助手标题  
全文文献 工具书 数字 学术定义 翻译助手 学术趋势 更多
查询帮助
意见反馈
   安全 在 计算机软件及计算机应用 分类中 的翻译结果: 查询用时:0.076秒
图标索引 在分类学科中查询
所有学科
计算机软件及计算机应用
互联网技术
安全科学与灾害防治
中国政治与国际政治
电信技术
公路与水路运输
石油天然气工业
建筑科学与工程
铁路运输
更多类别查询

图标索引 历史查询
 

安全     
相关语句
  safety
    Research on Error-Correcting Codes and Sequence Ciphers Over Finite Rings in Information Safety
    信息安全中有限环上的纠错码和序列密码研究
短句来源
    The Model and Application of Urban Traffic Emergency Management and Safety System
    城市交通紧急事件处理与安全系统模型及应用研究
短句来源
    THE METHOD TO ENHANCE SAFETY AND RELIABILITY FOR MIS
    加强MIS安全可靠性之方法
短句来源
    Safety Analyses of Man-raachine-environment System
    人-机-环境系统安全分析
短句来源
    Development of a Microcomputer Aided Safety Management System
    微机辅助安全管理系统的开发
短句来源
更多       
  security
    Research on Architecture and Security Technology for Web-based Cooperative Product Development System
    基于Web的协同产品开发体系结构及信息安全技术研究
短句来源
    Design and Analysis of Security Protocol
    安全协议的研究与设计
短句来源
    Research on and Enforcement of Secure Operating System Supporting Multiple Security Policy
    支持多安全政策的安全操作系统的研究与实施
短句来源
    Theory and Method of Data Hiding in Information Security
    信息安全中的信息隐藏理论和方法研究
短句来源
    Studies of Digital Watermarking of Information Security
    信息安全中的数字水印技术研究
短句来源
更多       
  safe
    Risk Management in Safe Measure to Computer System
    计算机系统安全的风险管理
短句来源
    IC Card and IC Card Safe Technique
    IC 卡及卡的安全技术
短句来源
    Furthermore, it should use the way of combining C/S with B/S to ensure safe operations of the system in the local area network (LAN) and wide area network (WAN) and meet the needs of users.
    并用C/S与B/S相结合的方式,使系统在局域网和广域网都能安全运行,满足用户的需求。
短句来源
    This paper states the design of database of the computer system for railway transportation,the design of functional module and safe implemental methods
    阐明铁路运输计算机系统中数据库设计的方案、系统功能模块设计及安全实施方法。
短句来源
    It brings forward an effective encryption technique and algorithm for protecting E-mail information's safe network transmission.
    提出了一种有效地保护E-mail信息安全传递的加密技术和算法.
短句来源
更多       
  secure
    Study on Secure Database and its Application
    安全数据库及其应用系统研究
短句来源
    Research on and Enforcement of Secure Operating System Supporting Multiple Security Policy
    支持多安全政策的安全操作系统的研究与实施
短句来源
    Research on Some Key Technologies of Structured Protection Level Secure Operating System Development
    《结构化保护级》安全操作系统若干关键技术的研究
短句来源
    Research on Some Key Technologies of Secure Operating System
    安全操作系统若干关键技术的研究
短句来源
    Research on and Enforcement of Methods of Secure Operating Systems Development
    安全操作系统开发方法的研究与实施
短句来源
更多       

 

查询“安全”译词为其他词的双语例句

     

    查询“安全”译词为用户自定义的双语例句

        我想查看译文中含有:的双语例句
    例句
    为了更好的帮助您理解掌握查询词或其译词在地道英语中的实际用法,我们为您准备了出自英文原文的大量英语例句,供您参考。
      safety
    A group of scientists conducted a comprehensive investigation on ecological safety and water and soil erosion in the Northwest Loess Plateau, Northwest China.
          
    Therefore, the extension scale of converting cropland to forest could be enlarged properly in the reservoir area, while it should be limited in the non-reservoir area due to the issues of higher population density and food safety.
          
    The infrared sensors around the robot improved its safety in avoiding barriers.
          
    Frequent natural disasters and man-made catastrophes have threatened the safety of citizens and have attracted much more attention.
          
    Disaster prevention, disaster reduction and disaster rescue are the important parts of national public safety.
          
    更多          
      security
    In this paper, we use a direct method to solve the optimal portfolio and consumption choice problem in the security market for a specific case, in which the utility function is of a given homogenous form, i.e.
          
    This paper analyzes the aritrage-free security markets and the general equilibrium existence problem for a stochastic economy with incomplete financial markets.
          
    Linear provable security for a class of unbalanced feistel network
          
    Application of this structure to block cipher designs brings out the provable security against linear attack with the upper bounds of probabilities.
          
    Trust management was discussed according to the security requirements in distributed environment.
          
    更多          
      safe
    In this paper we show that the competitive multiplier of Safe-Risky-fixed Algorithm in [4] is really 3 and presents a modified algorithm (Safe-Risky-unfixed Algorithm) that achieves a competitive multiplier of 2.
          
    The results show that there are two endangered species, six vulnerable species, 12 nearly threatened species and 344 safe species.
          
    Also, they kill the hosts in a concealed but safe position after the hosts cocoon or build their pupal cells.
          
    Progress has been made in the past decade on phytoremediation, a safe and inexpensive approach to remove contaminants from soil and water using plants.
          
    Splenic auto transplantation and esophageal transection anastomosis are a safe, effective, and reasonable treatment strategy for portal hypertension with varicial bleeding.
          
    更多          
      secure
    A secure model for mobile agent based on encrypted circuit construction
          
    A dynamic, secure, and efficient group key agreement protocol
          
    The key challenge of dynamic peer communication is how to realize secure and efficient group key management.
          
    The protocol is proven secure against passive attack by using indistinguishable method.
          
    By checking whether these variables are influenced by outside inputs, the database operations are proved to be secure or not.
          
    更多          


    In this paper is investigated design methodology in accordance with which implementation of μ-Petri nets by multimicroprocessor may be procceded. μ-Petri nets are defined, and they are used to describe the struetures of a significantly wide class of parallel asynchronous processes. Introduced is the canonical form of μ-Petri nets with which μ-Petri nets are transformed into typical asynchronous sequential circuits. Then the transition/output table (i.e. coded flow table) is written out on condition of allowed...

    In this paper is investigated design methodology in accordance with which implementation of μ-Petri nets by multimicroprocessor may be procceded. μ-Petri nets are defined, and they are used to describe the struetures of a significantly wide class of parallel asynchronous processes. Introduced is the canonical form of μ-Petri nets with which μ-Petri nets are transformed into typical asynchronous sequential circuits. Then the transition/output table (i.e. coded flow table) is written out on condition of allowed set of input sequences. If the given μ-Petri net and, in particular, the number of its places are considersbly large, the corresponding multimictoprocessor architecture is presented, decomposing the transition/output table. An example based on the microcomputer family M6800 is used to illustrate the implementation of μ-Petri nets by multimicroprocessor system.

    本文探讨在以多微处理机实现μ-Petri网(一种加以半解释的安全Petri网)这一工作中可遵循的设计方法论。先定义μ-Petri网可描述相当广泛类型的并行异步过程的控制结构。引入μ-Petri网的标准型式后,将μ-Petri网转换成标准的异步时序线路,再写出此异步时序线路在容许输入序列集下的转移/输出表(编了码的流程表)。分裂转移/输出表(如果给定的μ-Petri网规模相当大,特别是p结点为数相当多,因而此表也相应大),提出相应的多微处理机总体结构。以M—6800微计算机族为例,阐明如何实现μ-Petri网成多微处理机系统。

    A scheme of distributed file system, the revision of the UNIX file system, is proposed for a loop network. The principal revisions made include: (1) several catalogs are added to the structure; (2) a series of system calls are arranged; (3) a few "loopholes" in safety of the UNIX file system are mended; (4) an algorithm for keeping the consistency of multicopy files during modification are introduced. The features and functions of the original UNIX file system are retained, and the new scheme is also applicable...

    A scheme of distributed file system, the revision of the UNIX file system, is proposed for a loop network. The principal revisions made include: (1) several catalogs are added to the structure; (2) a series of system calls are arranged; (3) a few "loopholes" in safety of the UNIX file system are mended; (4) an algorithm for keeping the consistency of multicopy files during modification are introduced. The features and functions of the original UNIX file system are retained, and the new scheme is also applicable to distributed environment.

    本文针对环形网提出了一个分布式文件系统的方案.此方案对UNIX文件系统进行了改造,在文件的结构方面增设了几种目录,以提高文件的查找速度和支持文件的分布;在对文件的操作方面新设计了一系列的系统调用,以实现对分布文件的管理;同时修补了UNIX文件系统在安全方面的几处漏洞;最后提出了一个维护多副本文件在修改时的一致性的算法.此方案既保留了UNIX文件系统原有的特点和功能,又能适应于分布式环境.

    This paper describes one of the disk copy programs designed by the author for DJS-130 computer. It provides the users with a copy of high quality and high reliability and its operation is very simple. In programming, measures have been taken to protect the disk assembly and to enable the program to run even if some thing may go wrong. The flow chart is also given.

    本文介绍了一个为DJS-130型电子计算机设计的磁盘拷贝程序并给出了程序设计框图.在实际使用中,该程序较为安全、可靠,十分方便.

     
    << 更多相关文摘    
    图标索引 相关查询

     


     
    CNKI小工具
    在英文学术搜索中查有关安全的内容
    在知识搜索中查有关安全的内容
    在数字搜索中查有关安全的内容
    在概念知识元中查有关安全的内容
    在学术趋势中查有关安全的内容
     
     

    CNKI主页设CNKI翻译助手为主页 | 收藏CNKI翻译助手 | 广告服务 | 英文学术搜索
    版权图标  2008 CNKI-中国知网
    京ICP证040431号 互联网出版许可证 新出网证(京)字008号
    北京市公安局海淀分局 备案号:110 1081725
    版权图标 2008中国知网(cnki) 中国学术期刊(光盘版)电子杂志社