数据完整性
- 与 数据完整性 相关的网络例句 [注:此内容来源于网络,仅供参考]
-
On the basis of OCM, segmentation based on curvature radium is presented in the paper, in which curvature radium is calculated using parametric-surface fitting, and detecting edge points is realized from orthogonal direction, which ensure the integrality of edge points. Since the data is organized by cross-line in OCM, a new arithmetic, Double-direction Angle Difference arithmetic, is brought forward, which can pick up edge points more quickly.
物体的表面一般由多个曲面相交组成,要建立完整的几何模型,需要对测量数据进行区域分割——区分不同曲面的数据,现有的区域分割大多是对单视图的图像式测量数据进行的,但完整的CAD模型需要联合多个视图产生,本文在上面提出的三维正交模型的基础上,提出了三种区域分割方法:第一种方法是基于曲率半径的数据分区方法,通过二次参数曲面拟合计算局部曲率半径,从正交的多个方向进行检测,保证了边点提取的完整性。
-
Given that current GISs already have a hard time ensuring data integrity even in the standard, atemporal case, it is somewhat difficult to forecast whether they will soon be capable of handing data integrity in space-time cube models.
当前的 GIS 甚至在标准版的非时间研究案例中都难于得证时间数据的完整性,那么更加难预测何时能在时间立方模型中处理数据的完整性。
-
For the incompleteness, noisiness and inconsistency in these data, we use some preprocess technologies of Data Mining, such as Data Cleaning, Data Transformation and Data Reduction, to process these source data.
针对这些数据的不完整性、有噪声性和不一致性,本文用数据清理、数据变换、数据归约等数据挖掘的预处理技术处理这些原始数据。
-
While the strict integrity policy of Biba's model can be used to maintain integrity of data in computer systems, the integrity labels of both subjects and objects in a system are always kept static in SIP, which might lead to denial to some non-malicious access requirements and hence decreases the compatibility of applications Dynamic enforcement of this policy is presented, which can increase compatibility of software while keeping system integrity as strictly as SIP can The implementation of...
Biba模型中的严格完整性政策能够有效地保证数据的完整性,但是该政策中主体和客体的完整性标记都是静态不变的,这会限制进程的一些原本合理的活动,从而降低应用程序的兼容性。提出严格完整性政策的动态实施方案,并给出该方案在基于Linux的安全操作系统RFSOS中的实现。该方案既可以保证系统的完整性,又能提高系统的兼容性。实验证明,这种方案对系统的整体效率的影响小于1%。
-
The digital signature is some data that attachment on data units, perhaps password transformation which does to the data unit, this kind of data or the transformation permission data unit receive with by confirmed the data unit the origin and the data unit integrity and the protection data, prevented is carried on by the human fabricates.
数字签名[5]是附加在数据单元上的一些数据,或是对数据单元所作的密码变换,这种数据或变换允许数据单元的接收者用以确认数据单元的来源和数据单元的完整性并保护数据,防止被人进行伪造。
-
The design includes many new technologies in data exchange and data security, they are: Converting non-XML data to XML in order to apply the XML security technology to more data types; Using the technology of XKMS and PKI to manage the public key in order to overcome the shortage of complexity and difficulty in using PKI and improve the efficiency of the public key management; Using Diffe-Hellman algorithm combining with the public key technology to exchange secret key in order to furthest increase the security of the key; Using the technology of XML digital signature algorithm to ensure the integrity, message authentication and signer authentication of the data; Using the technology of XML encryption to ensure confidentiality of the data; Defining delegable access rules on the structure and content of the XML documents to provide fine-grained access control. According to the XML security framework, a XML security library is designed and implemented.
在对XML及其安全技术主要包括XML加密技术、XML数字签名、公钥管理、密钥产生和交换进行研究的基础上,结合传统密码技术和XML安全技术提出了一种基于XML的数据安全模型,模型中包含了目前网络数据交换和安全领域的一系列最新技术,主要有:将非XML格式数据转换为XML格式数据的方法,以保证现有的大部分网络数据能够应用XML安全技术;使用XML公钥管理技术结合PKI技术管理公钥,以克服PKI技术实施和部署复杂、难度大等问题,提高公钥管理的效率;使用Diffie-Hellman算法结合公钥技术交换密钥,以最大限度保证密钥的安全;使用XML数字签名技术保证数据的完整性、不可否认性和发送方身份认证;使用XML加密技术保证数据的机密性;根据XML文档的内容和结构定义授权访问规则进行良好的访问控制。
-
To further deal with the indirect privacy violation, the view-based inference control method is proposed which can eliminate the secure problem brought by multi-view collusions.
安全数据库策略旨在保护敏感信息和数据完整性,在多级关系数据库中,是通过BLP模型[2]的强制访问控制机制实现的。
-
This paper provides a fundamental support for further research on fine-grain data integrity check method and related applications.
得出的结论为细粒度数据完整性检验的进一步研究及相关的应用提供了理论支持。
-
Aiming at the currently shortage of XML streams quality detecting, this paper proposes a new forecasting method of XML streams quality by least squares support vector machines, which is used the method of XML keys' vector matrix as windows, and vector product wavelet transform to multilevel decompose and refactor the XML streams series, that can fulfill real-time checking demand of XML quality, and ensure constraint, consist- ency and integrality. For even more adapting net load, it proposes a control strategy by weight and adaptive adjustment to ensure XML streams quality.
针对当前XML数据流质量检测存在的不足,提出构建XML键的矢量矩阵作为窗口,利用矢量积小波变换多级分解与重构XML数据流,再结合最小二乘支持向量机对XML数据流质量进行预测的一种方法,满足XML数据流质量重构时实时检测的要求,保证XML数据的约束性、一致性与完整性;为了更好的适应网络负载,采取加权与自适应窗口调整等调度策略充分保证XML数据流的质量检测。
-
ENC data are foundations of ECDIS platform, so guaranteeing ENC data the latest and the security of ENC data becomes the primary problem in the course of using ECDIS platform. In order to guarantee the security and integrality of the data sent to ENC users, all Data Servers have taken the corresponding protective measures, these measures different with each other, so hindered security of the navigation and update of ENC data.
由于ENC数据是ECDIS平台显示的基础,所以确保ENC数据最新以及保证ENC数据的安全成为ECDIS平台在应用过程中的首要问题,各数据服务商为了确保发送给ENC用户数据的安全性和完整性,都采取了相应的保护措施,这些措施各不相同,阻碍了航海的安全和ENC数据的更新,为了解决这个问题,国际海道组织制定了保护ENC数据的国际标准——S-63标准,该标准不仅能保护ENC数据生产商的利益和合法权益,而且能够大大提高航海安全。
- 推荐网络例句
-
On the other hand, the more important thing is because the urban housing is a kind of heterogeneity products.
另一方面,更重要的是由于城市住房是一种异质性产品。
-
Climate histogram is the fall that collects place measure calm value, cent serves as cross axle for a few equal interval, the area that the frequency that the value appears according to place is accumulated and becomes will be determined inside each interval, discharge the graph that rise with post, also be called histogram.
气候直方图是将所收集的降水量测定值,分为几个相等的区间作为横轴,并将各区间内所测定值依所出现的次数累积而成的面积,用柱子排起来的图形,也叫做柱状图。
-
You rap, you know we are not so good at rapping, huh?
你唱吧,你也知道我们并不那么擅长说唱,对吧?