安全
- 与 安全 相关的网络例句 [注:此内容来源于网络,仅供参考]
-
In recent years, sever security accidents frequently arise in China, especially the colliery industry, of which serious posture exists. To protect the secure of producing and managing more efficiently, and to punish those who produce and manage with insecure elements, the Amendatory Act 6 makes amendments in this field. However, a imprecisely prescription would cause a inaccurately applying.
近几年,我国重特大安全事故频发,尤其是矿山行业的安全生产形势非常严峻,为了更有效地维护生产经营的安全,惩治那些不重视对安全生产设施和安全生产条件进行投入、建设、管理和维护的行为,《刑法修正案》对重大劳动安全事故罪进行了修改,但是修改后的条文在犯罪构成要件的表述上不明确,在司法上不能得到准确适用。
-
In recent years, sever security accidents frequently arise in China, especially thecolliery industry, of which serious posture exists. To protect the secure of producing and managingmore efficiently, and to punish those who produce and manage with insecure elements, theAmendatory Act 6 makes amendments in this field. However, a imprecisely prescription wouldcause a inaccurately applying.
近几年,我国重特大安全事故频发,尤其是煤矿行业的安全生产形势非常严峻,为了更有效地维护生产经营的安全,惩治那些不重视对安全生产设施和安全生产条件进行投入、建设、管理和维护的行为,《刑法修正案》对重大劳动安全事故罪进行了修改,但是修改后的条文在犯罪构成要件的表述上不明确,在司法上不能得到准确适用。
-
It is known that the security defense intensity of the information system depends on the weakest part of Maginot line. If there is no appropriate security architecture as a guide, it is difficult for the various security components in the information system to coordinate with each other and to work in order. Then, it often appears the "safety shortcomings" phenomenon, resulting in the vulnerability in the security and all the protection efforts in the information system are in vain. 2 Trusted computing and security mechanisms come apart.
众所周知,信息系统的安全防护强度取决于"马奇诺防线"中最为薄弱的环节,如果没有合理的安全体系结构作为指导,信息系统中各安全部件就难以相互协调、有序工作,就很容易出现"安全短板"现象,从而导致信息系统安全防护不堪一击,所有的努力功亏一篑。2可信计算和安全机制相脱节。
-
Based on the example of shahe reservoir, the text makes an analysis on circulation, management and environment and social economy development condition of the surrounding ecosystem. Then, the author carries on inquisition, data analysis and summary and makes calculation and demonstration of the safe stability of the dam ,and discusses the risking obviation and reinforcing technique. Finally, based on the existing research of sustainable development, experts" opinions and Mathematical Statistics analysis, the author brought forward an indication system suitable for reservoirs" sustainable development This system is made up of 4 first class indexes, 13 second class indexes, 38 foundational indexes. The 4 first class indexes are the dam safety evaluating index, the management index of reservoirs, the water ecosystem system stability index, the reservoirs construction effect index. The 13 second class indexes are the construction quality evaluating index, the dam running and management evaluating index, the flood control standard recheck index, the structure safety evaluating index, the anti- earthquake evaluating index, seepage safety evaluation index sign, the metal structure safety evaluating index, the engineering facility index, the management index, the water ecosystem system stability index, engineering effect index, the economic development index, the society development index.
本文以沙河水库为例,对其运行、管理及周围生态环境和社会经济发展状况进行调查,并将调查资料进行分析、归纳、总结;然后对水库大坝的安全稳定情况作出了简要的计算和论证,并讨论了水库的主要除险加固技术;最后在总结现有可持续发展研究的基础上,征集专家的意见,进行数理统计分析,提出了由4个一级指标、13个二级指标、38个基层指标组成的一套适合该水库可持续发展的指标体系。4个一级指标分别为:水库大坝运行安全综合评价指标、水库管理指标、水资源生态系统稳定性指标、水库建设效应指标;13个二级指标分别为:工程质量评价指标、大坝运行管理评价指标、防洪标准复核指标、结构安全评价指标、抗震安全评价指标、渗流安全评价指标、金属结构安全评价指标、工程设施指标、管理指标、水资源生态系统稳定性指标、工程效应指标、经济发展指标、社会发展指标。
-
The general objective of the thesis is to develop a language-based foundational theory of security for mobile and distributed systems, and this thesis focus on the following four interrelated aspects. Firstly, aiming at the access control, a type system with security levels is proposed and the Subject Reduction Theorem under labelled transition system is proved.
针对安全模型面临的困难与挑战,本研究从分析移动系统安全的实质出发,对系统安全进行高度的抽象,使用π-演算及其类型系统为理论工具为分布式系统安全建模,提出对安全模型的定义、规范、分析与实现都借助程序语言的理论、技术与方法的一体化路线,研究基于程序设计语言的安全模型。
-
Can think that road traffic safe program is government and its function department is , make the personal casualties of road traffic accident lose with property in program issue fall to the goal intended, determine in the traffic safe measure and action and its enforcement that person, vehicle, road and environment should adopt with the aspects such as management sequential, it is different levels people's government and its function department science develop the road traffic at will sexual major basis and important means of blindness of working and preventing road traffic safely working decision safely , it is strategy and the direction of road traffic safe development, have the scientificness of guaranteeing road traffic safe management and avoid decision fault before Zhan sexual role, have important strategic meaning for preventing road traffic accident.
可以认为,道路交通安全规划是政府及其职能部门为使道路交通事故的人员伤亡和财产损失在规划期内降至预定的目标,确定的在人、车、路、环境和管理等方面应采取的交通安全措施和行动及其实施时序,是各级人民政府及其职能部门科学开展道路交通安全工作、防止道路交通安全工作决策的随意性和盲目性的主要依据和重要手段,是道路交通安全发展的方向与战略,具有保证道路交通安全管理的科学性及避免决策失误的前瞻性作用,对预防道路交通事故具有重要的战略意义。
-
According to the structural features and the scene actual requirements of all kinds of mine safety door ,have designed the vertical shaft swing type safety door .
根据目前各种矿用安全门的结构特点和现场实际要求,设计制作了竖井摆动式安全门,介绍了安全门的基本结构、工作原理和技术参数,现场使用表明,安全门结构合理,工作安全可靠,各项指标均符合《煤矿安全规程》的要求,效果良好。
-
Triplicity is established for "application security"and"data security"and "law security "ofHospital Data Security Managerment System , and the science reference can be offeredto solve problems ofhospital data security.......
探索建立"应用安全"、"数据安全"和"法律安全"三位一体的医院数据安全管理系统,为解决医院数据安全问题提供科学借鉴。数据安全;电子签名;身份认证
-
The design includes many new technologies in data exchange and data security, they are: Converting non-XML data to XML in order to apply the XML security technology to more data types; Using the technology of XKMS and PKI to manage the public key in order to overcome the shortage of complexity and difficulty in using PKI and improve the efficiency of the public key management; Using Diffe-Hellman algorithm combining with the public key technology to exchange secret key in order to furthest increase the security of the key; Using the technology of XML digital signature algorithm to ensure the integrity, message authentication and signer authentication of the data; Using the technology of XML encryption to ensure confidentiality of the data; Defining delegable access rules on the structure and content of the XML documents to provide fine-grained access control. According to the XML security framework, a XML security library is designed and implemented.
在对XML及其安全技术主要包括XML加密技术、XML数字签名、公钥管理、密钥产生和交换进行研究的基础上,结合传统密码技术和XML安全技术提出了一种基于XML的数据安全模型,模型中包含了目前网络数据交换和安全领域的一系列最新技术,主要有:将非XML格式数据转换为XML格式数据的方法,以保证现有的大部分网络数据能够应用XML安全技术;使用XML公钥管理技术结合PKI技术管理公钥,以克服PKI技术实施和部署复杂、难度大等问题,提高公钥管理的效率;使用Diffie-Hellman算法结合公钥技术交换密钥,以最大限度保证密钥的安全;使用XML数字签名技术保证数据的完整性、不可否认性和发送方身份认证;使用XML加密技术保证数据的机密性;根据XML文档的内容和结构定义授权访问规则进行良好的访问控制。
-
This article describes the main tache which will impact power supply safety of core machine/equipment room ,including high-lower power distribution,generators,uninterrupted power supply,switch power supply,exact air-condition environment,lightningproof earthing system,power system monitoring system,maintenance management flow and maintenance ability of vindicator etc.
本文从影响核心机房供电安全的主要环节:高低压配电、发电机组、UPS、开关电源、机房空调环境、防雷接地、动力环境监控系统、维护管理流程及维护人员技能等方面出发,对安全评估的客观性保障、安全评估的内容及评价体系、安全评估的实施操作、安全评估应达到的效果进行详细的分析,从而指导核心机房的供电安全评估项目的有效开展。
- 推荐网络例句
-
In the United States, chronic alcoholism and hepatitis C are the most common ones.
在美国,慢性酒精中毒,肝炎是最常见的。
-
If you have any questions, you can contact me anytime.
如果有任何问题,你可以随时联系我。
-
Very pretty, but the airport looks more fascinating The other party wisecracked.
很漂亮,不过停机坪更迷人。那人俏皮地答道。