數據保護文件 的英文怎麼說

中文拼音 [shǔbǎowénjiàn]
數據保護文件 英文
data protection file
  • : 數副詞(屢次) frequently; repeatedly
  • : 據Ⅰ動詞1 (占據) occupy; seize 2 (憑借; 依靠) rely on; depend on Ⅱ介詞(按照; 依據) according...
  • : Ⅰ動詞1 (保衛; 保護) defend; protect 2 (保持) keep; preserve; maintain in good condition 3 (...
  • : 動詞1. (保護; 保衛) protect; guard; shield 2. (袒護;包庇) be partial to; shield from censure
  • : Ⅰ名詞1 (字) character; script; writing 2 (文字) language 3 (文章) literary composition; wri...
  • : Ⅰ量詞(用於個體事物) piece; article; item Ⅱ名詞1. (指可以一一計算的事物) 2. (文件) letter; correspondence; paper; document
  • 數據 : data; record; information
  • 文件 : 1 (公文、信件等) document; file; papers; instrument 2 [自動化] file; 文件保護 file protection; ...
  1. Form. taxus chinensis var. mairei is protecting plant in the first class, which is a precious and endangering plant in china in this paper, the quantitative characterics of form. taxus chinensis vsr. mairei population including age structure, spatial distribution pattern, growth dynamics of tree basal area, niche characterics, fractal dimension and competition between specises were studied using methods of mathematics ecology from the angle of population ecology of form. taxus chinensis var. mairei, then the prent state and the endangering causes were analysed. this research offers gist to protecting and enlarging the crude resourse of form. taxus chinensis vsr. mairei population, afforesting plantation and sustainable utilize for us

    從南方紅豆杉種群生態學的角度、主要應用學生態學的方法探討南方紅豆杉種群的量特徵,包括南方紅豆杉種群年齡結構、種群空間格局(探討分佈格局動態規律與生境相互關系) 、不同立地條下種群優勢度增長趨勢、生態位寬度、生態位相似比例、生態位重疊、空間占能力及種間競爭等,分析其目前現狀及瀕危原因,期望為南方紅豆杉野生資源的和擴大、營造人工林及可持續利用提供理論基礎,也為瀕危植物種群生態學的研究提供參考。
  2. As shown in figure 5, place the web server in the dmz demilitarized zone, to ensure that sensitive and important data and files are protected

    如圖5所示,將web服務器安裝在dmz demilitarized zone ,非區,以確敏感重要的
  3. Among all the techniques and methods protecting data, it is the most practicable to encrypt data and store encrypted data, because even if encrypted data are filched, copied, or peculated, attackers are incapable of understanding these data in that they are incapable of decrypting these data

    在目前的技術條下,和信息最行之有效的方法就是將它們加密后再存儲在庫中,因為加了密的和信息,即使被竊取、被拷貝、被截獲,獲取者因無法破解竊取的密而無從知曉它們對應的機密
  4. The safety of transmission line plays a important role in power system safety it is not only the requirement of ensure supply power reliability, but also the necessary precondition of enhance power system stabilization, to remove faulty line quickly and accurately, also keep non - faulty line continuous work when some transmission line faults current differential protection is a kind of simple, reliable and good - selective protection manner to any variety of transmission lines, power system development needs current differential protection apply to transmission lines, moreover the advancement of electric and communication technology enable current differential protection apply to transmission lines firstly, the paper discusses, analyses the research and application transmission line protection in detail, compare the principle and realistic presupposition of general line pilot protections secondly, because conventional current vector differential protection are influenced easily by load current and transitional resistance, in order to at the same time quicken protection act, the principle and criterion include work characteristic of differential protect based on fault component sampled values are studied, results shows that differential protect based on fault component sampled values excels general vector current differential protection in reliability, sensitivity and anti - saturation of current transformer in addition, synchronous current sampling methods at all terminals of line is analyzed and estimated lastly, the principle and criterion. also device design about current sampling values differential protection based on optical fiber communication, which apply to short transmission lines are concretely investigated,

    基於基爾霍夫定律的電流差動無論對於何種形式的輸電線路都是一種簡單、可靠、選擇性強的形式,電力系統的發展使得電流差動應用於線路成為需要,而電子、通信技術的發展使得電流差動應用於輸電線路成為可能。首先,本對目前線路的研究和實際應用情況進行了討論和分析,比較了常用線路縱聯的實現原理和實現條及優缺點。其次,針對常規相量電流差動易受正常負荷電流和故障過渡電阻影響的缺點,同時為加快差動的動作速度,對基於故障分量瞬時采樣值電流差動的原理、判、動作特性等作了討論和分析,結果表明基於故障分量瞬時采樣值電流差動在可靠性、靈敏度、抗電流互感器飽和方面明顯優于常規相量電流差動,對電流差動各端的同步采樣方法和通信也進行了分析和評價。
  5. The advent of the internet and the wide availability ofcomputers, scanners and printers make digital data acquisition, exchange and transmission a simple task. however, making digital data accessible to others through networks also creates opportunities for malicious parties to make salable copies of copyrighted content without permission of the content owner. digital watermarking is likely to be a potential solution to this problem. digital watermarking has been proposed as a solution to the problem of copyright protection of multimedia documents in networked environments. it makes possible to embed a watermark ( such as identification data, serials number, text or image etc. ) to multimedia documents allowing copyright protection, secret communication, document authentication and so on. in this paper, we present a new digital image watermarking method based on svd ( singular value decomposition ), and then give some theoretical analysis about the algorithm. extensive experimental results show that this method is much more robust than other methods presented before

    隨著計算機和網路技術的飛速發展,字圖像、音頻和視頻產品愈來愈需要一種有效的版權方法,另外通信系統在網路環境下的信息安全問題也日益顯露出來.字圖像水印技術為上述問題提供了一個潛在的解決方案.所謂水印技術就是將字、序列號、字、圖像標志等版權信息嵌入到多媒體中,以起到版權、秘密通信、的真偽鑒別和產品標志等作用.本提出了一種新的基於奇異值分解的字水印演算法並且對該方法的理論基礎給出分析.實驗結果表明這種方法要比目前提出的流行演算法魯棒
  6. The table will write down all about the electronic records during their life period. the content noted in the table will be the only basis on original and reality " testing of electronic records ". the major task of the second levels is to build the tight filing rules, moreover, combined the " life cycle table ", to build the test system to assure the original and the reality of the information during filing ; the assignment of the third level is to build testing and restoring measures of the original and the reality. by maintaining the media of electronic archives or building information file of electronic archives etc, electronic archives can maintain their available ^ visuak understandable during their deadline ; meanwhile, to build the safe control of the system through the workers dispersed authorization and deterring skills, to formulate the standards of the protective system, such as the standard of the basic structure of united electronic records ^ electronic archives. all of this is important to protect the original and the reality of electronic records and electronic archives

    「生命周期表」所記錄的內容將作為電子歸檔時檢驗原始性、真實性的唯一依;電子歸檔管理層中的主要任務是要建立起嚴密的歸檔制度,同時結合「生命同期表」建立檢驗措施證電子在歸檔過程中信息內容的原始性、真實性;電子檔案管層中主要任務是建立電子檔案原始性、真實性檢驗及原始恢復管理措施,通過對電子檔案載體的維、建立電子檔案維管理的信息檔等工作,確管期限中的電子檔案持其可用性、可存取性、可理解性:建立電子與電子檔案原始性、真實性體系安全控制,通過對系統工作人員授權分散化、建立用戶標識與認證技術等措施確體系」安全運行;加強「體系」涉及的標準與規范的制定工作,如建立統一的歸檔電于、電子檔案基本結構等標準對電子、電子檔案信息原始性、真實性有著重要意義。
  7. Digital watermarking is the technology which embeds copyright information including product id, text content or image logo into multimedia for copyright protection, secret communication and discrimination of the data files

    所謂字水印技術就是將字信息如產品序列號、本內容、圖像標志等版權信息嵌入到多媒體中,以起到版權、秘密通信、的真偽鑒別等作用。
  8. Plc, robot and cad / cam are called the three major pillars in the modem factory automation. plc, as the head of the three, has become the leading basic automatic equipment in the field of the industry control in the early 1980s " but as a matter of fact, plc being with the lack of friendly man machine interface, rnakes no close relationship between human and machineometimes it even can not be promoted and applied in some fields aiming at the situation mat those imported products are too expensive while domestic products are of rare famous brands, a plc man - machine interface - plc monitor is developedthis paper systemically introduces the developing procedure for the whole system, including how to design hardware and software system. especially emphasizing plc communication protocol. real time message accessing, lcd controller instruction set, definition of data construction for message & tag screens and how to display thern, assignment of internal resource of cpuealization in software among plc & manitor, file format defining a nd download of user data, etcplc monitor will compensate some weakpoints of plc, and extend the application rangeimultanneously enhance the performance of plc and increase the attached value of mechanical machines, undoubtedly it will see hight market prospect

    針對人機界面進口產品的高昂價格和國產品牌稀少的這一現狀,研製開發了一種plc人機界面? plc監控器。本系統地介紹了整個系統的開發過程,包括硬體系統、軟體系統的設計及實現,重點介紹了plc通信協議,監控器的基本工作原理以及期望實現的功能,監控器電源電路、 sram存儲器掉電電路、 cpu監控器電路、按鍵輸入電路的設計及按鍵狀態的讀入,時鐘信息的設定與讀取, cpu液晶顯示器指令系統,信息畫面及標簽結構的定義及顯示方法, cpu內部資源的分配,監控器與plc通信的軟體實現,格式的定義以及畫面的下載等。 plc監控器彌補了plc一些方面的不足,可以擴大plc的應用范圍,提升機械設備的檔次,增加設備的附加價值,具有一定的市場前景。
  9. Protecting sensitive data in the profile data source

    配置源中的敏感
  10. How do i protect sensitive data in configuration files

    如何配置里的敏感
  11. Sql server mobile also provides multiple - connection access to a database, multiple - column indexes and matching index limits, transaction support, referential integrity, 128 - bit file - level encryption and password protection, and a query optimizer

    Sql server mobile還提供對庫的多連接訪問、多列索引和匹配的索引限制、事務支持、引用完整性、 128位級加密以及密碼和查詢優化器。
  12. With the statistical data analysis method, according to the criminal lawsuits with civil lawsuits attached of some railway transportation intermediate court during 3 years, in my dissertation i commented on the actuality of the institution of the chinese criminal with civil lawsuit attached, revealed many problems of this institution during judicial practice and moused out the reasons from the following 3 sides, judicial concept, legislation and judges " quality. also, i analised the value and legitimacy of this institution and made clear its legal quality, attribute, principles. in conclusion, according to protect the parties, lawsuit rights and objective rights, i put in some constructive suggestions which can improve this institution further

    運用統計分析的方法,從某鐵路運輸中級法院近三年多來辦理的刑事附帶民事訴訟案入手,總體上評價了我國刑事附帶民事訴訟制度的現狀,揭示了該制度在司法實踐存在的諸多問題,從司法理念、立法和法官素質層面探詢了原因,分析了刑事附帶民事訴訟制度的價值及其存在的合理性,明確了刑事附帶民事訴訟制度的法律性質、特徵、原則,從當事人訴訟權利、實體權利出發,為進一步完善刑事附帶民事訴訟制度提出了具有建設性的意見。
  13. Analyse and monitor customer data to measure success and identify fluctuations / trends so as to decide on the relevant actions to be taken

    管理所有跟客戶拜訪、協議、服務條款等有關的,確客戶的信息在客戶庫中得到正確的維
  14. With isolated storage, your code no longer needs unique paths to specify safe locations in the file system and data is protected from other applications that only have isolated storage access

    通過獨立存儲,代碼不再需要使用唯一的路徑來指定系統中的安全位置,同時可以免遭只具有獨立存儲訪問權限的其他應用程序的損壞。
  15. Based on the activex technology, electric component menus and toolbars are created in this paper, with which a net wiring diagram for power electronics system is drawn. take advantage of autocad events, it is easy to fully carry out the consistency between graphics and data, from which users can manage databases and visual operation on graphics. the graphics about short - circuit current distribution and protection coupling are auto - drawn by using the autocad entity and text objects

    採用activex技術,創建電氣元菜單和工具欄,方便用戶繪制電力系統網路接線圖;利用autocad事,實現圖形的一體化,從而可以使用戶在圖形上操作和管理庫以及計算的可視化操作;利用autocad的圖形和本對象來自動繪制短路電流分布圖和整定圖。
  16. Database ; therefore, you should make sure that the configuration files are backed up regularly as part of your plan for securing packages saved to

    庫時並不會備份這些;因此,您應該確定期備份配置,以便存到
  17. In the ip core ’ s data management, we construct ip data - base tree structure, take the ip function as main search factor, warpping the ip cores having same function in the same xml file, and set up the accessing popedom, avoid the redundancy information, advance the search

    在事務級ip核管理中,為了高效的搜索ip核,構建了事務級ip庫的樹型結構,以ip的功能為主要搜索要素,功能相同的ip核被封裝在同一個xml中,並設立訪問權限,避免冗餘信息,提高搜索效率,並且實現知識產權
  18. Thery also protect the privacy of individuals against the misuse of personal data contained in records and archives

    他們還要個人隱私,防止和檔案中的個人被濫用。
  19. The encrypting file system ( efs ) in windows 2000 complements existing access controls and adds a new level of protection for your data

    Windows2000的加密系統( efs )補充了現有的訪問權限控制,並為添加了一級新的措施。
  20. To help protect your data, place any custom site - map data files that have a file name extension other than. sitemap in the app data folder

    為幫助您的,可將擴展名不是. sitemap的所有自定義站點地圖放入app _ data夾中。
分享友人