security data set 中文意思是什麼

security data set 解釋
安全數據集
  • security : n 1 安全(感);安穩;穩妥;平安。2 確實;確信;把握;可靠性;安心。3 【軍事】防禦物。4 保護;防...
  • data : n 1 資料,材料〈此詞系 datum 的復數。但 datum 罕用,一般即以 data 作為集合詞,在口語中往往用單數...
  • set : SET =safe electronic transaction 安全電子交易〈指用信用卡通過因特網支付款項的商業交易〉。n 【埃...
  1. The second part tracks the technology of information security and electronic security protocol which is advanced nowadays and will be applied in later sectors. the third part analyses secure demands of e - business and design general system frame of secure electronic business. the forth part analyses data flow and transaction process in the systems of electronic payment based on set protocol and ssl protocol distinctly, then designs them. systems of electronic payment consist of four logic parts, including client side, payment server, payment gateway, which is designed in fifth part

    本文從應用的角度出發,通過跟蹤研究國內外先進的信息安全技術和安全電子交易協議,對支付型電子商務業務及其安全需求作了詳細的分析;分別設計了基於set協議和non ? set協議的電子支付交易流程及系統中各組成部分(包括客戶端軟體、支付服務器、支付網關)的基本功能模塊,能較好實現商家、顧客、企業、銀行之間的信息流、資金流的傳遞及安全保障;接著就電子支付系統實現過程中的信息交換和系統集成等方面的問題作了探討,並給出了基於j2ee和xml的解決原型。
  2. In some projects charged by our lab such as national 863 project - " crop planting management components based on weather analyse ", anhui provincial 95 key project - " agricultural meteorology disaster evaluation system base on gis in anhui province " and the project " small coal mine security management and decision system based on gis in anhui province ", this paper combines the theory and arithmetic of rough set with gis and data mining in idss, investiges the application of rough set theory to precision analysis of attribute data and logical operation in gis, analyzes the logical operation based on rough set ( logical union, logical intersection, logical complement, mixed logical operation etc. ), so that it can give a method y to research the gis attribute data and the uncertainty of attribute data after superposition operator, so as to express the roughness and illegibility of attribute data more accurately

    在完成試驗室所承擔的國家863項目「基於氣象分析的農作物種植管理軟構件」 、省95攻關項目「基於gis的安徽省重大農業氣象災害測評系統」和「基於gis的安徽省小煤礦安全管理決策系統」等項目中,將粗糙集理論和演算法與gis 、智能決策系統中的知識發現等相結合,對粗糙集理論在gis屬性數據和邏輯運算精度分析中的應用情況進行了研究,分析了基於粗集的gis邏輯運算(邏輯並、邏輯交、邏輯補、混合邏輯等) ,從而為研究gis屬性數據及其疊加運算后屬性數據的不確定性提供了一種方法,能比較準確地表達屬性數據的模糊性和粗糙性。
  3. We use control chart to characterize states of security environment and data mining to construct intrusion detection strategies. the latter includes pattern mining, pattern consolidation arid pattern comparing. in succession to it, we construct attribute set and training set for classification of net data

    其次討論了自適應空間的構成,使用控制圖來構建條件空間,用數據挖掘技術來構建策略空間,重點討論了怎樣把數據挖掘技術應用到策略空間的構造中,包括模式的挖掘、合併、比較以及在此基礎上構建分類器所需要的屬性集與學習集。
  4. The set of security services offered includes access control, connectionless integrity, data origin authentication, protection against replays, confidentiality, and limited traffic flow confidentiality

    Ipsec協議提供的安全服務集包括存取控制、無連接的完整性、數據源鑒別、反重放攻擊、機密性和有限的通信量的機密性。
  5. The paper is on how to set up lab platform of vapour spewing to uppercooling water surface to coagulate directly and to observe and analyse which vapour coagulate on the water surface, the results enable people to know the security system of nuclear power. the range of the pressure parameters of prz is from 0. 2mpa to 0. 6mpa, and the range of the initial temperature parameters of cmt is from 23. 5 to 78. 5, all of the testing points are 30 and there are fifty thousand testing data. many results of vapour spewing to uppercooling water surface vertically to coagulate can get. for example : coagulating can make the water of cmt surge forcefully when vapour spews to uppercooling water surface, too many vapour - bubbles come into being and strike the water of cmt owing to rupture continually, all these will strengthen the surge because of the vapour pressure of cmt

    實驗中prz飽和蒸汽壓力變化范圍為: 0 . 2mpa - 0 . 6mpa , cmt中水初始溫度變化范圍: 23 . 5 - 78 . 5 ,實驗中測試工況30個左右,實驗測試數據50萬余個,得出了很多與非能動安全系統相關的蒸汽垂直噴向過冷水表面凝結時的結論:蒸汽垂直噴入過冷水表面凝結時會造成cmt中液面的強烈波動和振蕩,產生大量蒸汽汽泡,汽泡不斷破裂對cmt中液體帶來很大沖擊,勢必引起cmt中液體的振蕩,造成cmt汽空間汽壓不均勻,加強cmt液體的振蕩和波動。
  6. Firstly, in this paper, we review the histories of xml and xml database, and all kinds of data models used widely now. then we review traditional access control policies and policies specially used on xml, and present a new expression method of access set on xml based on child tree of w3c data model. and we bring rbac model into xml database and present a new xml access model x - rbac. because the usage of data in databases has high frequency, we present an ids model based on access set density to logging the potential security threats. and then we introduce the design and implementation of a prototype of our native xml database nhx and its access control system. finally, we draw a conclusion for this paper and the future work

    本文首先回顧了xml及xml數據庫的歷史,並總結了目前廣泛使用的xml數據模型,在分析了各種傳統數據庫訪問控制策略,以及xml的專有訪問控制策略的優缺點后,基於w3c的xml數據模型,提出了一種基於子樹的具有高彈性的便於實現的的訪問區域表示法,並將rbac模型引入進來,提出了一種適用於xml數據庫的訪問控制模型x - rbac ,同時為了區分xml數據庫訪問中的合法訪問和合理訪問,我們根據數據庫訪問具有頻繁性這一特徵,提出了一種基於區域訪問密度的入侵檢測模型( ids ) ,以對隱藏在正常訪問中的潛在安全威脅進行報警和日誌。
  7. Enterprise information system framework provides a series of reusable groupware, such as persistence layer which introduces dynamic value object 、 value list hander and command pattern, it encapsulates the detail of accessing database and affords the interface of different persistence layer framework ; basing on asynchronous javascript and xml ( ajax for short ), we develops the client validity check engine 、 dynamic cascading menu and common 、 dynamic tree structure groupware, as well as a set of tag library which include query 、 pagination 、 cache an so on. they reduce the code redundancy and predigests the development of interface layer enormously ; the security subsystem which is based on secure socket layer ( ssl for short ) and role - based access control ( rbac for short ) ensures the data security transmission and privilege control. furthermore, the model of enterprise application integration ( eai for short ) which based on web services, it supply some helpful explore for the sake of system integration and data communion for the future

    企業信息系統框架提供了一系列可復用組件,例如採用動態vo 、值列表處理器以及命令模式的持久層組件,封裝了數據庫訪問細節,並為不同的持久層框架提供調用介面;基於ajax ( asynchronousjavascriptandxml )技術的客戶端校驗引擎、動態級聯菜單以及通用動態樹型結構組件,一系列查詢、分頁、緩存等標簽庫則減少了表示層的代碼冗餘,簡化了表示層開發;基於ssl登錄以及基於角色的訪問控制的安全子系統則初步實現了數據安全傳輸和權限控制;此外基於web服務的企業應用集成模型為今後系統集成、數據共享提供了有益探索。
  8. In view of the engineering practice of chmavc " s assistant materials management information system, this paper discusses some engineering problems relation to the design of a large database and to the application of database technology. exposition of two important aspects - - then design of a large database and improvement of database performance concerning practice is given. it includes the design of a data model, the compress technique of data, indexes set - up, optimization of inquiry, integrity check and security control

    從工程實踐的角度,論述了為實現系統功能而在數據庫設計和軟體結構設計中所採用的方法和技術;並論述了為達到系統性能而在實現中所採取的各項措施,重點討論了大型數據庫的設計和改善數據庫性能這兩個重要方面,內容包括設計數據模型、建立索引、查詢優化、完整檢查和安全控制等。
  9. The system offers a range of unique features that are not available from other wireless communication platforms : fast call set - up time ; excellent group communication support ; direct mode operation between radios without going through the radio infrastructure ; packet data and circuit data transfer services ; frequency economy ; and excellent security features

    系統擁有少其他無線通訊平臺缺乏的獨特功能,如快速接駁通話出色的群組通訊支援通訊機之間不必經過無線電基建而以直接模式運作封包數據和電路數據傳送服務頻率便宜和優良的保安功能。
  10. " since cc3 adopts an ip - based tetra system, it provides an effective and efficient call set up with more reliable routing capabilities, " the spokesman said. " it also enables good voice quality by prioritising voice packets and allows various types of data to be carried in the same ip manner. security features include encryption and authentication of users to prevent eavesdropping by unauthorised elements, " he added

    他續說:此通訊系統亦會善用話音封包以確保優良的話音質素,以及容許以同樣的網際網路規約方式處理多種資料,而在保安方面,則包括加密技術及核實使用者身分以防止竊聽及未經授權接達系統等功能。
  11. There are two issues that make a macro set preferable to data languages like the xml declarative security file

    有兩個原因使得宏更適合xml聲明式安全文件這樣的數據語言:
  12. In this paper, on the base of analyzing the reliability operation status and the reliability data of 200mw units with the reliability management information system for jingyuan power plant, the feeble link and the key part of the generation set and system are defined and the corresponding measures are adopted, consequently, is increased the fault ratio of the device we can reduce and enhance security of the power plant, which is an effective method that controls the device reliability by using the mothod of systems engineering, namely plans, organizes, corresponds, controls and supervises the diversified engineering and technic activity of the reliability during the period of the whole device life to realize the reliability aim, minimize the cost of the whole device life and improve the general level of business safety production

    本文在應用靖遠電廠可靠性管理信息系統對該廠的200mw機組運行狀況和可靠性數據進行分析的基礎上,確定了發電設備和系統的薄弱環節、關鍵部位、並採取相應的措施,從而使設備的故障率減少,使電廠的安全性得以提高。這是一種利用系統工程的方法對設備的可靠性進行控制,即對設備全壽命周期中各項可靠性工程技術活動進行規劃、組織、協調、控制、監督,以實現確定的可靠性目標,使設備全壽命周期費用最低,提高企業安全生產綜合水平的有效方法。
  13. In tcp / ip protocol suite, the ipsec protocol provide interoperable, high quality, cryptographically - based security for ipv4 and ipv6. the set of security services offered includes access control, connectionless integrity, data origin authentication, protection against replays ( a form of partial sequence integrity ), confidentiality ( encryption ), and limited traffic flow confidentiality

    在tcp ip協議族中, ipsec ( internetprotocolsecurity )協議提供的安全服務保證數據在網路傳輸過程中的機密性、完整性和抗重放保護,以及對網路通信中的通信流分析攻擊提供有限的保護, ipsec協議還提供對網路的訪問控制能力。
  14. The basic data element set of police security

    公安業務基礎數據元素集
  15. Promulgating a set of guidelines on credit card holders data security for retailers ; and

    向零售商推介保密處理信用卡資料的指引;及
分享友人