英语人>网络例句>in principle 相关的网络例句
in principle相关的网络例句

查询词典 in principle

与 in principle 相关的网络例句 [注:此内容来源于网络,仅供参考]

Or we could say: phenomenal truths are deducible in principle from physical truths, but the deducibility is akin to that of a complex truth of mathematics: it is accessible in principle, but is not accessible to us now, perhaps because the reasoning required is currently beyond us, or perhaps because we do not currently grasp all the required physical truths.

或,我们可以说:现象真,在原则上可从物理真推理得到,这推理能力就好比负责的数学真:原则上可达,但不是我们现在可达的,或许因为必须的推理是超出我们的,或许是因为我们目前没有把握所有必须的物理真。

Basic principles of legislation authorization are the principle of necessary and the principle of definitude.

立法授权应遵循必要性原则和明确性原则。

As a basic principle in the delimitation,equitable principle has been established gradually in international practice,and become one part of international practices.

公平原则作为大陆架划界的基本原则的地位是在国际实践中逐步确立的,并且已经成为习惯国际法的一部分。

To oppose Revelation with "a preliminary and comprehensive demurrer"("une fin de non-recevoir préliminaire et globale"-- Le Roy) in the name of the principle of immanence, is to misinterpret that principle, which, rightly understood, involves no such exigencies (see below,"The Method of Immanence").

反对与启示"的初步结果,并全面抗辩"(下称" une鳍德非recevoir préliminaire等全球"-乐罗伊)的名字,这一原则的内涵,是误解了这一原则,其中,正确地理解,不涉及这种严格要求(见下文,"这个方法的内在性")。

Encryption Algorithm simple description : DES is a block cipher algorithm, his 64 for a pair of data encryption Encryption algorithm principle :The password system may divide into 2 big kinds from the principle, namely single key password system and double key password system.

加密算法的简单描述:DES是一种分组加密算法,他以64位为分组对数据加密。加密算法的原理:密码体制从原理上可分为2大类,即单钥密码体制和双钥密码体制。

According to the principle of the diameter of a circle corresponding to the right angle and the principle of short side for little angle in right triangle, projecting the initially-chosen point to the hyper-planes of the linear equation group in which every linear equation can be regarded as a hyper-plane and the projection points can be obtained. The initially-chosen point, and one arbitrary projection point, and the solution point are all on the surface of the relative hyper-geometry ball, therein-to, there is a projection point which is nearest to the solution point and it can be regarded as the next iterative initially-chosen point, so the solution problem of the linear equation group can be changed as an iterative problem of approaching the solution on the surface of a hyper-geometry ball.

根据直径对应的圆周角足直角以及直角三角形中短边对小角的原理进一步知道,当将初始点向线性方程组中各个方程所代表的超平面上投影得到投影点时,初始点和其任何一个投影点及方程组的解点都将位于一个相应的超球面上,其中必定存在一个投影点离问题解点的距离最短,即把该点作为下一次迭代的初始点,从而可将线性方程组求解的问题变成球面上逼近解点的迭代问题。

The principle of differential transmission is introduced at first,and then the virtual prototype model of the differential gear mechanism is established by using ADAMS.The simulation and analysis of its two different working conditions are carried out,and the speed characteristic curve and force curve are got,the principle of differential is analyzed by the curve.

首先阐述了差速器的传动原理,然后利用ADAMS建立了差速器齿轮机构的虚拟样机模型,并对该机构进行了两种工况下的仿真分析,得到传动齿轮的转速特性曲线及受力曲线,并通过曲线分析了差速器的差速原理。

The main content of this thesis includes six parts. First of all, it is a comprehensive systematic introduction about RSA algorithm including the present application situation and principle of RSA algorithm----producing big prime numbers and secret keys, the encryption arithmetic for information and the decryption for secret information, which establish the theory foundation for achieving concrete; secondly, it introduces some basic conception of RSA digital signature and theory of digital signature realizing process; thirdly, it introduces the basic principle of MD5 algorithm; fourthly, it states design and realization of RSA digital signature in detail. The main modules includes producing RSA secret keys, implementation of RSA encryption algorithm and decryption algorithm, producing message digest and realizing digital signature and verification by RSA; the fifth, it carries on testing entirely, analyzing and improving for this system;The sixth, it analyses the security of RSA digital signature and points out the development direction of RSA digital signature.

本文主要研究的内容包括:第一,对RSA算法进行了全面系统的介绍,包括RSA算法的应用现状和原理—大素数的产生、密钥对的产生、对明文的加密运算和密文的解密运算,为具体实现打下了理论基础;第二,介绍了RSA数字签名的一些基本概念和数字签名的理论实现过程;第三,对MD5算法基本原理的介绍;第四,详述了RSA数字签名的设计与实现,主要实现的模块包括RSA密钥的产生,RSA加密算法和解密算法的实现,消息摘要MD的生成以及利用RSA算法实现数字签名和签名的验证;第五,对该系统进行了整体的测试和分析改进;第六,分析了RSA数字签名的安全性,指出了RSA数字签名的发展方向。

In this paper, the concept of network security and security structures of OSI and Internet is introduced, and various threats confronting the computer network are also discussed. Several kinds of network information security technologies, including firewall technology, virtual private network, intrusion detection system, data encryption technology, identity authentication and security protocol etc. are also examined. The security of internal network is the biggest problem in the construction of each network. The solution to this problem lies in setting up a firewall. The theory of a firewall and the approach to its actualization is studied. Intrusion detection system, an important part of the computer network security system, has gained extensive attention. IDS monitors the computer and network traffic for intrusion and suspicious activities. It not only detects the intrusion from the extranet hacker, but also the intranet users. The emergence of virtual private network paves the way for realizing secure connection of LAN quickly and at a relatively low cost. The concept, function, key techniques, including the tunnel technology, and the ways to realize VPN are expounded in this paper. Also introduced is the data encrypt network technology, which is called the soul of computer network security, such as digital digest, digital signature, digital certificate, digital encrypt arithmetic and so on. At the same time, the principle and the process of implementing network security by digital certificate and digital signature, the basic principle and characters of security protocols, and finally, three of the security protocols, concerning the security problems in network, IPsec, SLL and SET are analyzed in detail Computer network system should be a system of dynamic defence, both dynamic and static, passive as well as active, and even offensive, combined with management and technology.

本文系统地介绍了网络安全的概念、OSI及Internet的安全体系结构,并讨论了计算机网络面临的各种安全威胁;内部网络的安全问题是每个建网单位面临的最大问题,可以认为防火墙技术是解决网络安全的一个主要手段,本文研究了防火墙的原理及其实现手段;作为一种主动的防御措施,入侵检测系统作为网络系统安全的重要组成部分,得到了广泛的重视,TDS对计算机和网络资源上的恶意使用行为进行识别和响应,不仅检测来自外部的入侵行为,也监督内部用户的未授权活动;虚拟专用网技术的出现,为实现网络间的连接提供了快速安全但又相对便宜的手段,本文较深入的探讨了实现VPN的隧道技术,并对VPN的概念、功能、实现途径、基本构成、关键技术及发展前景等问题进行了全面论述;数据加密技术是网络安全核心技术之一,本文从数据加密算法、数字摘要、数字签名及数字证书等几方面简要介绍了数据加密技术,并分析用数字证书和数字签名实现网络安全的原理和过程;对安全协议的基本原理、主要特点进行了较为深入的研究,并就网络的安全性问题剖析了三种安全协议:IPsec协议、SLL协议和SET协议。

Being different from the western mental politics, this traditional Chinese body politics mainly emphasizes the unity of body and nation rather than the contradiction of the two; emphasizes the dialogue principle of life rather than the monolog principle of sense; emphasizes the clan-species approach about harmony of colony and individual rather than the sociology approach about dimidiation of the two.

与西方的心识政治学不同,这种中国古代的身体政治学更多强调的是身国的合一而非身国的对立,是生命的对话原则而非理性的独白原则,是群己合谐的族类学方法而非群已二分的社会学方法。

第25/500页 首页 < ... 21 22 23 24 25 26 27 28 29 ... > 尾页
相关中文对照歌词
The Pleasure Principle
Tată (Father - Romanian Version)
Te-Am Visat
Tu Şi Eu
Man Of Principle
Artistic License
În Culori
Still
Ooh Baby
Wasted
推荐网络例句

He paid $5,000 for this cupcake.

他我这个纸杯蛋糕花了5000美元。

I mean, if you want to, that is

我的意思是,如果你们想吃的话。

In addition to his fee, he would be awarded an unaltered clone of himself.

除了费用,他将获得一个不作任何改造的克隆体。