查询词典 in security
- 与 in security 相关的网络例句 [注:此内容来源于网络,仅供参考]
-
The company CMG brand security products, the Ministry of Public Security of the State Security System Product Quality Supervision and Testing Center detection test pass products through national certification mandatory 3 C, and in April 2004 was named " China Security famous brands."
公司生产的康联牌系列安防产品,经国家公安部安全防范系统产品质量监督检验测试中心检测检测合格,系列产品通过国家强制性3C认证,并于2004年4月被评为"中国安防知名品牌"。
-
In Chapter ONE, the paper raises the five mainfunction of modem security market, introduces the four developing stages of our country"s security market; from five aspects he describer the present situation of China"s security market development, and the problem which is still existing in our countrys security market.
第一:提出了现代证券市场的5种主要功能,划分了我国证券市场发展的4个阶段,并且从5个方面叙述了中国证券市场发展的现状和存在的问题。
-
On this basis,the thesis proceeds from new problem in current economic development and developing reality of the basic social security of urban and rural areas in China.According to the reality of national conditions and the experience of basic social security of the western developed countries and Chinese basic social security and the next development trend of construction of China,the thesis used qualitative analysis and quantitative analysis means to study dualization social security system.
本文基于对有关社会保障理论的介绍、评析与我国社会保障实践相结合的基础之上,采用理论联系实际的方法,通过对我国城乡二元化社会保障实践的经验和教训的总结,运用社会主义市场经济理论和社会保障科学理论,结合我国目前农村经济运行中出现的新情况、新问题,提出改革和创新的新模式、新思路,寻求符合中国国情的统筹城乡二元化社会保障制度的新体制。
-
In the near term, the priority research areas are:(1)Method and model of ecological security assessment for ecological security pattern;(2)Land ecological security pattern of different ecological friable areas;(3) Spatial explicit model of land ecological security pattern;(4) Scenario simulation of regional land ecological pattern.
提出近期的研究重点主要包括:(1)面向生态安全格局设计的生态安全评价方法与模型;(2)不同类型生态脆弱地区的土地生态安全格局;(3)土地生态安全格局的空间显示模型;(4)区域土地生态安全格局情景模拟。
-
In SPVT (security protocol verifying tool), the specification language is the π-like calculus extended with three appendixes, the Dolev-Yao model is described with Horn logic rules, the π-like calculus model of security protocol is transformed into the logic program model by abstract rules, the security properties are verified based on the calculus of the logic program's fixpoint, and the counter-examples on security properties are constructed from the process of the fixpoint calculus and the process of the property verification.
在SPVT中,以扩展附加项的类演算作为安全协议描述语言,以扩展附加项的Horn逻辑规则描述协议攻击者的Dolev-Yao模型,通过一组抽象规则将安全协议的类(演算模型转换为逻辑程序模型,基于安全协议逻辑程序的不动点计算验证安全性质,从安全协议逻辑程序的不动点计算和安全性质的验证过程中构造不满足安全性质的安全协议反例。
-
TheAdvancestoIP Multimedia Subsystem architecture, built on the 3rd Generation Partnership Project 2 (3GPP2)'s Multimedia Domain, supports both IMS/MMD and non-Session Initiation Protocol services. In terms of network operation, A-IMS as extensions to IMS/MMD enhances the IMS/MMD network security with the addition of Security Operation Center, posture agent, etc. Some parts of the A-IMS framework are still under development sUCh as terminal support for the posture agent, security information exchange, and security policy definition.
改进的IP多媒体子系统基于3GPP2的多媒体域架构,包含了所有IP多媒体子系统/多媒体域业务功能,并增加了对非会话发起协议应用的支持;从网络运营的角度,针对IMS/MMD网络安全提出了一些扩展和补充,如增加了安全操作中心和姿态代理等,使IMS/MMD网络的安全性得到了较大改进。A-IMS仍处于框架性描述阶段,还有很多细节尚不明确,如终端对姿态代理的支持能力、安全信息交换的内容、安全策略的具体定义等,有待于进一步研究。
-
Chapter three describes the institutional background of China security analyst industry, including the history of security consultant industry in China, the current situation of sell-side analysts in China, security analysts\' job content and interest relations, and third-party evaluation for security analysts.
第三章介绍中国证券分析师行业的相关制度背景,包括中国证券咨询行业的发展历程、卖方分析师的发展现状、分析师的工作内容和利益关系、以及证券分析师的第三方评价等。
-
In 2003, Jilin Province security trading volume is 2.68 percent of the whole countrys trading volume. The two security companies are Northeast Security Co. which is Comprehensive Company, and ChangCai Security Co.which is Broker Company.
两家法人证券机构为综合类券商东北证券和经纪类券商长财证券,目前两家券商客户资产安全性、流动性较好,法人治理结构和内部控制制度比较完备。
-
As for a policy arranging, the social security can not be replaced in order to safeguard the whole society development harmonious. In 2004, The National Peoples Congress amended constitution and increased the provision overbuilding up the sound social security system, putting forward" The country establishes and perfects the social security system adaptable to economic development "definite. It put forward the higher requirement for the choice of the models of Chinese social security system.
社会保障制度的建设与发展,正是维护整个社会全面发展、协调发展的不可替代的制度安排。2004年全国人大修改宪法,增加了建立健全社会保障制度的规定,明确提出&国家建立健全同经济发展水平相适应的社会保障制度&,这为中国社会保障制度模式的选择提出了更高的要求。
-
In chapter3, information is divided into two basic types, the marginal equation of bond price and short-term interest variations is established, thus the security price variations and the price equilibrium of other assets (risk security non-risk security are included) are analyzed by the implement of portfolio Theory. Finally the bond value equation which takes equilibrium return as its yield Parameter is established through the theory of comparative return. In chapter 4, the intra-information and the transferable system of price is emphasized and the market-maker model and expected model under non-perfect information market conditions are established, and the disaccord of the influence of extra-information and intra-information on the security price is discussed.
第三章将债券的价格均衡划分为两大基本类型,建立了债券与短期利率变动的边际方程,运用组合原理分析债券价格变动与其它资产(包括风险证券和无风险证券)的价格均衡关系,通过比较收益原理建立了债券以市场均衡收益为折现参数的价值方程,并通过实证检验了该模型的合理性;第四章,分析了内部信息与价格的传导原理,建立了非完全信息市场条件下价格传递信息的做市商模型和预期模型,并讨论外部信息与内部信息对股票价格影响的非一致性。
- 推荐网络例句
-
This one mode pays close attention to network credence foundation of the businessman very much.
这一模式非常关注商人的网络信用基础。
-
Cell morphology of bacterial ghost of Pasteurella multocida was observed by scanning electron microscopy and inactivation ratio was estimated by CFU analysi.
扫描电镜观察多杀性巴氏杆菌细菌幽灵和菌落形成单位评价遗传灭活率。
-
There is no differences of cell proliferation vitality between labeled and unlabeled NSCs.
双标记神经干细胞的增殖、分化活力与未标记神经干细胞相比无改变。