英语人>网络例句>深入的 相关的搜索结果
网络例句

深入的

与 深入的 相关的网络例句 [注:此内容来源于网络,仅供参考]

In this thesis, several key technologies of passive acoustic direction are studied.

本文针对被动声探测中若干关键技术,进行了深入的研究。

But there still has deficiency in thinking and acquaintanceship with the lack of deep discussions in theory.

但从思想认识上,还有欠缺,理论上还缺乏深入的探讨。

The area in which much more needs to be learned is how actin interacts with all three transcription machineries.

在该领域需要更深入的是研究肌动蛋白如何与三种转录机器相互作用。

This article will aim at this kind of technology to carry on the thorough analysis and the research.

本文将针对此种技术进行深入的分析和研究。

The security issue of the AIP system has been studied thoroughly in this dissertation.

本文对AIP系统安全性问题展开了深入的研究。

The study has focused on: 1 The research background and the current state of the power measurement were analyzed systematically, and then wavelet-based power measurement algorithm was certified feasible for astable signals; 2 We developed a new method of RMS and power measurement based on Dmeyer wavelet. After that three other wavelet measurement approaches were compared with Dmeyer wavelet-based measurement approach. Then the impact on measurement errors of amplitude frequency property and energy leakage of wavelet filter banks were deeply researched, and some measures were proposed to reduce it; 3 We developed a new strategy of power measurement algorithm based on lifting wavelet, which had calculation advantage compared with the first wavelet, so that it was more suitable for the realization of hardware; 4 The running system of wavelet-based power measurement algorithm based on DSP was proposed, and then it was realized on ICETEK-VC5416-A EVM board; 5 Existing problems and the further research direction of wavelet-based power sub-band measurement algorithm was discussed.

本文对基于小波变换的功率测量算法展开深入的分析研究,主要内容有:1)系统地分析了功率分解测量的研究背景、国内外的研究现状,并从能量守恒的角度验证了小波功率分频带测量算法在非平稳信号条件下的可行性;2)首次提出了Dmeyer小波变换有效值与功率的测量方法,进而通过对该方法与3种已经提出的小波测量方法的对比分析,深入研究了小波滤波器组的幅频特性和能量泄漏特性对测量误差的影响,并针对电网谐波的特点提出了减小影响的相关措施;3)首次提出了二代小波功率测量算法,对比一代小波功率分频带测量算法,它大大减少了算法实现的运算量及内存的需求量,从而更适合于硬件的实时实现;4)提出了小波功率分频带测量算法的DSP实现方案,并在ICETEK-VC5416-A EVM板上进行了实现;5)探讨了小波功率分频带测量算法目前仍存在的问题,并提出了进一步的研究方向。

In this paper, the concept of network security and security structures of OSI and Internet is introduced, and various threats confronting the computer network are also discussed. Several kinds of network information security technologies, including firewall technology, virtual private network, intrusion detection system, data encryption technology, identity authentication and security protocol etc. are also examined. The security of internal network is the biggest problem in the construction of each network. The solution to this problem lies in setting up a firewall. The theory of a firewall and the approach to its actualization is studied. Intrusion detection system, an important part of the computer network security system, has gained extensive attention. IDS monitors the computer and network traffic for intrusion and suspicious activities. It not only detects the intrusion from the extranet hacker, but also the intranet users. The emergence of virtual private network paves the way for realizing secure connection of LAN quickly and at a relatively low cost. The concept, function, key techniques, including the tunnel technology, and the ways to realize VPN are expounded in this paper. Also introduced is the data encrypt network technology, which is called the soul of computer network security, such as digital digest, digital signature, digital certificate, digital encrypt arithmetic and so on. At the same time, the principle and the process of implementing network security by digital certificate and digital signature, the basic principle and characters of security protocols, and finally, three of the security protocols, concerning the security problems in network, IPsec, SLL and SET are analyzed in detail Computer network system should be a system of dynamic defence, both dynamic and static, passive as well as active, and even offensive, combined with management and technology.

本文系统地介绍了网络安全的概念、OSI及Internet的安全体系结构,并讨论了计算机网络面临的各种安全威胁;内部网络的安全问题是每个建网单位面临的最大问题,可以认为防火墙技术是解决网络安全的一个主要手段,本文研究了防火墙的原理及其实现手段;作为一种主动的防御措施,入侵检测系统作为网络系统安全的重要组成部分,得到了广泛的重视,TDS对计算机和网络资源上的恶意使用行为进行识别和响应,不仅检测来自外部的入侵行为,也监督内部用户的未授权活动;虚拟专用网技术的出现,为实现网络间的连接提供了快速安全但又相对便宜的手段,本文较深入的探讨了实现VPN的隧道技术,并对VPN的概念、功能、实现途径、基本构成、关键技术及发展前景等问题进行了全面论述;数据加密技术是网络安全核心技术之一,本文从数据加密算法、数字摘要、数字签名及数字证书等几方面简要介绍了数据加密技术,并分析用数字证书和数字签名实现网络安全的原理和过程;对安全协议的基本原理、主要特点进行了较为深入的研究,并就网络的安全性问题剖析了三种安全协议:IPsec协议、SLL协议和SET协议。

The security of PKI system itself is especially emphasized during the system design and implementation process, which is in accordance with the pervasive characteristic of PKI. Second, the concept of a Trusted Key Management Center is introduced for the first time. This technology greatly strengthens key management practices and allows for smooth transition from PKI to Key Management Infrastructure. Third, certificate status mechanisms are investigated in depth, and a certificate revocation performance simulation system is devised. All these work will provide guides to practice and employment of PKI applications. Based on time constraints, a new taxonomy for authenticated dictionaries is proposed. Fourth, formal analysis ofOCSP protocol is carried out; then an efficient and scalable OCSP system is developed. Fifth, the special requirements caused by the working environments of Wireless PKI are analyzed. Based on communicative hashing and dynamic Merkle hash tree, an efficient certificate status validation method suitable for WPKI is presented. Sixth, one important kind of fair exchange protocols is studied, and a new CEMBS based on RSA cryptosystem is proposed. Afterwards, a novel fair exchange protocol totally based on RSA signature scheme is devised.

在系统设计和实现的过程中,考虑到PKI作为普适性安全基础平台的特点,特别强调PKI系统自身的安全性;第二,首次在PKI系统的设计中提出了"可信密钥管理中心"的概念,这一独特设计大大地强化了密钥管理功能的实施,为PKI向密钥管理基础设施的平滑过渡提供了良好的技术准备;第三,对证书状态验证机制进行了深入研究,设计了证书状态模拟系统,以指导PKI系统和应用的部署和实施;在此基础上,基于时间约束首次给出了认证字典的一种新的分类方法;第四,对OCSP协议进行了形式化分析,设计和实现了一种高效、可扩展的OCSP系统;第五,分析了WPKI工作环境对设计安全基础平台提出的特殊要求,结合无线移动设备的具体特点,基于可交换杂凑函数和动态Merkle杂凑树设计出了一种适用于WPKI环境的高效证书状态查询机制;第六,对一类公平交换协议进行了深入的研究,从设计公平交换协议的密码基础结构出发,提出了一种新型的基于RSA密码体制的高效CEMBS;在此工作的基础上,设计了一种基于RSA密码体制的最优化公平交换协议。

The security of PKI system itself is especially emphasized during the system design and implementation process, which is in accordance with the pervasive characteristic of PKI. Second, the concept of a Trusted Key Management Center is introduced for the first time. This technology greatly strengthens key management practices and allows for smooth transition from PKI to Key Management Infrastructure . Third, certificate status mechanisms are investigated in depth, and a certificate revocation performance simulation system is devised. All these work will provide guides to practice and employment of PKI applications. Based on time constraints, a new taxonomy for authenticated dictionaries is proposed. Fourth, formal analysis of OCSP protocol is carried out; then an efficient and scalable OCSP system is developed. Fifth, the special requirements caused by the working environments of Wireless PKI are analyzed. Based on communicative hashing and dynamic Merkle hash tree, an efficient certificate status validation method suitable for WPKI is presented. Sixth, one important kind of fair exchange protocols is studied, and a new CEMBS based on RSA cryptosystem is proposed. Afterwards, a novel fair exchange protocol totally based on RSA signature scheme is devised.

在系统设计和实现的过程中,考虑到PKI作为普适性安全基础平台的特点,特别强调PKI系统自身的安全性;第二,首次在PKI系统的设计中提出了"可信密钥管理中心"的概念,这一独特设计大大地强化了密钥管理功能的实施,为PKI向密钥管理基础设施的平滑过渡提供了良好的技术准备;第三,对证书状态验证机制进行了深入研究,设计了证书状态模拟系统,以指导PKI系统和应用的部署和实施;在此基础上,基于时间约束首次给出了认证字典的一种新的分类方法;第四,对OCSP协议进行了形式化分析,设计和实现了一种高效、可扩展的OCSP系统;第五,分析了WPKI工作环境对设计安全基础平台提出的特殊要求,结合无线移动设备的具体特点,基于可交换杂凑函数和动态Merkle杂凑树设计出了一种适用于WPKI环境的高效证书状态查询机制;第六,对一类公平交换协议进行了深入的研究,从设计公平交换协议的密码基础结构出发,提出了一种新型的基于RSA密码体制的高效CEMBS;在此工作的基础上,设计了一种基于RSA密码体制的最优化公平交换协议。

In summary, the dissertation makes a profound study of traditional festivals with a new angle, visual field of philosophy and aesthetics, and mainly completes some work as follows: have a deep study of traditional festivals'phenomenon, discover the connotation of traditional festivals; explain the philosophical naissance of traditional festivals, analyze the dual-movement of time and its essential function to the logic process of traditional festivals'naissance; unfold the ontological foundation of traditional festivals, search out headstream of festival feeling which is rhythmized existence and experience of actual life, discuss the mode, character and significance of festival feeling; narrate the changes of traditional festivals in the process of modernization, explore the possible way of traditional festivals'transformation in modern society.

总之,本文从哲学美学这一崭新的视角对中国传统节日进行了深入的理论研究,主要完成了以下几个方面的工作:对传统节日进行了深入的现象描述,挖掘出了传统节日的文化内涵;阐释了传统节日的哲学发生,分析了时间的双重运动对于节日的逻辑生成的本质作用;发掘出了传统节日的存在论根基,寻找到了节日感的源头——节律化存在和实际生活经验,论述了节日感的表现形式、特质及其对于人生的重要意义;阐析了传统节日在现代化进程中发生的变化,探讨了传统节日在现代转型的过程中可能有的出路。

第5/100页 首页 < 1 2 3 4 5 6 7 8 9 ... > 尾页
推荐网络例句

With Death guitarist Schuldiner adopting vocal duties, the band made a major impact on the scene.

随着死亡的吉他手Schuldiner接受主唱的职务,乐队在现实中树立了重要的影响。

But he could still end up breakfasting on Swiss-government issue muesli because all six are accused of nicking around 45 million pounds they should have paid to FIFA.

不过他最后仍有可能沦为瑞士政府&议事餐桌&上的一道早餐,因为这所有六个人都被指控把本应支付给国际足联的大约4500万英镑骗了个精光。

Closes the eye, the deep breathing, all no longer are the dreams as if......

关闭眼睛,深呼吸,一切不再是梦想,犹如。。。。。。