邏輯安全性 的英文怎麼說

中文拼音 [luóānquánxìng]
邏輯安全性 英文
logical security
  • : Ⅰ動1. (巡察) patrol 2. [書面語] (遮攔) blockⅡ名詞1. (巡察) patrol 2. [書面語] (山溪的邊緣) edge
  • : Ⅰ動詞(編輯; 輯錄) collect; compile; edit Ⅱ名詞(整套書籍、資料的各個部分) part; volume; division
  • : Ⅰ形容詞1 (完備; 齊全) complete 2 (整個) whole; entire; full; total Ⅱ副詞(完全; 都) entirely...
  • : Ⅰ名詞1 (性格) nature; character; disposition 2 (性能; 性質) property; quality 3 (性別) sex ...
  • 邏輯 : logic
  1. Give out a correctness proof for the protocol based on the strand space model theory and kailar logic

    使用ssm理論和kailar證明了該協議的質。
  2. Through the implementing of kernel level file and cache mechanism at the client side, this newly proposed distributed network file system provides seamless network file access and reduces the performance decline caused by network transmission. utilizing the concept of logic block server, it provides the reliable data block storage and implements redundant storage capacity. utilizing the concept of the index server, it provide s the cost of the greatly for server and network during data access process and realizes the computing with balancing capacity

    在客戶端通過實現內核級文件的調用和緩沖機制,實現了文件的無縫網路存取,並減少由於網路傳輸帶來的能下降的影響;利用塊服務器實現塊的冗餘存取,實現數據塊的存放;利用索引服務器進行負載均衡計算,實現資料存取的較低網路和服務器開銷;利用索引服務器實現服務器組的零管理,使該系統具有高效、穩定和可伸縮
  3. About theorem, the paper introduces the syntax of ideal, also the first time uses concept of honest ideal to define secrecy goal of protocol and utilizes honest ideal logic to specify secrecy property. at the same time, this paper corrects one not so perfect lemma proving in a literature written by f " abrega, herzog and guttman

    在理論上,本文引入了理想的語義,並首次使用了理想的概念對協議的秘密進行嚴格的定義,同時使用理想的命題公式表示協議的秘密;另外,本文修正了f ' abrega 、 herzog和guttman三人文獻中的一個引理的證明,原有的證明是不完善的。
  4. Then a simple e - dealing system is devised to show the thoughts of the protocol. in order to formalize and verify the protocol, bzl logic model is built, which based on first - order logic and introduces many - sorted, dynamic and non - monotony logic

    為了形式化驗證數字現金的,本文在經典一階的基礎上,吸取了多類、動態和非單調的思想,提出了bzl模型。
  5. Chapter three is about the experimental research of the real time optimal position system ( see chapter two ), emphasis on the high performances of 196mx pts interrupt response and safe design of ipm module. the analysis of perfect experimental waveforms and basic algorithm are also provided. chapter four focus on the properties and application of ekf estimator

    論文第三章對點對點快速定位系統進行了實驗研究,重點介紹了196mxpts中斷系統對高速處理實時信號和消除編碼盤光電頭邊緣振蕩效應所起的作用、 ipm模塊的分析設計等,同時給出了完整的實驗波形分析以及基本演算法。
  6. Finally, we carried out the theoretically logical proof of the security of the revised protocol, using the formal logic analysis method

    最後,作者運用形式分析的方法對修改後協議的進行了理論上的證明。
  7. In this system, we are based on object - oriented methods, and encapsulate business models to classes, so assure this system ' s security, and adopting client / server pattern, using powerful and easily - learned development tool - delphi 7, and sql server 2000 on database, we establishes a new evaluation index system focusing on innovative qualities, which is different from traditional comprehensive evaluation on school ' s talents

    其中系統的分析和設計是按照面向對象的分析設計思路,將系統的業務封裝成組件,保證了系統的。系統採取c s ( client server )構架模式,採用功能強大、簡單易學的delphi7開發,后臺數據庫採用sqlserver2000 ,在具體的實現採用組件開發方式。
  8. The algorithm have the good one - way property, high sensitivity to initial values and good security due to the intrinsic characteristic of chaotic system and rijndael algorithm. the simulation experiment demonstrates the convenience and good hash performance ; 3 ) a new scheme of digital voice secure communication was proposed based on chaotic modulation without additional synchronization. the modulation sequence generated by chaotic logical mapping was used to encrypt the digital voice signal

    混沌系統和rijndael演算法的固有特點使該演算法具有較好的、對初值有高度的敏感以及較好的單向能,並且易於實現,是一種有效的單向hash函數; 3 )研究了一種無需同步的基於混沌調制的數字語音保密通信系統的方案,利用映射產生混沌調制序列,以該序列作為密碼對數字語音進行加密處理,為了更好的隱匿信號特徵,混沌調制在小波分解的基礎上,對不同的通道使用不同的參數進行,並借鑒混沌掩蓋對信息信號進行了限幅處理,使密文完隨機化。
  9. In the managed environment, application domains which you can think of as logical processes and contexts provide isolation and security at less cost and with greater ability to scale well than an operating - system process by relying on, among other things, the fact that managed code is verifiably type - safe

    在託管環境中,應用程序域(可以視為進程)和上下文以比操作系統進程更低的成本提供隔離和,並具有更強的伸縮能力,這依賴于託管代碼的許多優點,特別是託管代碼被證明是類型的。
  10. The author mainly does the following work : the construction of optical database ' s mainframe and the decision of design scheme ; the designs of concept structure model, logic structure model, physics structure and safety structure after the analysis of system demand ; the classification of optics which is adapted to search optical papers is advocated ; in order to solve the problems of converting heterogeneous data, the optical standards are designed ; the data input program of c / s architecture for optical database is developed, the work of inputting data and simply management of database can be done by this program

    作者重點作了以下工作: ?構造了光學數據庫的主體結構和設計方案; ?經過系統需求分析,對數據庫進行了概念模型設計、設計以及數據庫的物理設計、設計; ?提出了適合光學論文查詢的光學學科分類; ?為了能解決異構數據的相互轉換問題,嘗試制定了光學的元數據標準。 ?用visualc + +語言開發了c s模式的光學數據庫的數據錄入程序,該程序能進行數據錄入和簡單的數據庫管理。
  11. The paper analyzes the logic data structure of the 1c card and security performance supported by 1c cards

    本文對ic卡中數據的結構,以及ic卡提供的較高的能進行了分析。
  12. Then referring to the distribution projects of ip address in existing gprs network, the author analyzed and compared relative merits of deferent projects and brought up a new project : because both chinese gprs network and exterior data network are actually the same physical network, considering the gprs network security which is ensured by invisibility relative to exterior network, gprs network facilities try their best to employ private address in order to detach logically gprs core - net from exterior network through packet filtration of firewall and router ; because of the deficiency of public ip address recourses, the employment of public ip address should be minimized

    隨后參照現有gprs網路ip地址的分配方案,通過分析、比較各種方案的優缺點,提出了一個新的分配方案:由於中國gprs網路和外部數據網合二為一的現實,出於對的考慮,網路設備盡量採用私有地址,通過防火墻和路由器進行包過濾,使gprs核心網在上與外部網路分開,使其對外部網路不可見以保證gprs的網路;同時,由於公有ip地址資源不足,盡可能地減少用戶對公有ip地址的佔用。
  13. In this thesis, the database of gps vehicle monitor information management system is designed, the design of the man - machine conversation interface and the software of the database server, also the software of the mid - ware are accomplished. an improved and logical three layer structure framework is used to utilize the resource of the system efficiently, balance the load, and improve the expansibility of the system ; powerful oracle database is used as background database to provide high performance service to the system which has numerous users and large - scale ; encrpytion arithmetic of communication data is designed to ensure the safty of gps vehicle monitor information management system communication ; the usage of fire wall, system privilege management and data backup improved the safty of the information management system database ; high usability design is realized by oracle data guard ; optimization of the information management system made the whole gps vehicle monitor system persistent, stable and high quality

    本文針對原有gps車輛監控系統響應速度慢、穩定不高的不足,提出了一種以改進的三層結構體系為系統架構,以oracle數據庫為后臺的gps車輛監控信息管理系統設計方案,設計了gps車輛監控信息管理系統數據庫,完成了gps車輛監控信息管理系統人機界面、中間件及數據庫端的軟體設計。系統架構採用改進的三層結構體系,其結構清晰,有利於系統資源的有效利用,均衡負載,提高系統的可擴展;后臺數據庫採用功能強大的oracle數據庫,可以提供大規模、多用戶的高能服務;通信數據的加密演算法有利於確保gps車輛監控信息管理系統的通信;防火墻的使用、系統權限管理以及數據的備份和恢復等有利於提高gps車輛監控信息管理系統數據庫的, oracledataguard的使用有利於提高系統的可用;系統的優化,為系統持續、穩定、高質量運行創造了有利條件。
  14. In the field of verifying digital - cash, no good logic model describing and verifying a digital cash protocol has been brought forward either abroad or at home. in this background, the contents and purpose of my researches are to design a secure digital - cash protocol, devising a simple e - dealing system and building a logic model

    數字現金分析方面國內外都沒有一個能夠嚴格描述和驗證數字現金協議的模型,基於這種背景,本課題的研究目的是設計一個的數字現金協議,實現一個簡易電子交易系統來展示該協議的思想,並建立一個模型來形式化描述該協議且對其進行分析。
  15. As the way is special, which including to divide up the global data, allot the data, inquiring about the distributed data, distributed parallel control, completing control and security control. so it is completely fit to the distributed database system

    對于這種數據處理方式涉及到對局數據的分片處理、數據分配處理、分散式數據查詢處理、分散式並發控制及完整控制等問題,完適合用分散式數據庫來實現。
  16. The thesis is classified into 8 chapters according to the research purpose and logical arrangement. chapter 1 is the introduction of the thesis, which analyses the necessity of the research on global benefits distribution system and explains the theme and the angle of research. it also defines the three technical terms " economic globalization ", " the benefits of international tax ", " international coordination of tax benefits " and explain the research methodology and structure

    根據本論文的研究目標和排,文分為八章:第一章為導論,提出對球分配體系研究的必要,說明本論文從經濟球化研究國際稅收發展的主題和切入角度,對「經濟球化」 、 「國際稅收利益」 、 「稅收利益國際協調」三個關鍵的概念進行界定,並說明研究方法和結構。
  17. The paper puts emphasis on the system logic structure pattern, spatial organization mode and spatial analysis technique of map data in pda stage. other keystones are system security and communication techniques between pda and pda, pda and pc server

    文中重點討論該研發系統的結構模式、 pda平臺下地圖數據的空間組織方式和空間分析技術、系統客戶端pda群之間、 pda與pc服務器之間的通信技術以及系統的
  18. Under the open internet environment, three security mechanisms, including data confidentiality, identity authentication, and access control mechanism, must be realize when constructing logic secure subnet

    在開放的網際網路絡中,構建子網必須要實現三種機制:數據保密機制、身份認證機制和訪問控制機制。
  19. That is to say that ipsec is not suit for the guizhou electric power data network. to this point, after synthesizing the feature of the security, the expansibility and the flexibility, this thesis conclude that mpls vpn is a reasonable way out to connect all parts of businesses and operations in the guizhou electric power system. by this means, different applications run within different vpns, separately in logic, safely and extended well and if necessary, every department can get easy access to the bone net only through a physical interface and interact each other

    在綜合對多協議標記交換虛擬專用網( mplsvpn )的描述,以及mplsvpn固有的高擴展和靈活的特點后,為保證各專業系統在骨幹網傳輸的,論文認為完可以使用mplsvpn的架構,把貴州電力系統的每個業務和相應的vpn對應起來,建議可通過電力數據通信骨幹網mplsvpn方式,不同的應用在各自不同的vpn上,上相互獨立,可靠,並且擴展好,每家單位只需要一個物理介面接入骨幹網路,即使在同一個局域網上也可將vpn區分出來。
  20. The thesis discusses the application of windows dna in video monitor system and introduces how to design the three - tier architecture of the data service layer, business logical layer and presentation layer, and emphatically introduces security setting between these layers

    本論文中探討了windowsdna在視頻監控系統中的應用,包括如何設計三層結構中的數據服務層、商務層和展示層,並著重介紹了各層之間的設置。
分享友人