英语人>网络例句>tuning key 相关的网络例句
tuning key相关的网络例句

查询词典 tuning key

与 tuning key 相关的网络例句 [注:此内容来源于网络,仅供参考]

To further enhance the security and connectivity for wireless sensor networks,proposed an improved key management scheme.introduced the scheme,a random key predistribution using multiple key spaces and multipath key reinforcement was based on group-based deployment model which in the paper of du wen-liang.analysis and simulations show that the scheme has lower memory and communication overheads, better ability against attacks besides good security performance.

为了进一步提高无线传感器网络的安全连通性,在分析du wen-liang等人的group-based节点投放模型的基础上,提出了一种改进的密钥管理方案:多密钥空间与多路径增强相结合的随机密钥预分配方案。结果分析表明,该方案需要较少的内存存储空间,不仅提高了系统的连通性,还降低了节点的被捕获概率。

The menu key function and enter key function interconvert through the menu key translation mode in the present invention, thereby achieving the effect of providing convenient key operation to the left-handed user.

在本发明中,通过菜单键转换模式对菜单键功能与确认键功能进行相互转换,达到了为左撇用户提供方便的键操作的效果。

In the symmetrical encryption system aspect, discussed the des algorithm with emphasis, has given it in the key management, the safe application aspect exists question; the problem which in the asymmetrical encryption system aspect, studies in with emphasis which rsa and the application has the question, the ecc merit and should pay attention and so on.through the quite symmetrical key encryption system and the public key encryption system good and bad points,summarize should use the mix key encryption system in the electronic commerce, both guarantee data security, and may enhance encrypts and deciphers the speed.

在对称加密体制方面,重点讨论了des 算法,给出了其在密钥管理、安全应用方面存在的问题;在非对称加密体制方面,重点研究rsa及其应用中存在的问题、ecc的优点及应注意的问题等。通过比较对称密钥加密体制和公开密钥加密体制的优缺点,总结出在电子商务中应采用混合密钥加密体制,既保证数据安全,又可提高加密和解密速度。

By introducing XOR operation and one-way function chains to group key management schemes based on the keys tree, a new group key management scheme based on the keys tree, XOR operation and one-way function chains is proposed. Initialization, member adding and member evicting operations are introduced. The new scheme is compared with three other group key management schemes which are based on the keys tree:SKDC, LKH, and OFT. As far as transmission, computation and storage costs are concerned, the performance of the new group key management scheme is the best.

摘 要:在基于密钥树的组密钥管理方案中引入了XOR操作以及单向函数链,提出了一种新的基于密钥树、XOR操作以及单向函数链的组密钥管理方案,介绍了新方案中初始化、成员加入以及成员退出的操作,将新方案与3种基于密钥树的组密钥管理方案SKDC,LKH,OFT进行了比较,数据表明:就传输、计算以及存储开销而言,新的组密钥管理方案性能最优。

Its birth is in key word is decision-making in to the search engine optimizes worker enlarge wide train of thought, basis before circumstance, major search engine optimizes service business to pay close attention to most is the core key word in the website, rank that those who emphasize also is core key word, and oversight the key word of a few little flow.

它的诞生在关键字决策中给搜索引擎优化工作者扩宽了思路,根据以往的情况,大部分搜索引擎优化服务商关注最多的是网站中的核心关键字、强调的也是核心关键字的排名,而忽略了一些小流量的关键字。

The third key-press is regarded as letter affirmance key-press on mini key-board, at the same time, identifies sound, the identical method is: identifying the three sounds by lengthways three lists, identifying the three rhymes by transverse three rows, the intersectant is the whole identifying key-press of sound.

小键盘以输入第三键作为字符确认键,同时识别声韵,识别方法是:以纵向三列键识别三声;横向三排键识别三韵,纵横交合键位就是该音节的声韵全识别键。

The BCH coded authentication data is modulated by chaotic sequence and then embedded into the DCT domain of the image by using the owner's private key.The embedding process is controlled by Just Noticeable Difference of the DCT block.Users can extract the authentication data with the public key,while they can't get the private key to destroy or delete the watermark through the public key.

提出一种基于非对称水印的图像认证改进算法,算法中将经过BCH编码和混沌序列调制的认证信息作为水印,利用所有者私钥嵌入图像DCT域,嵌入过程根据DCT块的可视噪声阈值控制,用户可以利用公钥从水印图像中提取认证信息,但无法从公钥中获取任何私钥信息,从而无法破坏或删除水印。

In this paper it analyzes the execution process of SQL statement in Oracle database and finds out that reducing times of SQL statement parsing and optimizing CBO are the emphases of SQL performance tuning.Then it validates the key role of using bound variable and cache cursor in enhancing performance of SQL with example.

从分析ORACLE数据库中SQL语句执行原理入手,指出减少SQL语句的解析次数和优化CBO是SQL性能优化的重点,并用实例验证了使用绑定变量和高速缓存游标在提高SQL性能方面的重要作用。

It is able to perform spatial transformational movement, rotation, hoisting, tilting, planar rotation and tilted rotation. Based on configuration analysis, kinematic position equations were formulated, kinematic model of parallel fine-tuning structure was discussed as a key and inverse position analysis and velocity mapping equations were presented. Kinematic simulation of the mechanism was conducted using MATLAB software. A case study was provided, which applied the mechanism in tunnel erector assembling manipulators.

通过对该机构进行分析研究,建立其运动学位姿方程,重点探讨了并联微调机构的运动学模型,建立了其位置逆解与速度映射解析方程,运用MATLAB软件对该机构进行了运动学仿真分析;同时提供了该串并联机构应用于隧道管片拼装机械手的具体实例。

A well-known piece is BuxWV 146, in the rare key of F-sharp minor; it is believed that this prelude was written by Buxtehude especially for himself and his organ, and that he had an own way of tuning the instrument to allow for the tonality rarely used because of meantone temperament.

一位著名的BuxWV 146件,在罕见的F键小调,而是认为这是由胡德的前奏,特别是写自己和自己的器官,他得调整自己的方式的文书,以便很少使用的音调,因为meantone气质。

第9/100页 首页 < ... 5 6 7 8 9 10 11 12 13 ... > 尾页
相关中文对照歌词
Tuning Into Something Wild
Down On Longboat Key
Key Lime Pie
The Key
Ring Ding Dong
Alien
Tuning In Tuning On
Love Is The Key
J'Adore
Key West
推荐网络例句

Diabetes is a social disease that affects several million people worldwide.

糖尿病是一个社会性疾病,全世界有数百万人罹患此病。

I'll call you on Friday to see if we can reschedule our luncheon meeting at your convenience.

我星期五会给您打电话在您方便的时候我们重新安排我们的午餐约会。

Not only because there was a power off, but also because he cooked a muskrat.

不仅因为停电了,而且因为他做了麝鼠肉。