無條件安全 的英文怎麼說

中文拼音 [tiáojiànānquán]
無條件安全 英文
discretionary security
  • : 無Ⅰ動詞(沒有) not have; there is not; be without Ⅱ名詞1 (沒有) nothing; nil 2 (姓氏) a surn...
  • : Ⅰ名詞1 (細長的樹枝) twig 2 (條子) slip; strip 3 (分項目的) item; article 4 (層次; 秩序; 條...
  • : Ⅰ量詞(用於個體事物) piece; article; item Ⅱ名詞1. (指可以一一計算的事物) 2. (文件) letter; correspondence; paper; document
  • : Ⅰ形容詞1 (完備; 齊全) complete 2 (整個) whole; entire; full; total Ⅱ副詞(完全; 都) entirely...
  • 無條件 : unconditional; without preconditions; unreserved
  1. Thus, touched by masters loving heart, on july 26, deputy fire marshal kim shin - dong opened the lecture hall of the daegu city fire department headquarters for a special ceremony to receive masters contribution, along with gifts including bedclothes sets and masters publications. these items were beautifully wrapped in decorative boxes to lift the firefighters spirits and wish them a peaceful rest and recovery

    有感於師父的愛心,消防署副署長金信動先生特別於七月二十六日在消防署的大廳舉行別開生面的受贈儀式,我們所準備的精美禮盒中包括有慰問金套床巾及師父的出版品等禮物,藉此傳達我們希望受傷的消防人員能心靜養盡快復元的祝福。
  2. On the whole, bb84 + quantum cryptographic key distribution project is far from a termless absolute secure one in the perspective of theory, because the efficiency is enhanced on the sacrifice of security decreased. what ' s more, some works are done to strengthen the cryptograph in the field of identity authentication and other sectors, and the enhancement of efficiency strongly supports the cryptograph

    綜合來看, bb84 +量子密鑰分配方案並不是一個理論上絕對的方案,他在性能上的降低得到的代價卻是效率的極大提高,並且此方案在身份認證和其他環節上對其有所降低的性能作了保密加強的工作。
  3. The termless security of quantum cryptographic key protocol is based on the quantum non - clone principle and heisenberg uncertainty principle. whilst, these two characteristics mentioned above contributes greatly to solve the problems of low transmitting rate, complicated operation and forge - identity assault in the bb84 protocol

    量子密鑰協議的無條件安全性能主要建立在量子不可克隆定理和heisenberg的測不準原理兩大理論基礎上的,但也正是由於量子的這兩種特性導致在bb84協議中存在了傳輸效率低下、操作復雜、假冒身份攻擊等方面的問題。
  4. Quantum key distribution protocol makes use of single photon of quanta - randomicity to achieve unconditioned security key distribution, especially which is the realism significance of research way in quantum information at present

    量子密鑰分配( qkd )協議利用單光子固有的量子隨機性實現具有無條件安全性的密鑰分配,是目前量子信息領域中特別具有現實意義的研究方向。
  5. On the other hand, the harmonic and surge current in capacitor banks is restrained so that the capaci - tor is protected by reactor. since this type of reactor has a dry - type air - cored structure, no - core structure without ferromagnetic induc - tion effect, it is provided with the feature of good linearity and low noise, so that the product is convenient for maintenance and ope - ration in all weather

    該型電抗器採用乾式空心結構,維護簡單,運行鐵心,不存在鐵磁飽和,電感值不會隨電流變化而變化,線性度好,噪聲低,適合天候下運行。
  6. In the comprehensive arrangement, the term " fixed base " as mentioned under the third tax exemption condition in clause 2, article 3 of the limited arrangement has been removed

    面性排刪除了非面性排第三第二款第三個免稅所說的固定基地,因有關含義已包括在常設機構內,須另作表述。
  7. Qualitative inspect branch : responsible food produces licence management job, responsible treatment feeds character to measure safe admittance system, guard a pass into the factory around raw material, standard of manufacturing facilities, technological process, product, examine equipment and ability, ambient conditions, store carry, pack wait for a respect to undertake checkup ; investigate production and sale lawfully fake food and the irregularity that produce without card behavior

    質監部門:負責食品生產許可證治理工作,負責加工食品質量準入制度,圍繞原材料進廠把關、生產設備、工藝流程、產品標準、檢驗設備與能力、環境、儲運、包裝等方面進行審查;依法查處生產和銷售假冒偽劣食品和證生產的違法行為。
  8. The main results of this thesis are as follows : 1. based on the thoughts of " diffie - hellman decision problem " and anonymous signature, an unconditionally anonymous sign - cryption algorithm is proposed and its security proof is given

    研究成果體現在如下幾個方面: ( 1 )目前的簽密演算法要求簽密人的身份是公開的,作者利用匿名簽名的思想,給出了一個匿名的簽密演算法,並給出了相應的性證明。
  9. The author holds that credit is the basic condition for any transactions in the market. for financial assets that is neither tangible assets nor intangible assets, there should be statutory credit rating requirement to assure transaction safety in the market

    認為信用是市場交易的基礎,對介乎于有形財產和形財產之間的金融資產在交易前,須有法定的形式進行信用評級,以保障市場交易
  10. Accidents regularly happen across the country due to companies neglecting fire and safety codes, using poor equipment as well as ignoring environmental standards in pursuit of profits

    由於許多公司忽視防火和規范,使用質量差的儀器,同時在追求利潤的過程中視環保標準,國生產事故頻頻發生。
  11. This i not only thought possible, but easy, and pleas d my self extreamly with the thoughts of making it, and with my having much more convenience for it than any of the negroes or indians ; but not at all considering the particular inconveniences which i lay under, more than the indians did, viz. want of hands to move it, when it was made, into the water, a difficulty much harder for me to surmount, than all the consequences of want of tools could be to them ; for what was it to me, that when i had chosen a vast tree in the woods, i might with much trouble cut it down, if after i might be able with my tools to hew and dub the out - side into the proper shape of a boat, and burn or cut out the in - side to make it hollow, so to make a boat of it : if after all this, i must leave it just there where i found it, and was not able to launch it into the water

    但我卻完沒有想到,比起印第人來,我還有許多特別不利的,那就是,獨木舟一旦做成后,沒有人手可以幫我讓獨木舟下水。是的,印第人有印第人的困難,他們沒有工具,但是,我缺少人手的困難更難克服。如果我能在樹林里找到一棵大樹,費了很大的勁把樹砍倒,再用我的工具把樹的外部砍成小舟形狀,然後把裏面燒空或鑿空,做成一隻小船假如這些工作部完成後,小船仍不得不留在原地而法下水,那對我又有什麼用處呢?
  12. Associated with a project of the planned xuefengshan tunnel with 7. 6 km long during the construction of shaoyang to huaihua expressway in hunan province of shanghai to ruili national trunk highway, this paper firstly makes an introduction of the frequently - used analysis & computation methods for tunnel supporting structure. then, based on the analysis of the basic theory about the interaction mechanism of surrounding rock and support structure, a spatial computation model is made, a coupling numerical computation method with 3 - d elastic - plastic finite element and infinite element is proposed, and a comprehensive analysis has been made to the effects of the overall stability and safety of the surrounding rocks of different characteristics, different classes and under different construction methods. and thus the problem of 3 - d infinite region to which applying the general finite ca n ' t do has been resolved

    6公里的雪峰山隧道工程,首先介紹了隧道支護結構的常用分析計算方法;然後通過對隧道施工過程中,洞室穩定性與支護結構相互作用機理的深入分析,建立了隧道施工過程的空間計算模型,提出了採用三維彈塑性有限元-限元耦合的數值計算方法,綜合分析了隧道在不同圍巖特性和圍巖類別下,以及不同施工開挖方案等對隧道圍巖整體穩定和性的影響,從而解決了通用有限元方法難以解決的隧道三維限域問題;其可充分發揮有限元法在分析非線性方面的有效性和成熟性,以及限元法在分析處理限域和半限域方面的精確性和簡便性,為隧道施工過程中圍巖的穩定性分析開辟了一新的途徑。
  13. In this paper, based on the analysis of the rlem of theory foundation, computing method, preference, applicability, etc, we anatomized the rlem of three self - deficiencies and six scarcities. moreover, we adopted the parallel ways of contrasting the rlem with the fem and applied it to analyzing the impact of slide block of elasticity and plasticity, slip surface of coefficient and slip bed of elasticity, plasticity upon the stability of slope and in the plain linearity slope, the plain refracted line slope and the plain arc slope. in addition, we discussed the warp of between the lem of ( sarma, janbu, order, bishop, morgenstera - price, etc ) and the fem of result and the distributing of positive stress and shear stress on the slip surface

    本文從剖析剛體極限平衡法的理論基礎、計算方法、參數選取、適用等方面入手,剖析了剛體極限平衡方法的3點自身缺陷和6點不足,並在此基礎上採用了剛體極限平衡法(平面滑動破壞法、 sarma法、傳遞系數法、普遍分法、 janbu法、 bishop法、 morgenstern - price法)與大型有限元法對比研究的方法,分析研究了平面直線型滑坡、平面折線型滑坡、平面圓弧型滑坡在漸進破壞中邊坡的滑體彈塑性參數、滑麵塑性參數) 、滑床的彈塑性、以及極限平衡法法考慮開挖應力釋放等因素對邊坡穩定性的影響與滑動面上的正應力、剪應力分佈規律、系數的解答的差異。
  14. The models of unconditional security from quantum channels and noisy channels are two typical methods now. two parties begin the secret - key agreement over a public channel

    目前最典型的方法是利用有擾通道或量子通道建立無條件安全模型,通信雙方在公共通道上進行密鑰協商。
  15. It is unconditionally secure ( i. e. secure against a spy who has sufficient time and computer power ), and needless of any private key exchange before the actual communication

    量子密碼具有無條件安全的特性(即不會遭受擁有足夠時間和計算機能力的竊聽者攻擊的危險) ,而在實際通信發生之前,不需要交換私鑰。
  16. According to the described quantum one - way function, a quantum digital signature scheme whose security is based on fundamental principles of quantum physics is given and that the signature scheme is absolutely secure using one method of key distribution is shown

    根據所描述的量子單向函數,本文給出了一種基於量子物理的基本原理基礎之上的性的量子數字簽名,同時說明了在使用一種密鑰分配的下,它是無條件安全的。
  17. Information - theoretically secure secret - key agreement is the key to make perfect security. the models of unconditional security from quantum channels and noisy channels are two typical methods now. once the secret - key has been agreed over a public channel, one can use the key to encrypt messages by using one time pad

    現在通常的做法是通信雙方使用有擾通道或量子通道建立無條件安全模型,然後在公開認證通道上交互信息進行密鑰協商,通信雙方把協商之後的的密鑰作為雙方共享的密鑰使用一次一密體制進行保密通信。
  18. Because its complex of mechanics characteristic, shape of geometry and boundary condition, safety of the high arch dam under normal load is what engineers are concerned about

    因其受力特徵、幾何形狀、邊界等均較復雜,所以,高拱壩在正常荷載作用下的度,疑是工程設計人員所關心的主要課題。
  19. Simulation is a synthetic technique. there is much excellence with it, credibility, no destruction ; repeatability, safety, economy, no bound with in climate, locale, and space and tight with life of human being

    模擬技術是一門綜合性技術,具有可靠、破壞性、可重復、、經濟、不受氣候和場地、空間限制等優點,它與人類生活密切相關。
  20. Quantum communication is a rising interdisciplinary field which combines classical communication and quantum mechanics. quantum key distribution protocol makes use of single photon of quanta - randomicity to achieve unconditioned security key distribution, especially which is the realism significance of research way in quantum information at present

    量子密碼術是經典通信和量子物理相結合的一門新興交叉科學。量子密鑰分配( qkd )協議利用單光子固有的量子隨機性實現具有無條件安全性的密鑰分配,是目前量子信息領域中特別具有現實意義的研究方向。
分享友人