查询词典 key point
- 与 key point 相关的网络例句 [注:此内容来源于网络,仅供参考]
-
The Key Laboratory of Plant Nutrition and Nutrient Cycling;MOA;Key Laboratory of Plant-Soil Interactions;MOE;Department of Plant Nutrition;CAU;Beijing 100094;China;2 Fujian Institute of Tobacco Agricultural Sciences;Fuzhou 350003;China;3 College of Toba
农业部植物营养与养分循环重点开放实验室;教育部植物—土壤相互作用重点实验室;中国农业大学植物营养系北京100094;2。福建烟草农业科学研究所福建福州350003;3。云南农业大学烟草学院,云南昆明 650201;4。西南大学资源环境学院,重庆 400715
-
The virtual prototype model of McPherson suspension and steering linkage was established by using ADAMS software. The effects of key points on Ackerman steering and toe-in angle change characteristic were studied. And the parameters of the key points of steering linkage were optimized.
利用ADAMS软件建立麦弗逊悬架转向机构的虚拟样机模型,分析了转向机构中的关键点对阿克曼转向特性和车轮前束角变化特性的影响,对转向梯形进行了优化计算。
-
Music based on a certain dia tonic key is said to have the tonality of that key.
如果一部音乐作品是以某一自然音阶为基础创作出来的,我们就说这部作品具有这一个调子的调性。
-
O6O0ohv1b.y0 Any major key has a relative minor, its tonic a minor third below the tonic of the major key.
任何一个大调都有相对应的小调,主音间相差小三度。
-
AzF4}0W s0 Any minor key has a relative major, its tonic a minor third above the tonic of the minor key.
任何一个小调都有相对应的大调,主音间相差小三度。
-
In order to improve the existing generic service oriented intrusion tolerant system in aspect of architecture and function, this paper presents an improved adaptive intrusion tolerant system with improved architecture, functional modules and key techniques. From an overall consideration of the system, mixed with firewall, intrusion detection and other traditional technologies, IAITS combines redundancy, diversity and various fault tolerant techniques, thus enhancing reliability through active replication and secure multicast, reaching tradeoff between system complexity and intrusion tolerance ability by redundant design only in most vulnerable components, and supporting data protection on the basis of architecture with only a little extra cost in software and hardware by making use of topological coherence between application servers group and key share servers group.
本文针对目前面向通用服务的容忍入侵系统在架构和功能上的不足,提出了一种改进的自适应容忍入侵系统,在系统结构、功能模块以及关键技术上做出了改进的设计:从整体上考虑系统结构,将防火墙、入侵检测等传统的安全技术融合到容忍入侵系统的设计中;综合了以冗余与多样性为主的多种容错技术,采用主动复制与安全多播,增强了系统的可靠性;仅在最易受攻击的部件上采用冗余设计,兼顾系统复杂性与容侵能力;利用应用服务器组和密钥服务器组在拓扑结构上的一致性,在基本不增加软硬件开销的情况下,从架构上支持数据保护的功能。
-
This paper, which focused on the structure optimization theory and method, has finished such studies as follows: The three dimension model has been built, which provide the necessary conditions for the building of the dynamics equivalent model. By the launch dynamics simulation, the loads of the key joints when the rocket is launched has been got, which provide the necessary data for the finite element analysis and the structure optimization. The finite element model of the excess weight parts of the rocket has been built, buy the finite element intension analysis of the model in two conditions, the displacement and the stress of the key points have been got, which make us know the distributing of the stress and the transmogrification of the part. To satisfy the intension and the precision design request and to decrease the weight of the part as many as possible, the part has been topology optimized by the structure optimization theory and method. After that, the new model has been analysis in structure and launch dynamics. The contrast of the character change of the old part and the new part and the influence on the rocket system have been studied.
本文以结构优化理论和方法为核心,主要做了以下工作:建立了某自行火箭炮全炮三维实体模型,为建立该火箭炮系统的动力学等效模型提供了必要条件,进行了发射动力学仿真,得到该火箭炮发射装置各关键连接部位在发射状态下的载荷,为有限元分析和结构优化提供了必需的数据;建立了该火箭炮发射装置超重部分的有限元模型,分两种工况,对模型进行了有限元强度分析,得出了关键部位的位移和应力值,对其的应力和变形分布有了具体的了解;运用结构优化的理论和方法,对该火箭炮发射装置超重部分进行了拓扑优化,使其在满足强度和精度的要求下尽可能多地减轻重量,对优化后得到的模型进行了结构分析和发射动力学分析,对比了该部件优化前后的特性变化以及对火箭炮系统的影响。
-
By analyzing the key generation equations of Trivium and determining 52 bit of its interior state which need to be altered, and then fault injections are used to alter these 52 bit and a faulty key stream can be obtained.
通过分析Trivium密钥流生成方程,确定需要改变Trivium 288 bit内部状态中的52 bit,使用错误注入改变所确定的52 bit,并生成密钥流,与原始密钥流进行差分。
-
Each line begins with a key, followed by a colon, and the value associated with the key. The line is terminated by a single newline (UCS codepoint 10,"\n").
每行由一个键名开始,后跟一个冒号,然后是该键的值,结束于一个换行符(UCS代码是10,"\n")。
-
In these plants, including national key protected wild tea plants, Bole tree, umbrella, flowers and trees, tourism and other 14 kinds of wood; Guangdong Province, there are two kinds of key protected plants.
在这些植物中,其中国家重点保护植物有野茶树、伯乐树、伞花木、观光木等14种;广东省重点保护植物有2种。
- 相关中文对照歌词
- No Point
- Down On Longboat Key
- Key Lime Pie
- The Key
- Ring Ding Dong
- Love Is The Key
- J'Adore
- Key West
- Getting To The Point
- Paranoia Key Of E
- 推荐网络例句
-
The work of this paper is as follows: 1. Looking back the progressing history of the linear motor, introducing the features of the elevator driven by linear induction motor, radicating the topic of this paper "the digital frequency variable control of the elevator bi-side direct driven by linear induction motor". The research of this paper covers the conventional VVVF control, space vector based VVVF control, vector control and DTC.
本文主要开展了以下几个方面的工作: 1 回顾了直线电机发展历史,电机的驱动技术演变,特别是针对直线电机的驱动,简要介绍了直线感应电机驱动电梯的优点和不同结构类型,对传统的v/f控制,基于空间矢量法的v/f控制,矢量控制,和基于电压空间矢量的直接转矩控制进行了比较,确立了本课题的研究主题:直线感应电机双边直推式驱动电梯的全数字变频控制。
-
The article combines with the treatment of a superficial civil air defense work to introduce how the grouting method to improve the performance of the backfill soil.
文章从治理漂浮人防工事的角度提出了注浆技术在改善回填土性质方面的应用,并详细阐述了注浆技术的施工流程。
-
I knew nor shyness nor fear, my life was boisterous.
我不懂得羞怯和惧怕,我的