安全的
- 与 安全的 相关的网络例句 [注:此内容来源于网络,仅供参考]
-
By analyzing audit events, intrusion detection can discover the unauthorized and anomalistic actions. It is another important method of protecting information security.
常规的安全保护措施是保障系统安全的一方面,入侵检测通过分析审计事件,发现系统中未授权活动及异常活动,是信息安全保护的另一重要途径。
-
Part of the overall safety relating to the EUC and the EUC control system which depends on the correct functioning of the E/E/PE safety-related systems, other technology safety-related systems and external risk reduction facilities
与EUC和EUC控制系统有关的整体安全的组成部分,它取决于E/E/PE安全相关系统,其它技术安全相关系统和外部风险降低设施功能的正确行使。
-
At present, the ecological safety appraisal theory and method arenot riper yet. On the basis of absorbing the domestic and international relevant research incomprehensive appraisal of ecological safety, the safe comprehensive appraisal method ofthe ecology of subsiding areas and instance have been explored and studied in this text.
目前,生态安全的评价还没有比较成熟的理论与方法,在吸收国内外生态安全综合评价相关研究的基础之上,对采煤塌陷区生态安全综合评价方法及实例进行了探索与研究。
-
With more social concern on food safety, the way to secure food safety becomes an urgent problem to resolve, while the unsymmetrical information, moral hazards and management misbehavior always act as transaction cost increaser.
食品安全已成为全社会普遍关注的问题,但是保证食品质量安全必然会因信息不对称、道德危害和管理行为等因素而使交易成本增加,如何在保证食品安全的前提下减少交易成本就成为一个亟待解决的问题。
-
The threatens both from inside and outside the country, as well as the peoples misunderstandings of Internet information security were analyzed both in the macroscopical and microscopical way.
从宏观和微观的角度剖析了网络信息安全的内忧与外患、人们对网络信息安全的认知误区,指明了网络信息安全体系中各种重要元素。
-
In the design of SMCOS, introduce the software and hardware developing platform of SMCOS at first, then describe the system characteristic and hierarchical structure, tell the course of design and implementation of the software system of the SMCOS finally, mainly tell software architecture, design method to command interpreter, transmission module and file management, especially carry on deep explanation and discussion to the security environmental management of SMCOS, design the secure pseudorandom number generator according to systemic characteristic; Implement AES cryptographic algorithm, and optimize in term of the characteristics of AVR platform, make it reach the faster speed of encryption in case
在SMCOS的设计中,首先介绍了SMCOS的软硬件开发平台,然后描述了系统特性及其层次结构,最后讲述了SMCOS的软件系统设计与实现过程,主要讲述了SMCOS的软件架构、命令解释器、传输模块以及文件管理器的设计方法,特别对于SMCOS的安全环境管理进行深入的讲解及探讨,针对系统特点设计了安全的伪随机数生成方法;实现了AES加密服务模块,并针对AVR平台的特点进行了优化,使其在占用较小的代码空间的情况下达到较快的加密速度;改进了PIN的认证方法,对其传输过程提供了安全保护并采用了安全的验证方式以避免可能遭受的攻击:设计了相互认证命令,缩减了认证过程的时间消耗并提高了安全性。
-
In addition, proper measures are adopted to guarantee the real time property and safety of the system.
对于系统的安全性要求,分别采用了声明安全和编程安全的技术手段为系统提供了基本的安全保证。
-
The article uses the theories of Management Principle and Safety Principle,then puts forward the fundamentals of safety management of resourced-based island tourism and probes into the measures of the management of person,item,thing,from the problems on the safety management of management mechanism,tourism subject,object and media.
岛屿旅游是21世纪旅游的新热点,文章运用管理学和安全学的理论,从资源型岛屿旅游安全的管理机制与旅游主体、客体和媒体的安全管理存在的问题入手,提出了资源型岛屿旅游安全管理的基本原则,探讨了资源型岛屿旅游人、事、物3要素管理的相应措施。
-
The model has the following features: 1 The security information provided by the assessment result is more dependable because of the consideration of some main uncertain factors; 2 The improved analytic method of power system DSR and the dynamic equivalent technologies are applied to reduce the computing time and to make the model more practical; 3 Step-up assessment strategy is adopted in order to balance the precision and computing time requirements; 4 Decompounding of system insecurity indexes to each system component, or to each generator and consumer, and the visualization of assessment results, will help the operators to understand the security status of the power system more clearly; 5 The assessment results can be beneficial to the preventive control in traditional power systems and the security pricing in power market environments.
模型具有如下特点: 1由于综合考虑了一些不确定因素对系统安全性的影响,使得评估结果更加可靠; 2采用求解电力系统动态安全域的改进解析法,结合动态降维技术,大大减少了动态安全域的计算时间,使得模型比较实用; 3采取逐步递进的评估策略,以适应计算精度和计算时间要求; 4可定量分解出各元件或各发电与用户对系统不安全的贡献,配以形象直观的评估结果显示,使操作人员清楚了解系统的安全状况; 5评估结果在传统电力系统可帮助制定预防控制措施,在电力市场可用于安全性定价。
-
A lot of applied cryptosystems we use now are computational secure, but with the progress of computational power and cryptanalytic technique, the cryptosystems that are computational secure will become more and more insecure, so it will be more and more important to study theoretical security of cryptosystem.
目前我国在密码技术的应用水平方面与国外还有一定的差距。现在许多实用的密码体制都是计算安全的,但是随着计算能力的提高和密码分析的技术进步,计算安全的密码体制将会越来越不安全,因此,密码体制的理论安全研究越来越重要。
- 推荐网络例句
-
Neither the killing of Mr Zarqawi nor any breakthrough on the political front will stop the insurgency and the fratricidal murders in their tracks.
在对危险的南部地区访问时,他斥责什叶派民兵领导人对中央集权的挑衅行为。
-
In fact,I've got him on the satellite mobile right now.
实际上 我们已接通卫星可视电话了
-
The enrich the peopling of Deng Xiaoping of century great person thought, it is the main component in system of theory of Deng Xiaoping economy, it is a when our country economy builds basic task important facet.
世纪伟人邓小平的富民思想,是邓小平经济理论体系中的重要组成部分,是我国经济建设根本任务的一个重要方面。