英语人>网络例句>安全 相关的搜索结果
网络例句

安全

与 安全 相关的网络例句 [注:此内容来源于网络,仅供参考]

At present, there are two branches in the research of database security technology, which are secure database management system and enhancive database security system. According to the view of enhancive database security system, this paper takes the typical TCSEC model as reference. An agent system is built between database client and database server for secure communication, SQL parsing and access controlling.

目前,我国数据库安全技术研究主要有安全数据库管理系统和数据库安全增强系统两个方向,本文主要从数据库安全增强系统的角度出发,参考经典的TCSEC监视器模型,在数据库客户端和服务器端之间建立一个代理系统,来完成数据库的安全通信、SQL分析和访问控制等功能。

The theory of resource exiguity is basis of researching supply security of mineral resource. The theory of security science is foundation to weigh whether supply of mineral resource is safe or not The theory of sustainable development is basic demand to research safe supply of mineral resource.

其中资源稀缺论是研究矿产资源供应安全的基础;安全科学论是衡量矿产资源供应是否安全的砝码;可持续发展论是矿产资源供应安全的基本要求;综合国力论是矿产资源供应安全的保障手段。

In the near term, the priority research areas are:(1)Method and model of ecological security assessment for ecological security pattern;(2)Land ecological security pattern of different ecological friable areas;(3) Spatial explicit model of land ecological security pattern;(4) Scenario simulation of regional land ecological pattern.

提出近期的研究重点主要包括:(1)面向生态安全格局设计的生态安全评价方法与模型;(2)不同类型生态脆弱地区的土地生态安全格局;(3)土地生态安全格局的空间显示模型;(4)区域土地生态安全格局情景模拟。

On the basis of recommending the concept and basic feature, the main challenge that current information security of national defence is confronted with is analyzed by the numbers. Then the basic approaches for strengthening the building of information security of national defence is introduced roundly and by the numbers from some aspects such as theoretical investigation, technical furnishment, personnel training and statute building.

全文从国防信息安全的概念、基本特征入手,系统分析了当前危胁国防信息系统安全的各种因素,综合分析得出从技术和非技术两个方面加强我国国防信息安全的基本对策,力求以理论研究引导和推动国防信息安全系统建设实践,为我国国防信息安全的发展方向、建设及运用提供可靠的理论依据和支撑。

The presented security adequacy of unilateral authentication secure, mutual authentication secure, unilateral session key secure, or mutual session key secure is proved not only substantial but also necessary to meet 4 security definitions respectively under the computational model of matching conversation and indistinguishability.

在基于匹配对话和不可区分性的计算模型下,证明了给出的保证密码协议单方认证安全、双方认证安全、单方密钥安全和双方密钥安全的充分必要条件分别满足4个可证安全定义。

The Design must strictly stand by "Safety Production Standard of People's Republic of China" and "Industrial Disease Prevention and Cure Standard of People's Republic of China", earnestly carry out guideline of "safety first, prevention primary", in priority, select advanced, mature and safe process in essential, rigorously execute actual standard and criterion, in order to meet the requirement of safety and hygiene, realize smooth, longer periodic running, and protect safety and health of operators in production.

设计严格遵守《中华人民共和国安全生产法》、《中华人民共和国职业病防治法》,认真贯彻"安全第一、预防为主"的方针,优先选用先进、成熟、本质安全的生产工艺,严格执行现行的标准规范,使本工程能达到安全卫生的要求,实现长期、稳定生产,在生产过程中职工的安全与健康不受损害。

Latterly, this paper introduces the secure model of OSCARSEC and the requirement for the audit system, we analyzes this model in the aspect of traditional security analysis paradigm.

然后从数据库的安全模型着手,从传统安全分析的角度对OSCARSEC安全数据库做出了相应的分析,得到了数据库的安全模型,以及安全数据库对审计的一些需求。

According to the most unfavorable fire scenario for safety evaeuation, the AEST can be obtained through the spread of fire and smoke spread simulation. And the REST of different staff loads are calculated by empirical formula method. Through contrasting two times, whether evacuation passage setting can meet the evacuation requirements is confirmed, and then solutions are proposed. Then highway tunnel fire cause is discussed by Fault Tree Analysis method, and the effective measures to reduce the probability of tunnel fire are reducing the number of flammable materials and using fire-retardant or noncombustible materials for inner decoration are obtained.

以厦门金山寨隧道为例分析火灾时人员的安全疏散,针对隧道内最不利人员安全疏散的火灾场景进行分析,通过对火灾蔓延、烟气扩散进行模拟获得可用的人员安全疏散时间AEST,并用经验公式法计算不同的人员荷载下必需的人员安全疏散时间REST,对比两个时间,判别当前疏散通道的设置是否满足人员疏散要求,并对不满足安全疏散要求的工况提出解决方案。

Including TCSEC (Trusted Computer System Evaluation Criteria; commonly called the "Orange Book"), which is a standard for computer security issued by the US government; ITSEC(the Information Technology Security Evaluation Criteria), which is a standard for computer security that was issued by the Europe, CC, which is a world standard for computer security; GB 17859-1999, which classified criteria for security protection of Computer information system in China.

本文论述了计算机网络安全现状、评价现状,以及网络信息安全评估标准,包括美国可信计算机安全评价标准,欧洲的安全评价标准,国际通用准则(CC,等同GB 18336),我国计算机信息系统安全保护等级划分准则(GB 17859-1999)。

The paper makes an analysis on how to solve the safe production problem from some aspects,such as the safe education and evaluation,peccancy prevention,safe supervision,and enterprise safe culture construction etc.

文章对如何做好安全生产工作,从安全教育、安全性评价、防止违章、安全监督、企业安全文化建设、安全文明生产等方面进行了阐述。

第8/100页 首页 < ... 4 5 6 7 8 9 10 11 12 ... > 尾页
推荐网络例句

Cynanchum Lingtai apricot production in the average weight 65 grams, the brightly-colored fruit, juicy rich, sweet-sour taste, sweet from the nucleolus, when the late Qing Dynasty famous Shaanxi, Gansu provinces, the Qing imperial court Tongzhi tribute for years.

灵台生产的牛心杏平均单果重65克,果实色泽鲜艳,汁多味浓,甜酸适口,离核仁甜,清末时就驰名陕、甘两省,清同治年间曾为朝廷贡品。

Chenopodium album,Solanum nigrum, and Amaranthus retroflexus were very susceptible to the herbicides. Polygonum persicaria and Abutilon theophrasti were relatively less susceptible to the herbicides, and Lycopersicon esculentum was not susceptible to it. The relationship between reduction rates of weed biomass and PPM values of weed leaves 2,4, and 6 days after treatment was established.

供试的6种杂草对该混剂的敏感性存在显著差异:红心藜Chenopodium album、龙葵Solanum nigrum和反枝苋Amaranthus retroflexus对该混剂最敏感,ED90值分别为47.65、71.67和29.17g/hm2;春蓼Polygonum persicaria和苘麻Abutilon theophrasti敏感,ED90值分别为96.91、114.20g/hm2;而番茄不敏感。

However, I have an idea.

不过,我有个主意。