identification of individual 中文意思是什麼

identification of individual 解釋
人身同一認定
  • identification : n. 1. 認出,識別,鑒定,驗明(罪人正身等)。2. 【心理學】自居作用。3. 身分證。4. 【數學】黏合,同化。
  • of : OF =Old French 古法語。
  • individual : adj 1 單一的,個別的,單獨的。2 個人的,個體的。3 特殊的,特有的,獨特的 (opp General universal...
  1. The article points out the importance and necessity of the information - security from its actuality in our country. the resources in the information system, for instance, hardware, software, data, document, operator, meterial and so on, are evaluated and gived safety grade firstly. and then, it analyses the menace including the nonauthorized access, the information leak, the refused sevice, the internal objection which the system will take. the following are the corresponding control police : confirm the users " rights and duties, including the mode of using account, the limit of accessing resource, the application of password, the building of backup ; confirm the administrators " right and duties, including physical safety, system configuration, account configuration and usufruct, password management, audit and control, backup and individual intimity ; run - of - mill measure of security defence, including access control, symbol and identification, integrality control, password technique, firewall system, audit and resumption, safety of operating system, safety of database system, defence of computers " virus and resisting - deny protocol. in the end, the article offers the strategies of disposing the safety - accident and analyse after ithow. to report it, how to solve it in phase, and how to avoid it happening again. in a word, the article presents a holistic resolvent about keeping away the information system ' s security, and supplies a essential frame for its configuration, management and application

    然後,對系統可能受到的威脅,包括非授權訪問、信息泄漏、拒絕服務和內部缺陷等進行分析,並提出了相應的控制策略:確定用戶的權力和責任,包括帳戶使用方式、資源訪問權限、口令應用以及建立備份等;確定系統管理員的權力和責任,包括物理安全、系統配置、帳戶設置及使用權限、口令管理、審計和監控、備份以及個人隱私等方面;一般性的安全防護措施:存取控制、標識和認證、完整性控制、密碼技術、防火墻系統、審計和恢復、操作系統安全、數據庫系統安全、計算機病毒防護和抗抵賴協議等。最後,對事故處理和事後分析提供策略,如何報告安全事故,如何協調解決安全事故,如何避免安全事故再次發生。總之,本文對信息系統安全防範工作給出一個整體的解決方案,為其在配置、管理和應用方面提供了基本的框架。
  2. In this paper, various kinds of identity - authentication schemes are analyzed and compared, and the individual identity - authentication scheme is designed to meet the requirement of the jarl mis, which was based on fingerprint identification technology, digital signature technology and id technology. the design is also realized in the registration management system by fingerprint

    本文通過對各種身份認證方案進行綜合的分析和比較,並結合監獄指紋點名管理系統對身份認證方案的具體要求,設計了基於指紋識別、數字簽名及智能卡技術於一體的個人身份認證方案,並將它在監獄指紋點名管理系統中予以實現。
  3. The ways of intervention refer to interview group psychotherapy and individual consulting. and the methods include cognition adjustment, emotion release and model identification

    干預形式為團體干預與個體輔導,干預技術涉及認知調整、情緒宣洩和榜樣認同。
  4. Secondly, through the analysis of the experience of the advanced banks domestically and internationally, the identification of the development of jianyany branch will be ensured mainly on individual banking business

    其次,根據國內外先進銀行的發展經驗和當地經濟發展趨勢分析,對j銀行簡陽支行發展定位進行研究並確定為以個人銀行業務為主。
  5. According to the analysis of the history of jianyang branch and the comparison of the levels of the contemporary financial business, the research about the identification of development and the strategy individual banking business will be developed based on the related theory of market consumption. and finally, a reasonable strategy will be given

    通過對j銀行簡陽支行業務歷史發展分析,以及當地區域經濟發展狀況和金融同業發展水平的比較分析,並運用市場營銷相關理論等對j銀行簡陽支行的發展定位和個人銀行業務發展策略進行了研究,提出了合理的對策。
  6. The identification of the individual by someone known to the data user

    由資料使用者認識的其他人識辨該人的身分。
  7. When town worker is applying for individual housing accumulation fund to borrow money, should submit the following data : individual data : the individual that applies for loan ( borrower of the following abbreviation ) the relevant identification of identification and spouse ( id or other and effective certificate all but ) xerox each 4 ; the marriage of borrower proves ( certificate of lone proof, marriage certificate, divorce or divorce judgment, the death that the person that bereft of one ' s spouse must provide opposite party proves ) xerox each 4 ; the significant evidence photocopy that makes the money that buy a house 4 ; the income of borrower and spouse proves each 4 ; original of lawful the contract that buy a house 4 ; and the seal of borrower and its spouse

    城鎮職工在申請個人住房公積金貸款時,應提交以下資料:個人資料:申請貸款的個人(以下簡稱借款人)身份證實及配偶的相關身份證實(身份證或其他有效證件均可)的復印件各4份;借款人的婚姻證實(單身證實、結婚證書、離婚證書或離婚判決書,喪偶者須提供對方的死亡證實)的復印件各4份;交購房款的有效憑證復印件4份;借款人及配偶的收入證實各4份;合法的購房合同原件4份;以及借款人及其配偶的印章。
  8. Usually dual sources ( radar and decoy ) have the same or alike modulation and position. in this dissertation, method of doa identification is studied in order to tracking individual radiation source correctly. the main efforts and results of this dissertation can be summarized as follows : 1

    本文重點研究在兩點源(雷達和誘餌)空間張角很小、時域重疊、信號調制參數相同或相近的情況下, prs有效分選輻射源到達方向( directionofarrivals ,即doa )的方法,以實現對待攻擊輻射源的正確跟蹤。
  9. The influence of medical treatments on individual identification and paternity test

    醫療對個人識別和親子鑒定的影響
  10. Reasons of the moral crisis of li individual agents have been elaborated from two viewpoints, i. e. formal and informal constraints respectively, the discrepancies of formal constraints such as salary assignment system, training system and qualified identification system have been explored firstly, and then some deeper reasons originated from those informal constraints such as culture, religion belief, contractual concepts, individualism and collectivism etc. have been analyzed

    從正式約束和非正式約束兩方面闡述了壽險個人代理人失信行為的根源。在正式約束中,主要分析了薪酬分配製度、培訓體系、資格認定體系等存在的缺陷;在非正式約束中則從文化、宗教、契約觀、個人主義和集體主義來分析壽險個人代理人存在失信行為的深層次原因。
  11. Sound intensity measurement allows accurate identification, isolation and ranking of individual sound sources

    聲強測量可以精確的鑒別、孤立、列舉單個噪聲源。
  12. Introdution individual identification regard individual as research object, including living body, corpse and biology material from of the human body, which examine the material, use theory and technology of forensic medicine and anthropolgic to detect, analyse, and confirm its individuals body source

    前言個人識別是以個人為研究對象,包括活體,屍體及來源於人體的生物學性檢材,應用法醫學、人類學的理論和技術檢測分析,確定其個體的身源。
  13. When identifying the basis of apportion charges, administrate office should judge and recognize from the whole company and individual branches. the identification and measurement of segment asset and owes include two aspects : the direct ones and which need to distribute on the quantitative basis

    分部資產和分部負債的確認和計量主要包括兩個方面:首先確認可直接歸屬該分部的項目數額,其次確認可按合理基礎分配給該分部的項目數額。
  14. Borrow writing down card is the consumption after depositing money first credit card is the reimbursement after be being consumed first is in abroad, credit card can regard as individual identification, in credit society, the record of credit card mirrors the individual ' s credence to record, having guiding effect to borrowing money to shop with instalment

    借記卡是先存款后消費信用卡是先消費后還款在國外,信用卡可以當作個人身份證實,在信用社會里,信用卡的記錄反映個人的信用記錄,對貸款和分期付款購物起著指導性作用。
  15. Individual taxpayers, besides using digital certificates, can also use their taxpayer identification number and e - tax password to authenticate their identity when make use of this service to enquire about both the general and their specific tax information such as the status of their tax return, assessment and payment and trc account balance

    除使用數碼證書,個別人士亦可使用稅務編號和稅務易通行密碼核實身分。使用互動稅務查詢服務,除了可取得一般的稅務資料外,還能夠查詢個人的稅務資料,如他們的報稅表、評稅和付款狀況,以及儲稅券帳戶的結餘。
  16. The obligee name that estate registers decides according to following method : ( 1 ) legal entity, for the legal name of this legal entity ; ( 2 ) national office, institution, decide the name that name or government affirm for the law of this mechanism, unit ; ( 3 ) illegal person organization, organize the name that registers lawfully or the name that the government approves for this ; ( 4 ) individual, for the full name on lawful identification ; ( 5 ) mutual person, for the name of each obligee or full name

    房地產登記的權利人名稱根據如下辦法確定: ( 1 )企業法人,為該企業法人的法定名稱; ( 2 )國家機關、事業單位,為該機關、單位的法定名稱或政府確認的名稱; ( 3 )非法人組織,為該組織依法登記的名稱或政府批準的名稱; ( 4 )個人,為合法身份證實上的姓名; ( 5 )共有人,為各權利人的名稱或姓名。
  17. An accurate automatic personal identification is critical in a wide range of application domains such as internet security, automated banking, residence safeguard, health care and electronic commerce etc. biometrics identifies an individual based on her physiological or behavioral characteristics such as face, fingerprint, iris, dna and voice etc. with its unique advantages, automatic fingerprint identification has become one of the most reliable biometric technologies

    在網路安全、金融、安防、醫療以及電子商務等諸多應用領域都有著身份認證的強烈需要。與此相關的生物特徵識別技術日益受到人們的重視。這種技術根據人體自身的特徵如人臉、指紋、視網膜、 dna 、聲音等來識別個人的身份。
  18. Individual pink dolphins can be identified from the unique colour, shape and scarring on their dorsal fins and wwf have been using this identification technique to establish a catalogue of whos who in the hong kong pink dolphin world

    憑照片中海豚背鰭上獨有的顏色型狀及疤痕可辨認個別白海豚,世界自然基金會一直沿用此辨認技術辨識個別白海豚及替白海豚成立了誰是誰辨識目錄。
  19. The essence of individual study processes of social standard is a process of forming one ' s morality, which is built on the ground of individual ' s identification with social norm, and therefore it becomes an important content of moral educational psychology to research the psychological process of social standard study identification

    個體社會規范的學習過程,其實質是品德形成的過程,它建立在個體對社會規范認同的基礎上,因此,研究社會規范學習認同的心理過程就成為道德教育心理學的重要內容。
  20. Data users may however accept a copy if the individual chooses voluntarily to provide this in place of the physical production of the identity card for identification, but the copy must be destroyed once the identity card number is recorded

    不過,如個人自願選擇提供身份證副本,以代替實際出示身份證作識辨用途,則資料使用者可接受副本,但卻必須在記錄身份證號碼后,隨即毀滅有關副本。
分享友人