identification document 中文意思是什麼

identification document 解釋
身分識別文件
  • identification : n. 1. 認出,識別,鑒定,驗明(罪人正身等)。2. 【心理學】自居作用。3. 身分證。4. 【數學】黏合,同化。
  • document : n 1 文獻,文件;公文。2 證件,證書,憑證。3 記錄影片,記實小說。4 【航海】船舶執照。vt 1 用文件[...
  1. 6 in an effort to protect our customers ' identity, vip cardholders must present their vip card and a valid identification document for cash coupon redemption at the customer service center of golden eagle stores

    6為保證持卡貴賓的合法權益,兌換獎勵時需持卡本人攜帶vip卡、有效身份證件(原件) 、購物憑證到領券店顧客服務中心辦理。
  2. The article points out the importance and necessity of the information - security from its actuality in our country. the resources in the information system, for instance, hardware, software, data, document, operator, meterial and so on, are evaluated and gived safety grade firstly. and then, it analyses the menace including the nonauthorized access, the information leak, the refused sevice, the internal objection which the system will take. the following are the corresponding control police : confirm the users " rights and duties, including the mode of using account, the limit of accessing resource, the application of password, the building of backup ; confirm the administrators " right and duties, including physical safety, system configuration, account configuration and usufruct, password management, audit and control, backup and individual intimity ; run - of - mill measure of security defence, including access control, symbol and identification, integrality control, password technique, firewall system, audit and resumption, safety of operating system, safety of database system, defence of computers " virus and resisting - deny protocol. in the end, the article offers the strategies of disposing the safety - accident and analyse after ithow. to report it, how to solve it in phase, and how to avoid it happening again. in a word, the article presents a holistic resolvent about keeping away the information system ' s security, and supplies a essential frame for its configuration, management and application

    然後,對系統可能受到的威脅,包括非授權訪問、信息泄漏、拒絕服務和內部缺陷等進行分析,並提出了相應的控制策略:確定用戶的權力和責任,包括帳戶使用方式、資源訪問權限、口令應用以及建立備份等;確定系統管理員的權力和責任,包括物理安全、系統配置、帳戶設置及使用權限、口令管理、審計和監控、備份以及個人隱私等方面;一般性的安全防護措施:存取控制、標識和認證、完整性控制、密碼技術、防火墻系統、審計和恢復、操作系統安全、數據庫系統安全、計算機病毒防護和抗抵賴協議等。最後,對事故處理和事後分析提供策略,如何報告安全事故,如何協調解決安全事故,如何避免安全事故再次發生。總之,本文對信息系統安全防範工作給出一個整體的解決方案,為其在配置、管理和應用方面提供了基本的框架。
  3. Ix a copy of the applicant s identification document

    Ix申請人身分證明文件副本
  4. Vi a copy of the applicant s identification document

    Vi申請人身分證明文件副本
  5. The advent of the internet and the wide availability ofcomputers, scanners and printers make digital data acquisition, exchange and transmission a simple task. however, making digital data accessible to others through networks also creates opportunities for malicious parties to make salable copies of copyrighted content without permission of the content owner. digital watermarking is likely to be a potential solution to this problem. digital watermarking has been proposed as a solution to the problem of copyright protection of multimedia documents in networked environments. it makes possible to embed a watermark ( such as identification data, serials number, text or image etc. ) to multimedia documents allowing copyright protection, secret communication, document authentication and so on. in this paper, we present a new digital image watermarking method based on svd ( singular value decomposition ), and then give some theoretical analysis about the algorithm. extensive experimental results show that this method is much more robust than other methods presented before

    隨著計算機和網路技術的飛速發展,數字圖像、音頻和視頻產品愈來愈需要一種有效的版權保護方法,另外通信系統在網路環境下的信息安全問題也日益顯露出來.數字圖像水印技術為上述問題提供了一個潛在的解決方案.所謂水印技術就是將數字、序列號、文字、圖像標志等版權信息嵌入到多媒體數據中,以起到版權保護、秘密通信、數據文件的真偽鑒別和產品標志等作用.本文提出了一種新的基於奇異值分解的數字水印演算法並且對該方法的理論基礎給出分析.實驗結果表明這種方法要比目前提出的流行演算法魯棒
  6. Ii a copy of the applicant s identification document

    Ii申請人身分證明文件副本
  7. A a copy of the applicant s identification document

    A申請人身分證明文件副本
  8. Please provide the copy of identification document

    請提供新增使用者之身份證明文件副本。
  9. You have authority to entrust or do not entrust other to handle property right card, but indispensible both sides carries identification and relevant document to show up ; appear in property right controversy, or go bankrupt, or when low debt, one party can take separate action explain get property right card

    你有權委託或不委託他人辦理產權證,但必需雙方攜身份證實和有關文件到場;在產權出現爭議、或破產、或低債時,一方可以採取單獨行動申領產權證。
  10. Re can be further broken down into the activities of fact - finding ( identification of sources of requirements or stake - holders as we will call them in rest of this document ), information gathering ( getting the “ wish - list ” from all the relevant parties ) and integration ( documenting & refining the “ wish - list ” through repeated analysis until it is self - consistent )

    需求捕獲可進一步分為查找需求源(識別需求的提出人或則稱之為風險承擔者,即產品涉及其利益的人,在該文檔其餘部分將繼續使用風險承擔者這個詞) ,網羅信息(收集各方面人員的對產品的要求,得到「期望列表」 )和整和(反復分析「期望列表」直到前後一致,得到文檔化,提煉后的「期望列表」 )等活動。
  11. Currently, part of the number of an identification document - be it a hong kong id card or a passport - of an ipo applicant or the first - named applicant of a joint ipo application is printed on the ipo refund cheque for unsuccessful applications

    或在首次公開招股聯名申請中排名首位的申請人的退款支票上,會印有其身分證明文件號碼
  12. Ans : please carry your personal identification document to the centre and re - register your account. account will be re - launched one week after your registration

    答:請憑識別證親至電算中登記辦理,自登記日起停用一周后重新啟用。
  13. In the 3rd chapter, according to the requirement of the representation of the product information, a new data model - xoem ( extensive object exchange model ) is presented because of the lack of the data model, which faces to the xml. the formal description of the xoem and its corresponding algebra are put forward, and then the data model is applied to the xml document on the web. in the 4th chapter, the method of the uniform information representation is presented according to the requirement of the description and identification of the diversified heterogeneous product information

    在第三章中,結合產品信息網上表達的需求,針對www環境下缺乏面向產品信息xml描述的web數據模型的情況,提出了基於帶根連通有向圖的一種新的數據模型即可擴展對象交換模型xoem ( extensiveobjectexchangemodel ) ,給出了該模型嚴格的形式化描述,並將該模型應用到含有xml半結構化數據的web中。
  14. The card automatic identification and inspection the electronic admission ticket the special qualifications document management the forgery - proof epc supply chain administration accessibility channel product counting the special device management and inspection and so on supervisory control and data acquisition

    車輛自動識別查驗,電子門票,特殊資格證件管理,商品防偽, epc供應鏈管理,無障礙通行門禁,小商品盤點,特種設備管理查驗等。
  15. Web site esdkiosk. or you can still use the facility join the activity by presenting your identification document when arriving at the venue

    ,使用康體通之"重印確認通知書"功能,再次列印三十天內之確認通知書,亦可於到達場地時出示有關身份證明文件,以使用預訂設施或參與活動。
  16. If given name appears first on your identification document, please put a ‘ 9 ’ in the box

    如申請人身分證明文件上的名字排?在姓氏之前,請在有關方格內加上9號。
  17. Candidates who take the admission / placement examination must bring along the notification letter and the original identification document ( i. d. card or passport ) for verification purpose

    參加入學試/分班試之人士必須攜帶考試通知書及有效之身份證明文件(身份證或護照)正本作核對之用。
  18. Tied around the body s neck was a waist belt from a bathrobe. no identification document was found on the body

    死者是男性,頸纏浴袍的腰帶,身上沒有任何身分證明文件。
  19. Mr lai said the smart identity card system was a complicated system with state - of - the - art technology. " the id card with multi - application is not only an identification document but lays a solid foundation for e - applications and e - commerce

    黎處長說:智能身份證已不僅是一張身份證明文件,它的多用途功能更為電子應用及電子商貿奠定了堅固的根基。
  20. " the id card with multi - application is not only an identification document but lays a solid foundation for e - applications and e - commerce. hong kong people enjoy a wide range of new services including the automated clearance system to be implemented at control points by the end of this year, " he said

    黎處長說:智能身份證已不僅是一張身份證明文件,它的多用途功能更為電子應用及電子商貿奠定了堅固的根基。香港市民可享受一咭多功能的服務,包括本年底在各口岸推出的自助過關系統。
分享友人