通信流保密 的英文怎麼說

中文拼音 [tōngxìnliúbǎo]
通信流保密 英文
traffic security
  • : 通量詞(用於動作)
  • : Ⅰ動1 (液體移動; 流動) flow 2 (移動不定) drift; move; wander 3 (流傳; 傳播) spread 4 (向壞...
  • : Ⅰ動詞1 (保衛; 保護) defend; protect 2 (保持) keep; preserve; maintain in good condition 3 (...
  • : Ⅰ名詞1 (秘密) secret 2 [紡織] (密度) density 3 (姓氏) a surname Ⅱ形容詞1 (距離近; 空隙小)...
  • 通信 : communication; communicate by letter; correspond
  1. The high - power semiconductor quantum well ( qw ) laser is a kind of luminescence device with superior performance, it has longe - lived, low threshold current density, high efficiency, high luminosity and excellent monochromatic, coherence, directionality, etc. the high - power semiconductor laser is widely applied to the fields, such as military, industrial machining, communication, information processing, medical treatment, etc. the material ' s epitaxy is the foundation of the whole laser ' s fabricating, and it has important influence on the optics and electricity performance about the laser

    大功率半導體量子阱激光器是一種性能優越的發光器件,具有壽命長、閾值電度低、效率高、亮度高以及良好的單色性、相干性、方向性等特點,廣泛應用於軍事、工業加工、息處理、醫療健等領域。材料的外延生長是整個激光器器件製作的基礎,對器件的光學和電學性能有著重要的影響,生長不出優質的材料體系,獲得高性能的器件就無從談起,因此,材料的外延生長便成為了整個半導體激光器製作過程之中的重中之重。
  2. The core products include telecom power systems, board mounted power supplies, custom power supplies, ups, precision air conditionings, outdoor shelter solutions, automatic transfer systems, network power protection products, vrla batteries, lv & precision distribution cabinets, centralized power and environment monitoring systems, dc power systems and ac motor drive inverters used in electric utility power systems

    艾默生網路能源產品涉及電源、印刷板板裝電源、客戶定製電源、 ups 、機房專用精空調、戶外一體化機櫃、自動切換開關、動力網路護產品、蓄電池、低壓配電和精配電櫃、動力設備及環境監控系統、電力操作電源、交變頻調速器等領域。
  3. 2 ) based on the study and analysis of many security architecture standards, the security region and the defense layer are introduced, the information category, the threatening level and the security protection level ( spl ) are put forward, the methods and requires of the security analysis are discussed in this paper. 3 ) based on the security architecture model and the security analysis, the graded requires of the security management and the security technology is presented, so the security design of the cissa and the choice of security produces can be done conveniently. 4 ) a cooperative communication platform is designed and implemented to ensure the dynamic and cooperative ability of above cissa model

    針對計算機息系統安全體系模型和實施標準的不足,本文緊圍繞分層、分級、動態防禦以及協同平臺等關鍵技術開展研究工作,所做的工作主要集中在: 1 )在深入研究了當前各種行的安全體系模型基礎上,提出了用於指導計算機息系統安全體系建設的動態縱深防禦安全體系模型; 2 )在對各種安全體系標準進行研究與分析的基礎上,引入了安全域和安全防護層次的概念,提出了息類別、威脅級別和安全障級別的定義,闡述了進行計算機息系統安全分析的方法和要求; 3 )在安全體系模型和安全分析的基礎上,提出了安全管理及安全技術的分級要求,從而便於進行計算機息系統的安全設計以及產品的選型; 4 )設計並基本實現了用於障上述安全體系動態協同能力的協同平臺。
  4. The advent of the internet and the wide availability ofcomputers, scanners and printers make digital data acquisition, exchange and transmission a simple task. however, making digital data accessible to others through networks also creates opportunities for malicious parties to make salable copies of copyrighted content without permission of the content owner. digital watermarking is likely to be a potential solution to this problem. digital watermarking has been proposed as a solution to the problem of copyright protection of multimedia documents in networked environments. it makes possible to embed a watermark ( such as identification data, serials number, text or image etc. ) to multimedia documents allowing copyright protection, secret communication, document authentication and so on. in this paper, we present a new digital image watermarking method based on svd ( singular value decomposition ), and then give some theoretical analysis about the algorithm. extensive experimental results show that this method is much more robust than other methods presented before

    隨著計算機和網路技術的飛速發展,數字圖像、音頻和視頻產品愈來愈需要一種有效的版權護方法,另外系統在網路環境下的息安全問題也日益顯露出來.數字圖像水印技術為上述問題提供了一個潛在的解決方案.所謂水印技術就是將數字、序列號、文字、圖像標志等版權息嵌入到多媒體數據中,以起到版權護、秘、數據文件的真偽鑒別和產品標志等作用.本文提出了一種新的基於奇異值分解的數字水印演算法並且對該方法的理論基礎給出分析.實驗結果表明這種方法要比目前提出的行演算法魯棒
  5. The effects of the meteor trails orientation on the size and shape of the footprint on the ground are calculated, which the mechanism of good concealment, antijam and low probability of intercept is explained. this method overcomes the classical limitation

    其次用數學的方法研究並計算了星余跡的方位對地面「足跡」的形狀和大小的影響,從而揭示了星突發具有性好、抗干擾性、抗攔截的物理機制,克服了經典方法的缺陷。
  6. From the inception of the company, beist has gained professional instructions from various ministries and commissions such as state certification and accreditation administration, china certification and accreditation association, general administration of quality supervision, inspection and quarantine, state committee of economy & trade, national development and reform commission, state - owned assets supervision and administration commission, the state environmental protection administration, state administration of work safety, ministry of science and technology, etc. and has been maintaining smooth information exchange and close ties with competent governmental departments of various industries, all of which enable more comprehensive environmental factors of the country to be taken into consideration in consultation and training and operate established systems more practically and thoroughly

    公司成立至今得到國家認監委、國家認證認可協會、國家質檢總局、國家經貿委、國家發改委、國資委、國家環總局、國家安監總局、科技部等部委的行業指導,長期與政府各行業主管部門持暢息交切聯系,這一切使得我們的咨詢、培訓工作更多地考慮了國家的綜合環境因素,所建體系能夠運行得更加切合實際、徹底。
  7. Secondly, some encryption algorithms are introduced, with the analysis and comparison for these encryption algorithms, the author designs an appropriate project to accomplish the end - to - end encryption. thirdly, this paper accomplish the design of an encryption scheme which combining the strongpoint of the rsa algorithm and the idea algorithm. the main process is as following : first, input the digital signal to the encryption device, and then the digital signal exclusive or with the keying sequence which is generated by key stream generator ( ksg ) and the ksg is based on the idea encrypting and deciphering algorithm, the secret key synchronization is also studied

    本課題主要研究的內容是數字集群系統加機制的研究,首先介紹了數字集群系統的安全機制,講述了單向和雙向鑒權的過程、單呼和群呼的空中介面加過程及其鑰的選用和管理,特別介紹了端到端加;然後介紹了幾種常用的加演算法,過分析其優劣,提出了端到端加的解決方案;最後完成了基於rsa演算法和idea演算法的數字集群系統加方案的設計,其具體過程為將經過數字號送入加器里,和以idea加演算法為基礎設計的發生器( ksg )產生的碼序列進行加解運算,並且研究了此加過程的碼同步問題。
  8. It can provide security service that includes access control, integrality, authentication, replay attack protection, privacy and privacy of finite communication

    過ah和esp協議來以下的安全服務:訪問控制,無連接完整性,數據源認證,重放攻擊護,機性和有限的通信流保密性。
  9. Government : in order to cut administration cost and increase the work efficiency of government, the video conference system has more and more widely used nowadays. video conference systems can help government to increase remote communication, so that to cut meeting and travel cost, improve the decision - making process

    政府機關:為了加快息交速度,證政令暢談,同時提高辦公會議質量和效率,召開電視電話會議已經成為各級政府機關普遍推崇的方式,語音圖像數據可同時交互,使溝及時有效,鼎視的一系列先進技術更障了會議的安全
  10. This paper described the design and realization of a command and communication system database in the environment of vfp. it briefly introduced the mostly function, the system frame, the constitute & the information flow ; it introduced the key techniques used in the database design, such as user interface designing technique, application system toolbar designing technique, multi - media technique, data exchange technique, security and maintaining secrecy technique, etc. moreover it do more analysis, research & prospect for these technique & the developing way of the system

    本篇描述了vfp環境下某指揮系統數據庫的設計和實現;簡要介紹了該數據庫系統的主要功能、體系結構、組成和程;介紹了數據庫設計中的用戶界面設計技術、應用系統工具欄設計技術、多媒體技術、數據交換技術、安全措施等技術,並對這些技術以及系統的發展方向進行了進一步的分析、研究和展望。
  11. In the part of voice encryption, spatiotemporal chaotic system ( ocoml model ) and lfsr are used to generate multidimensional pseudo - random sequence. this sequence has a longer period, better randomicity, passing the verification of fips 140 - 2 security requirements. using the key stream generated by it to encrypt the voice gets a better security

    在語音加方面,本文利用時空混沌系統(單向耦合映象格子模型)與線性移位寄存器產生了高維的偽隨機序列,該序列周期很長,具有更強的隨機性,過了fips140 - 2的安全性能驗證,利用其作為對語音號進行加,獲得了更高的性。
  12. It has been widely applied in personal communications, mobile communications and the field of broad band wireless access, and it has also been regarded as the main air access of the third generation mobile communications, because comparing with tdma and fdma, cdma has greater system capacity, higher frequency efficiency and stronger anti - interference ability, at the same time it still has the potential of solving the conflict of limited frequency resource and limitless user request

    相對于tdma , fdma等多址技術而言,它具有系統容量大,頻帶利用率高,抗干擾能力強,性能好等優越性,同時還具有緩解有限頻帶與無線用戶需求之間矛盾的潛力,因而在個人,移動,寬帶無限接入領域都得到了廣泛的應用,也被普遍認為是未來第三代移動的主空中介面技術。
  13. In tcp / ip protocol suite, the ipsec protocol provide interoperable, high quality, cryptographically - based security for ipv4 and ipv6. the set of security services offered includes access control, connectionless integrity, data origin authentication, protection against replays ( a form of partial sequence integrity ), confidentiality ( encryption ), and limited traffic flow confidentiality

    在tcp ip協議族中, ipsec ( internetprotocolsecurity )協議提供的安全服務證數據在網路傳輸過程中的機性、完整性和抗重放護,以及對網路中的分析攻擊提供有限的護, ipsec協議還提供對網路的訪問控制能力。
  14. Protect individual privacy and business secret while emphasizes the " transparent information ". pay attention to cultivating the supervising function of trade association

    在強調息「透明」 ,打社會渠道的同時加強對個人隱私和商業秘的立法護。
  15. Synchronization of digital - flow chaos generators in secure communication

    中數字混沌產生器的同步
  16. Chinese flowers and trees trades cover guild of company of engineering of agent of flower grower, flowers and trees, gardens, flowers, government the many levels such as farming mouth, the technology that at the same time orgnaization and the institution of higher learing such as university of center, as southwest as information industry of national forestry ministry, country traffic carry close communicates and cooperate, innovate ceaselessly in the domain such as business management, management strategy

    中國花木交易涵蓋花農、花木經紀人、園林工程公司、花卉行業協會、政府農口等多個層面,同時與國家林業部、國家息產業中心、西南交大學等機構和高等院校切的技術交和合作,在企業管理、經營戰略等領域不斷創新。
  17. Enabling up to 14 levels of access rights, apeos wizshare s comprehensive suite of security capabilities ensures comprehensive information disclosure and protection controls over sensitive corporate information

    Apeos wizshare支持多達14個級別的訪問權限。面面俱到的安全功能組合,既周地管理企業的機息,又證了必要息的有效
分享友人