機電式密碼機 的英文怎麼說
中文拼音 [jīdiànshìmìmǎjī]
機電式密碼機
英文
electro-machianical ciphering machine- 機 : machineengine
- 電 : Ⅰ名詞1 (有電荷存在和電荷變化的現象) electricity 2 (電報) telegram; cable Ⅱ動詞1 (觸電) give...
- 式 : 名詞1 (樣式) type; style 2 (格式) pattern; form 3 (儀式; 典禮) ceremony; ritual 4 (自然科...
- 密 : Ⅰ名詞1 (秘密) secret 2 [紡織] (密度) density 3 (姓氏) a surname Ⅱ形容詞1 (距離近; 空隙小)...
- 碼 : Ⅰ名詞(表示數目的符號或用具) a sign or object indicating number; code Ⅱ量詞1 (指一件事或一類的...
- 機電 : electromechanical機電設備 electromechanical equipment; electromechanical device
-
The structure of this paper goes like this, the first chapter introduce the development of e - b / l in practice and in laws. and draw a conclution that the electrification of the b / l is a history tide. in the second chapter, on the basic of reseach the security trap in e - b / l running, 1 conclude six security elements of, e - b / l : the liability of the system, the authenticity of dealers ' identity. the integrity and secrecy of electronic data, and the validity and evidence effectiveness of electronic data. from the third chapter to the eighth, 1 reseach these elements one by one. the third chapter introduce the establishment of the e - b / l security system, and some related laws the fourth chapter introduce the certification authority of e - b / l. in the fifth chapter, 1 introduce the encrypt of electronic information and some countries ' control on use / import / export crytography. the sixth chapter introduce the concept and principle of digital signature, and reseach some related legal issues. the seventh chapter reseach the legal demand of validity, then come to a conclution that to establish a independent electronic information system is necessary. in the eighth chapter, 1 reseach some countries " regulation on the evidence effectiveness of electronic data
第二章在分析電子提單運作中的安全隱患的基礎上,歸納出其六大安全要素,即系統的可靠性、交易者身份的真實性、數據電訊的機密性和完整性、數據電訊的合法有效性以及交易者行為的不可抵賴性。第三章到第八章分別對這六大要素進行分析:第三章介紹了電子提單網路安全體系的建立以及系統安全保護法規,第四章則介紹了電子提單的安全認證機構,第五章介紹了信息加密技術以及各國立法對密碼技術的進出口及使用的控制,第六章介紹了數字簽名的概念及原理,並以bolero為例介紹了數字簽名的技術方式,對有關法律問題作了論述;第七章首先論述了電子提單對有效性的法律需求,然後結合國內法和國際規則的規定論證了數據電訊制度產生的必然性;第八章通過對各國立法對電子證據的法律效力的規定,論述了對電子交易至關重要的數據電訊的不可抵賴性。Currently, the army is developping military network based oa project with effort among which military email transferring system is an essential application module. this paper proposed a data model of military email transferring as well as detailed design scheme according to the potential threat in email service system, practical condition of current military network and official model as well as document transferring process. it discussed the security requirement of military email transferring system in detail as well as analyzed and design relevent data model, mail exchange protocol and application requirement of cryptogram management
該文針對電子郵件服務系統中存在的安全隱患,基於對目前國內外電子郵件安全技術的分析研究,立足於現有軍事計算機網路的實際現狀,根據目前軍隊的辦公模式、公文傳輸流程,提出了一種適合於軍隊辦公自動化中軍用電子郵件傳輸的數據模型及具體的設計方案,詳細討論了軍用電子郵件傳輸系統的安全服務需求,對相關的數據模型、郵件交換協議、密碼管理的應用需求等進行了詳細的分析和設計。The experiment set we are researching on is composed of four sections, namely remote control through coded radio, tube close driven by a electromotor, tube disjunction pushed by a electromagnet and power supplied by a single - phase dry - type transformer
本實驗裝置主要由四部分構成,即密碼無線遙控、電動機拖動熔管合閘、電磁鐵推斥熔管分斷、單相干式變壓器供電。Three phase dry type power transformer, which make it with those features : safety, reliability, and energy saving, fireproof, flameproof, simple maintenance etc., the design is advanced ; the structure of products is reasonable and the outline is fine, the main performances of the products are much better than the national standards, for example, partial discharge level no - load loss, on - load loss, noise level, it is adaptable for application on heavy humidity and severely pollute places which are near to lake, sea and rive, as well as, high demand - fireproof, heavy load capacity place, such as : high building, airport, station, port, underground, hospital, electrical power station, metallurgy, shopping center, residential area and petroleum chemical industry, nuclear power station, nuclear - powered submarine
非包封線圈三相干式變壓器,具有安全可靠節能防火防爆維護簡單等優點。其設計先進結構合理外形美觀。主要性能指標均優于國內標準,如局放水平空載損耗負載損耗噪聲以及能適應高溫度環境使用等,可安裝在靠近湖海河邊污穢潮濕的環境及防火要求高負荷較大的地區,適用於高層建築機場車站碼頭地鐵醫院電廠冶金行業購物中心居民密集區以及石油化工核電站核潛艇等場所。In the electronic filing process, the return information will be end - to - end encrypted i. e. from the taxpayer to the department with strong encryption technology 128 - bit secure socket layer by using a " session " key and ird s public key
報稅表資料在傳送到稅務局前,系統會使用強化加密技術128 - bit secure socket layer ssl ,以「對稱密碼匙」 session key一組由電腦隨機產生的數值及稅務局的「公開密碼匙」將資料作站對站式加密。In the return filing process, the return data will be end - to - end encrypted i. e. from the taxpayer to the department with strong encryption technology 128 - bit secure socket layer by using a " session " key and ird s public key so that data confidentiality can be preserved
系統會使用強化加密技術128 - bit secure socket layer ssl ,以「對稱密碼匙」 session key一組由電腦隨機產生的數值及稅務局的「公開密碼匙」將資料作站對站式加密,以達保密效果。Man was landing on the moon ; huge computers made thousands of calculations a second ; the basic genetic code had been broken ; major infectious diseases had been defeated through antibiotics and vaccination ; concorde was flying at twice the speed of sound and for the first time we could watch colour tv transmitted live from around the world
人類曾經登上了月球,巨型計算機在一秒的時間內完成成千上萬的計算、基本的遺傳密碼得到破解、通過抗生素和免疫接種使傳染性疾病得到控制、協和式飛機也曾以兩倍于音速飛行,我們也第一次能看到全球實況直播的彩色電視節目。It has been playing an important role in equipping all kinds of arms and services for campaigns, tactical exercises and emergent actions etc. based on the detailed analysis of the exchange ' s architecture and implementing, this thesis points out some disadvantages of the device, such as too many absolute components, not very high enough reliability and security, very large size and weight, operating and maintaining difficultly. considering low power requirement and man - machine interface optimizing design at the same time, the thesis come up with an integrated design scheme to the previous device based on " mcu + cpld / fpga architecture " : ( 1 ) signal frequency dividing, timing frequency producing, 20 customers " led states controlling are implemented in cpld ; ( 2 ) decoding, latching data and controlling signals are implemented in cpld by bus interface between mcu and cpld ; ( 3 ) chip selecting principles and mcu idle mode design are completed under the consideration of low power requirement ; ( 4 ) operation by chinese lcd menus is adopted in the man - machine interface
本項目以該交換機為研究對象,在詳細分析原設備的系統結構和功能實現方式的基礎上,指出該機型在使用過程中存在技術相對陳舊、分立元件過多、可靠性和保密性不夠、體積大、重量大、維修困難等問題,同時結合系統的低功耗需求和優化人機介面設計,本文提出基於「單片機+ cpld fpga體系結構」的集成化設計方案:在cpld中實現信號音分頻和計時頻率生成電路、 20路用戶led狀態控制電路; cpld與單片機以總線介面方式實現譯碼、數據和控制信號鎖存功能的vhdl設計;基於低功耗設計的器件選型方案和單片機待機模式設計;人機介面的lcd菜單操作方式。To remind ais that they should have adequate data security procedures, such as computer log - on and application - specific access passwords and data encryption technology, to protect against theft and unauthorised access of computer equipment or information in open - plan areas
中提醒認可機構,要有足夠的資料保安程序,例如電腦的登入及接達特定應用程式的密碼,以及數據加密技術,以防範在開放式范疇內的電腦設備或資料被盜取及被未經授權取用。Respond to typical level 1 help desk requests and trouble tickets. trouble tickets would include re - setting of passwords, trouble shoot printer problems, trouble shoot pc and application problems
對水平1的桌面需求和問題做出反饋。此類問題主要包括:重新設置密碼;印表機解決問題;臺式電腦問題以及應用程序問題。分享友人