驗證安全系數 的英文怎麼說

中文拼音 [yànzhèngānquánshǔ]
驗證安全系數 英文
proof factor
  • : 動詞1. (察看; 查考) examine; check; test 2. (產生預期的效果) prove effective; produce the expected result
  • : Ⅰ動詞(證明) prove; verify; demonstrate Ⅱ名詞1 (證據) evidence; proof; testimony; witness 2 (...
  • : Ⅰ形容詞1 (完備; 齊全) complete 2 (整個) whole; entire; full; total Ⅱ副詞(完全; 都) entirely...
  • : 系動詞(打結; 扣) tie; fasten; do up; button up
  • : 數副詞(屢次) frequently; repeatedly
  • 驗證 : test and verify; checking; proving; testing; confirmation; [數學] corroboration; inspection; veri...
  • 系數 : [數學] coefficient; ratio; modulus; quotient; factor
  1. Network forensics is an important extension to present security infrastructure, and is becoming the research focus of forensic investigators and network security researchers. however many challenges still exist in conducting network forensics : the sheer amount of data generated by the network ; the comprehensibility of evidences extracted from collected data ; the efficiency of evidence analysis methods, etc. against above challenges, by taking the advantage of both the great learning capability and the comprehensibility of the analyzed results of decision tree technology and fuzzy logic, the researcher develops a fuzzy decision tree based network forensics system to aid an investigator in analyzing computer crime in network environments and automatically extract digital evidence. at the end of the paper, the experimental comparison results between our proposed method and other popular methods are presented. experimental results show that the system can classify most kinds of events ( 91. 16 ? correct classification rate on average ), provide analyzed and comprehensible information for a forensic expert and automate or semi - automate the process of forensic analysis

    網路取是對現有網路的必要擴展,已日益成為研究的重點.但目前在進行網路取時仍存在很多挑戰:如網路產生的海量據;從已收集據中提取的據的可理解性;據分析方法的有效性等.針對上述問題,利用模糊決策樹技術強大的學習能力及其分析結果的易理解性,開發了一種基於模糊決策樹的網路取分析統,以協助網路取人員在網路環境下對計算機犯罪事件進行取分析.給出了該方法的實結果以及與現有方法的對照分析結果.實結果表明,該統可以對大多網路事件進行識別(平均正確分類率為91 . 16 ? ) ,能為網路取人員提供可理解的信息,協助取人員進行快速高效的據分析
  2. Secondly, the fu yang lailong mountain slope failure was introduced. the factors influcing the slope stability were analysed and the calculated results were compared with those obtained by insitu monitoring. finally, some conclutions were obtained, which are important to engineering application

    本文結合富陽來龍山滑坡的工程實例,介紹了來龍山滑坡的概況,分析了滑坡產生的成因、滑坡要素及監測情況,並用極限平衡法和有限元法分別進行了的計算與分析,提出並了自己的觀點。
  3. The table will write down all about the electronic records during their life period. the content noted in the table will be the only basis on original and reality " testing of electronic records ". the major task of the second levels is to build the tight filing rules, moreover, combined the " life cycle table ", to build the test system to assure the original and the reality of the information during filing ; the assignment of the third level is to build testing and restoring measures of the original and the reality. by maintaining the media of electronic archives or building information file of electronic archives etc, electronic archives can maintain their available ^ visuak understandable during their deadline ; meanwhile, to build the safe control of the system through the workers dispersed authorization and deterring skills, to formulate the standards of the protective system, such as the standard of the basic structure of united electronic records ^ electronic archives. all of this is important to protect the original and the reality of electronic records and electronic archives

    「生命周期表」所記錄的內容將作為電子文件歸檔時檢原始性、真實性的唯一依據;電子文件歸檔管理層中的主要任務是要建立起嚴密的歸檔制度,同時結合「文件生命同期表」建立檢措施保電子文件在歸檔過程中信息內容的原始性、真實性;電子檔案保管層中主要任務是建立電子檔案據原始性、真實性檢及原始據恢復管理措施,通過對電子檔案載體的維護、建立電子檔案維護管理的信息文檔等工作,確保在保管期限中的電子檔案保持其可用性、可存取性、可理解性:建立電子文件與電子檔案原始性、真實性保護體控制,通過對統工作人員授權分散化、建立用戶標識與認技術等措施確保「保護體運行;加強「保護體」涉及的標準與規范的制定工作,如建立統一的歸檔電于文件、電子檔案基本結構等標準對保護電子文件、電子檔案信息原始性、真實性有著重要意義。
  4. Signature and verification systems, such as ecdsa etc, the discuss about key exchange systems such as deffie - hellman systeme, etc. this thesis also discussed several applications and information safety products of the elliptic curve cryptosystems at the finite field too, such as digital signature, the group signature, the application in the smart card

    Ecdsa等簽名體制的選取, deffie - hellman等密鑰交換體制的研究。論文也討論了基於有限域上橢圓曲線公鑰密碼統的若干應用和信息產品,如字簽名,組簽名,在智能卡中的應用。
  5. My work exams the realization of rsa algorithm, explains some important steps and its security in detail and sign the assess file by rsa algorithm in real estate evaluation s < tem in the end

    本文研究了rsa演算法的實現過程,並對其中的一些重要步驟及其性進行了詳細的討論。最後,在房地產評估統中實現了通過用rsa演算法對評估報告進行字簽名來報告的合法性和可靠性。
  6. On the theoretical basis above, we achieve an secure electronic exchange system based ssl protocol, which use object - oriented programming design, cryptography technology and com technology. we put forward a new model - scm ( secure component model ) in our system design, which realizes a two levels authentication system by using user ' s password authentication and the public key cryptographic digital signature authentication together ; which realizes stronger and selectable encryption algorithms ; which realizes information integrity and non - repudiation. at the same time, we explore a new way which combine com and cryptography technology to implement secure electronic exchange

    依據上述理論基礎,採用面向對象的程序設計方法,在ssl協議的基礎上,探索了利用com組件技術實現一個電子交易的二次加解密組件統。在對統的設計中提出了組件模型( scm ) ,該模型提供兩層認機制和瀏覽器web服務器雙向身份鑒別。即第一通過用戶口令;第二利用雙方的公鑰書對握手連接信息進行字簽名
  7. A coefficient of 0. 9 can be multiplied to ensure the safety of structures. by and large, the back covered porous brick wall with constructional column and gird beam has the same shearing strength under low circulated load as other porous brick wall, so the shear resistance and aseismatic capability can be calculated by the standard method. the experiment indicates that the back covered porous brick wall has good energy absorbing as well as deforming capability, and it can satisfy the requirement of aseismatic structures

    盲孔多孔磚砌體的通縫抗剪強度略低於規范計算值,為保結構,建議設計時乘以0 . 9 ;盲孔多孔磚墻片在低周反復荷載作用下抗剪承載力與其它多孔磚墻片基本相當,可按規范方法計算其抗震抗剪承載力;試明帶構造柱及圈樑的盲孔多孔磚墻片有較好的吸能、變形能力,可以滿足抗震結構的要求。
  8. The ibm - pc computer can inspect and monitor the distant controller. ( 3 ) we used the counter and timer to improve the rate of success and the system containing error ability and avoid the infinite cycle when we design the serial communication software. moreover we adopt the checking out method

    ( 3 )在串列通訊軟體設計方面,採用了重復次器和定時器,從而大大提高了通訊的成功率和統的容錯能力並且避免了發生死鎖情況;在據傳輸過程中,採用累加和的校方法,保統傳輸的性、可靠性。
  9. In the function of the system realizes, the high - efficient quality and security that explain the remote data base access ( rda ) emphatically, and explain web safe practice of using procedure making and rda technology in detail. including, user authorize https, data base encrypt and batch treatment

    統的功能實現上,著重闡述遠程據庫訪問的高效性和性,並詳細講解所採用的web應用程序開發的技術和遠程據庫訪問技術,包括用戶身份( https ) 、據庫加密及批處理等高效的網路開發技術。
  10. It is not always good at increased the cement ratio ; sometimes it is even harmed to the strength of the pile. the strength of the pile must matches the strengths of the origin soft foundation. improved fixing methods of strain meter and how to calculate the deformation modulus, the load transfer behavior of cement - soil pile, the compound foundation bearing capacity, pile - soil stress ratio with the increasing of the load are analyzed and studied

    本文通過分析和試分析,提出樁間土天然地基承載力標準值的取值方法、樁間土承載力折減取值方法,這和實測結果很接近;並得出提高復合地基置換率是提高復合地基承載力有效途徑,並具體比較了單樁復合地基和三樁復合地基提高天然地基的承載力的值,並樁體強度應和天然軟基相匹配,指出盲目提高樁體強度是不可取的,有時甚至偏於不,這對于當前的建設是很有意義的。
  11. At the meantime, the rock mass may alternate between loading and unloading and it exists in certain kind of liquid, such as surface water, unconfined water, confined water etc for its intrinsic crannies. the practical rock mass concerned project must solve the key stability pr oblem after the understanding of the complicated mechanical characteristic and the deformation trends to guide the following project design and construction for the demand of security, economy, feasibility and validity. however, the intrinsic nonlinearness and complexity of the engineering rock mass become the main difficulty to predict the stability and deformation, the corresponding structure design must ensure enough safety with all the determinate or random force combination, so a model without the geometry distortion and constitutive equation warp is necessary to be built for the quantificational analysis of practical structure ' s stress, for the simulation of the real process and for the determinate evaluation system and optimization

    由於實際工程巖體其固有的非線性和復雜性,使得求解對應的諸如其穩定性、變形等問題面臨較大的困難,而有關的工程結構的設計必須保該結構在外來因素的作用下具有足夠的度、經濟性和合理性,這必然要求對巖體及其工程結構的受力與變形有一套量化評判體和優化技術,抓住實際工程問題的本質特徵並建立可行的符合幾何模擬、本構模擬、受力模擬、過程模擬四原則的求解模型,通過該模型的值模擬成果來指導巖體工程的設計、施工及運營、管理;而巖體結構面的存在使得基於傳統連續介質力學理論的理論分析和值模擬面臨巨大的挑戰,物理模擬的試周期和成本也大大增加,而巖土體工程問題則成為典型的據有限、了解程度有限類問題,這類問題的解決需要綜合應用理論分析、經判斷、物理模擬和值模擬等方法,值模擬可以完成目前許多技術手段無法完成的實,如參控制,復雜條件下的邊界條件的處理,同時值模擬具有高可重復性,且值模擬的成本和人力開銷等遠低於物理模擬,因此研究巖土體工程問題的流形元值模擬方法是一項具有理論和實際工程應用價值的重要課題。
  12. The main functions of the software include the conditions monitoring of the units and the performance analysis on line, for example, the calculation of the net coal consumption rate of thermal power plants, the net coal consumption rate of power supply, the efficiency of boiler, the efficiency of turbine and other significant index

    統使用方便、靈活、功能強大、界面友好,並具有據有效性檢和用戶功能,具有豐富的報表、圖形界面來顯示計算分析結果。這套統可以在線監測和分析機組的運行效率,包括發電煤耗、供電煤耗、鍋爐效率、汽輪機效率和廠用電率。
  13. In this thesis, can bus is used as the system bus, concentrating the research on the feasibility of using redundancy can bus technology in large - scale motor vehicle safety performance detecting & control system. this thesis first gives an overall design of the data collection and control system applied to the front end of a large - scale motor vehicle safety performance detecting & control system. regarding that the bus controller, bus driver and bus transfer medium would fail to function easily, the dual mode cold - redundancy structure is adopted in system to ensure the reliability

    本文採用can總線作為統總線,重點研究冗餘can總線技術應用於大型機動車性能測控統的可行性並進行:首先對基於冗餘can總線的機動車性能測控統的前端據採集與控制統進行了總體設計,考慮到總線控制器、總線驅動器和總線介質都是容易出故障的部件,統採用了二模冷冗餘結構來保障can總線通訊的可靠進行;其次,根據統需要,設計了基於c8051f021的帶冗餘can總線通道的據採集與控制模塊,用於採集與處理檢測現場的模擬信號和字信號,並自行開發了can總線應用層協議以及應用軟體,通過冗餘can總線實現與上位機的可靠通訊;然後,為了冗餘can總線設計方案的可行性,搭建試平臺並進行can總線故障切換的試;最後對課題的研究工作進行了總結與展望。
  14. The paper testified the application of the distributed database technology in the management information system by designing a system for a medical corporation as practical example in detail witch includes require analysis, devising function, designing distributed database, safety insurance and applying system

    本文以某藥業公司的營銷管理平臺為例,通過統的需求分析、功能設計、分散式據庫設計、性保統實施等五個方面詳細了分散式據庫技術在企業管理信息統中的應用。
  15. In the first example, the safety factor of a dam is calculated and the results are found to be in good agreement with those obtained by using the bishop method

    理論分析的正確性,首先計算了一座土壩的,並與傳統的bishop方法的計算結果進行比較,二者相當吻合。
  16. It can be used to measure mechanical and electrical parameters of relay ; because the reliability of electromagnetic relay is very important to the safe running of the control system, this paper introduces a reliability index for micro - electromagnetic relay. the compliance test - plan of success ratio for it is studied through the application of bayesian theory. the paper compares the methods of classical statistical theory and bayesian theory for making sampling plan of success ratio

    此外,本文還介紹了由msc - 51單片機控制的繼電器參測試統的原理和方法,能對機械參和電氣參進行測試;由於電磁極化繼電器可靠性的高低將直接影響控制統的運行,研究了用bayes理論設計電磁繼電器產品的成功率方案,並與經典方法設計的成功率方案進行了比較,在特定的先信息下, bayes方案所需的樣本容量較小。
  17. This article starts with and dissertate these key technologies such as middle component, multimedia large object, connection and snap shop of database, data transactions of distributed databases, data security issue in distributed databases, data backup and recovery of databases and data audit in detail. the discussion would be done combining with some practical projects and previously developed systems from the software engineering point of view and achieve research results which had been applied and validated in the projects and systems

    所以本文從這幾個關鍵技術入手,從軟體工程的角度出發,結合多個實際項目和以前開發的統為基礎,從統設計的基本思想、思路出發,結合一些基本依據分別以組件中間件、多媒體大據對象、據庫的鏈接與快照、分散式據庫據的處理、分散式據庫據的問題、據庫的備份和恢復以及據審計等具體問題進行比較詳細的論述,並且將得到研究結果在項目和統中予以實現加以
  18. In the field of verifying digital - cash, no good logic model describing and verifying a digital cash protocol has been brought forward either abroad or at home. in this background, the contents and purpose of my researches are to design a secure digital - cash protocol, devising a simple e - dealing system and building a logic model

    字現金分析方面國內外都沒有一個能夠嚴格描述和字現金協議的邏輯模型,基於這種背景,本課題的研究目的是設計一個字現金協議,實現一個簡易電子交易統來展示該協議的思想,並建立一個邏輯模型來形式化描述該協議且對其進行性分析。
  19. The fundamental principles in the design of a wlan security protocols are summed up from the experience and lessons of the protocols in existence, and a new systemic structure is presented to provide security in wlan, which is based on the fundamental topological structure of infrastructure. the design includes three main modules, i. e. encryption and data integrality, key management, and identification authentication

    本文總結已有協議的設計經和教訓以及國內外的先進技術,歸納了設計無線局域網協議的基本要求和原則,並提出了一種新的無線局域網統體結構,該體結構基於有中心的無線局域網拓撲結構,包含了據加密和完整性認、密鑰管理和身份認三個基本模塊。
  20. Secondly, safety factor of a landslide body with a polygonal sliding surface is analyzed in this paper. the results demonstrate that this method can consider that the different material stiffness parameters in the landslide body have an effect on the safety factor. finally, the safety factor of a three - dimension landslide body with a spherical sliding surface is calculated with this method, and the applicability of this method for three - dimension slope is verified after comparing the result with theoretical answer

    文中首先用具有理論解的算例? ?垂直坡受集中荷載的問題了該方法的正確性,再通過對一個具有折線滑動面的滑坡體的的分析說明了該方法還可以考慮塌滑體內不同的材料剛度參的影響,之後用該方法對一個具有球形滑裂面的三維滑坡體進行了計算,通過與閉合解的比較了該方法對三維邊坡問題的適用性。
分享友人