計算安全性 的英文怎麼說

中文拼音 [suànānquánxìng]
計算安全性 英文
computational security
  • : Ⅰ動詞1 (計算) count; compute; calculate; number 2 (設想; 打算) plan; plot Ⅱ名詞1 (測量或計算...
  • : Ⅰ動詞1 (計算數目) calculate; reckon; compute; figure 2 (計算進去) include; count 3 (謀劃;計...
  • : Ⅰ形容詞1 (完備; 齊全) complete 2 (整個) whole; entire; full; total Ⅱ副詞(完全; 都) entirely...
  • : Ⅰ名詞1 (性格) nature; character; disposition 2 (性能; 性質) property; quality 3 (性別) sex ...
  • 計算 : 1 (求得未知數) count; compute; calculate; reckon; enumerate 2 (考慮; 籌劃) consideration; pla...
  1. In consideration of studying island coast hydrodynamic factors is in order to build breakwater engineering, design waves, astronomic - tide and storm - tide which increases water level are computed to offer design parameters, discuss and analyze the influence of engineering safety aroused by those factors

    考慮到研究海島周圍海岸動力因素的目的是為了建設海島工程,還進行了設波浪以及天文潮、風暴潮增水的,分析了這些因素對工程的影響。
  2. According to trusted compeer seeffiity evaluation standard ( tgskt ), tfae security level of ^ armostall dbms is c2, and it is not eueuglrto safeguarded ^ it is necessary and pressing to afford a credible system to protect infomation resource

    按照可信機評估標準tcsec看,當前多數dbms系統只具備c2級,這種對數據的保護是不夠的。提供一個可靠的mlsdbms系統來保護系統信息資源是必要的,迫切的。
  3. In conclusion, it is primarily described that the expectable social and economical benefits of this mis are great, and the design can be fulfilled smoothly. the difficulty of this thesis is : not only think about the coordination each other synthetically on workers, equipments, technologies, data and user ' s priorities, different project and different continuation day, but also must ensure that it is agility, controllable and safe when the data be transmitted on internet or intranet

    本管理信息系統強調是針對無形的數據信息產品( gis等海量數據)的生產管理信息系統,不是單純的統,還要實施嚴密的控制,除需要綜合考慮人員、設備、技能技術、權限、工程、工期在劃調度統方面的協調外,還需要強調海量數據信息產品的原始數據、半成品、成品在網路上流動的靈活、可控制
  4. " the apparent paradox that openness about your methods leads to better security is not unique to computer software - military and diplomatic cryptographers have known for a century that it is folly to depend on the secrecy of your encoding method rather than the secrecy of your keys, " says raymond

    Raymond說: 「公開您的方法將導致更好的這個明顯矛盾的觀點並非機軟體所獨有,軍事和外交上的解密者知道這個觀點已有一百年了:依賴編碼方法的保密而不依賴密鑰的保密是非常愚蠢的。 」
  5. Immune evolutionary algorithms are optimal algorithms in essence, therefore, they can be used in some fields, such as cybernation, pattern recognition, optimal design, meshing learning, network security, etc. there are also some examples of these attempts described in this paper

    免疫進化在本質上講是一種優化演法,所以它們可以應用於一些諸如自動控制、故障診斷、模式分類、圖象識別、優化設、機器學習和網路等廣泛領域,本文在這方面也做了一些初步的嘗試。
  6. With the rapidly development of computer network technology and the widely use of network technology in every walk of life, people transmit data through computer network more and more frequently, including all kinds of secret information ( for example, military secret ; bussiness secret ; personal private information ). today, as a result of poor security of our network system, we can not prevent the transmittied information from stealing and modifying unlawful. thus, the computer network technology is applied to our daily life restrictedly. recently, many network applications with voip ( for example msn messenger ; dialpad ; distributed multipoint multimedia conferences ) take no measures to encrypt their data

    隨著機網路技術的迅猛發展和網路技術在各行各業中的廣泛應用,人們通過機網路傳輸數據日益增加,其中包含了各種機密信息(例如軍事機密信息、商業機密信息、個人隱私信息等) 。由於目前的網路系統缺乏足夠的,不能有效防止網路上所傳輸的信息被非法竊取和修改,因而極大地限制了機網路技術在日常工作中的應用。當前,基於voip技術的各種網路應用,如msnmessenger , dialpad ,以及一些分散式多媒體會議系統,竟然未採取任何加密措施
  7. The excimer laser diopter correction and aberration correction have been proved efficiency and safety. based on cad / cam, applied optics, ophthalmology, biomedicine and computer techonlogy, this paper studied the principle of excimer laser aberration correction. the conception, cause of formation and representation of wavefront aberration are introduced

    準分子激光治療屈光不正及消除像差的有效已被證實,本學位論文將cad 、眼科視光學、波前像差技術、生物醫學技術與機技術等多學科理論交叉結合,系統敘述了人眼波前像差理論,包括波前像差概念、表示方法、測量方法和產生的原因等。
  8. Security analysis of the accounting by edp system

    化系統的分析
  9. In the evaluation of the structural safety, the assurance coefficient of structure can be received by loading structural models, the endogen force of computation structures, the eccentric compression and the safe criterion

    結構評價,通過荷載結構模型結構內力,並根據偏心受壓構件的判定標準,評價結構的系數。
  10. For motor shafts, the highest stress is at the boundary between the key groove and the ring groove ; the next one is at bottom and terminal of the spline. according to the results, the 17. 4mm shaft is insecurity, the 22. 2mm and 30. 2mm shafts are security

    在軸的上,對17 . 4mm泵軸結果是不的;對22 . 2mm泵軸結果是的;對30 . 2mm電機軸結果是的,而且還有較大的功率輸出空間。
  11. The topics covered in this course include interactive proofs, zero - knowledge proofs, zero - knowledge proofs of knowledge, non - interactive zero - knowledge proofs, secure protocols, two - party secure computation, multiparty secure computation, and chosen - ciphertext security

    本課程所涵蓋的主題包含有互動式證明,零知識證明,知識的零知識證明,非互動式零知識證明,協定,雙方,多方與選擇密文
  12. Inside the instrument has many kinds of scaling conversation formula which can carry out chosen scale conversation such as convert into length etc. digital clock timer wide use to clocking, timing in every industry field. it is operate brief, clocking accuracy, timing alarm, and with outer connected start stop, clear function

    本表含有前述智能流量積控制儀的部功能,增加了獨特的防盜措施,提高了系統的,即使在斷電的情況下,亦可有效地防止盜用,保證了用戶的準確量使用,且操作簡便,可靠高。
  13. Compared with the passive car suspension, the semi - active car suspension system with the intelligent mr damper can control the damping force automatically with the computer control and then enhance the ride comfort and handling stability of the car effectively

    與傳統的汽車被動懸架系統相比,裝有磁流變阻尼器的半主動懸架系統,可以根據路面狀況和車輛運行狀態,在機的控制下自動調節阻尼力,大大提高了汽車乘坐的舒適和行駛
  14. At present, whereas so many reasons such as its using function changing from irrigation to city water supply, the increasing of importance, the original design standard on the low side, the damage and aging of structure, the demand for seismic fortify in strong earthquake region and offering data of technical alteration for adding flux aftertime, it is important for safety and seismic capability of this aqueduct bridge

    目前,該渡槽使用功能由灌溉輸水改為城市供水、實際重要提高、鑒于原設標準偏低、結構的病害和老化破損以及地處強震區對抗震設防的要求,為日後加大流量進行技術改造提供依據,因而急需對渡槽作較詳細的可靠評估和抗震能評估。本文針對該渡槽進行了原位現場檢測,並對其進行結構分析和結構的能與抗震能的評估等方面的工作。
  15. Presenting a new concept of authentication chain. 2. introducing a asymmetry key into authentication algorithm, especailly in the loss compression field algorithm, to enhance more security

    提出將用非對稱密鑰演法應用於認證演法特別是有損壓縮域的認證演法之中,因此極大提高了所設法的
  16. Firstly, we generalize and analyze the advantages and present research of elliptic curve cryptography ; secondly, we study the basic theory of the ecc ; thirdly, we illustrate the safety of the ecc and discuss the elliptic curve key agreement scheme, elliptic curve encryption scheme and elliptic curve digital signature algorithm ; fourthly, we study fast algorithms of the multiplication and inversion multiplication of the element of in the underlying finite field f2m whose characteristic is two represented by the two basis of optimal normal basis and polynomial basis. we make improvements to the fast algorithm of the polynomial basis multiplication by hankerson and base on the experiments, we describe the properties and compare the advantages of the multiplication and inversion multiplication of the elements in f2m field under optimal normal bases and polynomial basis. results concluding from the study car be used as references in the realization of the elliptic curve cryptosystem ; fifthly, we overview the current fast algorithm of point multiplication, improve the fix base point comb algorithm, advance the speed of the whole system and remark the advantages and disadvantages of the popular algorithms based upon the experimental datas ; sixthly we realize the algorithm library of elliptic curve cryptography based on the f2m. only change slightly in our algorithm library can we realize the ecdh, eces, ecdsa based onf2m of anysize ; seventhly, we realize the ecc on two secure elliptic curves, including ecdh, eces, ecdsa

    本文首先介紹並分析了橢圓曲線密碼體制的優點及研究現狀;其次研究了橢圓曲線密碼體制的基本理論;第三,分析了橢圓曲線密碼的並介紹了密鑰共享,加密,數字簽名等橢圓曲線密碼體制;第四,深入研究了特徵為2的有限域f _ 2m中的元素在多項式基和最優正規基表示下的乘法運和乘法逆運的快速演法,並對hankerson等人提出的多項式基下的乘法運的快速演法作了改進,而且在實驗的基礎上不僅分析研究了f _ 2m域中元素在多項式基和最優正規基表示下的乘法和乘法逆運能,還對這兩種基表示下的f _ 2m域中元素運效率的優劣作了比較和研究,所得的結論可供在實現橢圓曲線密碼體制時參考;第五,研究了目前流行的橢圓曲線標量乘法的快速演法,同時改進了固定基點梳形法,提高了整個系統的速度,並在實驗的基礎上分析研究了流行演法的優劣;第六,實現了基於f _ 2m的橢圓曲線密碼體制的演法庫,在我們的演法庫中只需稍微改變便能實現基於任意尺寸的f _ 2m上的ecdh , eces , ecdsa等橢圓曲線密碼體制;第七,實現了兩條橢圓曲線上的橢圓曲線密碼體制,包括ecdh , eces , ecdsa 。
  17. The type of wireless transmission detaches the part of data acquisition from the part of data processing in order to improve the monitor system upon the practicability and security for the person. the universal serial bus is a kind of newer bus interface ' s criterion than other buses in the computer ' s technology. in the design, the universal serial bus is used as the interface between the system and the computer that makes the design possess a lot of features, such as easy operation, plus and play, none of exter nal power, and need not to install

    無線數據傳輸方式將數據採集部分與處理部分分開,提高了監護系統的實用和對人體的;通用串列總線是一種較新穎的機總線介面規范,本系統使用通用串列總線作為系統與機的介面方式,使得本系統具有操作簡便、體積小巧、即插即用、支持熱插拔、無須外接電源、使用無須裝等特點。
  18. The living example model has used the trial model of reality, thus for the initial stage calculation data has provided effectively and verifys this text is aimed at giving an economy practical virtual reality method and the train of thought to the resisted fire research aspect of prestressing force net frame

    從對預應力網架結構在火災作用下的的中發現預應力網架結構的抗火特和普通網架抗火特的差異,為預應力網架結構的工程實用提供一定的參考。本文旨在對預應力網架的抗火研究方面給出一個經濟實用的虛擬現實的方法和思路。
  19. While dissertating system safety analysis method, emphasizejd particularly on fta. fta is the method basing on occurred the top matter, analyzing from top to below, processing boolean operation, and in the last find out the mostly reason of faulty. while dissertating system safety appraise, emphasized particularly on dafen method and fuzzy integrated appraise method. dafen method just is used in sub - system and aimed at safety in some environment. fuzzy integrated appraise method process appraise to system safety using the knowledge of fuzzy mathematic which may be a great system or little system. while dissertating s safety decision - making, emphasized particularly on ahp which possess of the relative importance degree basing on experience of expert, constituting judgment matrix. calculating importance degree of every project. processing project - electing and decision - making

    在論述系統評價時,主要論述了打分法和模糊綜合評價法,打分法針對在某種環境下的,進行子系統評價。模糊綜合評價是運用模糊數學的知識進行系統評價,所評價的系統可以是一個大系統,也可以是一個小系統。在論述決策時,主要論述了層次分析法,層次分析法主要是根據專家經驗,給出各因素的相對重要度組成判斷矩陣,各方案措施的相對重要度,進行方案優選,進行決策。
  20. ( 2 ) in project designing the negative friction must be calculate by the method in this thesis. parameters of vertical weight and sedimentation must be checked to ensure the design security

    ( 2 )在工程設中,應當按本論文闡述的方法對樁的負摩擦力進行,驗樁基的豎向承載力和沉降等參數,保證工程設
分享友人