軟體保密性 的英文怎麼說

中文拼音 [ruǎnbǎoxìng]
軟體保密性 英文
software privacy
  • : Ⅰ形容詞1 (質地不硬) soft; flexible; supple; pliable 2 (柔和) soft; mild; gentle 3 (軟弱) we...
  • : 體構詞成分。
  • : Ⅰ動詞1 (保衛; 保護) defend; protect 2 (保持) keep; preserve; maintain in good condition 3 (...
  • : Ⅰ名詞1 (秘密) secret 2 [紡織] (密度) density 3 (姓氏) a surname Ⅱ形容詞1 (距離近; 空隙小)...
  • : Ⅰ名詞1 (性格) nature; character; disposition 2 (性能; 性質) property; quality 3 (性別) sex ...
  • 軟體 : [計算機] software軟體包 (程序包) software package; 軟體程序 software program; 軟體跟蹤方式 soft...
  1. Operating system is the only basic software anear the hardware. its security is the base of other software. if there is no the security base, the security of application system or security system building on operating system, such as pki, encryption techniques, is not ensured

    操作系統是唯一緊靠硬的基本,其安全職能是其他安全職能的根基,缺乏這個安全的根基,構築在其上的應用系統以及安全系統,如pki 、加技術的安全是得不到根本障的。
  2. The author wish this study win be used in the development of numerical control dividing lathe that can divide into groups of the size for precise measure of thickness of ompressor carboy hatch soft shim the system of pneumatic measure applied widely for component measurement in produce process in factory. the author 100kup a large number related documents over about one and half year for research and went to factory and related research institute for investigating

    並希望將這一研究結果應用於對「壓縮機缸蓋墊片」厚度尺寸精測量分組的數控分選機的研製。氣動測量系統以其測量倍率高、測量精度高、測量力小( 0 . 05 1n ) 、對被測工件有自潔作用、測量精度好、抗干擾能力強等優點而被廣泛應用於工廠生產過程中的零件檢測。
  3. " the apparent paradox that openness about your methods leads to better security is not unique to computer software - military and diplomatic cryptographers have known for a century that it is folly to depend on the secrecy of your encoding method rather than the secrecy of your keys, " says raymond

    Raymond說: 「公開您的方法將導致更好的安全這個明顯矛盾的觀點並非計算機所獨有,軍事和外交上的解者知道這個觀點已有一百年了:依賴編碼方法的而不依賴鑰的是非常愚蠢的。 」
  4. So security and safeguarding of information on computer networks has become one of the most import problems, because of the diversity of network ' s connection, the asymmetry of terminal ' s distribution, the interconnection of computer and the attack of hacker, cracker and vicious software. it is more important for military ' s automation commanding network and banks whose network communicates sensitive data. thus we should apply sufficient safeguarding to these networks, otherwise the computer network will be useless, even jeopard the national security

    但由於計算機網路具有連接形式多樣、終端分佈不均勻和網路的開放、互連等特徵,致使網路易受黑客、駭客、惡意和其它不軌的攻擊,所以網上信息的安全和是一個至關重要的問題。對于軍用的自動化指揮網路和銀行等傳輸敏感數據的計算機網路系統而言,其網上信息的安全和尤為重要。因此,上述的網路必須有足夠強的安全措施,否則該網路將是個無用、甚至會危及國家安全的網路。
  5. Refractory fiber and product is manufactured by means of dry method and wet method. as an excellent insulation material, it has comparatively low volume density, good softness and very low thermal conductivity coefficient. sticking method, ancjoring method and folding method can be selected respectively. this product can be used in various industrial kilns & furmaces for lowering heat consumption

    耐火纖維及製品是採用干法、濕法生產的具有較低度、較好柔、極低的導熱系數的優質絕熱溫材料,施工時可分別採用粘貼法、錨固法、折疊塊形式施工,適用於各種工業窯爐降低熱耗之用。
  6. In the second part of this paper, it makes a detailed analysis among fluid - model - based, smith - principle - based and two - pd - controllers - based by comparing to the method and application of control theory. then it gets the laws to keep the control loop stable. in order to analyze the dynamic and transient characters, three congestion control algorithms mentioned above have been carried out in the nist atm network simulator and the successful outcomes are brought out

    本論文對atm網路abr業務擁塞控制的控制理論演算法進行了總結,簡要分析了其優點和缺點;運用控制理論的分析方法和觀點對基於流控制模型、史斯預估控制模型和雙重比例微分控制模型三種擁塞控制演算法加以具的分析,從而分析了怎樣確控制環的穩定;在nistatm網路模擬中嵌入以上三種擁塞控制演算法,從而對演算法的動態和瞬態特進行模擬分析,以此證明控制演算法的有效;最後提出了今後atm網路abr業務擁塞控制演算法的發展趨勢。
  7. The meijiayi mjy channels therapeutic apparatus developed by our company, combines the advanced microcomputer technics with the profound traditional chinese medicine methods as well s the human channelss science, magically takes advantages of modern electronic technics and the outer treatment of chinese medicine, realistically simulated the effects like acupuncture, aprapathy, essage, eating, kin scraping and cupping, etc. which improve the comprehensive effects, especially for the common ailments and geriatric diseases in digest digestive system, respiratory system and nervous system

    旋翼式多流束濕式基表,雙脈沖采樣方式進行數據採集,採用計算機技術進行數據處理顯示控制閥門動作。它採用獨特的卡口安全及護措施動態安全可靠的ic卡加機制先進的硬的容錯處理能安全可靠,具有精度高自身功耗低積小壽命長便於安裝等特點。能準確實現用水計量及實現預付費功能。
  8. The aim of this research project is to supply the technical preparation for the nuclear power station domestalization and autonomous design, to improve the design quality and level, to ensure the reliability of the sealing system in the advanced pressurized water reactor vessel, to ensure the nuclear safety, and to raise the design software level of the nuclear vessel sealing system to the advanced world class

    本課題研究的目的是為核電站國產化及自主設計提供技術準備,提高設計質量和設計水平,確先進壓水堆核容器封系統設計的可靠,確核安全,使核容器封設計達到世界先進水平。
  9. The software of the buoy system is complicated, the controlled object amount to five bouys, diversification of control mode in every bouy, and the software joint with multi - hardware. for the sake of reliability, a series of hand signals are required

    浮標監測系統繁雜,被控對象多達5個浮標,每一枚浮標內部的控制方式復雜,各與硬結合緊,需要一系列握手信號證系統的可靠
  10. This paper used complex encrypting algorithm, and used the method of software encryption at the mobile terminal to certificate the security of data delivering, at the same time, by setting the rule of data delivering between the wap gateway and the server, it solved the problem efficiently

    摘要使用混合加演算法,同時在移動終端使用方法來證數據傳輸的安全,並且在wap網關和服務器間設置數據傳輸規則,從而有效地解決了此問題。
  11. This paper, giving an example of society security smart ic card, mainly tells of the design and realization of smart card core - operation system ( cos ). in the first chapter general design idea of smart card operation system is brought forward, it including theory, principle of system. in the second chapter, the characters and qualities of smart card chip - gk1207 adopted in this system is introduced

    本論文以社會障智能ic卡為例,著重講述了智能卡的核心?操作系統( cos )的設計與實現,其中第一章提出了智能卡操作系統的總設計思想,包括系統工作原理、設計和實現原則;第二章對本系統採用的智能卡晶元? gk1207的能特點進行了介紹;第三、第四章主要講述了智能卡cos開發的兩項關鍵技術? ?加演算法和通信協議;第五章具討論了社卡cos的設計與實現。
  12. Now, the legislation protection of computer software is still an important problem in spite of so many years " discussion. and this problem has n ' t been solved thoroughly up till now. this article begins with detailed analysis of the history, main problem, advantages and disadvantages of the protection to computer software by copyright law, patent law and trade secret law

    本文擬首先逐一詳細分析:計算機版權法護的歷史發展、主要問題、優勢及存在的問題;專利法護的曲折發展、的可專利、採用專利法護的必然、主要障礙和出路;商業秘的構成、商業秘的可行和不足之處,從而對計算機取得更全面和深入的了解。
  13. The following four conditions are allowed us to publish your information : in order to observe the relevant laws and regulations, obey the legal service procedures of jinjiang sansheng shoes material co., ltd in order to preserve the trademark property of jinjiang sansheng shoes material co., ltd in order to preserve user and social masses privacy security on our behalf in urgent case in order to conform to other relevant requirements members population analyse consultation rights are reserved by jinjiang sansheng shoes material co., ltd6

    D用戶同意遵守中華人民共和國守國家秘法中華人民共和國計算機信息系統安全護條例計算機護條例等有關計算機及網際網路規定的法律和法規實施辦法。在任何情況下,百絲達服裝材料有限公司合理地認為用戶的行為可能違反上述法律法規,金勵工藝網可以在任何時候,不經事先通知終止向該用戶提供服務。用戶應了解國際網際網路的無國界,應特別注意遵守當地所有有關的法律和法規。
  14. Abstract : technology dimensions of work parts always exceed the determined technology dimension limits. but when the work parts are big enough, it is still possible and valuable to modify the work parts " following technology process and technology dimensions, which are respectively called as dynamic technology process ( dtp ) and dynamic technology dimension ( dtd ), to ensure them to be qualified. a mathematical model is proposed which is about how to plan the dtd once the dtp is determined. a software has been written to testify the correctness of the above model. this model will be very useful in the capp and online quality assurance in the manufacturing of precise machine parts

    文摘:工件的工藝尺寸在工藝過程中經常會超出許可的范圍,但當這些超差工件仍有足夠的加工余量時,通過修改其後續工藝路線(稱為動態工藝路線)及工藝尺寸(稱為動態工藝尺寸)仍有可能將其加工成成品.本文提出了一種在後續工藝路線確定后如何確定后續工藝尺寸的數學模型,並利用該模型成功地編制出了動態工藝尺寸設計的,且用很多事例驗證了該模型的正確.該方法可以應用於精機械零件製造時的計算機輔助工藝過程設計及在線質量
  15. It particularly analyzes the encryption algorithms to choose a perfect frame, and makes good use of the advantages of rsa algorithm and des algorithm, so that the whole system obtains a credible guarantee of its security

    進行了詳細的演算法研究及選型,合理運用了rsa和des演算法的優勢互補,從而為整個應用系統提供了可靠的安全障。論文完成了信息加系統的演算法的詳細設計和硬電路的搭建。
  16. Using standards - based ipsec technology, vpn client extends the integrity and confidentiality of data traveling outside of enterprise networks by providing encryption, compression, and authentication

    基於ipsec標準,通過加,壓縮和認證來護傳輸數據的完整和機
  17. Compare dbs aes with permutation code, we found use encryption and decryption technology based on permutation code, can ensure the encrypted software ca n ' t be pirated

    對比des 、 aes ,說明使用排列碼加演算法,是可以證被加安全的。
  18. This paper introduces some practicable ways to realize the design of background signal simulator console software, database exploitation and the data processing for the gps receiver ( gn - 79 ). to meet the needs of these superiorities such as simple maneuverability, modularization and high secrete security, we considerably think of those requirements in the aspects of the signal - producing, hardware - setting, timing and orientation, user setting and so on, during the period when we design the software, make the database accessing down to the bottom layer, and obligate full space for its improvements of software modification and function expansion

    由於工程的操控部分即實現部分需要現簡便、易控、模塊化以及好等優勢,因此,在設計實現操控界面的同時,充分考慮了信號產生、硬設置、定時定位以及用戶設置等各方面的要求,實現了數據庫訪問技術到底層的管理,為將來的修改、功能擴容留下了充分的空間。
  19. Malware is malicious code or software secretly inserted into a system to compromise the confidentiality, integrity, or availability of the data or applications residing on the network

    惡意是秘地插入系統、危及網路中的數據或應用程序的,完整或可用的惡意代碼或
  20. These information properties include a company s financial data, human resource data, customer information, product sales data etc. because the confidentiality of information properties is getting more and more valuable, software development companies could use the complex designs of software protection lock to enable encode and decode data files, therefore software protection locks have an additional function

    這些信息資產包括公司的財務數據人事數據客戶數據銷售數據等。信息資產的愈來愈受重視,而開發公司可利用護鎖的復雜設計來達到將數據文件做編碼與譯碼的功能,所以護鎖便又多了一項可利用的價值。
分享友人