完整性
- 与 完整性 相关的网络例句 [注:此内容来源于网络,仅供参考]
-
Dapingzi highway tunnel is located in sound potash granite covered by debris.The overburden of the tunnel is relatively thin and the bias is great. In entrance zone,slope surface is covered with thick deluvial,colluvial,alluvial debris,resulting in difficult tunneling condition.
锦屏电站专用公路大坪子隧道岩体为钾长花岗岩,岩体完整性较好,表层为块碎石土,但隧道埋深较浅,偏压严重,进洞口段边坡表面覆盖有较厚的坡崩冲积块碎石土,成型进洞困难。
-
Cause to be agitated, excited, or roused同义词:agitate, rouse, turn on, charge, commove, charge up同义词:arouse, sex, turn on, wind up7. stir the feelings, emotions, or peace of同义词:stimulate, shake, shake up, stir
本站所收集信息资料为网络转载版权属各作者并已著明作者旨在资源共享、交流、学习之用,请勿用于商业用途,本站并不保证所有信息、文本、图形、链接及其它内容的绝对准确性和完整性,故仅供访问者参照使用。
-
And as he followed, comprehendingly and critically, he noted the unbroken field of the other's knowledge. As for himself, from moment to moment the conversation showed him gaps and open stretches, whole subjects with which he was unfamiliar.
在他怀着理解和批判的眼光听着他时,他注意到了对方知识的完整性,也不时地发现着自己知识的漏洞和大片大片的空白,那是许多地完全不熟悉的话题。
-
When M rr is positive, it represents a compressional state; when M rr is negative, it represen
之所以进行这种简化是因为在相当多的情况下,地震的震源或矩心深度难以测准,并且震源机制目录的完整性得不到保证。
-
Safety precautions of network should be contrapose all kinds of menace, then can insure the confidentiality, integrality, usability of the network information.
网络的安全措施应是能全方位地针对各种不同的威胁,这样才能确保网络信息的保密性、完整性和可用性。
-
Reconstructed coracoclavicular ligament by allogenous tendon has good material intensity, and can meet the requirements of local stress, better substitute integrity and function of coracoclavicular ligament. Moreover, it has precise effect and simple operation. It acts as long-term fixator following plate removal, thus is important supplement of clavicular crook plate fixation.
采用异体肌腱重建的喙锁韧带经过重塑形而成熟,具有较好的材料强度,能满足局部应力要求,能较好地替代喙锁韧带的完整性及功能,效果确切,操作简便,在去除钢板后发挥永久固定作用,是锁骨钩钢板固定的重要补充。
-
Ulna coronoid process fractures need active therapy.
结论冠状突骨折需积极处理,重视软组织及韧带的检查及处理,尽量保留桡骨小头的完整性。
-
The systems include application sub-system and cretification authority, application sub-system apply symmetric and asymmetric cryptosystem and public-key certificate which was authoticated by CA and can certify the valid user-identity to set up secure communication channel, exchange session key and provide message integrity, confidetiality, authentication and nondeniability.
系统包括证书中心和应用子系统,证书中心签发证书用来证明用户的合法身份,应用子系统应用证书和对称、非对称密码体制,识别用户合法身份,建立了安全通信通道和交换会话密钥,实现了通信数据的完整性、保密性、真实性、不可否认性。
-
First, we found that after exposure to 60℃ for 5 and 30 min ,culturable L. pneumophila concentration reduced 4 and 6 log CFU/mL, and the loss of cell membrane integrity was 56 % and 83 %, respectively. However, the total concentration was not affected. These results indicate heat exposure decreases the culturability of L. pneumophila significantly.Second, heated L.
结果显示,退伍军人菌(108 cells/ml)於60℃受热5分钟与30分钟后,可培养浓度分别下降了4 log CFU/ml与6 log CFU/ml,而细胞膜完整性则分别下降56 %与83 %,但未造成总细菌浓度之改变,故可知受热60℃主要影响细菌的可培养性。
-
The design includes many new technologies in data exchange and data security, they are: Converting non-XML data to XML in order to apply the XML security technology to more data types; Using the technology of XKMS and PKI to manage the public key in order to overcome the shortage of complexity and difficulty in using PKI and improve the efficiency of the public key management; Using Diffe-Hellman algorithm combining with the public key technology to exchange secret key in order to furthest increase the security of the key; Using the technology of XML digital signature algorithm to ensure the integrity, message authentication and signer authentication of the data; Using the technology of XML encryption to ensure confidentiality of the data; Defining delegable access rules on the structure and content of the XML documents to provide fine-grained access control. According to the XML security framework, a XML security library is designed and implemented.
在对XML及其安全技术主要包括XML加密技术、XML数字签名、公钥管理、密钥产生和交换进行研究的基础上,结合传统密码技术和XML安全技术提出了一种基于XML的数据安全模型,模型中包含了目前网络数据交换和安全领域的一系列最新技术,主要有:将非XML格式数据转换为XML格式数据的方法,以保证现有的大部分网络数据能够应用XML安全技术;使用XML公钥管理技术结合PKI技术管理公钥,以克服PKI技术实施和部署复杂、难度大等问题,提高公钥管理的效率;使用Diffie-Hellman算法结合公钥技术交换密钥,以最大限度保证密钥的安全;使用XML数字签名技术保证数据的完整性、不可否认性和发送方身份认证;使用XML加密技术保证数据的机密性;根据XML文档的内容和结构定义授权访问规则进行良好的访问控制。
- 推荐网络例句
-
However, as the name(read-only memory)implies, CD disks cannot be written onorchanged in any way.
然而,正如其名字所指出的那样,CD盘不能写,也不能用任何方式改变其内容。
-
Galvanizes steel pallet is mainly export which suits standard packing of European Union, the North America. galvanizes steel pallet is suitable to heavy rack. Pallet surface can design plate type, corrugated and the gap form, satisfies the different requirements.
镀锌钢托盘多用于出口,替代木托盘,免薰蒸,符合欧盟、北美各国对出口货物包装材料的法令要求;喷涂钢托盘适用于重载上货架之用,托盘表面根据需要制作成平板状、波纹状及间隔形式,满足不同的使用要求。
-
A single payment file can be uploaded from an ERP system to effect all pan-China RMB payments and overseas payments in all currencies.
付款指令文件可从您的 ERP 系统上传到我们的电子银行系统来只是国内及对海外各种币种付款。