深層加密 的英文怎麼說

中文拼音 [shēncéngjiā]
深層加密 英文
deedensification
  • : Ⅰ形容詞1 (從上到下或從外到里的距離大) deep 2 (深奧) difficult; profound 3 (深刻; 深入) thor...
  • : i 量詞1 (用於重疊、積累的東西 如樓層、階層、地層) storey; tier; stratum 2 (用於可以分項分步的...
  • : Ⅰ名詞1 (秘密) secret 2 [紡織] (密度) density 3 (姓氏) a surname Ⅱ形容詞1 (距離近; 空隙小)...
  • 深層 : deep (layer); deep (stratum)深層采水 [海洋學] deep-casting; 深層語法 deep grammar
  1. This study is a post - cruise study of this leg, calcareous nannofossil samples from sites 1146, 1147 and 1148 of leg 184 were analyzed to provide a high - resolution biostratigraphy for this leg and to investigate morphological variation of coccolith genus gephyrocapsa. the main results of this study are : 1. 12 late pliocene to pleistocene bio - events were recognized and 6 zones of martini ( 1971 ) were determined for the upper sediment sequences of sites 1146 and 1148

    本文作為大洋鉆探項目船下后續研究的一部分,對184航次中的1146站位和1147 、 1148站位的樣品進行了分析和研究,在船上科學家已經建立起的地框架的基礎上進一步采樣,對生物事件標志化石類別進行數量統計,進一步確定了12個生物事件在鉆孔中的度,建立起了兩個站位的高解析度的鈣質超微化石生物地框架。
  2. Outwardly, his practice grants us an abundance of necessities, good health, helpful friends, good family and good living conditions ; inwardly, we attain a greater understanding of dharma, by practicing morality within the three scopes ; and secretly, we reduce the habituations of a self cherishing, grasping mind

    涵義而言我們能在持戒上得到持于佛法有更的體悟。然而就最究竟的意而言修行此法門能幫助我們去除無明之根也就是我們強烈的我執。
  3. After the briefly present the origin and features of internet protocol version 6 ( ipv6 ), the paper detailedly introduced the conception, characters, security technologies of vpn, and main tunnel protocols used to implement and deploy vpns. after analyzing and comparing these technologies of realizing vpns, we choosed ipsec. then, the paper analyzed in the ipsec structure, function, work mode, and its components such as authentication header ( ah ), encapsulating security payload ( esp ), internet key exchange ( ike ), encryption and authentication algorithms, security association, security policy, and how they cooperate with each other in order to secure ip packages

    在簡要介紹ipv6協議的由來和優點之後,詳細闡述了虛擬專用網的概念、特點、安全技術及實現的關鍵隧道協議,通過對實現技術的分析比較,選用了安全性強大的ipsec隧道技術,接著入研究了ipv6安全協議ipsec的體系結構、操作模式,詳細論述了ipsec協議簇的各個組成部分,如認證報頭ah協議、封裝安全載荷esp協議、鑰管理ike協議、認證演算法、安全聯盟和安全策略等,以及這些組件之間如何協作,來共同實現對網路ip數據包的安全保護。
  4. The forecast method of formation compression the principle of forecast method is based on increasing of formation compression along with burial depth. the used parameters include velocity, density, porosity, and fluid content etc. in fact, the factor influence formation compression is very complex

    4地壓力預測方法地壓力預測方法的基本原理建立在地壓力隨埋而增的基礎上,所用的參數主要有巖速度、度、孔隙度、流體含量或與之有關的參數等。
  5. This paper discusses some important technologies closed to dtv receiving system deeply, base on scn and cctv. it includes mpeg - 2 system level, dvb service information, conditional acceptance. it also describes how to realize epg, ca, upgrade on line etc based on the dtv service information technology at lengtho now, the production of this design is applied to the digital tv products of cctv and sichuan tv net

    本論文結合數字電視在四川廣電網和cctv的具體應用情況,入研究探討了與數字電視接收系統緊相關的部分關鍵技術,包括mpeg - 2系統結構分析、 mpeg - 2和dvb業務信息分析、數字電視條件接收基本原理和解擾及技術,並詳細敘述了如何運用數字電視業務信息技術實現了電子節目指南、條件接收、在線升級等基本業務。
  6. There are many methods of foundation consolidation for civil engineering, such as soil exchange method, prepress method, dynamic consolidation method, vibrancy rushing method, soil and podsol dense pile method, sand pile, cement - coal - powder and gravel pile method, deep mixing method, high - pressure eject masonry, etc. the dynamic consolidation and deep mixing method ( dmm ) are very common in project construction

    目前國內外地基處理的方法很多,主要的地基處理方法包括:換填法、預壓法、強夯法、振沖法、土和灰土擠樁法、砂樁法、水泥粉煤灰碎石樁法、攪拌法以及高壓噴射注漿法等。其中強夯法和攪拌法是工程建設中較常用的固方法。
  7. With the ground of information encryption technology, this paper analyzes network security architecture and makes deep research on user authentication on network application layer, especially on otp ( one - time password )

    本論文從網路安全體系結構分析入手,以信息技術為基礎,對網路應用的身份認證技術,特別是一次性口令認證( otp )技術進行了入研究。
  8. Firstly, gravel piles in soil were laid for compacting and consolidating soil, then gravel composite foundation was treated with dynamic compaction in order to form three - level soil that is gravel composite soil and high replacement ratio composite foundation and dense composite foundation

    該法先在填土中設置好碎石樁體,利用擠和排水固結的作用使其得到初步固,然後對荷載影響度范圍內的復合土體進行低能強夯處理,迫使樁體碎石沿徑向擴散,形成上部為實的碎石二合土、中部為擴徑后高置換率復合地基、下部為整體夯復合地基的三結構。
  9. Moreover, a method for iterating thermal and magnetic analysis is put forward. in chapter 5, the distributed characteristics of eddy and temperature fields in induction heating process are simulation by fem respectively, including the distributions of eddy and temperature fields during the whole induction heating process, the influence of frequency and magnetic disperse, and the prediction of hardened depth

    第五章:用ansys軟體對感應熱過程中工件內渦流場、溫度場的一些基本問題進行模擬及分析,主要包括:熱過程中工件渦流功率度及溫度分佈規律;頻率與磁力線逸散對熱效果的影響;同時對感應淬火淬硬度進行了模擬預測。
  10. In the paper, other research results are summarized, and a big test model indoor of row pile retaining and protecting deep foundation pit is designed. for homogeneous soil or samdwich soil structure three different retaining and protecting kinds : dense pile, thin pile and without pile are designed, using excavation simulation and loading on the top of slope, the model test is divided into two stages : foundation pit excavation simulation stage and destroy test stage. in this paper, for three different retaining and protecting kinds, the relation between soil pressure and displacement of piles, the relation between soil stress and strain, interaction of pile and soil and retaining and protecting loss - stability destroy are systemic studied

    本文總結了前人研究成果,構築大型室內基坑排樁支護試驗模型,在均質及狀土結構地基上,設計了排樁、疏排樁及無支護三種不同支護型式,採用模擬開挖與坡頂均布荷方式,進行了模擬基坑開挖和破壞性的兩個階段試驗,對三種不同支護型式的土壓力與樁位移、土體應力與變形、樁土共同作用及支護結構失穩破壞進行系統研究。
  11. This paper utilizes decision theory, cybernetics and system according to function and the characteristic of the state - owned group financial accountant of holding company to discuss and worth related theories such as theory, is close to combine the reality of the state - owned group financial management and accounting information system of holding company, adopts to determine the nature, is with ration, sum up the method of deducing, enumerate case layer upon layer further, record system and processing for the state - owned systematic essential factor, system hierarchy of control and classfication in the group accounting information system of holding company to handle system, combined accounting form and accounting accounting center, information transmit the related problems such as system have carried out the thorough research of overall system, inference makes the modern systematic structural frame of the state - owned group accounting information of holding company that perfected scientifically, and reach following conclusion : first, accounting information is that the key, accounting information system of the information of business management is the strong support system of enterprise decision

    外部競爭和內在要求的雙重壓力都表明企業集團構建科學完善的會計信息系統十分必要和迫切。本文根據國有控股企業集團財務會計的特點與職能,運用決策論、控制論、系統論和價值論等相關理論,緊結合國有控股企業集團財務管理和會計信息系統的實際,採用定性與定量相結合、歸納推斷的方法,入,列舉案例,對國有控股企業集團會計信息系統中的系統要素、制度控制體系、分類記載體系、工處理體系、合併會計報表、會計核算中心、信息傳遞體系等相關問題進行了全面系統入的研究,推論出科學完善的現代國有控股企業集團會計信息系統的構架,並得出如下結論:第一,會計信息是企業管理信息的核心,會計信息系統是企業決策的強有力的支持系統。
  12. Bin stack technology, effectively integrating acquisition and processing technology, is the continuity of high precision 3d acquisition, aiming at increasing reflecting energy, resolution and s / n ration through small bin size acquisition, enlarged bin size processing and increasing cmp fold times. besides 3d acquisition, bin stack can also be used in 2d acquisition

    面元疊技術,是高精度三維地震的延續,它有效地把採集技術和處理技術緊結合為一體,通過小面元採集、擴大面元處理,提高cmp面元的疊次數,以達到提反射能量、提高解析度、信噪比的目的。
  13. According to some kinds of existed attacking methods that are aimed at the web system, the article discusses the feasibility to implement secure transmission tunnel on every layer in tcp / ip protocol, and the related secure protocol standard. and focusing on cryptography, the paper lucubrates the technology of secure transmission of information such as data encryption, digital signature, identity authentication and data integrality technology

    本文針對web系統中信息傳輸所面臨的安全威脅,從保障網路信息安全傳輸的角度,系統研究了tcp ip各個次上實現安全通道的可行性及相關的安全協議標準,圍繞碼體制,對數據、數字簽名、身份認證、數據完整性控制等信息安全傳輸技術進行了入的探討。
分享友人