查询词典 key
- 与 key 相关的网络例句 [注:此内容来源于网络,仅供参考]
-
AzF4}0W s0 Any minor key has a relative major, its tonic a minor third above the tonic of the minor key.
任何一个小调都有相对应的大调,主音间相差小三度。
-
In order to improve the existing generic service oriented intrusion tolerant system in aspect of architecture and function, this paper presents an improved adaptive intrusion tolerant system with improved architecture, functional modules and key techniques. From an overall consideration of the system, mixed with firewall, intrusion detection and other traditional technologies, IAITS combines redundancy, diversity and various fault tolerant techniques, thus enhancing reliability through active replication and secure multicast, reaching tradeoff between system complexity and intrusion tolerance ability by redundant design only in most vulnerable components, and supporting data protection on the basis of architecture with only a little extra cost in software and hardware by making use of topological coherence between application servers group and key share servers group.
本文针对目前面向通用服务的容忍入侵系统在架构和功能上的不足,提出了一种改进的自适应容忍入侵系统,在系统结构、功能模块以及关键技术上做出了改进的设计:从整体上考虑系统结构,将防火墙、入侵检测等传统的安全技术融合到容忍入侵系统的设计中;综合了以冗余与多样性为主的多种容错技术,采用主动复制与安全多播,增强了系统的可靠性;仅在最易受攻击的部件上采用冗余设计,兼顾系统复杂性与容侵能力;利用应用服务器组和密钥服务器组在拓扑结构上的一致性,在基本不增加软硬件开销的情况下,从架构上支持数据保护的功能。
-
This paper, which focused on the structure optimization theory and method, has finished such studies as follows: The three dimension model has been built, which provide the necessary conditions for the building of the dynamics equivalent model. By the launch dynamics simulation, the loads of the key joints when the rocket is launched has been got, which provide the necessary data for the finite element analysis and the structure optimization. The finite element model of the excess weight parts of the rocket has been built, buy the finite element intension analysis of the model in two conditions, the displacement and the stress of the key points have been got, which make us know the distributing of the stress and the transmogrification of the part. To satisfy the intension and the precision design request and to decrease the weight of the part as many as possible, the part has been topology optimized by the structure optimization theory and method. After that, the new model has been analysis in structure and launch dynamics. The contrast of the character change of the old part and the new part and the influence on the rocket system have been studied.
本文以结构优化理论和方法为核心,主要做了以下工作:建立了某自行火箭炮全炮三维实体模型,为建立该火箭炮系统的动力学等效模型提供了必要条件,进行了发射动力学仿真,得到该火箭炮发射装置各关键连接部位在发射状态下的载荷,为有限元分析和结构优化提供了必需的数据;建立了该火箭炮发射装置超重部分的有限元模型,分两种工况,对模型进行了有限元强度分析,得出了关键部位的位移和应力值,对其的应力和变形分布有了具体的了解;运用结构优化的理论和方法,对该火箭炮发射装置超重部分进行了拓扑优化,使其在满足强度和精度的要求下尽可能多地减轻重量,对优化后得到的模型进行了结构分析和发射动力学分析,对比了该部件优化前后的特性变化以及对火箭炮系统的影响。
-
By analyzing the key generation equations of Trivium and determining 52 bit of its interior state which need to be altered, and then fault injections are used to alter these 52 bit and a faulty key stream can be obtained.
通过分析Trivium密钥流生成方程,确定需要改变Trivium 288 bit内部状态中的52 bit,使用错误注入改变所确定的52 bit,并生成密钥流,与原始密钥流进行差分。
-
Each line begins with a key, followed by a colon, and the value associated with the key. The line is terminated by a single newline (UCS codepoint 10,"\n").
每行由一个键名开始,后跟一个冒号,然后是该键的值,结束于一个换行符(UCS代码是10,"\n")。
-
In these plants, including national key protected wild tea plants, Bole tree, umbrella, flowers and trees, tourism and other 14 kinds of wood; Guangdong Province, there are two kinds of key protected plants.
在这些植物中,其中国家重点保护植物有野茶树、伯乐树、伞花木、观光木等14种;广东省重点保护植物有2种。
-
To assign a contact or phone number to a speed dial key,in the phone,select a contact or phone number hold any unassigned letter key.
给分配一个联系人或电话号码快速拨号键,请在电话界面下,选顶联系人或电话号码,常按任何未分配的字母键
-
To assign acontact or phone number to a speed dial key,in the phone,select a contact or phone number hold any unassigned letter key.
给分配一个联系人或电话号码快速拨号键,请在电话界面下,选顶联系人或电话号码,常按任何未分配的字母键
-
The method comprises searching the undermost leaf node corresponding to a key word in a pre-established index tree; acquiring a block corresponding to the leaf node in the pre-stored IP address area of the virtual private network and corresponding index information, wherein the block comprises one or more consecutive IP address area and corresponding index information; acquiring the IP address area to which the key word belongs in the block; and searching the routing list corresponding to the index information according to the indexing information corresponding to the IP address area.
所述方法包括:在预先建立的索引树中查找关键字对应的最下层的叶子节点;在预先存储的虚拟私用网的IP地址区间和对应的索引信息中,获取叶子节点对应的块,该块包括一个或多个连续的IP地址区间和相应的索引信息;在该块内获取关键字所属的IP地址区间;根据该IP地址区间对应的索引信息,找到该索引信息对应的路由表项。所述装置包括:查找模块和获取模块。
-
Base on these, the article started with customer value, the core part of CRM, expatiate on the key account character and essence from customer value point of view in IT industry, advanced the material method how to identify the key account. The method solved the management difficulty for the IT company who are impercipient and undistinguishable on KAM.
基于以上的问题,本文从客户关系管理的核心—顾客价值入手,从顾客价值的角度阐述IT企业关键客户的特征和本质,提出了识别关键客户的具体方法,解决了IT企业在关键客户管理上对关键客户认识不足和辨识不清的管理难点问题。
- 相关中文对照歌词
- Key Lime Pie
- The Key
- Minor Key Sonata
- Down On Longboat Key
- Laid Back 'n Low Key
- Key To Your Heart
- Take The Key
- Dota 2 Beta Key
- My Key
- The Key
- 推荐网络例句
-
The split between the two groups can hardly be papered over.
这两个团体间的分歧难以掩饰。
-
This approach not only encourages a greater number of responses, but minimizes the likelihood of stale groupthink.
这种做法不仅鼓励了更多的反应,而且减少跟风的可能性。
-
The new PS20 solar power tower collected sunlight through mirrors known as "heliostats" to produce steam that is converted into electricity by a turbine in Sanlucar la Mayor, Spain, Wednesday.
聚光:照片上是建在西班牙桑路卡拉马尤城的一座新型PS20塔式太阳能电站。被称为&日光反射装置&的镜子将太阳光反射到主塔,然后用聚集的热量产生蒸汽进而通过涡轮机转化为电力