正確性確認 的英文怎麼說

中文拼音 [zhēngquèxìngquèrèn]
正確性確認 英文
validation validate validating
  • : 正名詞(正月) the first month of the lunar year; the first moon
  • : 形容詞1. (符合事實; 真實) true; reliable; authentic 2. (堅固; 堅定) firm
  • : Ⅰ名詞1 (性格) nature; character; disposition 2 (性能; 性質) property; quality 3 (性別) sex ...
  • : 動詞1 (認識; 分辨) recognize; know; make out; identify 2 (建立關系) enter into a certain rela...
  • 正確性 : accuracy
  • 正確 : exactness; correct; right; proper; rightness; rectitude; validity
  • 確認 : affirm; confirm; acknowledge; identification; corroboration
  1. It uses xml encryption, xml signature and ssl technology to design and implement the solution of transmission of tender and evaluation documents separately which are based on the different security requirement. the solutions guarantees the secrecy, incontestability, integrity and identity authentication in the transmission of the bidding documents

    在標書傳遞子系統中根據不同的安全需求,使用xml加密、 xml簽名和ssl技術分別為投標書和評標書設計並實現了安全傳遞的方案,保了標書傳遞中的保密、完整、長期不可否、時間有效和用戶身份
  2. At last, for direct realization of this kind of structure system, an experiment of cable truss structure with d5 and 16 trusses has been done to check its distribution of self - equilibrium stress

    最後,為了對本結構體系有更直觀的感識,向時也為了進一步驗證理論分析的,本文對一直徑5米、由16榻索析架組成的環形索析結構模型進行了實驗研究。
  3. Those of us who practice skepticism for a living often find ourselves tiptoeing politely around the pc police, who think that all beliefs and opinions are equal

    像我們這種靠懷疑論吃飯的人,每每遇到為所有信仰與意見都應一視同仁的政治糾察隊,都會躡手躡腳、禮貌地繞道而行。
  4. Thus, the chinese characters in the phonetic complex category are more difficult than the characters in the other three categories

    此外,在六書中四種造字原則之與難度達顯著差異,由難到易的順序為形聲、會意、象形、指事。
  5. This study examined whether certain categories of chinese characters were more difficult to learn and whether the phonetic component found in some characters plays an important role for children learning to read chinese

    摘要本研究之目的系經由探討六書中的形聲、會意、象形、指事的難度層次以及其對學童的影響;此外,更進步將形聲字分成五個類型,加以探討此五類型的難度以及其對學童的影響。
  6. Correspondence means that each time a principal b completes a run of the protocol as responder using x, which to b appears to be a run with a, then there is a unique run of the protocol with the principal a as initiator using x, which to a appears to be a run with b. secrecy means that messages protected by the protocol can be known by any penetrator

    然後基於strand空間模型給出了其嚴謹周密的證明。 mb協議的主要體現在兩個方面:證屬:當協議主體以某參數完成協議后,被證主體也必須以該參數參與協議運行。秘密屬:保護協議消息不會泄漏給未被授權的主體。
  7. The thesis consist of six chapters and based on the way of propose the question, analysis, then get the solution. it discussed and recognized what the ship transportation cost was in chapter one ; studied the environment and growing trend of the cost in chapter two ; fully discussed and demonstrated the voyage variable costs and controlling method, proposed a mathematic decision model of fuel supplying and get through the validation, proposed the concept of risking cost and addressing many controlling measures to it in chapter three ; discussed a certain running costs, proposed and validated a mathematic model of condition - based maintenance, and put forward many practical controlling method of running costs such as crew payment, repairs, spare parts, stores and lub oils in chapter four ; combining a case of monthly running cost budget and verification, performed a useful learning on running cost budget, forecast and verification in chapter five ; finally fully studied the method of cost - calculating and benefit - analyzing of time chartering container ships on a proposed route

    第一章主要討論並清什麼是船舶運輸成本;第二章研究了船舶運輸成本的生存環境和生長趨勢;第三章詳細論述並論證了航次變動成本的控制措施,提出了燃油補給方案的決策模型並給出了模型的驗證過程,提出了航次風險成本的概念並論述了若干航次風險成本的控制措施;第四章對船舶營運成本中的船員費用、維修保養費用、備件、潤物料費用等幾個主要的可控較高的成本進行了細致的分析並分別討論了相應的控制措施,提出了基於狀態維修決策的數學模型並論證了模型的及具體解算步驟,對于備件、潤物料的控制堅持以科學的預算為前提,以申領、接收、使用、盤存為控制環節,切實做到理論與實踐的密切結合;第五章結合營運成本的預核算的案例,對船舶運輸營運成本的預算及核算進行了有益的探討;第六章結合具體案例對期租班輪的成本測算與效益分析方法進行了細致的研究。
  8. For example, w. rostow considered that the growth of economy was aroused by leading industry, and industrial structure took a very important role in the economy growth ; h. chenery considered that industrial structure and economy growth had a bidirectional causal relation ; however, the most influencing theory was brought forward by s ? kuznets, who considered that it was economic growth which caused the variance of industrial structure advancement, etc. according to cointegration theory and granger causality theory, this paper, based on the summary of multitudinous scholars ’ research literature, carries a positive analysis to the relationship between industrial structure and economic growth, using the time serial data from 1978 to 2003 by

    分析結果驗證了配第?克拉克定律的即經濟的增長是就業人口向第三產業轉移的原因,但卻否了庫茲涅茨的收入決定論,即至少在我國,產業結構的演進是經濟增長的原因而不是相反。同時,本文還原創地論證了,我國的經濟增長與產業結構之間存在惟一的動態均衡關系即協整關系,產業結構與經濟增長之間短期波動與長期均衡關系存在於根據協整方程建立的向量誤差修模型之中。
  9. The fact and the truth are no doubt important in politics, but the makeup is also important. because the political conclusion itself is not based on the fact or the truth sometimes, and the makeup can also form the proper judgment. it is the propriety not the correctness that the political cognition pursues

    在政治中事實和真實固然是重要的,但是虛構也是重要的,因為政治結論本身往往並不以事實或真實為基礎,虛構同樣能形成適當的判斷,政治識追求的不是絕對,而是適當
  10. On the other hand, the opening and insecure internet brings up a new task to the rfmdms based on the internet that how to ensure the security of data transporting in many application fields such as the military equipments " maintenance and etc. the security of data transporting on the internet is mainly made up of three aspects : identity authentication, encrypted data transporting and digital signature

    網路數據傳輸安全主要解決在網路環境下用戶之間身份驗證、數據加密傳輸以及實現數字簽名三個方面問題:用戶身份驗證保證了通信的源點和目的點的;數據加密傳輸保證了數據在網路的中間節點不會泄露通信秘密;數字簽名可以保證發送信息的一方不能對自己發送過的信息進行否
  11. The value relativism holds that any value proposition is not absolutely correct and that all the values are relative. it advocates tolerance and open - mindedness though it is negative in that it obliterates the possibility of the comparison between high values and low ones

    價值相對主義為任何一種價值主張都不具有唯一絕對的,一切價值都是相對的,它倡導寬容和開放的精神,它的消極在於消解了任何價值高下比較的可能
  12. If you, or anyone in your family, have an epileptic condition, consult your physician prior to using the service. immediately discontinue use of the service and consult your physician if you experience any of the following symptoms while using the service - - dizziness, altered vision, eye or muscle twitches, loss of awareness, disorientation, any involuntary movement, or convulsions

    本檢索目錄或許會導引您至有些人為是具攻擊或不適當的網站。啟昌電腦有限公司並不負責檢視本目錄中所列網站之內容,因此,啟昌電腦有限公司對于該內容所涉及之、著作權歸屬,或是其合法如何,並不負任何責任。
  13. Additionally the quality of requirements elicitation decides the correctness of customer ‘ s feedback on completeness and validity of requirements

    此外,需求捕獲過程的質量也將決定客戶對需求的完整可。
  14. Professor george w. wetherill of the university of california in los angeles says that he would give the first two theories each a 10 percent chance and the third theory a 20 percent chance

    洛杉磯加州大學的喬治教授說,他為前兩個理論有百分之十的,第三個理論有百分之二十的,另外的百分之六十他將給「至今我們都還沒想到的事物」 。
  15. Modeling yahalom protocol - creating and putting out share secret bases on symmetry cryptography - in strand space, the security of this protocol is proved by a convenient method which founds on strand space theory. finally, herein this authentication method, we give some advices in cryptographic protocols design

    本文給出了基於對稱密碼演算法產生和發布共享秘密的yahalom協議的串空間模型,並運用基於串空間理論的一種簡便證方法對其安全進行了驗證,證明了該協議的;並且針對這一證方法,給出了安全協議設計的幾點建議。
  16. These ways not only hold relatively good reasoning ability but also are easily realized. moreover, the ways discussed in the paper are in possession of expansibility and can be generally used. by introducing the student model into student self - testing system, the author gets a

    作者把學生模型運用到學生自測系統中,通過測試,得出了一系列表結果,這些結果顯示了加入學生模型的自測系統具有自適應並且能夠比較準地推理出學生的知水平,證明了學生模型中演算法的可行
  17. The axiom system of law theory insist : the reasoning of law science is the same as the one of natural science, one proposition is deduced from another proposition, the correctness of the first proposition depends on the correctness of the second proposition, the correctness of the second proposition depends on the third proposition, and so on

    法律的公理體系理論主張:法學的推理與自然科學推理的方式是相同的,都是由一個命題出發經過邏輯推理得出另一個命題。后一個命題的取決於前一個命題的,而前一個命題的又取決于再前一個命題的,一直可以追溯到一個不能再行追問的而必須被為真的命題? ?公理,而公理的則取決于公眾的一致承
  18. It is necessary to improve the comprehensive capability of judges and standardize the presentation of evidence in order to make sure of the truthfulness of the proof authentication

    要做好這一工作,就要全面提高法官的綜合素質,規范出示證據的行為,以保證證的
  19. The research on this thought can at first enable people deepen the understanding about the source, development, intention and characteristics of it. second, this research confirms that the present macro - economic system and operational mechanism are suitable and reasonable. third, it can provide the afterward economic construction with new theory

    對該思想研究,不僅使我們可以對該思想的淵源、沿革、內涵、特徵等有所理解;還可以加深對我國目前宏觀經濟制度和運行機制的合理識,同時也有助於對我國未來經濟建設的理論創新。
  20. All these questions should only be solved and proved through engineering method and technology realization. in this dissertation, the author tried to illustrate the purpose and aims of internet security by giving a new idea of the boundary of traditional lan. using the ppdr theory, also combining with a real instance and the monitor - auditing software already developed, the author proved the validity and the applicability of this theory model both theoretically and practically. furthermore, illustrated how the security technology strategy is formed and applied by using the reasoning method of system engineering science, hence, advanced a good instance as to how to thoroughly fulfil the internet security engineering

    本論文通過對傳統的內聯網系統邊界和區域定義的充分理解和重新識,對網路安全的目的、目標進行了描述,並運用p ~ 2dr理論模型,結合所參與的一個網路安全工程實例和已開發完成的內聯網監控審計軟體,從理論和實踐兩方面證明該理論模型和對一些定義理解的和可實現,以系統工程學的思維方式闡述了安全策略的形成過程和實現方法,對網路安全工程實際應用提出了可資借鑒的實例。
分享友人