驗證技術 的英文怎麼說

中文拼音 [yànzhèngshù]
驗證技術 英文
proof technique
  • : 動詞1. (察看; 查考) examine; check; test 2. (產生預期的效果) prove effective; produce the expected result
  • : Ⅰ動詞(證明) prove; verify; demonstrate Ⅱ名詞1 (證據) evidence; proof; testimony; witness 2 (...
  • : 名詞(技能; 本領) skill; ability; trick; technique
  • : 術名詞1. (技藝; 技術; 學術) art; skill; technique 2. (方法; 策略) method; tactics 3. (姓氏) a surname
  • 驗證 : test and verify; checking; proving; testing; confirmation; [數學] corroboration; inspection; veri...
  1. Dynamic verification, stand stone of verification, will continue acting as an important role during the verification flow in the future

    動態驗證技術的基礎,在今後的流程中也將繼續扮演重要的角色。
  2. In this article, we perform a tri - layer security mechanism ; we improve the form authentication of asp. net in two places ; we also perform a new dynamic authentication based on two factor ; then we perform a new way to send the credential through the soap header ; we solve the problem about the key creation and the key storage and the transmission of the encrypted message ; after analyzing and discussing the soap protocol, we put forward a safely custom authentication through combining the digest authentication and soap protocol and credential

    在web服務安全方面提出了一些新看法,解決了一些新問題: 1 )提出了基於角色的三層安全機制; 2 )對asp , net的表單驗證技術提出了兩處新的改進: 3 )提出一種動態的雙因素口令認方法,即在單因素(固定口令)認基礎上結合第二個物理認因素,以使認的確定性按指數遞增。在此,本文提出了第二種認因素?信任憑
  3. Furthermore, three expanded gny logic rules are given during above analysis based on gny, and at the end of this paper, security protocol formal verification based on attack logics is discussed and presented, a development framework of integrating such verification model into automated analysis tools such as spearii is shown finally

    另外,本文在使用gny邏輯的分析過程中,提出三條實用的gny擴展規則,而在文章最後,對基於攻擊邏輯的安全協議方法作了初步研究,提出了將該協議攻擊驗證技術融入協議自動分析工具的設計框架。
  4. With the supports of lunar exploration pre - research program “ lunar soft landing integrative simulation and validation technique ”, this dissertation performed deep and systemic study on lunar explorer autonomous navigation and control issues. the main contents of this dissertation are as follows

    本文結合月球探測工程二三期預研項目「月球軟著陸綜合模擬演示驗證技術」 ,對月球探測器的自主導航與控制方法進行了較深入的研究。
  5. With turning the scale of asic ( appl ication specified integrated circuits ) to s0c ( system on chip ), which conunon1y is composed of mcu, specified function ip cores, memory, periphery interface etc, the ip reuse techno1ogy is very important in s0c design flow, which can realize the constructions of different levels components. the approach of configurable system, method and design f1ow for udsm ( u1tra deep sub micron ) asic, logic system design using hdl 1anguage, coding style, static and dynamic verification strategy are a1so presented in chapter 2. in chapter 3 we study the vlsi - - dsp architecture design, dense computation and high speed high performance digital signal processing unit structure, which includes high speed mac components and distributed arithmetic unit

    在工程設計方法及結構化設計和高層次綜合的研究中,介紹了在深亞微米工藝條件使用的方法和asic設計流程,討論了高層次綜合的核心如何從描述推出電路構成的設計思路,針對不同目標的設計巧討論了採用hdl語言進行邏輯系統設計的方法,給出了用vhdl語言進行代碼設計時的規范和風格,在面向soc的策略討論了動態和靜態的驗證技術,提出了進行單獨模塊、晶元的全功能和系統軟硬體協同的整體策略。
  6. By building an physical module of duv to turn the sequential execution of software simulation into consequential execution of hardware emulation, emulation technology can ran on 100 to 1000 times speed than simulation technology does, which erase the bottleneck of simulation technology

    本文還結合fpga的應用深入研究了驗證技術的另一發展方向? ?硬體模擬。通過物理模型將軟體模擬的順序執行變為硬體的并行執行,模擬可以將動態的速度提高2到3個數量級,消除速度瓶頸。
  7. This dissertation integrates theory analysis with experiment research and makes further research on nc geometric simulation. the establish of the cutting forces model, cutter wear model, machining error predition and compensation, machining parameter optimization in the physical simulation fields are made more research on the basis of the above research contents. the main achievements are as follows : 1

    本文採用理論分析與實研究相結合的思路,進一步研究了幾何模擬與精度驗證技術,研究了銑削力模型的建立、刀具磨損模型的建立、加工誤差模型與誤差補償、基於加工模擬的加工參數優化等物理模擬關鍵,主要研究內容和成果如下: 1 .設計了集幾何模擬和物理模擬為一體的數控加工模擬系統的體系結構。
  8. The growing concerns about identity theft may give a boost to fingerprint - verification technology

    身份竊取的問題越來越受到重視,可能會大幅推動指紋驗證技術
  9. With the rapid development recent years the static verification can offer relative faster speed and shorter time than dynamic one can do in the growing field of large scale chip

    靜態驗證技術在近幾年內有著飛速的發展。靜態驗證技術可以克服晶元規模增大時動態時間耗費巨大的缺點。
  10. Verification technologies are cataloged into dynamic verification technology, which must run duv, and static verification technology, which need n ' t run duv

    本文考察了動態驗證技術和靜態驗證技術的最新發展,並積累了實踐應用經
  11. Under the support of jiangsu province key scientific and technological project, this dissertation does research on nc code preprocess and solid - based verification simulation in noncircular surface nc grinding

    本文以江蘇省科攻關項目為依託,著重對非圓曲面數控磨削加工模擬中的數控代碼預處理和基於實體的模擬驗證技術開展了研究。
  12. The security you get for free when you don t release your source code is commonly known as " security by obscurity. " it is a bad idea to rely on this kind of security, however, because skilled attackers are still going to be able to break your code if it wasn t designed properly in the first place

    雖然身份是計算機安全性中最簡單的一個概念,但它也是最難做到的一個。今天,我們只觸及表面。在今後的部分中,我們將討論您可以在軟體中使用的其它身份驗證技術,例如公鑰身份和生物統計身份
  13. This protocol is implemented based on lsb watermark technology. its highlight points are : the verification and authentication data are embedded into the images " data, any changes of pixel values and changes in image size due to scaling or cropping as well as block swapping in images or corresponding block swapping between images can be detected and located, logo image is unnecessary

    本文提出的基於數字水印的數字圖像完整性與身份驗證技術綜合了信息安全中有關消息完整性與身份的方法與數字水印,並充分考慮到了數字圖像的特殊性,提出了兩種協議模型:無仲裁協議模型與有仲裁協議模型。
  14. With the typical circuit fault model and conventional bit testing method, this paper researches into the validation technique of bit and smart fault detection which enhance the test effect of bit

    本文結合數控系統典型電路故障模式和常規bit檢測方法,研究bit的驗證技術,並開展智能故障檢測方法的研究,以提高bit的檢測水平。
  15. The book demonstrates how linearization may be used to give a diverse check on the correctness of the as - programmed model and explains how formal techniques of model validation may be used to produce a quantitative check on the simulation model ' s overall validity

    本書論了如何應用線性化檢已編程模型的正確性,說明了如何應用常規模型驗證技術全面有效的檢模擬模型。
  16. The traditional idea of converting sounds into words is of very limited use in communications. the utterance - verification technology is helpful in addressing the above sounds

    而傳統的把語音轉換成文字的想法在通信中用處非常有限,發音驗證技術有助於處理上述聲音。
  17. We design and realize webservice in different languages different and dbms to communicate with each other in a standards - based way ; we also solve the incompatible problem between different dataset ; using the dom solves the problem of xml - inserting and xml - combination and xml - sorting ; the using of the validity control keeps the program more securely. iv. we perform some new ideas and then solve some new problem on security of webservice

    分析和實現了webservice在不同編程語言、不同數據庫下的數據交換和實現問題;解決了數據交換時不同數據集的不兼容問題,使web上各種數據源間的數據交換更為方便;採用了dom解決來自不同web服務的數據的插入、合併、分頁、排序問題;數據驗證技術的使用,提高了模塊的健壯性。
  18. Traditionally, pure xml validation techniques only extend to

    傳統上,純xml驗證技術只達到了對
  19. Review on the researching of nc graphic verification technology in the world

    數控銑削程序圖形驗證技術國內外研究現狀
  20. Model checking is an important technology of automatic verification

    模型檢( modelchecking )是一種重要的自動驗證技術
分享友人