security patterns 中文意思是什麼

security patterns 解釋
景觀生態安全格局
  • security : n 1 安全(感);安穩;穩妥;平安。2 確實;確信;把握;可靠性;安心。3 【軍事】防禦物。4 保護;防...
  • patterns : 花樣
  1. To detect both known and unknown intrusion patterns, the system introduces a blended frame that makes use of both misuse detection approach and anomaly detection approach. the one of the highlight of the architecture is introduction of data mining technique, and the other is introduction of genetic algorithms. the ids uses data mining algorithms to abstract key features of system runtime status from security audit data, and it uses genetic algorithm to select the feature subset to reduce the amount of data that must be obtained from running processes and classified

    本文陳述了所研究系統的主要特點和技術:將智能體( agent )技術應用於入侵檢測系統,解決了傳統入侵檢測系統的集中式解決方案的弊病,充分利用網路資源協同完成入侵檢測任務;利用基於主機和基於網路的數據源,形成一種完整的混合型的結構,從而能收集到更加全面的信息;使用了異常檢測技術和誤用檢測技術,採用一種混合型的結構,既能檢測已知的攻擊模式,又能發現新的攻擊模式。
  2. The core issue i " d like to discuss in this paper is the thesis that " cooperative security " is the rational choice of the security patterns in the asia - pacific area after the cold war. the following are my reasons : from the practical perspective, asean regional forum ( arf ) is the first and the only pan - regionally official " cooperative security " organization emerged in the asia - pacific area after the cold war. and it has made great contribution to the asia - pacific security : firstly, arf is the product of the asean ' s new security concept and strategy, which is in accord with the maintenance of national and regional security interest for asean and most of the states in this area ; secondly, the appearance of arf also conforms to the subjective and objective needs of big powers ; thirdly, the method to resolve the security problems by dialogue and cooperation, the building of confidence - building measures and the launching of the preventive diplomacy in arf have enhanced mutual understanding and mutual trust among asia - pacific countries

    本文要論證的中心問題就是, 「合作安全」是冷戰后亞太地區安全模式的理性選擇,理由如下:首先,從實踐的角度看, 「東盟地區論壇( arf ) 」是冷戰后亞太地區出現的第一個,也是迄今為止唯一的一個泛地區官方「合作安全」組織,它在發揮維護冷戰后亞太地區安全方面起到了重要的作用和收到了良好的績效:第一, arf是冷戰后東盟國家新的安全觀念和以此為指導的新的安全戰略的產物,它符合東盟國家及絕大多數發展中國家保持本國及整個亞太地區安全與穩定的利益;第二, arf的出現符合亞太地區大國的主觀訴求和客觀需要;第三, arf以對話、合作解決安全問題的方式及它的信心建立措施和預防性外交的開展為亞太地區國家之間增進相互理解和信任起到了積極的作用,有利於冷戰后的亞太國家走出「安全困境」 ,實現真正意義上的普遍安全。
  3. ( 6 ) the mother " worm feeling had much influences on individual " self - esteem than other rearing patterns. ( 7 ) the mother " worm feeling influenced individual " s self - esteem indirectly by influencing their security self - value and self - acceptance

    ( 6 )安全感、自我接納與自我價值對自尊有較好的預測作用,與其它的父母教養方式相比較,母親溫暖理解的教養方式對自尊有較強的預測力。
  4. Guarantee of pledge has become one of the most charming and potential valued guarantee patterns because of its low established cost, simple established procedure and another character that it does n ' t restrict the function of object as it ' s not providing the security

    保證擔保以其設立成本之低廉、設立程序之簡便,以及不致因提供擔保物而限制物之效能充分發揮等特點,成為各種擔保方式中最具魅力和潛力的一種方式。
  5. At present, purchease - sales - inventory manage systems generally have two types of constructive patterns. one is c / s, the other is b / s. in view of their advantages and shortcomings as well as correlative factors, such as its operations characteristic and actuality, being changing intranet environment and customary demanding fashion and developing trend of operations and manage fashions of corporations, the paper puts forward a kind of mixed constructive pattern of c / s and b / s aiming at complex operation, frequent data processing, more data transmitting and high - demand to security, the c / s is used. on the contrary, for those operations of wide scope and low - rise security, the b / s is used. in this way, the mixed patterns has the advantages both c / s and b / s and it satisfied different special demands

    目前進銷存系統一般採用c s或b s兩種結構模式,根據圖書進銷存業務特點和現狀、現在企業普遍改造的intranet環境、企業長期的需求習慣方式及將來業務和經營方式的發展趨勢,針對c s 、 b s結構進銷存系統各自優缺點,本文提出了採用一種c s和b s混合結構模式。把業務復雜、數據處理頻繁、數據傳輸量大、安全性要求高的業務,運用c s結構模式,而對于面向范圍廣、安全性要求不高的業務,運用b s結構模式。這樣集c s和b s結構的優點,滿足了圖書進銷存業務不同的特點需求,同時,使企業的原有的經營處理應用系統能平滑過渡,也為滿足今後新的需求具有很好的擴展性。
  6. And the use crowd from 10 years old for the beginningaccording to every 2 years old is a human body biology cycle, hascarried on 32 levels of patterns hypotheses, the security, thevalidity carries on highly thin

    並把使用人群從10歲為起點按每2歲為一個人體生物周期,進行了32級的模式設定,把安全性有效性進行高度細化。
  7. Particularly in use in the sdsi simple distributed security infrastructure, a new design for a public - key infrastructure. standard visitors are discussed in the original design patterns book

    ,特別是在一種新的用於公用密鑰基礎設施的設計sdsi (簡單分散式安全性基礎設施( simple distributed security infrastructure ) )中的使用。
  8. In this security model, mobile agent uses different itinerary patterns, security policies and reputation management to reduce the risk in e - commerce as much as possible and make the transactions of e - commerce more efficient

    在所研究的安全模型中,移動代理使用不同的訪問策略、安全機制以及信用管理措施來盡可能地降低在電子商務環境中所遭受到的風險,同時利用移動特性來提高交易的效率。
  9. Under finite precision, ways we always seek is easy to implement. and we encrypt the fh system with chaotic stream cipher. simulation results show that the security properties of fh sequence have been improved and the security of information is guaranteed even the fh patterns are broken

    大量的對比分析試驗表明,該密鑰生成器生成的混沌序列密碼的密碼學特性良好。同時,本文還努力的尋求一種在有限精度條件下混沌加密的可實現方案,並利用混沌序列密碼對跳頻系統進行加密。
  10. The compound structure : an explanation of the political and security patterns in east asia

    安全復合體理論與東亞安全區域主義上
  11. Part three compares with the foreign social security system in the world on four points, such as the definitions, the social security patterns, the administration content and raising funds styles

    第三、與國外社會保障制度進行比較,如社會保障的界定、社會保障模式、社會保障管理和社會保險基金的籌集等。
  12. The forth one points that our country should choose region division and coordination pattern, and at the same time combining other three patterns to commonly adjust food balance of demand and supply, by evaluating their superiorities and inferiorities and comparatively analyzing the four food security adjustment patterns including stock adjustment pattern between two years, market adjustment pattern, policy adjustment pattern and region division and coordination pattern

    第四部分通過對年際間庫存調節模式、市場調節模式、政策調節模式及區域分工與協作模式進行優劣評價以及比較分析,指出我國目前應選擇區域分工與協作模式,同時結合其它三種模式共同調節糧食的供需平衡和實現糧食安全。
  13. Firstly, based on the real situation of the chinese manufacturing industry, the state of the art of advanced patterns in e - manufacturing and related technologies are analyzed. a manufacturing information exchange pattern, which can support the enterprise application integration in the distributed and heterogeneous computer application environment, is put forward. then, the general model of manufacturing information exchange pattern in e - manufacturing is set up to realize the semantic and program codes interaction among different enterprises " information systems and ensure the security and reliability in exchanging manufacturing information

    首先,本文在分析國內外網路化製造先進模式及其相關技術的研究現狀的基礎上,結合我國國情和製造業現狀,提出了一種能夠在分佈、異構的計算機應用環境下支持企業應用系統集成的製造信息交換模式,建立了網路化製造中製造信息交換模式的總體框架,有效的保障了不同應用系統之間語義和代碼層次的互操作以及製造信息交換的安全性和可靠性,為網路化製造中企業間製造信息的交換、共享和應用系統的集成提供了實現的基礎。
  14. Firstly, the internal environment in the asia - pacific area determines that other security patterns do n ' t suit the need of the protection of the national and regional security for the countries hi this area, that is, balance - of - power security. collective security and common security. secondly, the great changes of the external environment in the asia - pacific area after the cold war made countries hi this area from decentralization to cooperation, so the security pattern of " cooperative security " became the rational choice for countries in this area

    其次,從理論的視角看:第一,從系統?環境的角度考慮,亞太地區的內部環境決定了歷史上和現實中存在的幾種安全模式如均勢安全、集體安全和共同安全模式不符合冷戰后亞太國家維護本地區及國家安全的需要;冷戰后亞太地區外部環境發生的巨大的變化使亞太各國由分散走向合作,使亞太各國選擇「合作安全」模式來保障地區安全及國家安全成為理性、成為必然;第二,從國際合作的理論視角考慮, 「合作安全」是增進冷戰后亞太地區國家客觀共同利益的有效途徑。
分享友人