隱式系統 的英文怎麼說

中文拼音 [yǐnshìtǒng]
隱式系統 英文
implicit system
  • : Ⅰ動詞(隱瞞; 隱藏) hide; conceal Ⅱ形容詞1 (隱藏不露) hidden from view; concealed 2 (潛伏的; ...
  • : 名詞1 (樣式) type; style 2 (格式) pattern; form 3 (儀式; 典禮) ceremony; ritual 4 (自然科...
  • : 系動詞(打結; 扣) tie; fasten; do up; button up
  • : Ⅰ名詞1 (事物間連續的關系) interconnected system 2 (衣服等的筒狀部分) any tube shaped part of ...
  • 系統 : 1. (按一定關系組成的同類事物) system 2. (有條理的;有系統的) systematic
  1. The structure of this paper goes like this, the first chapter introduce the development of e - b / l in practice and in laws. and draw a conclution that the electrification of the b / l is a history tide. in the second chapter, on the basic of reseach the security trap in e - b / l running, 1 conclude six security elements of, e - b / l : the liability of the system, the authenticity of dealers ' identity. the integrity and secrecy of electronic data, and the validity and evidence effectiveness of electronic data. from the third chapter to the eighth, 1 reseach these elements one by one. the third chapter introduce the establishment of the e - b / l security system, and some related laws the fourth chapter introduce the certification authority of e - b / l. in the fifth chapter, 1 introduce the encrypt of electronic information and some countries ' control on use / import / export crytography. the sixth chapter introduce the concept and principle of digital signature, and reseach some related legal issues. the seventh chapter reseach the legal demand of validity, then come to a conclution that to establish a independent electronic information system is necessary. in the eighth chapter, 1 reseach some countries " regulation on the evidence effectiveness of electronic data

    第二章在分析電子提單運作中的安全患的基礎上,歸納出其六大安全要素,即的可靠性、交易者身份的真實性、數據電訊的機密性和完整性、數據電訊的合法有效性以及交易者行為的不可抵賴性。第三章到第八章分別對這六大要素進行分析:第三章介紹了電子提單網路安全體的建立以及安全保護法規,第四章則介紹了電子提單的安全認證機構,第五章介紹了信息加密技術以及各國立法對密碼技術的進出口及使用的控制,第六章介紹了數字簽名的概念及原理,並以bolero為例介紹了數字簽名的技術方,對有關法律問題作了論述;第七章首先論述了電子提單對有效性的法律需求,然後結合國內法和國際規則的規定論證了數據電訊制度產生的必然性;第八章通過對各國立法對電子證據的法律效力的規定,論述了對電子交易至關重要的數據電訊的不可抵賴性。
  2. The texture can be systematically classified as the six types : the felt - like texture, the micro - fibrous cryptocrystalline texture, the micro - fibrous texture, the micro - leaf - like cryptocrystalline texture, the micro - leaf - like texture and the radiated fibrous texture

    通過對青海軟玉顯微結構的觀察與研究,按其主要礦物透閃石組分的表現形,較為地劃分青海軟玉的主要結構類型為:毛氈狀結構、顯微纖維晶質結構、顯微纖維結構、顯微葉片狀晶質結構、顯微葉片狀結構以及放射狀纖維結構。
  3. With the rapidly development of computer network technology and the widely use of network technology in every walk of life, people transmit data through computer network more and more frequently, including all kinds of secret information ( for example, military secret ; bussiness secret ; personal private information ). today, as a result of poor security of our network system, we can not prevent the transmittied information from stealing and modifying unlawful. thus, the computer network technology is applied to our daily life restrictedly. recently, many network applications with voip ( for example msn messenger ; dialpad ; distributed multipoint multimedia conferences ) take no measures to encrypt their data

    隨著計算機網路技術的迅猛發展和網路技術在各行各業中的廣泛應用,人們通過計算機網路傳輸數據日益增加,其中包含了各種機密信息(例如軍事機密信息、商業機密信息、個人私信息等) 。由於目前的網路缺乏足夠的安全性,不能有效防止網路上所傳輸的信息被非法竊取和修改,因而極大地限制了計算機網路技術在日常工作中的應用。當前,基於voip技術的各種網路應用,如msnmessenger , dialpad ,以及一些分散多媒體會議,竟然未採取任何加密措施
  4. With the establishment of the regional headquarter for asia pacific in shanghai in 2003, geberit underlined its commitment to china. esteemed as a pioneer in sanitary and piping systems, geberit is mastering all kind of in - building water flows. the broad product family ranges consist of flushing tanks and mechanisms, electronic sensors, traps, shower toilets, water drainage and water supply systems

    吉博力公司於1996進入中國,於1996年和1997年在浙江岱山和上海建立了兩個生產基地,主要生產節水型水箱水箱水箱配件及各種管道,並銷售所有吉博力集團的其它產品,如電子感應水嘴,電子感應小便沖水,高密度聚乙烯管道排水hdpe ,以及虹吸屋面雨水排放等。
  5. The article points out the importance and necessity of the information - security from its actuality in our country. the resources in the information system, for instance, hardware, software, data, document, operator, meterial and so on, are evaluated and gived safety grade firstly. and then, it analyses the menace including the nonauthorized access, the information leak, the refused sevice, the internal objection which the system will take. the following are the corresponding control police : confirm the users " rights and duties, including the mode of using account, the limit of accessing resource, the application of password, the building of backup ; confirm the administrators " right and duties, including physical safety, system configuration, account configuration and usufruct, password management, audit and control, backup and individual intimity ; run - of - mill measure of security defence, including access control, symbol and identification, integrality control, password technique, firewall system, audit and resumption, safety of operating system, safety of database system, defence of computers " virus and resisting - deny protocol. in the end, the article offers the strategies of disposing the safety - accident and analyse after ithow. to report it, how to solve it in phase, and how to avoid it happening again. in a word, the article presents a holistic resolvent about keeping away the information system ' s security, and supplies a essential frame for its configuration, management and application

    然後,對可能受到的威脅,包括非授權訪問、信息泄漏、拒絕服務和內部缺陷等進行分析,並提出了相應的控制策略:確定用戶的權力和責任,包括帳戶使用方、資源訪問權限、口令應用以及建立備份等;確定管理員的權力和責任,包括物理安全、配置、帳戶設置及使用權限、口令管理、審計和監控、備份以及個人私等方面;一般性的安全防護措施:存取控制、標識和認證、完整性控制、密碼技術、防火墻、審計和恢復、操作安全、數據庫安全、計算機病毒防護和抗抵賴協議等。最後,對事故處理和事後分析提供策略,如何報告安全事故,如何協調解決安全事故,如何避免安全事故再次發生。總之,本文對信息安全防範工作給出一個整體的解決方案,為其在配置、管理和應用方面提供了基本的框架。
  6. A experienced equation which is summarized by many experiments is used to determine the number of mesosphere nerve cell and a sort of new square - sum function of errors is adopted. its characteristic is that weight errors of possible exceptional point is less. accordingly, the effect of errors of possible exceptional point is reduced, which make actual function relation simulation easier

    針對bp演算法的局限性,給出了一種優化的bp演算法,採用經過大量實驗總結出的經驗公來確定層神經元的個數,並選取了一種新的誤差平方和函數,該函數的特點是對一些可能的異常點的誤差權值設計的較小,從而降低了異常值誤差帶來的影響,便於模擬出真實的函數關
  7. M ( 4 ) do a deep research on the privilege management of the engineering database system co - s _ dbs, and aimed at the requirements of the cooperative design for the privilege management, purpose a privilege management model s _ pmm. this model can not only provide the well - designed structure of the privilege control table and the paniculate privilege control, but also support role mechanism, positive and negative privilege mechanism, concealed privilege mechanism, which well satisfies the requirements of the cooperative design

    ( 4 )對co - s _ dbs工程數據庫的權限管理進行了深入的研究,針對協同設計對權限管理的要求設計了權限管理模型s _ pmm ,該模型提供了設計良好的權限控製表結構,細粒度的權限控制,支持角色機制、正負權限機制、權限機制,很好的滿足了協同設計的要求。
  8. By far, microsoft ’ s teredo is the only tunnel mechanism that supports nat users in a certain extent, but meanwhile has many limits such as not supporting symmetric nat, not being able to provide bidirectional ipv6 connections, having poor security, etc. silkroad exploits the client - server tunnel mode and makes use of the stateful characteristic of tunnel servers to resolve the teredo ’ s problems

    目前已有的隧道機制中,只有微軟公司提出的teredo協議在一定程度上支持nat 。然而, teredo實際上不能為nat用戶提供雙向的端到端ipv6連接,不支持對稱類型的nat ,並且存在安全患。 silkroad採用客戶端-服務器模結構,利用隧道服務器的有狀態特性,解決了teredo存在的問題。
  9. During the procedure of system design and implementation, the author has made some innovative efforts such as : ( d establishing the user interest orientated model, the model receiving user interests continuously and conjecturing user interests by interaction with the user, accumulating user preferences in information demand, thereby achieving self - adaptive retrieval, ? roviding a feedback method which is based on the human - machine interaction, summarizing the user operations on the interface of result presentation, and designing an algorithm for capturing user operation behaviors, by which the changes in user interests and preferences can be learned potentially, ? ffering a method for user interest mining which can extract subjects of information confirmed by user, thereby conjecturing or predicting different kinds of expressions of the same interest or extracting the new interests or unexpressed interests, ? roposing a solution of personalized internet information retrieval based on the user interests in accordance with the above - mentioned work, the solution having very strong feasibility and practicality with taking user interest model as center, employing machine learning ( active learning and passive learning ) and data mining as tools, and being assisted with network robot,

    Piirs分析與設計過程中所做的創新性的嘗試主要有以下幾個方面:實現了基於用戶興趣的用戶模型,該模型通過與用戶的交互(主動交互和被動交互) ,不斷地接收用戶的興趣和推測用戶的興趣,積累用戶信息需求的偏好,實現自適應的檢索;提供了一種基於人機交互的反饋方法,對用戶在結果呈現界面上的操作進行了歸納總結,設計了用戶操作捕獲演算法, 「性地」學習用戶興趣和偏好的變化;提供了一種用戶需求挖掘的方法,對用戶已確定的信息做進一步的主題挖掘,由此推測或預測用戶同一興趣的不同表述方或者挖掘出用戶新的或未表達出來的興趣;在上述工作基礎上提出了一套完整的基於用戶興趣的個性化網路信息檢索的解決方案,該方案以用戶興趣模型為中心,以機器學習(主動學習和被動學習)和數據挖掘為手段,輔以網路機器人,具有很強的可行性和實用性。
  10. Standard guide for installation of gypsum products in concealed radiant ceiling heating systems

    天花板輻射加熱中石膏製品安裝的標準指南
  11. Currently, the army is developping military network based oa project with effort among which military email transferring system is an essential application module. this paper proposed a data model of military email transferring as well as detailed design scheme according to the potential threat in email service system, practical condition of current military network and official model as well as document transferring process. it discussed the security requirement of military email transferring system in detail as well as analyzed and design relevent data model, mail exchange protocol and application requirement of cryptogram management

    該文針對電子郵件服務中存在的安全患,基於對目前國內外電子郵件安全技術的分析研究,立足於現有軍事計算機網路的實際現狀,根據目前軍隊的辦公模、公文傳輸流程,提出了一種適合於軍隊辦公自動化中軍用電子郵件傳輸的數據模型及具體的設計方案,詳細討論了軍用電子郵件傳輸的安全服務需求,對相關的數據模型、郵件交換協議、密碼管理的應用需求等進行了詳細的分析和設計。
  12. Audio, video and audiovisual systems ; interconnections and matching values ; part 3 : interface for the interconnection of eng cameras and portable vtrs using non - composite signals, for 625 line 50 field systems

    音頻視頻和視聽.互連和匹配值.第3部分:電子新聞收集攝影機和採用625行50場復合消圖象信號的便攜磁帶錄象設備介面
  13. Using method of oil - flow visualization techniques and measuring pressure distribution along airfoil chordwise and spanwise studies have been down for sidewall boundary - layer displacement effect in two - dimensional wind tunnel. three different chord models were tested in two different wind tunnel. in order to clarify the sidewall effects and study method of sidewall suction theory and sidewall interference correction method to remove effects of sidewall on model. the results of oil - flow test show that selection rational suction wary can obtain better testing results. by investigations on effects of the sidewall boundary layer suction and application of a sidewall interference correction method

    為了很好地解決多機場航班隊列的擁塞問題,在將進場容量、離場容量與機場容量作為一整體的情況下,充分考慮了機場間的網路效應,詳細研究了多機場航班隊列的優化問題,建立了多機場開放非實時流量管理的數學模型,通過選取適當的決策變量,使其為線性0 - 1整數規劃模型,實現了中心流量集中管理.與其它演算法不同,本文提出的啟發枚舉演算法能很好地解決此類問題,對某機場網路的模擬結果證明了所建模型、優化演算法及相應軟體的有效性和可靠性
  14. Looking through available documents, the research on innovation network is focused more on formal innovation network which links all participants together on account of agreement official agreements, and less on informal innovation network formed by all kinds of informal links such as social relation, blood relationship, reliance link and informal communication

    從現有的文獻來看,創新網路的研究熱點主要集中於參與者之間基於正契約類聯所組建的正創新網路,而對于藏在網路之中的由各種非正(如社會關、血緣關、信任關、非正交流等)聯結而成的非正創新網路認識不足,更缺乏深入的研究。
  15. We also discussed some of the finer details of privileges, including implicit privileges, the differences in authorization between static and dynamic sql, and how privilege information is stored in the system catalog tables

    還討論了特權的某些細節,包括特權、靜態和動態sql之間授權方的差異以及特權信息如何存儲在編目表中。
  16. As the same time, the net environment become more and more complicated and all kinds of complicated equipments need continuous upgrade and filling _ leak. all those aggravate the work of network administrators. a litter of negligence could bring up great hidden trouble

    與此同時,當今的網路環境也變得越來越復雜,各各樣的復雜的設備,需要不斷升級、補漏的使得網路管理員的工作不斷加重,不經意的疏忽便有可能造成安全的重大患。
  17. Additionally , this paper also provides a new idea to get meaningful words one by one from the chinese stream with high correctness , which is called concealed link writing

    此外,為獲得要求的分詞準確性,本文提出了新的分詞連寫思想。
  18. Implicit learning of distributed decision group in dynamic system control task

    分散群體在動態控制決策中的內學習
  19. In the first chapter in this dissertation, the possibility and certainty of traditional letter of credit electronicsization have been discussed. in the second chapter, first of all simply introduced the model that electronic letter of credit preceeds. then according to this model, put forward the probably existing safe trouble : the systematic reliability ; secrecy and completeness of data telecommunications ; the social status authenticity of business person and the nature that business action cannot be denied ; the legal effectiveness of the data telecommunications as evidence

    本文第一章論述了傳信用證電子化的可能性與必然性;第二章首先簡單介紹了現在國際上電子信用證運做的模,然後根據此運做模提出可能存在的安全患;的可靠性;數據電訊的機密性和完整性;交易者身份的真實性及交易行為的不可抵賴性;數據電訊作為證據的合法有效性。
  20. A computer system that is used to control a larger system is termed an embedded system. reliability and real - time are primary attributes of embedded systems

    嵌入藏在更大的中的計算機,相對于普通的桌面計算機,嵌入要求有更強的實時性,更高的可靠性。
分享友人