practical security 中文意思是什麼

practical security 解釋
實際保密度
  • practical : adj 1 實地的,事實上的,實際上的 (opp theoretical)。2 實踐的,實地經驗過的,練習過的,經驗豐富...
  • security : n 1 安全(感);安穩;穩妥;平安。2 確實;確信;把握;可靠性;安心。3 【軍事】防禦物。4 保護;防...
  1. Police legal education reform and practical education mode on the application of clinique teaching in public security legal education

    論診所式教學法在公安法學教學中的運用
  2. Secondly, the csto has accumulated a quite good experience of practical cooperation in the spheres of foreign policy and of combating terrorism and the narco - threat. all this enables the organization to take a leading position in questions of security and encourage military - political cooperation in the post - soviet space, uniting around itself other interested countries of the region

    雙方一致認為,在新的國際安全形勢下,切實維護全球戰略穩定,積極促進裁軍進程和加強多邊軍控,有效防止大規模殺傷性武器及其運載工具的擴散,符合所有國家的利益。
  3. Resemble with the digital watermark methods of the other media such as still image and video, digital audio watermark must account for some problems which consist of perceptual transparency, data bit rate, robustness, security and real - time etc. the robustness of watermark is vital to the practical application, which requires the watermark providing with significant data since it suffered from some intended attacks or unintended revisal

    與靜態圖像、視頻等數字水印方法類似,音頻水印的研究主要須解決感知透明性、數據嵌入率、魯棒性、安全性以及實時性等問題。水印演算法的魯棒性對于實際應用來說是至關重要的,它要求數字水印在遭受有意的攻擊或無意的修改後,仍能提供有意義的數據,這一性能對版權保護的應用顯得尤為突出。
  4. He may put experienced reformists in central positions, appoint practical, broadminded types as foreign - policy advisers, and strengthen the office of the prime minister ( he favours the creation of an american - style national security council )

    他也許會讓有經驗的改革派擔任要職,指定務實靈活型人物擔任外交政策顧問,增加首相的權力(他鐘情于建立一個美式的國家安全委員會) 。
  5. Having fully absorbed the former researching results, f " abrega, herzog and guttman brought forward a kind of formal method named strand space, which is a practical, intuitive and strict one for security protocols analysis. the model uses a kind of order graph between its nodes existing casual relationship to represent protocol executions

    串空間( strandspace )模型由f ' abrega 、 herzog和guttman三人提出,它是分析安全協議的一種實用、直觀和嚴格的形式化方法,它充分吸收了前人的研究成果,模型使用一種節點間存在因果關系的有向圖來表示協議的運行。
  6. Currently, the army is developping military network based oa project with effort among which military email transferring system is an essential application module. this paper proposed a data model of military email transferring as well as detailed design scheme according to the potential threat in email service system, practical condition of current military network and official model as well as document transferring process. it discussed the security requirement of military email transferring system in detail as well as analyzed and design relevent data model, mail exchange protocol and application requirement of cryptogram management

    該文針對電子郵件服務系統中存在的安全隱患,基於對目前國內外電子郵件安全技術的分析研究,立足於現有軍事計算機網路的實際現狀,根據目前軍隊的辦公模式、公文傳輸流程,提出了一種適合於軍隊辦公自動化中軍用電子郵件傳輸的數據模型及具體的設計方案,詳細討論了軍用電子郵件傳輸系統的安全服務需求,對相關的數據模型、郵件交換協議、密碼管理的應用需求等進行了詳細的分析和設計。
  7. Concentrating on security analysis and design of block ciphers, five principal achievements have been obtained in this dissertation : 1. using differential - nonlinear cryptanalysis, truncated differential - linear cryptanalysis and integral cryptanalysis respectively, three attacks of reduced - round safer + + are given ; 2. based on the survey of provable security and practical security of block ciphers, a block cipher model of spn cipher containing feistel structure is proposed

    分別利用差分-非線性密碼分析、截斷差分-線性密碼分析、積分密碼分析三種不同的密碼分析方法,對safer + +進行了密碼分析; 2在對分組密碼的可證明安全性和實際安全性研究的基礎上,提出了一個嵌套feistd結構的sp型分組密碼的模型。
  8. In this paper, the belief logic system gny and it ' s related implementation tool spearii are utilized, ssl protocol is a focused instance, then the detailed analysis procedure from initial protocol model to various evolution protocol models is given, later the final evolution protocol model and ssl protocol are contrasted and thus the security analysis conclusion is drawn for ssl. during the analysis procedure two practical security authentication solutions are designed based on evolution protocol models

    本文採用著名的信念邏輯gny邏輯系統及其相關的形式化工具spear ,以ssl協議為分析實例,詳細闡述了從初始協議模型到各個進化協議模型的分析過程,並將最終的進化模型與ssl協議作比較,給出ssl協議的安全分析,同時在分析過程中以協議模型為基礎設計了兩個實用的安全認證方案。
  9. For farther research in practical status and birth mechanism of information man - oeuvre rent seeking, the thesis usees decision - making and game theory to build gamemodel, linking to character of information manoeuvre rent seeking and adding some hypothesis and parameter. use typical sampling with punish decision from security monitor committee of china, and do positive research, result shows that from those years information manoeuvre rent seekings in china have been in a high frequency state, many prescripts of < security law > have not been enforced well on checking of lawless cases, degree of punish cant hold back the information manoeuvre rent - seek - ing impulsing. at the effective monitor of stock market, not only probability of check is low, but rate of succeed is low too

    實證研究結果表明,近年來,我國證券市場的信息操縱行為處于高頻率狀態, 《證券法》的有關處罰規定在現實中沒有得到嚴格的實施,懲罰力度不足以有效遏止市場的尋租沖動,在市場有效監管上,不僅稽查的概率偏低,而且稽查的成功率也有待提高,合理改進稽查概率、稽查成功率、懲罰力度、中小投資者抗租能力等相關參數,是提高市場效率的有效途徑。
  10. The clearness and solidification of bushism concept, system and practical operation, have provided the writer with the evidence and stable coordinate as follows : to reveal the essiential content of bushism from the us multicultural and multipolitical angel and through this crack to dissect directionally the trend and reasons of bush government al asia - pacific strategy, then further to find out the way of decomposition and combination of the political powers in asia - pacific region, accordingly re - structure the new system of the security pattern in asia - pacific region

    「小布希主義」的理念、體系和實踐運作的明朗化和凝固化,為作者如下研究工作提供了必要的證據和穩定的坐標,即從美國的多元文化和多元政治結構人手揭示「小布希主義」的內在本質,並以此為切口對其亞太戰略動向和原因進行定向解剖,進而探囊取物,以國家和跨國家集團為單位尋找亞太地區政治力量的分解組合方式並由此重構亞太地區安全格局的新體制。
  11. This thesis adopts vfp database manage system ( dbms ), oo ( object oriented ) programming and sas statistic analysis software. starting with the impacting factors on cocoon - cooking technique of filature production, the system analyzes diversified data information, along with the relativity of various parameters used in technical designing. based on those, we scheme out the structure composing and system flow chart of cocoon - cooking problem - consulting, also develop maintainable and practical technological designing subsystem with friendly interface, simple operation and fine security

    本課題採用vfp數據庫管理系統開發技術和面向對象的編程技術及sasrelease6 . 12統計分析軟體,採用關系數據模型,從繅絲生產中煮繭工藝過程的相關影響因素入手,充分分析影響煮繭的各種數據信息,以及在工藝設計中用到的各類參數的相關性,在此基礎上設計出煮繭問題咨詢子系統的結構組成和系統流程圖,進而研製具有良好界面,操作簡便,安全性好,實用且可維護的工藝設計子系統,以建立一個完善的煮繭工藝設計專家系統( cctdes ) 。
  12. The core issue i " d like to discuss in this paper is the thesis that " cooperative security " is the rational choice of the security patterns in the asia - pacific area after the cold war. the following are my reasons : from the practical perspective, asean regional forum ( arf ) is the first and the only pan - regionally official " cooperative security " organization emerged in the asia - pacific area after the cold war. and it has made great contribution to the asia - pacific security : firstly, arf is the product of the asean ' s new security concept and strategy, which is in accord with the maintenance of national and regional security interest for asean and most of the states in this area ; secondly, the appearance of arf also conforms to the subjective and objective needs of big powers ; thirdly, the method to resolve the security problems by dialogue and cooperation, the building of confidence - building measures and the launching of the preventive diplomacy in arf have enhanced mutual understanding and mutual trust among asia - pacific countries

    本文要論證的中心問題就是, 「合作安全」是冷戰后亞太地區安全模式的理性選擇,理由如下:首先,從實踐的角度看, 「東盟地區論壇( arf ) 」是冷戰后亞太地區出現的第一個,也是迄今為止唯一的一個泛地區官方「合作安全」組織,它在發揮維護冷戰后亞太地區安全方面起到了重要的作用和收到了良好的績效:第一, arf是冷戰后東盟國家新的安全觀念和以此為指導的新的安全戰略的產物,它符合東盟國家及絕大多數發展中國家保持本國及整個亞太地區安全與穩定的利益;第二, arf的出現符合亞太地區大國的主觀訴求和客觀需要;第三, arf以對話、合作解決安全問題的方式及它的信心建立措施和預防性外交的開展為亞太地區國家之間增進相互理解和信任起到了積極的作用,有利於冷戰后的亞太國家走出「安全困境」 ,實現真正意義上的普遍安全。
  13. Optimal power flow is an analyzing and optimizing method of power networks, considering economy and security at the same time. it has been widely applied to secure operation, economic dispatch, energy management and pricing of electric power, etc. with the fast development of power market, the importance of practical uses of opf is standing out increasingly

    最優潮流( opf )是一種同時考慮經濟性和安全性的電力網路分析和優化方法,在電力系統的安全運行、經濟調度、可靠性分析、能量管理以及電力定價等方面得到了廣泛的應用。
  14. The approach has definite theoretical significance, and has better practical values for information, communication and network security

    本研究具有一定的理論意義,它對于信息安全、通信保密以及網路安全具有較好的實際意義。
  15. Secondly, system design and architecture for network security part of practical project are introduced. finally, building scheme and implementation of ipsec security gateway and vpn system supported by linux operation system is put forward after ipsec protocol research and analysis

    其次介紹了四川省物價局縱向網網路工程中網路安全部分的體系設計及架構,最後通過研究和分析ipsec協議,提出了linux操作系統下ipsec安全網關和vpn系統的構建方案。
  16. The research on airspace management and evaluation system will lay a substantial academic and pratical foundation for ensuring air traffic security and making sufficient and effective use of airspace resource, and it has important social effect and practical value

    對空域管理與評估系統進行研究,將為保障空中交通安全和充分有效地利用有限的空域資源奠定堅實的理論和實踐基礎,具有重大的社會意義和實用價值。
  17. Abstract : this paper introduces some practical security models and their actions and characteristics

    文摘:介紹信息安全模型的作用和特徵以及幾種目前比較實用的安全模型。
  18. Security administrator can make flexible combinations of security modules according to practical security requirements, and administrate the system remotely by using graphical interfaces

    其基於電子證書的身份認證、可根據實際需要對安全模塊進行靈活配置、遠程管理等功能尤為突出。
  19. It is observed that the system has high practical security, fast encryption ( decryption ) speed and excellent reliability against strong channel noise, and its overall cryptographic properties are considerably better than known chaotic cryptosystems

    研究表明,該系統具有高安全性、快加密(解密)速度和強抗通道噪聲能力,它的密碼性質優于所有已知的混沌密碼系統。
  20. In the end, a reliable and practical security policy, in which container based declarative security is dominant and programmatic security is complementary, is given respectively to the web tier, ejb tier and eis tier of the system according to the system framework and deployment environment

    最後還結合系統框架和部署環境分別針對j2ee的網路層、 ejb層和eis層的不同情況制定了以基於容器的聲明性安全為主,以可編程性安全為補充的安全策略。
分享友人