驗證安全系數 的英文怎麼說
中文拼音 [yànzhèngānquánxìshǔ]
驗證安全系數
英文
proof factor- 驗 : 動詞1. (察看; 查考) examine; check; test 2. (產生預期的效果) prove effective; produce the expected result
- 證 : Ⅰ動詞(證明) prove; verify; demonstrate Ⅱ名詞1 (證據) evidence; proof; testimony; witness 2 (...
- 全 : Ⅰ形容詞1 (完備; 齊全) complete 2 (整個) whole; entire; full; total Ⅱ副詞(完全; 都) entirely...
- 系 : 系動詞(打結; 扣) tie; fasten; do up; button up
- 數 : 數副詞(屢次) frequently; repeatedly
- 驗證 : test and verify; checking; proving; testing; confirmation; [數學] corroboration; inspection; veri...
- 系數 : [數學] coefficient; ratio; modulus; quotient; factor
-
Network forensics is an important extension to present security infrastructure, and is becoming the research focus of forensic investigators and network security researchers. however many challenges still exist in conducting network forensics : the sheer amount of data generated by the network ; the comprehensibility of evidences extracted from collected data ; the efficiency of evidence analysis methods, etc. against above challenges, by taking the advantage of both the great learning capability and the comprehensibility of the analyzed results of decision tree technology and fuzzy logic, the researcher develops a fuzzy decision tree based network forensics system to aid an investigator in analyzing computer crime in network environments and automatically extract digital evidence. at the end of the paper, the experimental comparison results between our proposed method and other popular methods are presented. experimental results show that the system can classify most kinds of events ( 91. 16 ? correct classification rate on average ), provide analyzed and comprehensible information for a forensic expert and automate or semi - automate the process of forensic analysis
網路取證是對現有網路安全體系的必要擴展,已日益成為研究的重點.但目前在進行網路取證時仍存在很多挑戰:如網路產生的海量數據;從已收集數據中提取的證據的可理解性;證據分析方法的有效性等.針對上述問題,利用模糊決策樹技術強大的學習能力及其分析結果的易理解性,開發了一種基於模糊決策樹的網路取證分析系統,以協助網路取證人員在網路環境下對計算機犯罪事件進行取證分析.給出了該方法的實驗結果以及與現有方法的對照分析結果.實驗結果表明,該系統可以對大多數網路事件進行識別(平均正確分類率為91 . 16 ? ) ,能為網路取證人員提供可理解的信息,協助取證人員進行快速高效的證據分析Secondly, the fu yang lailong mountain slope failure was introduced. the factors influcing the slope stability were analysed and the calculated results were compared with those obtained by insitu monitoring. finally, some conclutions were obtained, which are important to engineering application
本文結合富陽來龍山滑坡的工程實例,介紹了來龍山滑坡的概況,分析了滑坡產生的成因、滑坡要素及監測情況,並用極限平衡法和有限元法分別進行了安全系數的計算與分析,提出並驗證了自己的觀點。The table will write down all about the electronic records during their life period. the content noted in the table will be the only basis on original and reality " testing of electronic records ". the major task of the second levels is to build the tight filing rules, moreover, combined the " life cycle table ", to build the test system to assure the original and the reality of the information during filing ; the assignment of the third level is to build testing and restoring measures of the original and the reality. by maintaining the media of electronic archives or building information file of electronic archives etc, electronic archives can maintain their available ^ visuak understandable during their deadline ; meanwhile, to build the safe control of the system through the workers dispersed authorization and deterring skills, to formulate the standards of the protective system, such as the standard of the basic structure of united electronic records ^ electronic archives. all of this is important to protect the original and the reality of electronic records and electronic archives
「生命周期表」所記錄的內容將作為電子文件歸檔時檢驗原始性、真實性的唯一依據;電子文件歸檔管理層中的主要任務是要建立起嚴密的歸檔制度,同時結合「文件生命同期表」建立檢驗措施保證電子文件在歸檔過程中信息內容的原始性、真實性;電子檔案保管層中主要任務是建立電子檔案數據原始性、真實性檢驗及原始數據恢復管理措施,通過對電子檔案載體的維護、建立電子檔案維護管理的信息文檔等工作,確保在保管期限中的電子檔案保持其可用性、可存取性、可理解性:建立電子文件與電子檔案原始性、真實性保護體系安全控制,通過對系統工作人員授權分散化、建立用戶標識與認證技術等措施確保「保護體系」安全運行;加強「保護體系」涉及的標準與規范的制定工作,如建立統一的歸檔電于文件、電子檔案基本結構等標準對保護電子文件、電子檔案信息原始性、真實性有著重要意義。Signature and verification systems, such as ecdsa etc, the discuss about key exchange systems such as deffie - hellman systeme, etc. this thesis also discussed several applications and information safety products of the elliptic curve cryptosystems at the finite field too, such as digital signature, the group signature, the application in the smart card
Ecdsa等簽名驗證體制的選取, deffie - hellman等密鑰交換體制的研究。論文也討論了基於有限域上橢圓曲線公鑰密碼系統的若干應用和信息安全產品,如數字簽名,組簽名,在智能卡中的應用。My work exams the realization of rsa algorithm, explains some important steps and its security in detail and sign the assess file by rsa algorithm in real estate evaluation s < tem in the end
本文研究了rsa演算法的實現過程,並對其中的一些重要步驟及其安全性進行了詳細的討論。最後,在房地產評估系統中實現了通過用rsa演算法對評估報告進行數字簽名來驗證報告的合法性和可靠性。On the theoretical basis above, we achieve an secure electronic exchange system based ssl protocol, which use object - oriented programming design, cryptography technology and com technology. we put forward a new model - scm ( secure component model ) in our system design, which realizes a two levels authentication system by using user ' s password authentication and the public key cryptographic digital signature authentication together ; which realizes stronger and selectable encryption algorithms ; which realizes information integrity and non - repudiation. at the same time, we explore a new way which combine com and cryptography technology to implement secure electronic exchange
依據上述理論基礎,採用面向對象的程序設計方法,在ssl協議的基礎上,探索了利用com組件技術實現一個安全電子交易的二次加解密組件系統。在對系統的設計中提出了安全組件模型( scm ) ,該模型提供兩層認證機制和瀏覽器web服務器雙向身份鑒別。即第一通過用戶口令驗證;第二利用雙方的公鑰數字證書對握手連接信息進行數字簽名驗證。A coefficient of 0. 9 can be multiplied to ensure the safety of structures. by and large, the back covered porous brick wall with constructional column and gird beam has the same shearing strength under low circulated load as other porous brick wall, so the shear resistance and aseismatic capability can be calculated by the standard method. the experiment indicates that the back covered porous brick wall has good energy absorbing as well as deforming capability, and it can satisfy the requirement of aseismatic structures
盲孔多孔磚砌體的通縫抗剪強度略低於規范計算值,為保證結構安全,建議設計時乘以系數0 . 9 ;盲孔多孔磚墻片在低周反復荷載作用下抗剪承載力與其它多孔磚墻片基本相當,可按規范方法計算其抗震抗剪承載力;試驗證明帶構造柱及圈樑的盲孔多孔磚墻片有較好的吸能、變形能力,可以滿足抗震結構的要求。The ibm - pc computer can inspect and monitor the distant controller. ( 3 ) we used the counter and timer to improve the rate of success and the system containing error ability and avoid the infinite cycle when we design the serial communication software. moreover we adopt the checking out method
( 3 )在串列通訊軟體設計方面,採用了重復次數計數器和定時器,從而大大提高了通訊的成功率和系統的容錯能力並且避免了發生死鎖情況;在數據傳輸過程中,採用累加和的校驗方法,保證了系統傳輸的安全性、可靠性。In the function of the system realizes, the high - efficient quality and security that explain the remote data base access ( rda ) emphatically, and explain web safe practice of using procedure making and rda technology in detail. including, user authorize https, data base encrypt and batch treatment
在系統的功能實現上,著重闡述遠程數據庫訪問的高效性和安全性,並詳細講解所採用的web應用程序開發的安全技術和遠程數據庫訪問技術,包括用戶身份驗證( https ) 、數據庫加密及批處理等高效安全的網路開發技術。It is not always good at increased the cement ratio ; sometimes it is even harmed to the strength of the pile. the strength of the pile must matches the strengths of the origin soft foundation. improved fixing methods of strain meter and how to calculate the deformation modulus, the load transfer behavior of cement - soil pile, the compound foundation bearing capacity, pile - soil stress ratio with the increasing of the load are analyzed and studied
本文通過分析和試驗分析,提出樁間土天然地基承載力標準值的取值方法、樁間土承載力折減系數取值方法,這和實測結果很接近;並得出提高復合地基置換率是提高復合地基承載力有效途徑,並具體比較了單樁復合地基和三樁復合地基提高天然地基的承載力的數值,並驗證樁體強度應和天然軟基相匹配,指出盲目提高樁體強度是不可取的,有時甚至偏於不安全,這對于當前的建設是很有意義的。At the meantime, the rock mass may alternate between loading and unloading and it exists in certain kind of liquid, such as surface water, unconfined water, confined water etc for its intrinsic crannies. the practical rock mass concerned project must solve the key stability pr oblem after the understanding of the complicated mechanical characteristic and the deformation trends to guide the following project design and construction for the demand of security, economy, feasibility and validity. however, the intrinsic nonlinearness and complexity of the engineering rock mass become the main difficulty to predict the stability and deformation, the corresponding structure design must ensure enough safety with all the determinate or random force combination, so a model without the geometry distortion and constitutive equation warp is necessary to be built for the quantificational analysis of practical structure ' s stress, for the simulation of the real process and for the determinate evaluation system and optimization
由於實際工程巖體其固有的非線性和復雜性,使得求解對應的諸如其穩定性、變形等問題面臨較大的困難,而有關的工程結構的設計必須保證該結構在外來因素的作用下具有足夠的安全度、經濟性和合理性,這必然要求對巖體及其工程結構的受力與變形有一套量化評判體系和優化技術,抓住實際工程問題的本質特徵並建立可行的符合幾何模擬、本構模擬、受力模擬、過程模擬四原則的求解模型,通過該模型的數值模擬成果來指導巖體工程的設計、施工及運營、管理;而巖體結構面的存在使得基於傳統連續介質力學理論的理論分析和數值模擬面臨巨大的挑戰,物理模擬的試驗周期和成本也大大增加,而巖土體工程問題則成為典型的數據有限、了解程度有限類問題,這類問題的解決需要綜合應用理論分析、經驗判斷、物理模擬和數值模擬等方法,數值模擬可以完成目前許多技術手段無法完成的實驗,如參數控制,復雜條件下的邊界條件的處理,同時數值模擬具有高可重復性,且數值模擬的成本和人力開銷等遠低於物理模擬,因此研究巖土體工程問題的流形元數值模擬方法是一項具有理論和實際工程應用價值的重要課題。The main functions of the software include the conditions monitoring of the units and the performance analysis on line, for example, the calculation of the net coal consumption rate of thermal power plants, the net coal consumption rate of power supply, the efficiency of boiler, the efficiency of turbine and other significant index
該系統使用方便、靈活、功能強大、界面友好,並具有數據有效性檢驗和用戶安全驗證功能,具有豐富的報表、圖形界面來顯示計算分析結果。這套系統可以在線監測和分析機組的運行效率,包括發電煤耗、供電煤耗、鍋爐效率、汽輪機效率和廠用電率。In this thesis, can bus is used as the system bus, concentrating the research on the feasibility of using redundancy can bus technology in large - scale motor vehicle safety performance detecting & control system. this thesis first gives an overall design of the data collection and control system applied to the front end of a large - scale motor vehicle safety performance detecting & control system. regarding that the bus controller, bus driver and bus transfer medium would fail to function easily, the dual mode cold - redundancy structure is adopted in system to ensure the reliability
本文採用can總線作為系統總線,重點研究冗餘can總線技術應用於大型機動車安全性能測控系統的可行性並進行驗證:首先對基於冗餘can總線的機動車安全性能測控系統的前端數據採集與控制系統進行了總體設計,考慮到總線控制器、總線驅動器和總線介質都是容易出故障的部件,系統採用了二模冷冗餘結構來保障can總線通訊的可靠進行;其次,根據系統需要,設計了基於c8051f021的帶冗餘can總線通道的數據採集與控制模塊,用於採集與處理檢測現場的模擬信號和數字信號,並自行開發了can總線應用層協議以及應用軟體,通過冗餘can總線實現與上位機的可靠通訊;然後,為了驗證冗餘can總線設計方案的可行性,搭建試驗平臺並進行can總線故障切換的試驗;最後對課題的研究工作進行了總結與展望。The paper testified the application of the distributed database technology in the management information system by designing a system for a medical corporation as practical example in detail witch includes require analysis, devising function, designing distributed database, safety insurance and applying system
本文以某藥業公司的營銷管理平臺為例,通過系統的需求分析、功能設計、分散式數據庫設計、安全性保證和系統實施等五個方面詳細驗證了分散式數據庫技術在企業管理信息系統中的應用。In the first example, the safety factor of a dam is calculated and the results are found to be in good agreement with those obtained by using the bishop method
為驗證理論分析的正確性,首先計算了一座土壩的安全系數,並與傳統的bishop方法的計算結果進行比較,二者相當吻合。It can be used to measure mechanical and electrical parameters of relay ; because the reliability of electromagnetic relay is very important to the safe running of the control system, this paper introduces a reliability index for micro - electromagnetic relay. the compliance test - plan of success ratio for it is studied through the application of bayesian theory. the paper compares the methods of classical statistical theory and bayesian theory for making sampling plan of success ratio
此外,本文還介紹了由msc - 51單片機控制的繼電器參數測試系統的原理和方法,能對機械參數和電氣參數進行測試;由於電磁極化繼電器可靠性的高低將直接影響控制系統的安全運行,研究了用bayes理論設計電磁繼電器產品的成功率驗證實驗方案,並與經典方法設計的成功率驗證方案進行了比較,在特定的先驗信息下, bayes方案所需的樣本容量較小。This article starts with and dissertate these key technologies such as middle component, multimedia large object, connection and snap shop of database, data transactions of distributed databases, data security issue in distributed databases, data backup and recovery of databases and data audit in detail. the discussion would be done combining with some practical projects and previously developed systems from the software engineering point of view and achieve research results which had been applied and validated in the projects and systems
所以本文從這幾個關鍵技術入手,從軟體工程的角度出發,結合多個實際項目和以前開發的系統為基礎,從系統設計的基本思想、思路出發,結合一些基本依據分別以組件中間件、多媒體大數據對象、數據庫的鏈接與快照、分散式數據庫數據的處理、分散式數據庫數據的安全問題、數據庫的備份和恢復以及數據審計等具體問題進行比較詳細的論述,並且將得到研究結果在項目和系統中予以實現加以驗證。In the field of verifying digital - cash, no good logic model describing and verifying a digital cash protocol has been brought forward either abroad or at home. in this background, the contents and purpose of my researches are to design a secure digital - cash protocol, devising a simple e - dealing system and building a logic model
數字現金安全分析方面國內外都沒有一個能夠嚴格描述和驗證數字現金協議的邏輯模型,基於這種背景,本課題的研究目的是設計一個安全的數字現金協議,實現一個簡易電子交易系統來展示該協議的思想,並建立一個邏輯模型來形式化描述該協議且對其進行安全性分析。The fundamental principles in the design of a wlan security protocols are summed up from the experience and lessons of the protocols in existence, and a new systemic structure is presented to provide security in wlan, which is based on the fundamental topological structure of infrastructure. the design includes three main modules, i. e. encryption and data integrality, key management, and identification authentication
本文總結已有協議的設計經驗和教訓以及國內外的先進技術,歸納了設計無線局域網安全協議的基本要求和原則,並提出了一種新的無線局域網安全系統體系結構,該體系結構基於有中心的無線局域網拓撲結構,包含了數據加密和完整性認證、密鑰管理和身份認證三個基本模塊。Secondly, safety factor of a landslide body with a polygonal sliding surface is analyzed in this paper. the results demonstrate that this method can consider that the different material stiffness parameters in the landslide body have an effect on the safety factor. finally, the safety factor of a three - dimension landslide body with a spherical sliding surface is calculated with this method, and the applicability of this method for three - dimension slope is verified after comparing the result with theoretical answer
文中首先用具有理論解的算例? ?垂直坡受集中荷載的安全系數問題驗證了該方法的正確性,再通過對一個具有折線滑動面的滑坡體的安全系數的分析說明了該方法還可以考慮塌滑體內不同的材料剛度參數對安全系數的影響,之後用該方法對一個具有球形滑裂面的三維滑坡體進行了計算,通過與閉合解的比較驗證了該方法對三維邊坡問題的適用性。分享友人