• 数字全息光学原理为其理论基础,计算机强大处理能力相结合应用信息安全领域

    The all-digital holography is based on the optical theory, combined with the strong manipulated ability of the computer, which is applied to the information security fields.

    youdao

  • 现代密码学理论密码技术信息安全重要基础

    Modem cryptological theory and cryptological technology are important basis of information security.

    youdao

  • 将IFS理论引入信息安全领域提出一种基于直觉模糊推理入侵检测方法

    The paper brings the theory of IFS into the field of information security and proposes a technique for intrusion detection based on intuitionistic fuzzy reasoning.

    youdao

  • 危机管理理论为基础风险预警通过收集已辨识评价风险因子信息状态,来预警企业安全生产状况

    Risk forewarning, based on crisis management theory, is to gather information status of the identified and evaluated risk factors, and to warn the enterprises of their production safety status.

    youdao

  • 身份识别认证以及数字签名技术现有安全理论保证网络环境下信息安全传输的有力手段

    Identification recognition, authentication and digital signature are strong methods of available security theories to secure safe transmission in network environment.

    youdao

  • 论文第一部分1-4系统完整搭建了信息安全理论基础框架

    Part 1 (Chapter 1 - 4) establishes theoretic basic framework of Information Security in systematically and integrally.

    youdao

  • 现代密码学理论密码技术信息安全重要基础

    Modern cryptological theory and cryptological technology are important basis of information security.

    youdao

  • 信息融合技术可拓理论基础上,提出一种新的煤矿安全评价模型

    On the basis of information fusion technology and extension theory, a new assessment model of underground coal mines safety behavior was proposed.

    youdao

  • 提出信息系统安全评估准则标准理论结构上还成熟,而且可操作性

    Evaluation of having bought forward Information security rules is not mature in theory and not strong at maneuverability.

    youdao

  • 理论研究指导煤矿安全监察管理信息系统给出系统全部建模过程

    Under the guidance of the theory research, taking Coal Safety Supervise Management Information system for instance, giving the whole modeling process of the system.

    youdao

  • 主要研究方向计算机网络信息安全理论技术并行计算

    Research Fields: the Theory and Technique of Computer network and Information Security; Parallel Computing etc.

    youdao

  • 文章消息层次讨论了信息安全问题重点介绍了信息理论密码学复杂性理论密码学。

    This paper discusses on the problem of information security from message level, and introduces emphatically information theory based cryptology and complexity theory based cryptology.

    youdao

  • 安全进程代数可以作为信息安全基础理论框架。

    Security Process Algebra forms a basis for secure information flow theory.

    youdao

  • 水印通信模型建立,水印的相关检测模型,到信息隐藏容量分析写术的安全理论详细介绍了水印的相关理论

    Theories related to watermark are introduced in detail, including communication model, related detection model, hiding information capacity analysis and security of steganography.

    youdao

  • 本文论述建立物资管理信息网络系统的全过程,内容涉及物资管理理论数据库应用软件的设计与实现算法、网络构建及安全等方面的问题。

    The thesis dissertate whole process at building information and network system, including 5 aspects: material manage theory, computer database, application procedure, network and safe.

    youdao

  • 本文从理论上研究了RBAC概念模型,并传统安全访问控制相比较论证了在企业信息系统中采用RBAC的必要性

    We analyze RBAC concept model, compare it with traditional access control scheme, and demonstrate the necessity of implement RBAC in Enterprise Information Systems.

    youdao

  • 方法针对医疗信息各项安全要求进行理论分析构建安全远程医疗系统模型结果

    Methods: security telemedicine system model was constructed with theoretic analysis according to each security request of medical information.

    youdao

  • 信息安全风险评估系统风险的整体评价进行了理论归纳

    The risk evaluation of information security and system risk synthetical assessment method was also theoretically concluded.

    youdao

  • 理论可以满足井下所有信息传输需要,特别适合煤矿安全生产,对煤矿井下的运用有一定的参考价值。

    It can theoretically meet the transmission of all underground information and is specially suitable for safe production in coal mines.

    youdao

  • 文章在安全进程代数理论框架内讨论信息安全模型

    A process algebraic approach to the modelling of information flow security is explained.

    youdao

  • 数据库安全计算机学院网络信息安全专业主干之一,由数据库理论与技术和数据库安全两个方面构成。

    As one of the backbone courses for Network and Information security major, the course of database and security comprises database theory and technology, database security.

    youdao

  • 网络攻击效果评估理论方法研究信息系统安全评估过程中具有深刻的理论指导意义重要的应用价值。

    The evaluation theory and method of the attack effect of networks are very important and significant in information systems.

    youdao

  • 本文信息过滤技术应用到安全审计内容审计对于完善安全审计系统具有很高理论指导作用

    In this paper, the information filtering technology is applied in content auditing, which will play a very important role on consummating theoretical direction of the safety audit system.

    youdao

  • 本文煤矿安全生产信息GIS电子地图信息结合管理者提供一个形式多样化信息管理平台,是对矿山GIS的建设理论和方法上的探索尝试

    The paper provides a diversified forms of information management platform by binding of GIS and mines safety production information. Thus it's a exploring and attempting in mine construction of GIS.

    youdao

  • 本文煤矿安全生产信息GIS电子地图信息结合管理者提供一个形式多样化信息管理平台,是对矿山GIS的建设理论和方法上的探索尝试

    The paper provides a diversified forms of information management platform by binding of GIS and mines safety production information. Thus it's a exploring and attempting in mine construction of GIS.

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定