• The study looked at practices like backing up data, using password protection, and running virus scans, and ranked 35 big cities across the U.S. based on its survey.

    研究涉及的调查项目包括数据备份用户密码保护以及运行病毒扫描根据其调查结果对美国35大城市进行了排名

    youdao

  • Strict data-protection laws prevented Brockmann from carrying out his own version of the mobile-phone study in Germany, where he was based until recently.

    严格数据保护法规使得布洛克曼无法德国开展新一轮关于手机研究直到最近,的研究主要都在那儿进行。

    youdao

  • Based on it, this article puts forward a reservation - layer protection data and sensitivity prediction system software, and raises a sensitivity prediction model through multiple - statistics.

    基础上设计保护数据库敏感预测系统软件通过多元统计回归分析提出储层敏感性预测模型

    youdao

  • Based on the analysis of a typical stator ground fault and its recording data, the protection action is proved to be correct.

    通过一次典型定子接地故障情况保护录波数据分析证明了保护动作行为正确性

    youdao

  • Based on the theory of graded protection, information domain of SCAL information network are divided as well according to the different safety grade of different data.

    基于等级保护思路,按照不同数据的不同安全等级,给出川航信息网络的信息划分方法。

    youdao

  • Guangzhou relay protection information management system is constructed based on the dispatch data web and dispatch centre-control integrative data platform.

    广州继电保护信息管理系统基于电力调度数据网电力调度集控一体化数据平台构建的。

    youdao

  • Moreover, to lower maintenance efforts, the technique of network harddisk recovery card is adopted in implementing data protection, copy and recovery based on networks.

    采取网络硬盘还原实现了硬盘数据保护及网络拷,达到了减少维护工作量目的。

    youdao

  • This paper focuses on the audio watermarking for copyright protection which embeds the binary image data into the time domain of the audio signal based on the spread-spectrum technique.

    本文讨论用于版权保护利用扩频技术时域嵌入二进制图像数据音频水印技术。

    youdao

  • In order to use cryptographic techniques to avoid the lack of data protection, this paper proposes a new watermark algorithm based on block statistics.

    针对密码技术数据保护方面不足提出一种新的数字水印算法——基于分块统计的水印嵌入算法。

    youdao

  • Personal information protection based on data security, the need for comprehensive management of laws, standards and norms.

    个人信息保护数据安全为基础需要法律标准规范等综合治理

    youdao

  • The thesis presents the design and realization of a data synchronous acquisition system in integrated protection based on FPGA and digital frequency multiplying technique.

    论文任务是设计实现基于FPGA数字技术的集成保护数据同步采集系统

    youdao

  • An intelligent printer card is designed to reduce the main CPUs working load of digital bus protection, which is based on80386EX and used to implement the tasks of printing data processing and print.

    减轻微机母线保护CPU工作负荷,开发80386ex为核心的智能打印板完成数据处理打印任务

    youdao

  • In earlier version, authentication and key management protocol is called Privacy key management (PKM); and data protection protocols include two solutions based on DES-CBC and AES-CCM.

    早期规范中的认证密钥管理协议保密密钥,管理(PKM),数据保密机制包含基于DES -CBCAES - CCM的两个解决方案

    youdao

  • This article is based on the space resource data from the cultural relic protection information data and establishes the systematic framework combining GIS technology.

    文物保护信息资源数据中的空间资源数据为基础,结合GIS技术进行了系统结构搭建

    youdao

  • If you choose SQL authentication, the connection strings are encrypted, using Data Protection API (DPAPI), based on your user credentials.

    如果选择SQL身份验证,将使用数据保护API (DPAPI)基于用户凭据对连接字符串进行加密。

    youdao

  • A corporate corrosion data management and evaluation system has been established based upon the corrosion conditions and protection requirements of the equipment in Dushanzi Petrochemical Company.

    结合中国石油独山子石化分公司(以下简称公司)设备腐蚀防护现状需要建立了石化公司腐蚀数据管理评价系统

    youdao

  • Unusual sampling data will cause incorrect action of microprocessor-based protection, which needs some reasonable countermeasures.

    采样数据异常可能导致微机保护不正确动作需要采取恰当的应对措施

    youdao

  • A protection scheme of mobile agents based on obfuscated agent data variables and time checking technology is presented in this paper.

    提出一种基于迷乱代理数据变量时间核查技术移动代理保护方案,同时给出获得时间核查技术主要数据的方法。

    youdao

  • Based on the encryption method, a pirate tracing scheme is proposed for the copyright protection of digital data.

    根据所提的加密算法给出一种适用于数字数据版权盗版跟踪方案

    youdao

  • Based on the encryption method, a pirate tracing scheme is proposed for the copyright protection of digital data.

    根据所提的加密算法给出一种适用于数字数据版权盗版跟踪方案

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定