數據認可 的英文怎麼說

中文拼音 [shǔrèn]
數據認可 英文
iec laboratory management system
  • : 數副詞(屢次) frequently; repeatedly
  • : 據Ⅰ動詞1 (占據) occupy; seize 2 (憑借; 依靠) rely on; depend on Ⅱ介詞(按照; 依據) according...
  • : 動詞1 (認識; 分辨) recognize; know; make out; identify 2 (建立關系) enter into a certain rela...
  • 數據 : data; record; information
  • 認可 : approve; accept; confirm; ratification; give legal force to
  1. The structure of this paper goes like this, the first chapter introduce the development of e - b / l in practice and in laws. and draw a conclution that the electrification of the b / l is a history tide. in the second chapter, on the basic of reseach the security trap in e - b / l running, 1 conclude six security elements of, e - b / l : the liability of the system, the authenticity of dealers ' identity. the integrity and secrecy of electronic data, and the validity and evidence effectiveness of electronic data. from the third chapter to the eighth, 1 reseach these elements one by one. the third chapter introduce the establishment of the e - b / l security system, and some related laws the fourth chapter introduce the certification authority of e - b / l. in the fifth chapter, 1 introduce the encrypt of electronic information and some countries ' control on use / import / export crytography. the sixth chapter introduce the concept and principle of digital signature, and reseach some related legal issues. the seventh chapter reseach the legal demand of validity, then come to a conclution that to establish a independent electronic information system is necessary. in the eighth chapter, 1 reseach some countries " regulation on the evidence effectiveness of electronic data

    第二章在分析電子提單運作中的安全隱患的基礎上,歸納出其六大安全要素,即系統的靠性、交易者身份的真實性、電訊的機密性和完整性、電訊的合法有效性以及交易者行為的不抵賴性。第三章到第八章分別對這六大要素進行分析:第三章介紹了電子提單網路安全體系的建立以及系統安全保護法規,第四章則介紹了電子提單的安全證機構,第五章介紹了信息加密技術以及各國立法對密碼技術的進出口及使用的控制,第六章介紹了字簽名的概念及原理,並以bolero為例介紹了字簽名的技術方式,對有關法律問題作了論述;第七章首先論述了電子提單對有效性的法律需求,然後結合國內法和國際規則的規定論證了電訊制度產生的必然性;第八章通過對各國立法對電子證的法律效力的規定,論述了對電子交易至關重要的電訊的不抵賴性。
  2. As a whole the system may compart three modules : ndis drivers in the kernel mode, the dll program in the user mode and the user application program, adopting the share memory technology three modules realize the data share of the control canal rule, the encapsulation data and the network neiborhood name and so on, so we can easily finis1 " the packet authentication by the control canal rule, improve the filtering efficiency of the system. whereas the current of firewall technology, the system has wide utily value and business value. this software is based on windows 2000 operating system, the programming language is chosen as visual c + + 6. 0 and win2000 ddk

    從總體上以劃分為以下三個模塊:核心層的ndis網路驅動程序、應用層的動態鏈接庫程序以及用戶應用程序,這三個模塊之間通過內存共享技術完成對控管規則、封裝、網上鄰居名字列表等的讀寫操作,從而很方便的根控管規則實現了對網路封包的證操作,提高了系統的過濾效率。鑒于目前防火墻技術的發展趨勢,本系統具有廣泛的實用價值和商業價值,因此具有一定的推廣前景。軟體的開發基於windows2000操作系統,開發語言採用visualc + + 6 . 0和win2000ddk 。
  3. Fundamental of laser 40ar / 39ar dating method : our laboratory has successfully set up the laser microprobe 40ar / 39ar geological dating method. our works include adjustment of the high - gain electron multiplier in mass spectrometer and correction of mass discrimination, adjustment of the laser, test for absorption ability of minerals to laser, designing and manufacturing high - vacuum sample chamber, sample preparation and irradiation, research on the variability of j values on the surface of rock chips, measuring atmospheric argon, determination and correction of blanks and ages, etc. the laser microprobe technique is particularly effective for some geological samples. it can be used, for example, for research of distribution of the components in extremely small samples that are very difficult to be separated and purified and those which contain excess argon

    本文首先從常規~ ( 40 ) ar ~ ( 39 ) ar階段升溫定年實驗室的改進入手,進而建立了激光~ ( 40 ) ar ~ ( 39 ) ar定年實驗室,利用這兩種先進同位素地質定年方法,結合其他手段,對青藏高原腹地和北緣的阿爾金斷裂系多期地質事件進行了詳細的同位素年代學研究:一、參照國際先進實驗室的流程,對我們的常規~ ( 40 ) ar ~ ( 39 ) ar階段升溫實驗室在樣品的預處理、樣品的照射條件和系統空白測量及校正等方面進行了改進,使之產出的同位素年代靠並為國際同行所承
  4. The relationship between shock wave velocity and particle velocity of no - porous enstatite can be expressed as : d = 3. 771 + 1. 516u where the unit of velocity is km / s

    為,從p phugongiot看,在50 160gpa范圍內,頑火輝石的高壓相是穩定的。
  5. In this paper, a safe, reliable, and intellectual control plan is provided aiming at the heat charge for dwelling district, which contains epigynous machine responsible for data processing and hypogynous mahcine responsible for unlocking the valve, by means of serial communication between them, combining homemade three - channel valve, to adminstrate the charge data and the valve efficiently. the main idea is based on the homemade three - channel valve. the vavle is locked at peacetime, while it is opened with the help of open tool and a water flow in the caliduct. as soon as the flow stops, the valve locks automatically. the open tool has data in its memory, and implement function by lcd and keyborad. so it can identify data and drive motor, to open the valve intellectually. the epigynous machine database manage system administrator the dweller information, standard heat charge and payment infomation etc, including store, configure, query, print etc, then store in the memory of open tool. as a result, the plan can do well in the experiment

    此閥平時是鎖閉的,只有用開啟器配以暖氣片中的水流才打開,一旦水流斷開,則此閥會自會鎖閉。而開啟器則是根其存儲器中的配以液晶顯示及小鍵盤,完成及電機驅動,自動對相應用戶的三通閥打開特定角度,完成開啟任務。上位機庫管理系統完成對用戶信息、熱費標準、繳費信息等原始的常規管理,包括存儲、設置、查詢、列印等,最後將處理后的傳到開啟器中存儲。
  6. Notwithstanding these efforts, the hkma considers that given the importance of this issue for public confidence, authorized institutions should take extra care to ensure the integrity of customer data, e. g. by printing the data as hardcopy reports or copying the data onto a medium that is separate from their computer systems such as micro - fiche or cd - rom

    盡管如此,金管局為由於有關事項對公眾信心有重大影響,所以機構應格外小心,確保客戶整全,例如把列印,保存有關的列印本,或把復制至電腦系統以外的縮微菲林膠片或唯讀光碟等儲存媒體。
  7. If the world persons " irises get into a database, it would have appeared the false and refuse false possibility to very fewness

    即使全人類的虹膜信息都錄入到一個庫中,出現假和拒假的能性也相當小。
  8. The article points out the importance and necessity of the information - security from its actuality in our country. the resources in the information system, for instance, hardware, software, data, document, operator, meterial and so on, are evaluated and gived safety grade firstly. and then, it analyses the menace including the nonauthorized access, the information leak, the refused sevice, the internal objection which the system will take. the following are the corresponding control police : confirm the users " rights and duties, including the mode of using account, the limit of accessing resource, the application of password, the building of backup ; confirm the administrators " right and duties, including physical safety, system configuration, account configuration and usufruct, password management, audit and control, backup and individual intimity ; run - of - mill measure of security defence, including access control, symbol and identification, integrality control, password technique, firewall system, audit and resumption, safety of operating system, safety of database system, defence of computers " virus and resisting - deny protocol. in the end, the article offers the strategies of disposing the safety - accident and analyse after ithow. to report it, how to solve it in phase, and how to avoid it happening again. in a word, the article presents a holistic resolvent about keeping away the information system ' s security, and supplies a essential frame for its configuration, management and application

    然後,對系統能受到的威脅,包括非授權訪問、信息泄漏、拒絕服務和內部缺陷等進行分析,並提出了相應的控制策略:確定用戶的權力和責任,包括帳戶使用方式、資源訪問權限、口令應用以及建立備份等;確定系統管理員的權力和責任,包括物理安全、系統配置、帳戶設置及使用權限、口令管理、審計和監控、備份以及個人隱私等方面;一般性的安全防護措施:存取控制、標識和證、完整性控制、密碼技術、防火墻系統、審計和恢復、操作系統安全、庫系統安全、計算機病毒防護和抗抵賴協議等。最後,對事故處理和事後分析提供策略,如何報告安全事故,如何協調解決安全事故,如何避免安全事故再次發生。總之,本文對信息系統安全防範工作給出一個整體的解決方案,為其在配置、管理和應用方面提供了基本的框架。
  9. But while there is much agreement about the reliability of the chinese figures, the real pace of growth in china is highly contested

    但是,雖然很多人為中國(經濟)信的,但中國經濟的實際增長速度卻飽受爭議。
  10. The g8 is believed to be considering mandating a uniform electricity - use standard for home appliances on standby mode, and is likely to call again on the oil industry to improve the reliability of its supply and demand data

    外界為,八國集團正考慮為家用電器制定統一的待機模式耗電標準,而且很有能再次呼籲石油工業提高其供求靠性。
  11. As an important technology on data authentication, digital signature can be used to identify the instance of denying, forgery, tamper and imitation in today ' s communication network. it can provide the data integrity, figure authentication, and also prevent from disavowal of a sender during data transmission. our task focuses on studying the key technology in digital signature. the direct goal is to implement digital signature on the basis of dsp

    在現代的字通信網路中,字簽名作為證技術中的一項關鍵技術,以解決否、偽造、篡改及冒充問題,用來保證信息傳輸過程中的完整性,提供信息發送者的身份證和不抵賴性。
  12. Provides an additional layer of security against potential denial of service attacks when deserializing untrusted data

    情況下, xmlserializer為反序列化不能受到的拒絕服務攻擊增加了一層安全保護。
  13. Based on the 3c evaluation model and index system, a model of evaluating the competitiveness of international shipping enterprises is etablished by adopting fuzzy - evaluation method and " 1 ~ 9 the former, 10 / 10 - 18 / 2 the latter " to identify weight. 15 international liner companies are selected for positive research on the basis of availability of information, and the results of which are accepted by relevant enterprises and specialists

    摘要在提出國際航運企業競爭力3c評價模式及評價指標體系的基礎上,運用模糊綜合評價方法,並採用「前端用1 ~ 9標度操作,後端用10 / 10 ~ 18 / 2標度計算」確定權重集,構建了國際航運企業競爭力綜合評價模型,結合獲性,選取了巧家國際班輪公司,展開企業競爭力的實證研究,並得出了企業與專家同的結論。
  14. This shift became distinct after annealing at 1100, which showed a decrease of the density and was considered that the interstitial impurity had diffused from sio2

    現有為退火過后氧化層的密度變小,能是氧化層內部間隙式雜質擴散出來的結果。
  15. The most commonly applied assay parameters accuracy, precision, detection limit, specificity, selectivity, calibration linearity or nonlinearity, stability, recovery, reproducibility and repeatability are carefully defined along with some recommendations required for assessing data acceptability arrived at the conference on analytical methods validation

    美國分析方法證會議曾推薦用分析參(準確度,精密度,檢測限度,專屬性、選擇性、校準線性或非線性、穩定性、回收率、重演性與重覆性)作為判斷實驗采納性。
  16. Sure, you don t have to encrypt the data - you can use a message authentication code - but most users are unlikely to anticipate this risk

    您確實不必加密以使用消息證碼( mac )但大多用戶未必預見到這一風險。
  17. The figures derived from the survey relate only to rmls provided by authorized institutions on the basis of first mortgages and which the reporting institution knows to be in negative equity i. e. the outstanding loan amount with the reporting institution exceeds the current market value of the mortgaged property. not included in these figures are some 58, 400 rmls associated with government - funded co - financing schemes and another 23, 200 rmls associated with private sector co - financing schemes

    調查所得字僅涵蓋由機構提供並機構所知為負資產即尚欠受訪機構的貸款額超出有關物業的當前市值的一按貸款,並不包括與政府資助二按計劃有關的約,宗及與私營機構二按計劃有關的約,宗住宅按揭貸款。
  18. You can change the default behavior and store view state in another location such as a sql server database by implementing a custom

    類以存儲頁,您以更改默行為並將視圖狀態存儲到另一個位置(如sql server庫) 。
  19. The two assessment methods have been compared and on the basis of it, the sustainable assessment method based on spatial data of grid model is more accurate. thus, if the sustainable assessment of regional land use system is needed, the one based on spatial data of grid model can be basis of sustainable assessment with the help of fuzzy theory test, and briefly to say, two methods will be integrated to apply i

    並對這兩種評價方法進行了比較,為基於網格空間持續性評價相對更精確一些,在區域土地利用系統持續性評價時,以以基於網格空間持續性評價為基礎,輔以模糊理論的持續性評價為驗證,兩者結合作出區域土地利用系統持續性的綜合評價。
  20. The reliability of forecast result is not only decided by the forecast methods, but also decided by the reliability of the basic data. the second one is not soluble by theory studies, but some instructive knowledge for the first problem can be get through the analysis and compare for different forecast methods

    因為預測結果的信性不僅取決于所採用的預測方法,也取決于所採集靠性,後者是理論工作者所無法解決的,前者則以通過對不同預測方法的分析比較得到一些指導性的識。
分享友人