英语人>网络例句>in depth 相关的网络例句
in depth相关的网络例句

查询词典 in depth

与 in depth 相关的网络例句 [注:此内容来源于网络,仅供参考]

In the calculus of proof the concept of forming a more in-depth study of mathematical logic of an independent branch.

在演算中证明的概念的更深入研究形成了数理逻辑的一个独立分支。

I am particularly puzzled as to when the auction as a matrix game, the Nash equilibrium analysis of the participants in the decision-making, through experiments, as well as a typical case of different auction process simulation to observe the participants in-depth behavioral tendencies.

尤为令我困惑的是当将拍卖作为一个矩阵博弈的时候,纳什均衡对于参与者决策的分析,通过实验不同的典型案例以及模拟拍卖过程,去深入观察参与者的行为倾向。

This hospital medical center in danyang, through the work mode of hospital medical check-up background and the present situation of in-depth investigation and analysis, the hospital medical system design and development.

本文从丹阳市中医院体检中心当前工作模式入手,通过对体检背景和医院体检工作的现状深入调查和分析,进行了医院体检系统的设计与开发。

This study consisted of 20 in-depth interviews with backpackers traveling in Tai-wan, and developed experience seeking, experience quality, memorability and beha-vioral intentions questionnaire by categorized.

本研究深度访谈20位来台背包客,并采取内容分析,分析出体验追求、体验品质、可回忆性与行为意图问项。

The security of PKI system itself is especially emphasized during the system design and implementation process, which is in accordance with the pervasive characteristic of PKI. Second, the concept of a Trusted Key Management Center is introduced for the first time. This technology greatly strengthens key management practices and allows for smooth transition from PKI to Key Management Infrastructure. Third, certificate status mechanisms are investigated in depth, and a certificate revocation performance simulation system is devised. All these work will provide guides to practice and employment of PKI applications. Based on time constraints, a new taxonomy for authenticated dictionaries is proposed. Fourth, formal analysis ofOCSP protocol is carried out; then an efficient and scalable OCSP system is developed. Fifth, the special requirements caused by the working environments of Wireless PKI are analyzed. Based on communicative hashing and dynamic Merkle hash tree, an efficient certificate status validation method suitable for WPKI is presented. Sixth, one important kind of fair exchange protocols is studied, and a new CEMBS based on RSA cryptosystem is proposed. Afterwards, a novel fair exchange protocol totally based on RSA signature scheme is devised.

在系统设计和实现的过程中,考虑到PKI作为普适性安全基础平台的特点,特别强调PKI系统自身的安全性;第二,首次在PKI系统的设计中提出了"可信密钥管理中心"的概念,这一独特设计大大地强化了密钥管理功能的实施,为PKI向密钥管理基础设施的平滑过渡提供了良好的技术准备;第三,对证书状态验证机制进行了深入研究,设计了证书状态模拟系统,以指导PKI系统和应用的部署和实施;在此基础上,基于时间约束首次给出了认证字典的一种新的分类方法;第四,对OCSP协议进行了形式化分析,设计和实现了一种高效、可扩展的OCSP系统;第五,分析了WPKI工作环境对设计安全基础平台提出的特殊要求,结合无线移动设备的具体特点,基于可交换杂凑函数和动态Merkle杂凑树设计出了一种适用于WPKI环境的高效证书状态查询机制;第六,对一类公平交换协议进行了深入的研究,从设计公平交换协议的密码基础结构出发,提出了一种新型的基于RSA密码体制的高效CEMBS;在此工作的基础上,设计了一种基于RSA密码体制的最优化公平交换协议。

The security of PKI system itself is especially emphasized during the system design and implementation process, which is in accordance with the pervasive characteristic of PKI. Second, the concept of a Trusted Key Management Center is introduced for the first time. This technology greatly strengthens key management practices and allows for smooth transition from PKI to Key Management Infrastructure . Third, certificate status mechanisms are investigated in depth, and a certificate revocation performance simulation system is devised. All these work will provide guides to practice and employment of PKI applications. Based on time constraints, a new taxonomy for authenticated dictionaries is proposed. Fourth, formal analysis of OCSP protocol is carried out; then an efficient and scalable OCSP system is developed. Fifth, the special requirements caused by the working environments of Wireless PKI are analyzed. Based on communicative hashing and dynamic Merkle hash tree, an efficient certificate status validation method suitable for WPKI is presented. Sixth, one important kind of fair exchange protocols is studied, and a new CEMBS based on RSA cryptosystem is proposed. Afterwards, a novel fair exchange protocol totally based on RSA signature scheme is devised.

在系统设计和实现的过程中,考虑到PKI作为普适性安全基础平台的特点,特别强调PKI系统自身的安全性;第二,首次在PKI系统的设计中提出了"可信密钥管理中心"的概念,这一独特设计大大地强化了密钥管理功能的实施,为PKI向密钥管理基础设施的平滑过渡提供了良好的技术准备;第三,对证书状态验证机制进行了深入研究,设计了证书状态模拟系统,以指导PKI系统和应用的部署和实施;在此基础上,基于时间约束首次给出了认证字典的一种新的分类方法;第四,对OCSP协议进行了形式化分析,设计和实现了一种高效、可扩展的OCSP系统;第五,分析了WPKI工作环境对设计安全基础平台提出的特殊要求,结合无线移动设备的具体特点,基于可交换杂凑函数和动态Merkle杂凑树设计出了一种适用于WPKI环境的高效证书状态查询机制;第六,对一类公平交换协议进行了深入的研究,从设计公平交换协议的密码基础结构出发,提出了一种新型的基于RSA密码体制的高效CEMBS;在此工作的基础上,设计了一种基于RSA密码体制的最优化公平交换协议。

Opuntia Milpa Alta is the edible cactus which was introduced from Mexico in 1998,at present, its biological activity substances is not enough in-depth study, and because cactus juice's color and appearance is unstable after sterilization, but also does not have the corresponding beverage product production.

米邦塔仙人掌是1998年从墨西哥引进的食用型仙人掌,目前对其生理活性物质的研究还不够深入,并且由于仙人掌汁液在加热杀菌后色泽和外观不稳定,还没有相应的饮料产品生产。

Secondly, the thesis also discussed in depth in the software architecture of each module technology program.

其次,该论文还深入讨论了软件体系结构中各模块的技术实现方案。

During December 1st 2006 to May 30th 2007, data collection was conducted by the semi-structural in-depth interviews and questionnaires of Pittsburg Sleep Quality Index, social support scale and Parental Stress Index to repeatedly measure 14 primipara and multipara in three time periods: the first week after the birth, the first week after the infant is transferred out, and the first week after they go home.

於2006年12月1日至2007年5月30日期间,分别在早产儿出生一周、转出加护病房一周以及返家后一周,以匹兹堡睡眠品质量表、社会支持量表、亲职压力量表,重复追踪14位初经产妇并进行半结构式深度访谈,以更深入了解早产儿母亲之睡眠品质及其影响因素,研究对象有效答覆率为93.33%。

However the variation of the Musca domestica acetylcholinesterase gene and the relationship of insensitivity to insecticides in various populations have not been explored in-depth.

然而家蝇乙酰胆碱酯酶基因多态性在不同家蝇抗性品系中的分布及与抗性谱的关系还没有得到充分探究。

第31/100页 首页 < ... 27 28 29 30 31 32 33 34 35 ... > 尾页
推荐网络例句

We have no common name for a mime of Sophron or Xenarchus and a Socratic Conversation; and we should still be without one even if the imitation in the two instances were in trimeters or elegiacs or some other kind of verse--though it is the way with people to tack on 'poet' to the name of a metre, and talk of elegiac-poets and epic-poets, thinking that they call them poets not by reason of the imitative nature of their work, but indiscriminately by reason of the metre they write in.

索夫农 、森那库斯和苏格拉底式的对话采用的模仿没有一个公共的名称;三音步诗、挽歌体或其他类型的诗的模仿也没有——人们把&诗人&这一名词和格律名称结合到一起,称之为挽歌体诗人或者史诗诗人,他们被称为诗人,似乎只是因为遵守格律写作,而非他们作品的模仿本质。

The relationship between communicative competence and grammar teaching should be that of the ends and the means.

交际能力和语法的关系应该是目标与途径的关系。

This is not paper type of business,it's people business,with such huge money involved.

这不是纸上谈兵式的交易,这是人与人的业务,而且涉及金额巨大。