資源訪問權限、口令應用以及建立備份等;確定系統管理員的權力和責任,包括物理安、系統配置、帳戶設置及使用權限、口令管理、審和監控、備份以及個人隱私等方面;一般性的安防護措施:存取控制、標識和認證、完整性控制、密碼技、防火墻系統、審和恢復、操作系統安、數據庫系統安病毒防護和抗抵賴協議等。最後,對事故處理和事後分析提供策略,如何報告安事故,如何協調解決安事故,如何避免安事故再次發生。總之,本文對信系統安防範工作給出一個整體的解決方案,為其在配置、管理和應用方面提供了基本的框架。
  7. Computer and network has spreaded all over the society. information security and sciential property right have been risen to a new level. it is a focused problem that how to protect data and software sciential property right in field of informational technology

    現代社會步入數字信化高度發達的時代,和網路遍及社會的每一個角落,信和知識產權不可侵犯也提到了一個新的高度,如何保證數據信的安和軟體知識產權成了信領域關心的熱點問題。
  8. Pos system, which is called real - time management system of sales point too, means that commodity information data process was accomplished instantly during selling. so it is a new type of commercial sales system that come into practice with the popularization and development of computer technology

    Pos系統是隨著的普及、發展而出現的一種新的自動化商業銷售系統,又稱銷售點實時管理系統,即銷售時的商品信數據處理是在交易的一瞬間完成。
  9. Under these circumstances, we cooperate with computer specialists for the purpose of researching and developing a new method which answers the needs of prosthodontics, which covers the information disposition work of the prosthodontics office in clinical activities, in personnel files management, in storehouse property management, in economic cost accounting and so on, and which solves the problems of relative information ' s construction, disposition, storage, inquiry, statistics and dynamic monitor forthwith with advanced information technology

    正是在這種狀況下,我們和專業人員合作,旨在研究和建立完符合口腔修復科專業要求,能夠涵蓋修復科在臨床醫療活動、人事檔案管理、庫房資產管理、經濟成本核等相關活動中需要解決的信處理問題,將相關信的構建、處理、存儲、查詢、統、實時動態監控等操作以先進的信處理方式加以解決。
  10. 2 ) based on the study and analysis of many security architecture standards, the security region and the defense layer are introduced, the information category, the threatening level and the security protection level ( spl ) are put forward, the methods and requires of the security analysis are discussed in this paper. 3 ) based on the security architecture model and the security analysis, the graded requires of the security management and the security technology is presented, so the security design of the cissa and the choice of security produces can be done conveniently. 4 ) a cooperative communication platform is designed and implemented to ensure the dynamic and cooperative ability of above cissa model

    針對系統安體系模型和實施標準的不足,本文緊密圍繞分層、分級、動態防禦以及協同通信平臺等關鍵技開展研究工作,所做的工作主要集中在: 1 )在深入研究了當前各種流行的安體系模型基礎上,提出了用於指導系統安體系建設的動態縱深防禦安體系模型; 2 )在對各種安體系標準進行研究與分析的基礎上,引入了安域和安防護層次的概念,提出了信類別、威脅級別和安保障級別的定義,闡述了進行系統安分析的方法和要求; 3 )在安體系模型和安分析的基礎上,提出了安管理及安的分級要求,從而便於進行系統的安以及產品的選型; 4 )設並基本實現了用於保障上述安體系動態協同能力的協同通信平臺。
  11. At first, the meaning and its essentiality of interception technology on computer video - leaking information is explained. the growing history and general situation of this kind of interception technology are summarized, and the main work of this paper is pointed out

    文章首先系統地介紹了研究視頻泄漏信截獲技對保障有重要的意義,闡述了該技的發展概況及本文工作的重點是在實用化過程中的幾個關鍵技的解決方案。
  12. On the basis of exploring the various conceptions the writer redefined computer crime and set forth a new and original view as follows : " computer crime is the behavior of the person who brings serious harm to society by using computer as a tool and by using the technology of computer information and specialized knowledge to illegally to encroach on the safety of computer and its network

    在探討各式概念的基礎上,對犯罪概念重新作了界定,提出了自己獨到的見解。認為「犯罪是行為人利用和專門知識,以為工具,非法侵害及其網路安的嚴重危害社會的行為。 」
  13. Our research project is basic condition platform construction project of the national science and technology of the ministry of science and technology. this paper researches the security audit techniques which watch and track actions in network information systems, and develops audit tool software. on the base of technology research, we will constitute technology standards that have own intelligence property, so that we could enhance network recovery capability to protect important computer information systems

    本文課題是科技部國家科技基礎條件平臺建設項目,研究對網路信系統進行面監視和對網上行為進行跟蹤的安,開發符合信管理需要的審工具軟體,為構建網路安系統提供技支持,並在技研究的基礎上研究制定具有自主知識產權且能與國際接軌的技標準,以提高國內信網路防禦能力,保護國家關鍵基礎設施,維護國家事務、經濟建設、國防建設、尖端科學技等重要領域的系統的安
  14. By comprehensive application of computer, communication, photo - electricity and sense etc. we shall develop a variety of software relative to the olympics and build the information management system for the olympic competition, develop and adopt the network computer ( nc ) technology and provide a mass, high speed, safe and steady information management platform for the olympics, linking the press information system and provide timely, fast and convenient information service for the sportsman or sportswoman and the olympic working personnel and the public

    通過、通信、光電、傳感等多項技的綜合應用,開發各類與奧運相關的軟體,建立奧運會比賽信管理系統;開發應用網路( nc )技,為奧運提供大容量、高速、安、穩定的信管理平臺,並與新聞信系統聯接,為運動員、奧運會服務人員及公眾提供適時、快速、便捷的信服務。
  15. Common technology requirement in computer information system classified security protection

    系統安等級保護通用技要求
  16. Network technology requirement in computer information system classified security protection

    系統安等級保護網路技要求
  17. Operating system technology requirement in computer information system classified security protection

    系統安等級保護操作系統技要求
  18. Database management system technology requirement in computer information system classified security protection

    系統安等級保護數據庫管理系統技要求
  19. Technical requirements of physical security for computer information system section 1 : local computing environment

    系統實體安要求第1部分:局域環境
  20. With the scale of computer information system ( cis ) expanding and the security technology developing, a systematic and normalized computer information system security architecture ( cissa ) is needed to strengthen the design, development, implementation, evaluation and management of cissa. in order to normalize the build of cissa, and construct the security defense architecture in our country, a uniform cissa model and the implementary standard must be built

    隨著系統規模的不斷擴大和信的不斷發展,為了加強系統安體系的設、開發、使用、評估和管理,需要對系統安體系進行系統化的認識和規范化的建設,因此必須建立統一的系統安體系模型和實施標準,規范系統的安體系建設,構築我國系統安防範體系。
分享友人