數據真實性 的英文怎麼說

中文拼音 [shǔzhēnshíxìng]
數據真實性 英文
data reality
  • : 數副詞(屢次) frequently; repeatedly
  • : 據Ⅰ動詞1 (占據) occupy; seize 2 (憑借; 依靠) rely on; depend on Ⅱ介詞(按照; 依據) according...
  • : Ⅰ形容詞(真實) true; genuine; real Ⅱ副詞1 (的確; 實在) really; truly; indeed 2 (清楚確實) cl...
  • : Ⅰ形容詞1 (內部完全填滿 沒有空隙) solid 2 (真實; 實在) true; real; honest Ⅱ名詞1 (實際; 事實...
  • : Ⅰ名詞1 (性格) nature; character; disposition 2 (性能; 性質) property; quality 3 (性別) sex ...
  • 數據 : data; record; information
  • 真實性 : facticity; realness; truth ; authenticity; factuality; truthfulness
  • 真實 : true; real; authentic
  1. The structure of this paper goes like this, the first chapter introduce the development of e - b / l in practice and in laws. and draw a conclution that the electrification of the b / l is a history tide. in the second chapter, on the basic of reseach the security trap in e - b / l running, 1 conclude six security elements of, e - b / l : the liability of the system, the authenticity of dealers ' identity. the integrity and secrecy of electronic data, and the validity and evidence effectiveness of electronic data. from the third chapter to the eighth, 1 reseach these elements one by one. the third chapter introduce the establishment of the e - b / l security system, and some related laws the fourth chapter introduce the certification authority of e - b / l. in the fifth chapter, 1 introduce the encrypt of electronic information and some countries ' control on use / import / export crytography. the sixth chapter introduce the concept and principle of digital signature, and reseach some related legal issues. the seventh chapter reseach the legal demand of validity, then come to a conclution that to establish a independent electronic information system is necessary. in the eighth chapter, 1 reseach some countries " regulation on the evidence effectiveness of electronic data

    第二章在分析電子提單運作中的安全隱患的基礎上,歸納出其六大安全要素,即系統的可靠、交易者身份的電訊的機密和完整電訊的合法有效以及交易者行為的不可抵賴。第三章到第八章分別對這六大要素進行分析:第三章介紹了電子提單網路安全體系的建立以及系統安全保護法規,第四章則介紹了電子提單的安全認證機構,第五章介紹了信息加密技術以及各國立法對密碼技術的進出口及使用的控制,第六章介紹了字簽名的概念及原理,並以bolero為例介紹了字簽名的技術方式,對有關法律問題作了論述;第七章首先論述了電子提單對有效的法律需求,然後結合國內法和國際規則的規定論證了電訊制度產生的必然;第八章通過對各國立法對電子證的法律效力的規定,論述了對電子交易至關重要的電訊的不可抵賴
  2. A elliptic curve digital signature and authentication algorithm of independent knowledge property right is designed and implemented on computer in this theme. data integrality and user authenticity is ensured

    本課題中設計了一種擁有自主知識產權的橢圓曲線字簽名和驗證演算法,並在微機上進行了現,確保了的完整和用戶身份
  3. The degree of informationality of management, the facticity, veracity, validity, criteriaty of data is all the foundation to build dw

    管理的信息化程度、、準確、有效、規范是建立倉庫的基礎。
  4. The table will write down all about the electronic records during their life period. the content noted in the table will be the only basis on original and reality " testing of electronic records ". the major task of the second levels is to build the tight filing rules, moreover, combined the " life cycle table ", to build the test system to assure the original and the reality of the information during filing ; the assignment of the third level is to build testing and restoring measures of the original and the reality. by maintaining the media of electronic archives or building information file of electronic archives etc, electronic archives can maintain their available ^ visuak understandable during their deadline ; meanwhile, to build the safe control of the system through the workers dispersed authorization and deterring skills, to formulate the standards of the protective system, such as the standard of the basic structure of united electronic records ^ electronic archives. all of this is important to protect the original and the reality of electronic records and electronic archives

    「生命周期表」所記錄的內容將作為電子文件歸檔時檢驗原始的唯一依;電子文件歸檔管理層中的主要任務是要建立起嚴密的歸檔制度,同時結合「文件生命同期表」建立檢驗措施保證電子文件在歸檔過程中信息內容的原始;電子檔案保管層中主要任務是建立電子檔案原始檢驗及原始恢復管理措施,通過對電子檔案載體的維護、建立電子檔案維護管理的信息文檔等工作,確保在保管期限中的電子檔案保持其可用、可存取、可理解:建立電子文件與電子檔案原始保護體系安全控制,通過對系統工作人員授權分散化、建立用戶標識與認證技術等措施確保「保護體系」安全運行;加強「保護體系」涉及的標準與規范的制定工作,如建立統一的歸檔電于文件、電子檔案基本結構等標準對保護電子文件、電子檔案信息原始有著重要意義。
  5. On - site measurements of parameters such as temperature, ph, turbidity and dissolved oxygen are made using the multiparameter water quality measuring probe, and recorded in the data logger. the readings obtained are then compared against the normal ranges from that station, and any unusual readings result in a second set of measurements being made to check the validity of the initial reading

    另外,工作人員利用多參水質計量儀地量度多項水質參,包括水溫酸鹼度混濁度及溶解氧,將測量結果記錄在記錄器內,再與該監測站的正常參范圍比較,核
  6. Banks assume no liability or responsibility for the form, sufficiency, accuracy, genuineness, falsification or legal effect of any document, or for the general and or particular conditions stipulated in the document or superimposed thereon ; nor do they assume any liability or responsibility for the description, quantity, weight, quality, condition, packing, delivery, value or existence of the goods represented by any document, or for the good faith or acts and or omissions, solvency, performance or standing of the consignors, the carriers, the forwarders, the consignees or the insurers of the goods, or any other person whomsoever. article 14 - disclaimer on delays, loss in transit and translation

    銀行對任何單的格式完整準確虛假或其法律效力或對在單中載明或在其上附加的一般及或特殊的條款,概不承擔責任或對其負責銀行也不對任何單所表示的貨物的描述量重量質量狀況包裝交貨價值或存在或對貨物的發運人承運人運輸代理收貨人或保險人或其他任何人的誠信或作為及或不作為清償力業績或信譽承擔責任或對其負責。
  7. Banks assume no liability or responsibility of the form, sufficiency, accuracy, genuineness, falsification or legal effect of any document ( s ) or superimposed thereon ; nor do they assume any liability, condition, packing, delivery, value of existence of the goods represented by any document ( s ), or for the good faith or acts and / or omission, solvency, performance or standing of the consignors, the carriers, the forwarders, the consignees or the insurers of the goods, or any other person whomsoever

    銀行對任何單的格式、完整、準確、虛假或其法律效力、或對在單中載明或在其上附加的一般和/或特殊的條款不承擔責任或對其負責;銀行也不對任何單所表示的貨物的描述、量、重量、質量、狀況、包裝、交貨、價值或存在、或對貨物的發運人、承運人、運輸行、收貨人和保險人或其他任何人的誠信或行為和/或疏忽、清償力、業績或信譽承擔責任或對其負責。
  8. Under the pattern of cyber - education, open laboratories are becoming inseparable parts which still are weak in the process of teaching. as for electric experiment category, there are many problems in common, for instance, less safe in equipment systems, less functional in instrument protection, thus forcing students to spend large quantity of time reviewing, recording, and analyzing data, while students do experiment only with less time, which have negative effect on purpose of experiment, at the same time, this does not reflect benefits that internet brings us

    然而當前大多高校的驗教學環節還比較薄弱,其中對電類驗來說存在諸多共問題,比如:驗系統安全差,儀表保護功能少,導致驗器材損壞嚴重:儀表能不穩定,零漂、溫漂現象嚴重,元器件線度校正不夠,儀表測量精度差;學生做一次驗要花大量時間記錄、整理、寫驗報告,正用在做驗上的時間並不多,從而使驗效率大大下降;同時也沒有充分利用校園網所帶來的便利和信息共享及互動的功能。
  9. A bank assumes no liability or responsibility for the form, sufficiency, accuracy, genuineness, falsification or legal effect of any document, or for the general or particular conditions stipulated in a document or superimposed thereon ; nor does it assume any liability or responsibility for the description, quantity, weight, quality, condition, packing, delivery, value or existence of the goods, services or other performance represented by any document, or for the good faith or acts or omissions, solvency, performance or standing of the consignor, the carrier, the forwarder, the consignee or the insurer of the goods or any other person

    銀行對任何單的形式、充分、準確、內容、虛假或法律效力,或對單中規定或添加的一般或特殊條件,概不負責;銀行對任何單所代表的貨物、服務或其他履約行為的描述、量、重量、品質、狀況、包裝、交付、價值或其存在與否,或對發貨人、承運人、貨運代理人、收貨人、貨物的保險人或其他任何人的誠信與否,作為或不作為、清償能力、履約或資信狀況,也概不負責。
  10. It combines the real echoes with the date simulated using the real airborne sar system parameters to analyze and validate the method. after the combined data are filtered, the improved greatest of cell - average constant - false - alarm - rate ( go - ca - cfar ) is used to judge whether moving target is detected or not. in the following, real moving target is detected and its velocity and position is gained through which it is focused well

    將接收的際場景際系統參下模擬的典型相結合,分析、驗證了頻域濾波法的能,並對濾波后的採用改進的選大單元平均恆虛警率( go - ca - cfar )方法進行處理,判斷動目標是否存在;然後對際的動目標進行檢測,準確的估計出目標速度及位置並對目標重新聚焦成像,接下來將聚焦的動目標圖像和常規sar圖像迭加,同時得到了回到位置的動目標聚焦圖像和際場景sar圖像。
  11. These rules consist of the total fit, the mathematics and fatigue physics, and the safety in tail predictions. an analysis of the test s - n data of 16mn steel weld joints reveals that the four models are reasonable if only considering the total fit as the conventional method did. but if by the present three rules, the appropriate models should be the normal or the extreme maximum value

    先前提出的有限下良好假設分佈的確定方法,包括三個原則,即假設分佈形狀與誤差分佈形狀的一致、預測的總體擬合效果、與疲勞失效機制的一致和尾部預測的安全,通過對線均值s - n曲線擬合16mn鋼焊接頭s - n誤差的統計分析,說明應用一般推斷方法, 4種分佈都可合理地作為的統計模型,綜合考慮三原則后,極大值和正態分佈是可能的良好假設分佈。
  12. Normally, management / business games are designed to model reality ( with corresponding business date ) more accurately than computer - simulated scenarios in which the connection with reality is given only loosely via the semantic embedding of the problem

    通常,管理/商業運營程序相比計算機模擬方案,更精確地設計為模型的(使用相應的商業) ,在計算機模擬方案中,這種與的連接僅僅是通過問題語義上的嵌入而泛泛地給出。
  13. On the basis of it, i design and implement ipsec in the network protocol stack of linux kernel, which can verify the encryption, integrity and authenticity of data at the ip level. it solves the problem of identification deceit, malicious modification and interception when datum is transmitted on the network, and the security of network transmission is improved greatly

    在此基礎上,在linux內核ip協議棧中設計並現了ipsec ,在ip層提供傳輸的機密、完整,解決ip報在網路中傳輸時的身份偽造、被人篡改以及被竊聽的問題,使網路傳輸安全得到很大提高。
  14. Analysis and design of data authenticity in audit systems

    數據真實性審計系統分析與設計
  15. In sampling survey we sometimes need facts about sensitive question. attempted open queries about such sensitive issues often result in nonresponse rates or high response biases arising out of willful misstatements or blatant lies

    如果對被調查者直接詢問,被調查者出於戒備,往往會拒絕回答或不回答,這樣就破壞了,而且破壞程度的大小無法度量。
  16. In the first chapter in this dissertation, the possibility and certainty of traditional letter of credit electronicsization have been discussed. in the second chapter, first of all simply introduced the model that electronic letter of credit preceeds. then according to this model, put forward the probably existing safe trouble : the systematic reliability ; secrecy and completeness of data telecommunications ; the social status authenticity of business person and the nature that business action cannot be denied ; the legal effectiveness of the data telecommunications as evidence

    本文第一章論述了傳統信用證電子化的可能與必然;第二章首先簡單介紹了現在國際上電子信用證運做的模式,然後根此運做模式提出可能存在的安全隱患;系統的可靠電訊的機密和完整;交易者身份的及交易行為的不可抵賴電訊作為證的合法有效
  17. With the drive of fap frames, the proposed method can realize realistic facial animation. the generated data is of small size, compatible with all mpeg - 4 system, also suitable for network transportation. the system realized with this method has great advantage for user ’ s operation

    這種方法能夠在連續fap幀的驅動下感較強的三維人臉動畫,該方法量小,適合於網路傳輸,而且具有通用強,計算復雜度低,強,操作簡單等諸多優點。
  18. Under internet entironment, data stored in database management system may be faced with unauthenticated disclosure, modification, counterfeit, broken, and so on. all these threat destroys the data ' s confidentiality. integrity, availability and facticity

    在internet環境下,庫管理系統中存儲的機密可能被非授權的泄露,纂改,中斷和偽造等。這破壞了的保密,完整,可用
  19. This thesis introduces the shipping business characteristics and the main problems of its information construction as well as the information status, network characteristics and e - business development of shipping companies of both abroad and domestic, especially of qingdao. it briefly explains the advantages and disadvantages of client / server network, browser / server network and computer operating systems often used by shipping information system and the performance comparison and choice of large database systems. it makes out the main business flow, network structure and the collective information solution of weidong company, and then illuminates the implement process of wewins in detail : diagnoses of business requirements, design of database and tables, programing skills of main business, development of web site and booking online, design and deploying of faxserver and data security solutions

    本文介紹了航運業的業務特點及信息化建設需重點注意的問題,國內國外特別是青島市航運企業的信息化現狀、網路特點及電子商務發展情況,簡述了航運信息系統採用的客戶服務器結構、瀏覽器服務器結構、操作系統的優缺點及常用大型庫的能比較與選擇,說明了威東公司的業務流程、網路結構特點及信息化總體解決方案,並詳細地說明威東航運信息系統的具體施過程:業務需求的調查分析、庫及工作表的設計、主要業務程序的設計與開發技巧、網站的開發與網上訂艙流程、傳服務器的設計與安裝及安全解決方案。
  20. It has some functions such as the certificate or the revoked certificate request, audit, creation, release, store, revoke and archive etc. its realization provides the possibility of the data authenticity, the integrity, the secrecy, the non - denial and so on for the end user

    證書認證中心ca是整個證書認證系統的核心,它具有證書/證書撤消列表的申請、審核、生成、簽發、存儲、發布、注銷、歸檔等功能。它的現為系統最終用戶提供數據真實性、完整、保密、不可否認等安全服務提供了可能。
分享友人