data key 中文意思是什麼

data key 解釋
數據鍵
  • data : n 1 資料,材料〈此詞系 datum 的復數。但 datum 罕用,一般即以 data 作為集合詞,在口語中往往用單數...
  • key : n 1 鑰匙。2 要害,關口,要沖。3 關鍵,線索,秘訣;解法。4 (外國書的)直譯本,圖例,題解,圖解,...
  1. The thesis has summarized the development of the oblique - pull bridge, its construction technology and the importance of bridge construction control, then has introduced project general situation, and has narrated detailed regulation, organization construction, the major work and difficult part of this bridge construction control. the following is the key part of this thesis, firstly, it has introduced the experiment work of early stage, structural calculation and its theoretical result : the absolute altitude of each operating mode, the absolute altitude of building mould in each section and the absolute altitude after pouring concrete ; then, it has discussed the method and content of the line shape control of the main beam, actual absolute altitude of building mould is put forward, and it has described the method of structural stress monitoring, how to arrange measure point and collect data, and how to analyze data. it has also narrated the method of rope force detection and structural temperature inspection

    本論文在總結了斜拉橋的發展及其施工工藝,並指出了橋梁施工控制的重要性之後,簡要的介紹了工程概況,敘述了炳草崗金沙江大橋監控細則、組織機構及監控的主要工作和難點部分;論文的核心部分,在介紹了炳草崗金沙江大橋施工控制與監測工作的前期實驗工作和施工各工況標高、各節段支模標高、澆注混凝土后的標高的結構計算和其理論計算結果之後,詳細論述了主梁的標高線形控制方法和內容,實際支模標高的提出,結構應力監控的方法、布點、測讀及其對測讀數據的合理分析方法,索力檢測和結構溫度監測的方法。
  2. All main technicals have been participated in the united design and technology transfer of mpc75 branchline aerobus and have a good command of key technologies on structural and system design of the airplane kinds like boeing and airbus as well as possess rich data of above planes

    主要技術人員均參加過mpc75支線客機的聯合設計與技術轉讓,掌握波音空中客車等機種的結構系統設計的技術關鍵,擁有大量上述飛機的有關資料。
  3. Introducing the theory and application of boundary element method on the sound radiation, giving the process of solving vibration noise radiation problem using boundary element analysis software ; presenting the coupling theory and the combination analysis of finite element method and boundary element method, and doing relevant analysis based on close drum shell ; programming the noise data simulation program using the numerical calculation software, simulating the acoustic and pressure data of a key point in the transient response acoustic field of the close drum shell, realizing the audibility of the noise, using the virtual reality tools to simulate the vibration noise of the drum shell ; combining the finite element method and boundary element method to analyze the vibration noise radiation of some gear box, and completing the whole simulation process of the vibration noise of the gear box

    綜合介紹了邊界元法在聲輻射問題上的理論及應用;並給出了運用邊界元法分析軟體求解振動聲輻射問題的過程。闡述了有限元法和邊界元法的耦合理論及組合分析方法,並以封閉鼓形薄殼為分析對象進行了相應的分析。利用數字計算軟體編制了噪聲數據模擬程序,並模擬了通過組合方法分析封閉鼓形薄殼瞬態響應聲場而獲得一關鍵點的聲壓數據,實現聲音的可聽化,隨后通過虛擬現實工具實現了該情形下橢球殼振動噪聲的虛擬模擬。
  4. In this thesis, it is indicated that the unified data model, knowledge representation and processing, and practicability and automaticity are three key points of any wi system

    本文指出數據模型、知識表示和處理、實用性和自動化處理能力是wi系統的關鍵問題。
  5. Special organization developed mechanism of jiangsu public security safety of network of information of key internet unit is checked greatly, check key internet information to serve an unit in all 2627, hidden danger of next safety of hairnet sth resembling a net rectify and reform advice note 104, still rent to mandatory lead plane and fictitious space safety administration has repair, outstanding to 4 problems internet data center is executed hang out one ' s shingle supervise and direct, the course is rectified and reform, delete bawdy pornography information in all 2570

    江蘇公安機關專門組織開展了重點網際網路單位信息網路安全大檢查,共檢查重點網際網路信息服務單位2627家,下發網路安全隱患整改通知書104份,還對託管主機和虛擬空間出租安全治理進行整治,對4家問題突出的網際網路數據中心實行掛牌督辦,經過整改,共刪除淫穢色情信息2570條。
  6. Class use a chaining mode called cipher block chaining, which requires a key and an initialization vector to perform cryptographic transformations on data

    類派生的類使用一種稱為密碼塊鏈接( cbc )的鏈接模式,該鏈接模式需要密鑰和初始化向量才能執行數據的加密轉換。
  7. The block cipher classes provided in the base class library use a chaining mode called cipher block chaining, which uses a key and an initialization vector to perform cryptographic transformations on data

    基類庫中提供的塊密碼類使用稱作密碼塊鏈( cbc )的鏈模式,它使用一個密鑰和一個初始化向量( iv )對數據執行加密轉換。
  8. Then this paper concerns about the network packet intercepting technology of linux os and gives a thoroughly overview of network hacking methods and some application protocol criterion, including http, ftp, telnet, nntp, pop3, smtp etc. then the system design scheme of the transparent proxy has been discussed, this system can be divided to 4 modules below : establishment of transparent charnel, implement of proxy service, gui configuration and management application, accessory filter functions ( such as url filter, command filter and logger etc ). we explain key techniques in all 4 main parts of this system, define the interfaces of each module, what is more the main data structures and software implements codes are all illustrated

    首先,論文陳述了防火墻的相關技術基礎,分析了透明代理作為一種先進易用的防火墻技術的原理,闡述了linux操作系統網路數據包攔截技術和http 、 ftp 、 telnet 、 nntp 、 pop3 、 smtp等應用層協議的協議規范和具體的工作流程。接著敘述了本透明代理服務器的系統總體設計方案,將系統分為以下幾個部分:透明通道建立、代理服務實現、 gui配置管理程序以及過濾功能(如url過濾、命令過濾和日誌審計等) 。論文然後分別介紹各個關鍵部分的具體實現要點,解釋了相互間的介面關系,列出了主要數據結構和實現流程。
  9. These appliances, available from companies such as decru, neoscale, and vormetric, implement very fast encryption - they typically claim to operate at or close to " wire speed. " they also usually include sophisticated key management facilities for controlling the creation and distribution of cipher keys, cycling of keys, and disposition of keys, besides handling general data encryption

    Decru 、 neoscale和vormetric等公司都能提供這些器件,它們實現了非常快的加密通常被聲稱速度達到或接近「線速」 。它們還常常包括高級的密鑰管理設施,除了用於處理一般的數據加密外,還可用於控制密鑰的創建和分發、密鑰的循環和密鑰的銷毀。
  10. You can choose different encipher algorithms according to requirement. aes is a symmetric block cipher that can process data blocks of 128 bits, using cipher keys with lengths of 128, 192and 256 bits. because the length of block and key has been expanded, security has been enhanced

    Aes ( advancedencryptionstandard )是fip ( federalinformationprocessingstandardspublication )在2001年6月發布的草案,它是分組加密演算法,消息分組為128bit ,有三種密鑰長度128bit 、 192bit 、 256bit ,由於分組長度和密鑰長度加長使得安全性大大的提高,它有望成為21世紀的加密標準。
  11. When we designed the system, we considered some key factors such as the system must deal with and store a great deal video and audio data, the capability of the hard disk in the server and client, hi the part of video compression, we choose the currently mpeg - 4 video constringent card to complete the collecting and compression of the video and audio signals

    在論文研究與實用系統設計中,充分關注到大量視音頻數據的處理、存儲以及服務器和遠程客戶端的硬盤容量等關鍵因素,視音頻壓縮採用了最新的mpeg - 4視音頻壓縮卡進行視音頻信息的採集和壓縮。
  12. Sequentially, the author discussed the technologies of medical image 3d visualization according to the clinical applications. with the development of computer, 3d visualization and computer graphics, the 3d visualization of medical images has progressed from fourier transform and convolve inverse projection to mpr ( multi - planar reformation, mpr ) and mtp ( maximum intensity projection, mtp ), nowadays, the real 3d reconstruction method, surface and volume rendering has risen. the image registering, image segmentation, pixel data set construction and 3d special interpolation are the key technologies in medical images 3d reconstruction

    隨著計算機技術、三維可視化理論和計算機圖形學的發展,醫學圖像的三維可視化技術也從傅立葉變換、卷積反投影等基本圖像處理演算法,發展到真正的三維重建演算法:面繪制和體繪制;醫學圖像的三維可視化技術的應用也從三維醫學成像發展到虛擬內窺鏡,以及今天的虛擬可視化人體研究;而圖像的配準、圖像分割、體數據集的構建、三維空間插值則是醫學圖像三維可視化實現過程中的關鍵技術環節。
  13. The key performance parameters are gotten through treating and analyzing the data getting from the cryopump cool - down test

    通過對低溫泵降溫過程中相關數據的處理與分析,獲取了低溫泵的各項關鍵性能參數。
  14. Objects that represent the data key value of each row in a

    控制項中的每一行的數據鍵值。
  15. Gets the data key value of the current record in a

    控制項中的當前記錄的數據鍵值。
  16. Gets the data key value of the selected row in a

    控制項中選中行的數據鍵值。
  17. Dialog figure 5, you can specify the data key field set it to

    對話框的第一個頁面上(圖5 ) ,您可以指定數據關鍵欄位(設置為
  18. It includes sorting algorithms, developed by the author, for use with random alphanumerical and numerical data key fields

    它包括了排序演算法,由作者開發的,可用於隨機的文字數字和數字數據關鍵字。
  19. Object that contains the data key value for the selected row in a

    控制項中選中行的數據鍵值。
  20. Gets or sets the value of the data key field of the associated control

    獲取或設置關聯控制項的數據鍵欄位的值。從
分享友人