security evaluation 中文意思是什麼

security evaluation 解釋
安全評估
  • security : n 1 安全(感);安穩;穩妥;平安。2 確實;確信;把握;可靠性;安心。3 【軍事】防禦物。4 保護;防...
  • evaluation : n. 1. 估價,評價。2. 【數學】賦值,值的計算。
  1. Geo - security evaluation in badong county town of three - gorge reservoir area

    三峽庫區巴東縣城區地質安全分區評價
  2. About the food security evaluation method, this thesis compared and analyzed the rate of grain - production trend evaluation method, the grain supply and demand early warning system evaluation method, the boomy analytic method and food security coefficient synthetic evaluation method

    浙江大學博士學位論文自給自足、自力更生與合作安全?中國糧食問題分析框架在糧食安全評價方法方面,本文分析比較了糧食趨勢產量增長率評價法、糧食供求預警系統評價法、景氣分析法和糧食安全系數綜合評價法。
  3. Security evaluation of coal mining above the confined aquifers

    承壓水上採煤安全性評價
  4. The chip and its operating system have attained the highest standard, itsec e6, by the information technology security evaluation and certification scheme in europe

    晶片和有關的操作系統已獲歐洲資訊科技保安評估及認證計劃評定為達到資訊科技保安及評估及認證最高的標準-第六級。
  5. The chip and its operating system have attained the highest standard, itsec e6, by the information technology security evaluation and certification scheme in europe. the panel of judges commented that smartics was comprehensive and included more than 20 innovative security features

    晶片和有關的操作系統已獲歐洲資訊科技保安評估及認證計劃評定為達到資訊科技保安及評估及認證最高的標準-第六級。
  6. This paper aims to confirm the technological status of a crane ' s metallic structures, taking the factors which affects cranes " performance into consideration, forecasting the crane ' s additional useful life, developing the software which is about the security evaluation of the crane ' s based on visual c + +

    本論文以港口起重機為研究對象,考慮影響起重機結構的各種因素,確定金屬結構的技術狀態,對其安全使用期限進行預測,並採用visualc + + 6 . 0開發了一套主要針對裝卸橋和門座起重機的安全性綜合評價系統。
  7. The iahp can quantify the effect of the evaluation parameters on security evaluation results. 2. based on iahp, the shem is presented

    改進的ahp方法可以有效地量化評估參數對評估結果的影響; 2 .在改進的ahp方法基礎上,提出了生存性分層評估方法( shem ) 。
  8. This paper expounds the meaning of ecological security, including the international and domestic discussion, the characteristic and research meaning of ecological security, and then expounds the definition of ecological security evaluation and research development on it. on the basis of this, the author puts forward the definition of grassland ecological security, named that within the range of specific space and time, the inherent structures, outside show and function of grassland ecosystem lies in a state that under existing natural environment pressure and social economic pressure and the mankind ' s positive responses, support and influence that its ecological service can offer to mankind ' s surviving and continuous development of society and economy make human life, production, health and development being in security ; at last expounds the principle of grassland ecological security evaluation and introduces some relevant evaluation methods

    本文論述了生態安全的涵義,其中包括國際、國內對其定義的探討以及生態安全的特點和研究意義;接著論述了生態安全評價的定義及其研究進展;在此基礎上,提出草原生態安全的概念,即在具體的時空范圍內,草原生態系統的內在結構、功能和外部表現,在現有的自然環境壓力和社會經濟壓力以及人類的積極響應之下,其所能提供的生態服務對人類生存和社會經濟持續發展的支持和影響,使人類的生活、生產、健康和發展不受威脅的一種狀態。
  9. In the part of the standard and index system of grassland ecological security evaluation, the author introduces selected principle, founded methods, sources of evaluation criterion and the principle that structures the index system of grassland ecological security evaluation, designs the concept frame of grassland ecological security evaluation learning from that of driving force - psr, and structures the index system of hierarchical structure of grassland ecological security evaluation according to the characteristic of grassland ecosystem and social and economic development of grassland

    最後對草原生態安全評價的原理做了探討,介紹了相關的評價方法。在草原生態安全評價的標準與指標體系研究中,討論了評價標準選取的原則、建立方法、來源以及草原生態安全指標體系構建的原則,依據草原生態系統以及牧區社會經濟發展的特點,借鑒驅動力psr生態環境系統服務的概念框架設計了草原生態安全評價的概念框架,並構建了草原生態安全評價指標層次結構體系。
  10. Besides, it improved the heilig ' s evaluation matrix, addressed the total food security evaluation matrix ( tfs matrix )

    同時,改進了糧食安全的黑利格評價矩陣,提出全面糧食安全評價矩陣( tfs矩陣) 。
  11. Base on this, the thesis addressed the total food security concept ( tfs ) with normative study firstly ; then combined qualitative analysis with quantitative analysis, compared with many kinds of food security evaluation methods and the intellective bp - ann model, improved the heilig ' s evaluation matrix, constructed the total food security evaluation matrix ( tfs matrix ), analyzed grain - production, circulate and consuming all - sidedly ; at last, analyzed and compared with different modes that can realize our country food security, and studied the rationality and feasibility of food cooperative security further using the cooperative game model. the tfs pursuits sustainable grain production, stable and smooth grain circulation, fair and suitable grain consumption increase

    據此,本論文首先運用規范研究,提出全面糧食安全( totalfoodsecurity ,以下縮寫成tfs )的概念;然後將定性分析與定量分析相結合,比較了多種糧食安全評價方法及智能bp - ann模型,改進了黑利格評價矩陣( heidi ' sevaluationmatrix ) ,構建了全面糧食安全評價矩陣( totalfoodsecurityevaluationmatrix ,簡稱tfs矩陣) ,對糧食生產、流通與消費進行全面分析;最後分析和比較了實現我國糧食安全的不同模式,並應用合作博弈模型進一步探討了糧食合作安全的合理性與可行性。
  12. This paper can provide a scientific basis for design and construction in reinforcing pipeline foundation, reduction of loads on pipe, section design of pipe, and security evaluation of pipe

    本文研究的方法和成果,將為地下管道以及管基加固的設計與施工、管道減荷、管道截面設計、管道安全性判別等提供了一定的方法和理論依據。
  13. In designing of the information security guarantee system of the telecom business enterprises, we need to follow the wooden pail principle of the network information security, the integrality principle of the network information security, security evaluation and balance principle, standardization and consistency principle, the principle of the combination of the technology and management, the principle of unified planning and separate implement, grade - classification principle and maneuverability principle

    然後,研究電信企業的信息安全保障體系的設計問題。在設計信息安全保障體系時,必須遵循信息安全木桶原則、網路信息安全整體性原則、安全性評價與平衡原則、標準化與一致性原則、技術與管理相結合原則、統一規劃分步實施原則、等級劃分原則和可操作性原則。
  14. By means of some simulation examples, the dynamic process of pressure load and acceleration impact load which occur in the process of missile launching is deeply studied. the dangerous position where the maximum load occurs and the time when it occurs are given. these results can provide technological reference to structure design, water tight design and launching security evaluation

    並通過部分算例,詳細研究了導彈在發射出管過程中所受的壓力載荷和加速度沖擊載荷的動態變化過程,給出的導彈所受最大載荷的危險部位及產生時間,可以為導彈的結構設計、水密性能設計和發射安全性評估提供技術參考。
  15. After intruducing the security demand from the computer area, this paper present the designing aim of the real time audit analysis system ( raas ), considering the trusted computer system evaluation criteria ( tcsec ) of us dod and common criteria for it security evaluation ( cc )

    本文首先介紹了計算機領域的安全需求,根據美國國防部的可信計算機評測標準( tcsec )和計算機信息系統的通用安全評價準則( commoncriteriaforitsecurityevaluation , cc )中提出的安全操作系統的審計標準,提出本系統的設計目的。
  16. Complicated the characteristic of the sna method and the hierarchical evaluation method, the shem can quantify the survivability evaluation system, and provide the foundation of quantitative system security evaluation. 3. the iahp and shem are applied to the survivable evaluation of a news website

    該方法綜合了sna方法和層次化安全評估方法的優點,能夠量化系統生存性評價體系,為量化系統的安全性評估提供了基礎; 3 .採用改進的ahp方法與生存性分層評估方法( shem )對某新聞網進行了安全評估。
  17. A mode of dynamic security evaluation of electric power system based on vulnerability index

    一種基於脆弱性指標的電力系統動態安全評估模式
  18. Based on analysis the traditional security evaluation methods, a improved ahp ( iahp ) and survivability hierarchical evaluation method ( shem ) are presented, which have been implemented in the survivability evaluation of a website

    本文在介紹了傳統安全評估方法的基礎上,提出了改進的ahp方法與生存性分層評估方法( shem ) ,並將其應用到某新聞網站的安全評估中。
  19. The contents in chapter three are technological base for developing the software of security evaluation of the cranes

    第三章是開發起重機結構安全性評價系統軟體的技術基礎。
  20. The thesis analyzes concerned hidden trouble of network security, common used method of network attack, the system structure of information system, hierarchy of network security, security evaluation rule of information system, and analyzes the problem of e - business which shall be solved

    本文分析了網路本身存在的安全隱患,常見的網路攻擊方法,信息系統的安全體系結構,網路安全的層次模型,信息系統的安全評估準則,在此基礎上分析了電子商務要解決的難題。
分享友人