英语人>网络例句>可验证性 相关的搜索结果
网络例句

可验证性

与 可验证性 相关的网络例句 [注:此内容来源于网络,仅供参考]

Based on indoor measurement of rock acoustic velocity,drillability, rigidity ,uniaxial compressive strength,the relationship between acoustic velocity and fragmentation parameters of rocks and that between the surface acoustic velocity and the underground mine logging acoustic velocity were explored by regression analysis.

在室内测定岩石声波速度、可钻性、硬度、单轴抗压强度试验的基础上,利用回归分析方法,探索声波速度与岩石机械破碎性能参数之间、地面声波速度与井下测井声波速度之间相关关系,建立了利用测井声波速度预测地层岩石机械破碎性能参数的数学模型,介绍了预测剖面及资料验证结果,并将这一方法用于计算PDC钻头可钻性以及中国南方海相碳酸盐岩地层的岩石力学参数。

Aiming at the complexity of DSRC (Dedicated Short-Range Communication) protocol, the fuzziness and ambiguousness resulted from the natural language of the protocol, the protocol engineering method is adop ted to guarantee the integrality, correctness, security, portability and standardization of the protocol.

针对专用短程通信协议的复杂性以及协议本身由自然语言承载、存在模糊性和二义性的特点,采用协议工程方法来保证协议的完整性、正确性、安全性、可移植性和标准化,并采用SDL对DSRC协议进行形式化描述,在此基础上提出了DSRC协议验证的步骤和实现方法,并对所开发的协议SDL模型进行验证,结果表明了协议的逻辑正确性。

In the mid-1990s George W. Gilchrist of theUniversity of Washington surveyed thousands of journals in the primaryliterature, seeking articles on intelligent design or creation science.

在这些史学性科学(还包括天文学,地质学和考古学,以及进化生物学)中,假说仍然是可以验证的,我们可以验证它们是否与现有证据保持一致,是否能对未来的发现做出可验证的预测。

After that, the model is validated safety and reliable by using the State Matrix Equation of the Petri network. According to the theory that the State Topological Map of Petri Network and Markov chain are isomorphous, the Markov chain of the model is deduced, by which some function indexes such as marked density of probability, average token-number, and usage of transformation can be calculated.

同时,本文运用Petri网系统的状态矩阵方程的方法对模型进行了可达性验证,经验证该模型是安全可达的,并根据随机Petri网的状态图同构马尔可夫链的原理,获得该模型的马尔可夫链,运用该MC链分析了模型的标记概率密度、位置中的平均标记数以及变迁的利用率等性能指标。

At first, the conception of test task was proposed to explain the evident difference of parallel efficiency of test tasks. Then, the guideline of parallelism was developed, to weigh the parallelizability of different test tasks, as well as guiding the configuration of instrument source in the parallel test system. At last, with an example, the rationality of parallelizability and the practicability of parallelism were proved.

首先根据测试任务组的并行测试效率不同的现象,提出了测试任务可并行性的概念;然后给出了衡量可并行性的可并行度指标,用以定量地指导并行测试系统开发过程中仪器资源的配置;最后通过应用实例验证了可并行性概念的合理性、可并行度指标的实用性。

It will expose the design problem of maintainability of civil airplane to the early stage of design. This paper discusses the composing of the virtual maintenance environment, builds non-immersion virtual maintenance environment of undercarriage, and establishes a part library management system. The characteristic of maintainability models and maintainability analysis based on virtual technique is researched to give the maintainability frame model of civil airplane virtual maintainability analysis. All levels of maintenance time model and maintenance man-hour model are established. Analog-Huffman code is proposed to optimize space partition method in traditional collision detection arithmetic."Maintenance therblig"is brought into the broken down of maintenance tasks, and the new maintenance tasks broken down method is proposed. The demands of human measure, position, and equipment layout in human engineering are discussed, and the verification methods of human measure, position and equipment layout in virtual maintenance are given. Basic principle and verification procedure of maintainability virtual verification is developed primarily, and the reachablity, the visibility, and posture-comfortability are verified.

本文论述了虚拟维修环境的组成,构建了某型飞机主起落架非沉浸式虚拟维修环境,建立了维修对象的零件库管理系统;研究了基于虚拟技术的维修性模型特点及维修性分析流程,给出了基于虚拟技术的民机维修性分析框架模型,并结合传统维修性模型,建立了各级维修时间模型和维修工时模型;提出类HUFFMAN编码,结合人因工程的要求,优化了传统碰撞检测算法中的空间分割法,使之适用于柔体;在维修性分解中引入"维修动素",给出了与CATIA、DELMIA等应用软件结合紧密的维修任务分解方法;论述了人因工程中对人体尺寸、姿势、设备布局的要求,给出了虚拟维修中人体尺寸、姿势分析、民机内设备布局的验证方法;初步制订了维修性虚拟验证的基本原则和验证程序,并结合具体实例对可达性、可视性、干涉性以及人体姿态舒适性进行了验证,较清晰、真实地反映了维修人员的维修状态。

This thesis deeply researches the J2EE security strategy on the application tier of enterprise system. The security strategy predigests the information security model and meets the security requirements expediently. But there are some disadvantages when the security requirements become more complex. The expositive security on the Web-Tier can not offer more information for authentication; there is no authentication for EJB-Tier to use, make the EJB-Tier depend on the Web-Tier; J2EE uses database or application server to manage the role information. Use database to manage the role information will increase the complex of enterprise application, and the way of application server will reduce the ability of migrate other J2EE platform. To solve these problems, the thesis designs an improved security strategy model.

本文从企业级系统应用层安全的角度出发,深入研究J2EE多层体系结构的安全策略模型。J2EE提供的安全策略简化了系统的信息安全模型,能够很方便地满足基于J2EE的分布式应用系统的安全需求,但是在面对更加复杂的安全需求时,J2EE安全策略在验证授权和角色管理中还存在不足之处:其在Web层的声明式验证机制无法为用户提供更多验证信息,可扩展性较差;在EJB层缺少业务逻辑层可供采用的验证机制,而是借助于Web层的验证机制,其耦合程度较高有悖于业务逻辑分离于表现逻辑的原则;在角色管理方面,J2EE采用数据库或者应用服务器来管理角色信息,其中,数据库管理角色的方式增加了应用开发的复杂度,应用服务器管理角色降低了系统的可移植性,两者都具有片面性。

The model designs an extensible authentication to replace the way which the expositive security uses on Web-Tier and an authentication for controlling the accessing to the protect resource on EJB-Tier. The improved model uses directory server to manage the role information. It reduces the complex of application development, and increases the ability of migrate other J2EE platform.

针对以上不足,本文提出了改进的安全策略模型,在Web层设计可扩展的验证模块来代替原来声明式安全采用的验证机制;在EJB层设计验证模块用于对业务逻辑资源的访问控制;在角色信息管理方面,使用目录服务器存储用户角色,来降低系统开发复杂度,提高系统的可移植性。

Firstly, there are less secure and efficient threshold schemes; secondly, the research on multi-secret sharing is rather weak; thirdly, usual verifiable secret sharing don't consider the partners' anonymity, while it is just people's expectation. Last but not least, the problem of variety on shares is becoming a more obvious restrict of efficiency, especially in the facets of the lost and being districted of shares. On the application of verifiable secret sharing, there are also two inadequates : on the one hand , verifiable secret sharing has been used in much threshold cryptography but in less verifiable signatures.

然而,经过认真总结、分析该领域目前研究的发展状况(具体结果将在第一章给出),我们发现在可验证秘密分享的研究方面,仍有下列四个不足之处:一是现有的安全、高效的门限方案不多;二是对多秘密分享的研究非常薄弱,在已有的文献中还见不到安全、实用的可验证多秘密分享方案;三是通常的秘密分享方案没有考虑秘密分享者的匿名性,而这恰恰是人们所希望的;四是秘密分享者的动态管理问题已经越来越明显的制约现有方案的安全,尤其是密钥份额丢失或被破坏时如何恢复更是没有被深入探讨。

APB VIP can be used to verify an APB RTL design by a designer or a verification engineer. It is very easy to set up the Testbench and generate the testcases for

验证IP和通用验证平台提供了更高可控性和可观测性的验证,有效缩短了芯片的验证时间,加快了芯片的上市速度。

第2/9页 首页 < 1 2 3 4 5 6 7 8 9 > 尾页
推荐网络例句

On the other hand, the more important thing is because the urban housing is a kind of heterogeneity products.

另一方面,更重要的是由于城市住房是一种异质性产品。

Climate histogram is the fall that collects place measure calm value, cent serves as cross axle for a few equal interval, the area that the frequency that the value appears according to place is accumulated and becomes will be determined inside each interval, discharge the graph that rise with post, also be called histogram.

气候直方图是将所收集的降水量测定值,分为几个相等的区间作为横轴,并将各区间内所测定值依所出现的次数累积而成的面积,用柱子排起来的图形,也叫做柱状图。

You rap, you know we are not so good at rapping, huh?

你唱吧,你也知道我们并不那么擅长说唱,对吧?