secure information 中文意思是什麼

secure information 解釋
安全信息
  • secure : adj ( curer; curest)1 安心的;不必擔心的;有把握的。 2 可靠的。3 安全的。4 堅固的;牢固的。5 必...
  • information : n. 1. 通知,通報,報告。2. 報導,消息,情報。3. 資料,知識,學識。4. 【自動化】信息,數據。5. 【法律】起訴,告發。adj. -al
  1. The watermark algovithm can resist the physical transfer of printing and scanning by applying techniques such as fixation normalization mutually which can secure the embedding position, chaotic encipher encryption, multipassage embedding and so on. what ’ s more, the watermark designed in this essay is binary image. it can bear a large amount of information

    本文綜合運用了歸一化相關確定嵌入位置、混沌加密、多通道嵌入等技術,使得本文所設計的水印演算法能夠抵抗印刷和掃描的物理轉換過程,同時本文所採用的水印是二值圖像,能夠承載大量的信息。
  2. Home automation is a combination of the modern computer technology, auto - control technology, communication technology, multimedia technology and modern architecture art by controlling the home devices and managing the information resource, home automation not only can give the services of information and the secure, comfortable and convenient environment but also can meet the need of the fast development of the information technology

    家庭自動化是指運用現代計算機技術、自動控制技術、通信技術、多媒體技術和現代的建築藝術相結合,通過對機電設備的自動控制,對信息資源的管理,向用戶提供信息服務及安全、舒適、便利的環境服務,適合當今信息技術高速發展需求特點的一種技術。
  3. Secure model of e business information based on internet

    的電子商務信息安全模型
  4. Encryption technology allows secure transmittal of information along the internet by encoding the transmitted data using a mathematical formula that scrambles the data

    加密技術通過數學公式對傳輸的數據進行編碼加密,從而使信息能夠安全地在網上傳輸。
  5. Information technology - identification cards - integrated circuit cards with contacts - part 4 : interindustry commands for interchange amendment 1 : impact of secure messaging on the structures of apdu messages

    信息技術.識別卡.帶觸點的集成電路卡.第4部分:用於交換的行業間命令.修改件1 :安全發送電文對apdu電文的影響
  6. Nothing contained in this section shall limit the authority of the assistant attorney general or the federal trade commission to secure at any time from any person documentary material, oral testimony, or other information under the antitrust civil process act [ 15 u. s. c. a. 1311 et seq. ], the federal trade commission act [ 15 u. s. c. a. 41 et seq. ], or any other provision of law

    本節規定不限制聯邦貿易委員會,司法部長助理隨時依據《反托拉斯民事訴訟法》 , 《聯邦貿易委員會法》或其它法律規定,向任何人隨時獲取文件性材料、口頭證據或其它信息。
  7. The design thoughts of the cdsp is seen through the development process. the user ' s requirements are met by the implementation of the information encryption, concealing and secure transmission.

    在開發過程中,充分運用了信息保密安全平臺的設計思想,從信息保密、信息隱藏和信息安全傳輸等幾個方面實現了用戶的需求,具有較高的實用價值。
  8. This is especially important in a hosting scenario where a custom site - map provider, if not implemented correctly, could leak information or contain default configuration settings that are not secure

    在宿主方案中,這一點尤其重要,因為如果沒有正確實現,自定義站點地圖提供程序可能會泄露某些信息,或包含不安全的默認配置設置。
  9. Because of these, our research group proposes an infrastructure for managing and controlling social behavior of agents ( imcsba ), which aims at adopting the policy - driven institution with the form of social - sector / federation as main line, and from five dimensions : explicitness of semantics for information content, systematization of mediate service for agents, rationality of negotiation process for agents, legality of behavior standard for agents, and individualization for adjusting agent service, providing agents with open, multi - dimensional, systematic, secure, and easy - to - transparently - adjust environment for social activities, in order to support the efficient development of social intelligence of agents

    為此,本課題組提出了開發管控agent社交行為的基礎結構imcsba ,旨在以社區聯邦式的政策導向型agent社會體制為主線,從五維:信息內容語義的清晰化、 agent中介服務的體系化、 agent協商過程的理性化、 agent行為規范的法制化和agent服務調控的個性化,給agent提供開放式、多方位、系統化、安全的、且易於人透明調控的社交活動環境,去支持agent社交智能的高效開發。
  10. 1. keeps your information secure via fingerprint for authentication

    1 .透過指紋識別毋須密碼輸入
  11. Entering the information era, dynamic defense in network environment is trending up gradually ; meanwhile secure protection is now turning into depth and dynamic defense from static defense

    步入信息時代,網路對抗環境中的動態防禦趨勢逐步加強,安全防護經歷了從靜態保護到縱深防禦和動態防禦的發展。
  12. The technology of compression of the rf synchronous information is comparatively low and secure and it can also produce high quality descrambling signals

    射頻行同步信號抑制的加解擾技術成本較低,技術比較成熟,電路實現也較為簡單。
  13. As always, any personally identifying information that you submit will remain secure and will never be transmitted to any third party

    像往常一樣,您交上的所有個人鑒定資料系受安全保管的及不會給第三者傳遞。
  14. If the page you are currently viewing is secure, information about its privacy certificate will be shown below

    如果您目前查看的頁受到保護,其私人證書將顯示在下面。
  15. Electrical equipment on - line monitoring four - layer secure information system based on b s

    結構的電力設備在線監測四層安全信息系統
  16. ( 2 ) the study of load balancing based on web server cluster. the paper outlined the main characteristics, and analyzed the famous scheduling policies for web server cluster in the world. the paper give one improved algorithm on lard, it can better balance the load, and provided a trace - driven simulation. ( 3 ) the paper provided a content - based request distribution, classify web service into two main categories : web publishing ( providing static information and lightly dynamic request ) and web transaction ( providing dynamic content generated from database queries and secure information )

    ( 2 )針對web服務器集群負載平衡技術進行研究,總結了web服務器集群負載平衡技術的核心問題;分析了當前的主要請求調度演算法,並給出了一種對經典lard演算法的改進調度演算法,模擬試驗表明改進演算法具有良好的適應性;設計了一個基於離散事件模擬的請求調度演算法模擬程序用於驗證提出的調度策略。
  17. This article introduces the secure information transmission system ( sit - tls ) developed by the author

    本文介紹了作者設計開發的安全信息傳輸系統sit - tls 。
  18. A real portable secure information security device at a retail price hk $ 250

    一個真正便攜式的數據安全設備。零售價為港幣二百五十元。
  19. That script, since it is running inside the web browser from the site, has access to secure information, such as the user s cookies

    那段腳本由於來自該站點,並在web瀏覽器內部運行,所以可以訪問安全信息,例如用戶cookie 。
  20. 6. how to support multi - policies in secure information systems was a research hotspot in recent years. in this paper, fmp studies were divided systematically in three classes : based on policy language, based on security attributes and based on uniformed security model

    提出「基於政策描述語言」 、 「基於安全屬性」和「基於統一模型」的分類方法,首次對國際上百花齊放的多安全政策支持框架的研究工作,進行了比較系統的劃分。
分享友人