英语人>网络例句>key-board 相关的网络例句
key-board相关的网络例句

查询词典 key-board

与 key-board 相关的网络例句 [注:此内容来源于网络,仅供参考]

The Key Laboratory of Plant Nutrition and Nutrient Cycling;MOA;Key Laboratory of Plant-Soil Interactions;MOE;Department of Plant Nutrition;CAU;Beijing 100094;China;2 Fujian Institute of Tobacco Agricultural Sciences;Fuzhou 350003;China;3 College of Toba

农业部植物营养与养分循环重点开放实验室;教育部植物—土壤相互作用重点实验室;中国农业大学植物营养系北京100094;2。福建烟草农业科学研究所福建福州350003;3。云南农业大学烟草学院,云南昆明 650201;4。西南大学资源环境学院,重庆 400715

The virtual prototype model of McPherson suspension and steering linkage was established by using ADAMS software. The effects of key points on Ackerman steering and toe-in angle change characteristic were studied. And the parameters of the key points of steering linkage were optimized.

利用ADAMS软件建立麦弗逊悬架转向机构的虚拟样机模型,分析了转向机构中的关键点对阿克曼转向特性和车轮前束角变化特性的影响,对转向梯形进行了优化计算。

Music based on a certain dia tonic key is said to have the tonality of that key.

如果一部音乐作品是以某一自然音阶为基础创作出来的,我们就说这部作品具有这一个调子的调性。

O6O0ohv1b.y0 Any major key has a relative minor, its tonic a minor third below the tonic of the major key.

任何一个大调都有相对应的小调,主音间相差小三度。

AzF4}0W s0 Any minor key has a relative major, its tonic a minor third above the tonic of the minor key.

任何一个小调都有相对应的大调,主音间相差小三度。

In order to improve the existing generic service oriented intrusion tolerant system in aspect of architecture and function, this paper presents an improved adaptive intrusion tolerant system with improved architecture, functional modules and key techniques. From an overall consideration of the system, mixed with firewall, intrusion detection and other traditional technologies, IAITS combines redundancy, diversity and various fault tolerant techniques, thus enhancing reliability through active replication and secure multicast, reaching tradeoff between system complexity and intrusion tolerance ability by redundant design only in most vulnerable components, and supporting data protection on the basis of architecture with only a little extra cost in software and hardware by making use of topological coherence between application servers group and key share servers group.

本文针对目前面向通用服务的容忍入侵系统在架构和功能上的不足,提出了一种改进的自适应容忍入侵系统,在系统结构、功能模块以及关键技术上做出了改进的设计:从整体上考虑系统结构,将防火墙、入侵检测等传统的安全技术融合到容忍入侵系统的设计中;综合了以冗余与多样性为主的多种容错技术,采用主动复制与安全多播,增强了系统的可靠性;仅在最易受攻击的部件上采用冗余设计,兼顾系统复杂性与容侵能力;利用应用服务器组和密钥服务器组在拓扑结构上的一致性,在基本不增加软硬件开销的情况下,从架构上支持数据保护的功能。

This paper, which focused on the structure optimization theory and method, has finished such studies as follows: The three dimension model has been built, which provide the necessary conditions for the building of the dynamics equivalent model. By the launch dynamics simulation, the loads of the key joints when the rocket is launched has been got, which provide the necessary data for the finite element analysis and the structure optimization. The finite element model of the excess weight parts of the rocket has been built, buy the finite element intension analysis of the model in two conditions, the displacement and the stress of the key points have been got, which make us know the distributing of the stress and the transmogrification of the part. To satisfy the intension and the precision design request and to decrease the weight of the part as many as possible, the part has been topology optimized by the structure optimization theory and method. After that, the new model has been analysis in structure and launch dynamics. The contrast of the character change of the old part and the new part and the influence on the rocket system have been studied.

本文以结构优化理论和方法为核心,主要做了以下工作:建立了某自行火箭炮全炮三维实体模型,为建立该火箭炮系统的动力学等效模型提供了必要条件,进行了发射动力学仿真,得到该火箭炮发射装置各关键连接部位在发射状态下的载荷,为有限元分析和结构优化提供了必需的数据;建立了该火箭炮发射装置超重部分的有限元模型,分两种工况,对模型进行了有限元强度分析,得出了关键部位的位移和应力值,对其的应力和变形分布有了具体的了解;运用结构优化的理论和方法,对该火箭炮发射装置超重部分进行了拓扑优化,使其在满足强度和精度的要求下尽可能多地减轻重量,对优化后得到的模型进行了结构分析和发射动力学分析,对比了该部件优化前后的特性变化以及对火箭炮系统的影响。

By analyzing the key generation equations of Trivium and determining 52 bit of its interior state which need to be altered, and then fault injections are used to alter these 52 bit and a faulty key stream can be obtained.

通过分析Trivium密钥流生成方程,确定需要改变Trivium 288 bit内部状态中的52 bit,使用错误注入改变所确定的52 bit,并生成密钥流,与原始密钥流进行差分。

Each line begins with a key, followed by a colon, and the value associated with the key. The line is terminated by a single newline (UCS codepoint 10,"\n").

每行由一个键名开始,后跟一个冒号,然后是该键的值,结束于一个换行符(UCS代码是10,"\n")。

In these plants, including national key protected wild tea plants, Bole tree, umbrella, flowers and trees, tourism and other 14 kinds of wood; Guangdong Province, there are two kinds of key protected plants.

在这些植物中,其中国家重点保护植物有野茶树、伯乐树、伞花木、观光木等14种;广东省重点保护植物有2种。

第54/100页 首页 < ... 50 51 52 53 54 55 56 57 58 ... > 尾页
相关中文对照歌词
Key Lime Pie
The Key
Minor Key Sonata
Down On Longboat Key
Laid Back 'n Low Key
Key To Your Heart
Take The Key
Dota 2 Beta Key
My Key
The Key
推荐网络例句

However, as the name(read-only memory)implies, CD disks cannot be written onorchanged in any way.

然而,正如其名字所指出的那样,CD盘不能写,也不能用任何方式改变其内容。

Galvanizes steel pallet is mainly export which suits standard packing of European Union, the North America. galvanizes steel pallet is suitable to heavy rack. Pallet surface can design plate type, corrugated and the gap form, satisfies the different requirements.

镀锌钢托盘多用于出口,替代木托盘,免薰蒸,符合欧盟、北美各国对出口货物包装材料的法令要求;喷涂钢托盘适用于重载上货架之用,托盘表面根据需要制作成平板状、波纹状及间隔形式,满足不同的使用要求。

A single payment file can be uploaded from an ERP system to effect all pan-China RMB payments and overseas payments in all currencies.

付款指令文件可从您的 ERP 系统上传到我们的电子银行系统来只是国内及对海外各种币种付款。