還保密 的英文怎麼說

中文拼音 [háibǎo]
還保密 英文
about me
  • : 還副詞1 (表示現象繼續存在或動作繼續進行; 仍舊) still; yet 2 (表示在某種程度之上有所增加) even...
  • : Ⅰ動詞1 (保衛; 保護) defend; protect 2 (保持) keep; preserve; maintain in good condition 3 (...
  • : Ⅰ名詞1 (秘密) secret 2 [紡織] (密度) density 3 (姓氏) a surname Ⅱ形容詞1 (距離近; 空隙小)...
  1. Generally the security was first-rate.

    總的來說,工作是幹得挺出色的。
  2. Seller may also at its election terminate this agreement upon written notice to member in the event member ( i ) fails to observe or perform any other provisions of this agreement to be observed or performed by member and such failure continues for a period of thirty ( 30 ) days after written notice from seller, or ( ii ) becomes insolvent or unable to pay its debts as they mature, or files a voluntary petition or suffers any involuntary petition to be filed against it under any provision of any bankruptcy or insolvency statute, or makes an assignment for the benefit of creditors, or applies for or consents to the appointment of a receiver or custodian for its assets, or any attachment or garnishment is initiated or filed against its property, or ( iii ) dissolves, liquidates, consolidates ( other than a consolidation in which member is the surviving entity ), or ceases to conduct operations

    有下列事件賣方可以選擇終止協議( 1 )賣方發出書面通知30天後,應該遵守或者履行的成員不能遵守或者履行協議的任何有關規定; ( 2 )到期破產或者無力償債務,或者在有關破產或者破產條例規定下自願申請或者遭受強制立案,或者作一個債主賠償費的分配,或者申請或者允許他的資產接受者或者人員配置,任何附件或者壓扣件創議或者財產立案; ( 3 )解散,破產,合併(在合併中成員是存在的獨體) ,或者終止商品營運。
  3. This article discussed the situation of unjustifiable disclosure and justifiable infringement of privacy and confidentialility as well

    本文討論了不當泄以及的合理例外等情況。
  4. Hester prynne - whose vocation, as a self - enlisted sister of charity, had brought her acquainted with the captain and crew - could take upon herself to secure the passage of two individuals and a child, with all the secrecy which circumstances rendered more than desirable

    海絲特白蘭作為婦女慈善會的志願人員,有機會結識了船長和海員,她可以有把握為兩個大人和一個孩子弄到艙位,而且那種環境提供了求之不得的一切要求。
  5. Element, but also assures that the key binding information that it returns is trustworthy

    元素所對應的公鑰,而且證它返回的鑰綁定信息是值得信任的。
  6. It is a poor compliment to the vigilance of us soldiers, monsieur, that, do what we will, we never can conceal our numbers.

    我們的士兵警惕性實在太差啦!你看,閣下,不管我們怎麼是沒能瞞住我們的人數。
  7. A standard genetic analysis used to determine evolutionary lineages shows that they have kept something else long hidden : winged species evolved from wingless ancestors, whose own ancestors were winged. “ to our knowledge, this is the first example of a complex feature being lost and later recovered in an evolutionary lineage, ” write michael f

    一項用於決定演化譜系的標準基因分析法證實,竹節蟲有其他隱藏已久的秘:有翅竹節蟲是由無翅竹節蟲演化而來的,而無翅竹節蟲的祖先原本就有翅膀。
  8. In spite of all the secrecy i obtained some light on hitler's further plans.

    關于希特勒今後的計劃,盡管他嚴加,我是看出一點苗頭。
  9. Moreover, this algorithm can be implemented very easily in software, and has a good prospect in the fields of secret communication and information security

    此外,本演算法特別易於軟體實現,在通信和信息安全領域具有良好的實際應用前景。
  10. There are new requirements for community health, safety, and security as well as labor conditions and pollution prevention, among others

    有新的對于社區衛生,安全,方面的需要像勞動環境、污染預防,等其他問題。
  11. Ideal single photon sources are far beyond real application. in practice, single photon sources being used are gained from precisely controlled heavy attenuation. to analyse the security of quantum key distribution system based on practical single photon sources is being very important

    單光子是量子通信的一大技術關鍵,也是安全的基礎,但是理想的單光子源離實際的使用很遠,目前實際使用的單光子源是由精控制的強衰減技術得到的。
  12. Currently, the technique of semiconductor laser arrays and stacks assembly is not mature in china. there are no assembling equipment for semiconductor laser arrays and stacks in the world, and all institutions manufacturing semiconductor laser arrays and stacks kept usage of solder as secret. consequently, assembling technique, solder and assembling equipment have been deemed as focal points of my studies

    目前國內對半導體激光器列陣及疊陣的組裝技術不成熟,國內外沒有用於半導體激光器列陣及疊陣的組裝設備,各個研製半導體激光器列陣及疊陣的機構對焊料的使用互相,因此本人對半導體激光器的結構、組裝技術、焊料、組裝設備進行了如下研究:對無鋁半導體激光器的結構進行了設計,在理論上對半導體激光器列陣及疊陣進行了研究。
  13. This short period of recovery time can be used to decode transmitted message in the receiver. our numerical simulations for chaotic communication in single - mode and multi - mode laser systems show the feasibility of the schemes respectively. in two multi - mode lasers, the scheme of chaotic communication can enhance the privacy

    我們分別對單模激光系統混沌同步通訊和多模激光系統混沌同步通訊進行了相應的數值模擬,數值模擬的結果表明,這種利用混沌同步進行通訊的方案是可行的,在多模激光系統中的混沌通訊可以大大提高度。
  14. The technology is not only safe and trustiness, but also easy to integrate with other identifying technology. moreover, we discuss the encryption of data. at last this papers show us a system of stock jobbing using bank book

    本文對網路數據傳輸的加問題以及證券系統內部的加防範措施進行了分析,本系統的雙層加方案解決了網路數據傳輸的加及對系統內部人員的問題。
  15. We specialize in the r & d and production of security hologram stickers and hot stamping hologram foil

    除擁有超前的全息製版技術和全封閉生產線外,具有嚴謹的管理體系,完善的制度及優質的售前、售中、售後服務。
  16. At this time, the zhejiang government did not even know about the bomb, for it was kept top secret

    浙江省政府此時不知道大橋上剛剛布滿了炸藥。此事被高度
  17. This essay firstly systematically introduces the theories and key technologies of vpn with the detailed presentation of the functions of safety manage central - - - - the automatic production and distribution of passwords, remote - controlled destroy of passive and active passwords, loading special data in air and special tracing of cell phones that are out of control. besides, the researchers has analyzed the contents and findings of similar researches both domestics and overseas with the emphases on the in - depth research of safety communication gateway in order to confirm a system model and carry out the macro - design. after that is the detailed introduction of the design realization of special information transportation

    本文首先系統地介紹了gsm移動通信專網的原理知識及關鍵技術,詳細介紹了安全管理中心的功能- -鑰自動產生和分配、被動式和主動式鑰遙控銷毀、專用數據空中加載、以及失控專用手機追蹤等,並且對國內外同類研究的內容和成果進行分析;重點對安全通信網關進行了深入研究,確定了一種系統模型並進行了總體設計,然後對其中專用信息傳輸的設計實現進行重點介紹;本文對安全管理中心的短消息安全通信網關與專用手機進行性能測試,測試結果表明該系統符合課題的各項技術指標,實現了安全通信網關的各項功能需求;最後,總結課題工作,對下一步系統進行完善和發展的內容提出了具體建議。
  18. The hfea says that it has yet to face a situation where it is asked to reveal the identity of a donor because a di child has a genetic condition or a disease such as leukaemia where bone marrow from a biological father might be needed to save a child ' s life

    Hfea說,該機構要面臨一種情況:如果人工授精孩子患有遺傳病或白血病這類疾病,他她可能需要生父的骨髓才能活命。 hfea一位發言人說: 「但是,目前的法律非常明確。捐獻者的身份必須。 」
  19. Open source operating systems allow users to copy, distribute and modify the program ' s code, and are relatively cheap compared to proprietary systems like windows, which does not allow users to modify its secret code

    這種操作系統不僅允許使用者復制分發和修改程序代碼,而且與微軟視窗等受專利護的操作系統相比,價格相對便宜。受專利護的操作系統不允許用戶修改其的代碼。
  20. In addition, base civilian often examine case of account of the bank on the net even, discover the problem avoids to put in time break ; what notice individual identity message even is confidential

    此外,基民要經常查看網上銀行賬戶情況,及時發現問題避免存失;要注重個人身份信息的
分享友人