英语人>网络例句>key 相关的网络例句
key相关的网络例句
与 key 相关的网络例句 [注:此内容来源于网络,仅供参考]

The method for encoding a position interpolator includes generating key data and key value data to be encoded by extracting, from a first animation path constituted by the position interpolator, a minimum number of break points, which can bring about an error of no greater than a predetermined allowable error limit between the first animation path and a second animation to be generated by the extracted break points, encoding the key data generated in step, and encoding the key value data generated in step.

用于对位置内插器进行编码的方法包括:通过从由位置内插器构成的第一动画路径中提取最小数量的断点,生成将被编码的密钥数据和密钥值数据,这些断点可以在第一动画路径和将由所提取的断点生成的第二动画路径之间引起不大于预定的可允许误差极限的误差;对在步骤中生成的密钥数据进行编码;以及对在步骤中生成的密钥值数据进行编码。

To cut selected text,press the shift key +the backspace key.to copy selected text,press the alt key and click the trackwheel .to paste selected text,press the shift key and click the trackwheel.

按住shift键+del键可以剪切文本;按alt键单击滚轮可以复制文本;按住shift键单击滚轮可以粘贴文本

The science reasonable definite key position transportation facility construction the order of priority, provides the basis for the science reasonable plan and the management transportation infrastructure construction.Determined reasonably synthesis transportation key position development scale and construction key, a plan, implements by stages, formsthe necessary consummation gradually in the plan time, the function complete Sichuan Yunnan Guizhou Province intersection region comprehensive transportation key position.

科学合理的确定枢纽交通设施建设的优先顺序,为科学合理规划和管理交通基础设施建设提供依据,合理地确定综合交通枢纽的发展规模和建设重点,一次规划,分期实施,在规划期内逐步形成配套完善,功能齐全的川滇黔结合部区域综合性交通枢纽。

The result makes clear, the hydrogenous key key of hydrate brilliant acupuncture point can be strong at water element 2 get together body and the hydrogenous key key in putting crystal lattice on the ice can.

结果表明,水合物晶穴的氢键键能强于水分子二聚体和冰晶格中的氢键键能。

Another set cryptographically key is public key and private key of address owner.And the public key is used in generating OCGA address.And the private key is used in generating digital signs.

另一组是ACGA地址主人的公钥和私钥,公钥用来生成OCGA地址,而私钥用来对该地址发送的消息进行数字签名。

An Advanced Cryptographically Generated Addresses method is proposed.It uses two sets of cryptographically keys to produce IPv6 address.One set cryptographically key is public key and private key of ISP.And the private key is used in assigning ACGA address,the public key is used in validating whether the address come from the ISP that it claimed.

提出一种改进的密码生成地址方法,ACGA涉及到两组公钥和私钥对,一组是ISP的公钥和私钥对,其中私钥在分配ACGA地址中使用,公钥在验证该地址是否存在或是否来自声称的ISP中使用。

The design includes many new technologies in data exchange and data security, they are: Converting non-XML data to XML in order to apply the XML security technology to more data types; Using the technology of XKMS and PKI to manage the public key in order to overcome the shortage of complexity and difficulty in using PKI and improve the efficiency of the public key management; Using Diffe-Hellman algorithm combining with the public key technology to exchange secret key in order to furthest increase the security of the key; Using the technology of XML digital signature algorithm to ensure the integrity, message authentication and signer authentication of the data; Using the technology of XML encryption to ensure confidentiality of the data; Defining delegable access rules on the structure and content of the XML documents to provide fine-grained access control. According to the XML security framework, a XML security library is designed and implemented.

在对XML及其安全技术主要包括XML加密技术、XML数字签名、公钥管理、密钥产生和交换进行研究的基础上,结合传统密码技术和XML安全技术提出了一种基于XML的数据安全模型,模型中包含了目前网络数据交换和安全领域的一系列最新技术,主要有:将非XML格式数据转换为XML格式数据的方法,以保证现有的大部分网络数据能够应用XML安全技术;使用XML公钥管理技术结合PKI技术管理公钥,以克服PKI技术实施和部署复杂、难度大等问题,提高公钥管理的效率;使用Diffie-Hellman算法结合公钥技术交换密钥,以最大限度保证密钥的安全;使用XML数字签名技术保证数据的完整性、不可否认性和发送方身份认证;使用XML加密技术保证数据的机密性;根据XML文档的内容和结构定义授权访问规则进行良好的访问控制。

In this context, we propose a time deployment based, pairwise keymanagement scheme called TDBK. In TDBK, the network lifetime is divided intoseveral consecutive network deployment statuses which are separated by nodedeployment events. Each node to be deployed is assigned its key informationthrough a special two-tier key predistribution mechanism, and timely deletes theuseless part of the key information through the key elimination mechanism eachtime the pairwise key establishment is finished in terms of a new nodedeployment event.

在此背景下,我们提出了一种基于时间部署的对****管理方案(Time Deployment Based Keying,TDBK),该方案将网络的生命周期分为多个连续的网络部署状态,相邻的部署状态之间通过节点部署事件分隔,每个节点通过特殊的两级****预分配机制来获得用于建立对****的****信息,随后通过****清除机制在每次节点部署事件发生时进行的对****建立过程完成后及时地删除其中无用的****信息。

Make signal be called binary system numeral to make for the make of binary system signal, the binary system make and is divided into a binary system to move key to control(2 ASK), the binary system Pin move key to control(2 FSK), the binary system mutually move key to control(2 PSK) with bad cent the binary system mutually move key to control(2 DPSK) etc. variety basic type, this topic main is numeral the frequency make and call Pin to move key to control.

调制信号为二进制信号的调制称为二进制数字调制,二进制调制又分为二进制幅移键控(2ASK)、二进制频移键控(2FSK)、二进制相移键控(2PSK)和差分二进制相移键控(2DPSK)等多种基本的类型,本课题主要是数字频率调制又称频移键控。

According to password which establishes, uses two pressed keys realizations password the input function, after the password input is correct, locks opens, if inputs three passwords are not correct, locking presses a key 3 seconds, simultaneously discovered reports to the police the sound, after has not pressed a key presses down 3 kinds, only then opens the pressed key locking function; Otherwise still had the pressed key in 3 seconds to press down, relocked presses a key 3 seconds time and reports to the police

根据设定好的密码,采用二个按键实现密码的输入功能,当密码输入正确之后,锁就打开,如果输入的三次的密码不正确,就锁定按键3秒钟,同时发现报警声,直到没有按键按下3种后,才打开按键锁定功能;否则在3秒钟内仍有按键按下,就重新锁定按键3秒时间并报警

第11/100页 首页 < ... 7 8 9 10 11 12 13 14 15 ... > 尾页
相关中文对照歌词
Key Lime Pie
The Key
Minor Key Sonata
Down On Longboat Key
Laid Back 'n Low Key
Key To Your Heart
Take The Key
Dota 2 Beta Key
My Key
The Key
推荐网络例句

Neither the killing of Mr Zarqawi nor any breakthrough on the political front will stop the insurgency and the fratricidal murders in their tracks.

在对危险的南部地区访问时,他斥责什叶派民兵领导人对中央集权的挑衅行为。

In fact,I've got him on the satellite mobile right now.

实际上 我们已接通卫星可视电话了

The enrich the peopling of Deng Xiaoping of century great person thought, it is the main component in system of theory of Deng Xiaoping economy, it is a when our country economy builds basic task important facet.

世纪伟人邓小平的富民思想,是邓小平经济理论体系中的重要组成部分,是我国经济建设根本任务的一个重要方面。