文件加密系統 的英文怎麼說

中文拼音 [wénjiànjiātǒng]
文件加密系統 英文
efs
  • : Ⅰ名詞1 (字) character; script; writing 2 (文字) language 3 (文章) literary composition; wri...
  • : Ⅰ量詞(用於個體事物) piece; article; item Ⅱ名詞1. (指可以一一計算的事物) 2. (文件) letter; correspondence; paper; document
  • : Ⅰ名詞1 (秘密) secret 2 [紡織] (密度) density 3 (姓氏) a surname Ⅱ形容詞1 (距離近; 空隙小)...
  • : 系動詞(打結; 扣) tie; fasten; do up; button up
  • : Ⅰ名詞1 (事物間連續的關系) interconnected system 2 (衣服等的筒狀部分) any tube shaped part of ...
  • 文件 : 1 (公文、信件等) document; file; papers; instrument 2 [自動化] file; 文件保護 file protection; ...
  • 系統 : 1. (按一定關系組成的同類事物) system 2. (有條理的;有系統的) systematic
  1. This paper discusses some important technologies closed to dtv receiving system deeply, base on scn and cctv. it includes mpeg - 2 system level, dvb service information, conditional acceptance. it also describes how to realize epg, ca, upgrade on line etc based on the dtv service information technology at lengtho now, the production of this design is applied to the digital tv products of cctv and sichuan tv net

    本論結合數字電視在四川廣電網和cctv的具體應用情況,深入研究探討了與數字電視接收相關的部分關鍵技術,包括mpeg - 2層結構分析、 mpeg - 2和dvb業務信息分析、數字電視條接收基本原理和解擾及技術,並詳細敘述了如何運用數字電視業務信息技術實現了電子節目指南、條接收、在線升級等基本業務。
  2. In e - business, security electronic payment always plays an important role in the electronic transaction. at the end, we analyze the related online payment technology, implement an online payment prototype component system based on the java cryptography architecture and discuss the online payment component technology briefly

    的最後還分析了網上支付的相關技術,並對現有的網上支付的安全性進行折衷,基於jdk的實現了一個網上支付原型組,對網上支付組技術做了初步探討。
  3. The function of the software use pc - computer to dispose the output signal which is produced by the device as following steps : ( 1 ) to input data by parallel interface ( 2 ) to record and form a file ( 3 ) to demonstrate results step by step ( 4 ) the results could be compiled ( 5 ) it can synthesis in the permitted error scope, substituted original dot for line or arc, finally we could get a graph that is described by some simply curve. ( 6 ) to convert these graph into a program, which used in the cutting process of numerical control. ( 7 ) the software also includes some protective methods

    處理軟體的作用是:利用pc兼容機,將上述裝置的輸出信號( 1 )通過并行口輸入( 2 )記錄成( 3 )逐點顯示出來( 4 )可人工進行化簡,編輯(刪、改點)等( 5 )可在給定誤差范圍內進行人工擬合,用直線和圓弧取代原來的點,得到一個與原圖形的誤差在規定范圍內,又消除跟蹤過程中因受到各種干擾而造成的缺陷,由盡可能少而簡捷的數學曲線描述的圖形( 6 )把這些圖形轉化成用於編制數控線切割工程序及autocad能夠識別的(主要指dxf格式) ( 7 )該軟體還有一定的措施。
  4. The table will write down all about the electronic records during their life period. the content noted in the table will be the only basis on original and reality " testing of electronic records ". the major task of the second levels is to build the tight filing rules, moreover, combined the " life cycle table ", to build the test system to assure the original and the reality of the information during filing ; the assignment of the third level is to build testing and restoring measures of the original and the reality. by maintaining the media of electronic archives or building information file of electronic archives etc, electronic archives can maintain their available ^ visuak understandable during their deadline ; meanwhile, to build the safe control of the system through the workers dispersed authorization and deterring skills, to formulate the standards of the protective system, such as the standard of the basic structure of united electronic records ^ electronic archives. all of this is important to protect the original and the reality of electronic records and electronic archives

    「生命周期表」所記錄的內容將作為電子歸檔時檢驗原始性、真實性的唯一依據;電子歸檔管理層中的主要任務是要建立起嚴的歸檔制度,同時結合「生命同期表」建立檢驗措施保證電子在歸檔過程中信息內容的原始性、真實性;電子檔案保管層中主要任務是建立電子檔案數據原始性、真實性檢驗及原始數據恢復管理措施,通過對電子檔案載體的維護、建立電子檔案維護管理的信息檔等工作,確保在保管期限中的電子檔案保持其可用性、可存取性、可理解性:建立電子與電子檔案原始性、真實性保護體安全控制,通過對工作人員授權分散化、建立用戶標識與認證技術等措施確保「保護體」安全運行;強「保護體」涉及的標準與規范的制定工作,如建立一的歸檔電于、電子檔案基本結構等標準對保護電子、電子檔案信息原始性、真實性有著重要意義。
  5. Present methods generally based on the statistics of earthquake damage, expert experiences, theory analysis and experimental researches have obvious advantages, disadvantages and certain scopes of application ; ( 2 ) different prediction methods should be adopted against different building conditions, sites, intensity and experiences etc to predict earthquake damage of buildings for prospective accuracy, dependability and availability ; ( 3 ) earthquake damage matrix, which is the foundation of earthquake damage prediction, of 7 kinds of building in the urban areas of zhangzhou city under intensity 6 to 9 has been set up. the damage conditions of different buildings under different intensity are as followings : all kinds of structures are basically intact under intensity 6 ; the reinforced concrete structures are basically intact under intensity 7, but other kinds of structures are destroyed slightly ; the reinforced concrete structures are still basically intact while other kinds of structures are destroyed intermediately under intensity 8 ; the reinforced concrete structures are destroyed slightly, single - story factories and open houses are destroyed intermediately and other kinds of structures are destroyed seriously under intensity 9 ; ( 4 ) the results of earthquake damage predicting of buildings embody the damage when earthquake happens in the future. thus, further identifications and reinforcements should be considered to buildings that will be destroyed intermediately or more under the earthquake with 10 % exceeding probability in future 50 years ; ( 5 ) the direct economic losses caused by damage of buildings resting with the area, structural type, intensity and damage of all kinds of buildings are the main part of the losses of the city in an earthquake ; ( 6 ) the direct economic losses increased progressively toward high intensity by 2 or 3 times

    基於上述研究,得出的主要結論有:建築物震害預測是一個模糊的、的、復雜的問題,現有的方法很多一般都是以震害計規律、專家經驗、理論分析和試驗研究為依據,有其自身的優缺點和一定的適用范圍;應針對不同的建築物條、場地條、地震強度和已有經驗等,採用不同的預測方法進行建築物震害預測,以使預測結果達到預期的精確性、可靠性和可操作性;建立了漳州市區7類建築物在6度9度地震作用下的震害矩陣,成為指導抗震防災的重要依據,各類結構的震害情況表現為: 6度地震作用下各類建築物基本完好; 7度地震作用下除鋼筋混凝土結構基本完好外其餘以建築輕微破壞為主; 8度地震作用下鋼筋混凝土結構仍以基本完好為主而其餘建築以中等破壞為主; 9度地震作用下鋼筋混凝土結構以輕微破壞為主,單層工業廠房和空曠房屋以中等破壞為主,其餘建築以嚴重破壞為主;建築物的震害預測結果體現了未來地震來臨時的震害程度,在編制漳州市區抗震防災規劃時,對于遭遇50年超越概率10的地震影響發生中等以上破壞的建築物應考慮進行抗震鑒定和固;由建築物的破壞所造成的直接經濟損失是城市地震經濟損失的主要部分,重慶大學碩士學位論摘要其主要與建築物總面積、結構類型、地震烈度和各類建築物的震害程度有關;不同烈度造成的直接經濟損失按2一3倍向高烈度方向遞增,漳州市區直接經濟損失由6度至9度的比例關為1 : 2 . 8 : 8 . 6 : 22 . 8 ;遭遇基本地震設防烈度( 7度)時,漳州市區直接經濟損失約4 . 5億元,無家可歸人員約40000人,且以磚木結構和多層磚混結構的震害損失最大;地震造成的人員傷亡主要與建築物倒塌及嚴重破壞的程度和總面積以及震時的建築物室內人數切相關,地震時無家可歸人員主要與住宅倒塌、嚴重破壞及中等破壞的程度和總面積以及城市人均居住面積切相關。
  6. The ntfs file system includes many performance enhancements and new features such as per - user disk quotas and file encryption

    Ntfs也包含許多增強性能和新功能,例如對每個用戶的磁盤限額、等。
  7. Using the high sensitivity to the initial value of the chaos system, an assistant key is imported based on conventional chaotic encryption algorithm

    這種方法基於傳混沌演算法,利用混沌對初始條的敏感依賴性,在圖像過程中引入一個輔助鑰,可有效抵抗已知明攻擊。
  8. In this dissertation, the pivotal points relating to conditional access system, including the framework of mpeg - 2 system layers, the de - multiplexing of mpeg - 2 system, the service information table of mpeg - 2 and dvb, the encryption and decryption method for digital tv conditional access system, are fully discussed according to the market requisition. there is also a probe into the feasibility and security aspect of the coherent descramble algorithm

    本論結合市場需要,詳細研究探討了與數字電視有條接收相關的部分關鍵技術,包括mpeg - 2層結構分析、 mpeg - 2復接技術、 mpeg - 2與dvb中業務信息表分析、數字電視有條接收解擾技術
  9. We regulate a command - response pair for the encryption / decryption operation based on permutation code, combining rsa and md5 used in cos safety module, and bring forward a safety transmission process for documentation

    並給排列碼操作賦予相應的命令應答對,結合智能卡操作的安全模塊中的rsa演算法和md5演算法,提出了使用這種數字簽名卡進行安全傳輸的過程。
  10. Then the article introduces the design and realization of user level monitor module and kernel level monitor module detailedly, including how to realize the system clipboard monitor, the file motion control, file print job interdiction, and the directory share monitor in system ’ s user level, how to realize the process accessing filter, the process privilege control, the file encryption and decryption in system ’ s kernel level

    詳細給出了用戶層監控模塊和內核層監控模塊的設計和實現,包括如何在操作用戶層實現剪貼板監控、移動控制、共享目錄監控、列印阻斷等,如何在內核層實現進程訪問過濾、用戶進程權限控制、透明功能。
  11. In this paper, the alumina ceramic was prepared under normal pressure and low temperature, the mechanical properties, micromorphology, microstructure of grain boundary and phase composition of the alumina ceramic, and the precision shaping and cold processing of the femoral head were systematically studied ; the effects of the additives, the relation between microstructure and mechanical strength, the sintering mechanism of the material and the influence factors of the structure and properties of the alumina ceramic were discussed also

    在常壓低溫條下制備了氧化鋁陶瓷,研究了氧化鋁陶瓷材料的力學性能、微觀形貌、晶界顯微結構、相組成和股骨頭的精成型、冷工,並討論了添劑的作用、材料顯微結構與力學強度的關、材料的燒結機理及影響氧化鋁材料結構與性能的因素。
  12. Several influence factors to result plasma drift in hainan were analyzed. in this paper the characteristics of ionospheric parameters variation were analyzed systematically and some new results in storm - time such as seasonal behaviors were obtained ; it is the first time to investigate the ionospheric drift behavior in hainan and some new results was obtained, the relationships between each two plasma drift velocity components in storm time in hainan were found and the electric filed variation in hainan ionosphere also was obtained ; the results also show that there are big differences of the ionosphere parameters bo and bl obtained from the data with that obtained from the iri - 2001 applied for hainan ; a new phenomena was found during a strong magnetic storm, that a layer with very strong electron density and density grad was found during the recovery phase of the storm, its horizontal scale is beyond 100km and temporal scale is about 2 hours, this phenomena repeated 3 times continuously. a type of negative disturbance in high and low latitude but positive disturbance in east - asia also has been found

    較為地給出了海南地區電離層的參數變化特徵,特別是得到了一些暴時與以往不同的季節特性;第一次給出了海南地區的電離層等離子體漂移特徵,發現等離子體漂移暴時擾動在三個方向上有內在的聯,得到了電場變化曲線;研究結果還表明海南電離層的半厚指數和形狀參數等與國際參考電離層iri - 2001存在很大差別;通過對強磁擾動事期間的參數變化特性分析發現,在磁暴恢復相期間海南地區電離層底部存在一個電子度非常大的高度區,高度區底部電子度梯度隨高度急劇增,該區域的水平尺度可達100公里以上時間尺度約為2小時,連續出現過三次,這是一個在海南從來未發現的新現象;研究還發現了暴時東亞地區電離層擾動會出現高低緯負相而中緯正相的現象。
  13. The article elaborates on medical treatment insurance integrated services network mis at last, especially details the issues in actualizing it : the strategy of network security, the technique of popedom management, the technique of multilayer - distributing bases on groupware, encrpytion checkout, the mode of popedom management bases on roles, audit and control of operation - log, and theory of closed loop safety control

    章最後結合醫保綜合業務網路管理信息實例以詳細說明,尤其在實施過程中採用了網路安全策略,權限管理技術,基於組的多層分散式技術,校驗,基於角色的權限管理方式,操作日誌審計監控,閉環安全控制理論等問題進行了詳細的探討。
  14. The research theme of this dissertation is the working mechanism of bionic thermostable component. combined with the project of national natural science foundation ? study on bionic thermal robust component for precision machine tools " ( no. 59805018 ), actively absorbed the original thoughts and new technologies of correlative subjects, piezoelectric bionic intelligent structure and its applications on the engineering realm are systematically and thoroughly studied and many innovative and unique views are put forward so as to improve the control performance of piezoelectric intelligent structure

    以仿生熱穩定構的工作機理為研究主線,結合國家自然科學基金項目? 「精工設備仿生熱魯棒構的研究」 ( no . 59805018 ) ,積極吸收相關學科的新思想、新技術,地研究壓電仿生智能結構及其在工程領域的應用,改善壓電智能結構控制性能,並將其引入精機械熱變形控制研究領域。
  15. In this paper, the design idea, the system composition, the theory of the primary algorithm and the function composition of every sub system are introduced mainly

    主要介紹了「基於級數據應用」的設計思想、結構、主要演算法的原理、各子的功能結構等。
  16. Of particular interest are those that provide the ability to manage many aspects of cryptography, the extensive math libraries, and the external access to web services, files, and business - to - business communication systems

    其中尤其重要的是提供了對諸多設置進行管理的能力、豐富的數學庫以及從外部訪問web服務、和企業對企業通訊的能力。
  17. In this paper, a creative precise and carry - home stiffness testing system is designed for measuring stiffness of large sheet metal. this system overcomes difficulties such as instability, being hard to test displacement. except for the mechanism, this system uses a torsion sensor with high accuracy, a suit of step motor s and a pc with the given software to get an ideal effect in practical test

    針對大型薄板類零部剛度測量中的難點,比如力的載不穩定、變形量測量困難等,設計出了一套精的便攜式剛度測量在機械裝置基礎上利用了高精度傳感器、步進電機和計算機,並結合自主開發的測控軟體,在實際測試中,達到了較高的測量精度。
  18. Under finite precision, ways we always seek is easy to implement. and we encrypt the fh system with chaotic stream cipher. simulation results show that the security properties of fh sequence have been improved and the security of information is guaranteed even the fh patterns are broken

    大量的對比分析試驗表明,該鑰生成器生成的混沌序列碼的碼學特性良好。同時,本還努力的尋求一種在有限精度條下混沌的可實現方案,並利用混沌序列碼對跳頻進行
  19. The paper designs a data encryption system for network communication, which combines the private - key algorithm 3des with the public - key algorithm rsa to encrypt data and signs on files with public - key algorithm rsa and one - way hash function md5. the system can actualize encryption of data, digital signature and identification efficiently and ensure privacy, authenticity, integrity and nonrepudiation of data

    在此基礎上,本設計了網路通信數據,該將對稱演算法3des與非對稱演算法rsa相結合對數據,用公鑰演算法rsa和單向散列函數md5實現對的數字簽名,有效地實現了網路通信中的信息、數字簽名、身份認證等功能,保證了發送方所發送信息的秘性、鑒別性、完整性及不可否認性。
  20. Spark pc lock is special designed to protect your individual information security of your pc. it offers encrypted disk protection, log on function and files folders encryption etc. it is cost - low and very ease of use for everybody

    Spark pc lock是一種基於硬體身份認證方式的桌面數據安全保護,它提供鎖機器,保險箱,網路屏蔽,網站過濾,等功能。
分享友人