key verify 中文意思是什麼

key verify 解釋
鍵式驗孔
  • key : n 1 鑰匙。2 要害,關口,要沖。3 關鍵,線索,秘訣;解法。4 (外國書的)直譯本,圖例,題解,圖解,...
  • verify : vt. (-fied)1. 證實;證明,核驗,核實,驗證;校準。2. 【法律】(用證據或宣誓)證實;在(訴狀或答辯書結尾)提供舉證說明。
  1. This paper deriving the theory work inflection point in the static stage characteristics curve of small measurement range linear dimension measurement. by the way of high pressure and back pressure pneumatic measure and designed the parameter of the mainly and measure spray head, which are the key component in the spray head - baffle pneumatic sensor. the different groups for the main - spray head and the measure spray head, will effect the dynamic and static stage characteristic parameter. the author have done contrast experiment and optimization design to test and verify the theory derivation whereby made the rang of show valve of pneumatic measure system measure range up to 40 u m, the sensitivity up to 100mv / u m, resolution up to 0. 05 p m, the uncertainly of measure is less than 0. o2 u m, satisfaction of requirement of groups the carboy hatch thickness size precise measure of soft shims

    對高壓背壓式氣動測量用於小量程線性尺寸測量的靜態特性曲線的理論工作拐點進行了推導,對氣動測量系統中的噴嘴-擋板型氣動傳感器中的關鍵部件? ?主噴嘴和測量噴嘴的參數進行了理論設計,對主噴嘴和測量噴嘴的不同組合,將影響測量系統靜、動態特性指標的噴嘴參數進行了對比實驗和優化設計,並通過實驗驗證了理論推導,從而使氣動測量系統量程的示值范圍達到40 m ,靈敏度達到100mv m ,解析度達到0 . 05 m ,測量不確定度小於0 . 2 m ,滿足了壓縮機缸蓋軟體墊片厚度尺寸精密測量分組的要求。
  2. For the delay - independent stability, necessary and sufficient algebraic criteria have been obtained in terms of characteristic functions. the key of the criteria is to verify that a polynomial has no nonzero real roots

    對時滯無關穩定性,以特徵函數為工具,獲得了充要代數準則,其核心是判定多項式方程無實根,這一問題由廣義sturm理論解決。
  3. The third party uses the message, the key signature and the known public key to verify the source as trusted

    第三方再根據該訊息、金鑰簽章與已知的公開金鑰,認證該訊息具有可信賴的來源。
  4. One of the key issues for marrakech is agreement on how nations will account for, report and verify their emissions of global warming pollution and the amounts that forests and land - use absorb

    馬拉喀什會議的其中一個主要議題,是商討各國如何計算匯報及核實溫室氣體排放量和森林及土地的廢氣吸收量,並就此達成共識。
  5. In the meanwhile, we build a complete simulation model of layered wireless self - organizing routing network and verify feasibility of network architecture and key technologies, including operating mode of wireless interface, addressing and routing in lwsrn we study the performance of wsrn in terms of routing overhead, packet delivery ratio, and the communication capability, and compare these result with that of ad hoc network

    同時,構造了完整的分層結構的無線自組織路由網路模擬模型。驗證了網路體系結構和關鍵技術的可行性,包括無線通道工作方式、網路編址技術、網路路由過程。並通過模擬分析了分層結構的無線自組織路由網路的路由負載、網路數據到達率和網路通信容量。
  6. The article takes a 600mw natural cycle drum boiler ( soot blow using steam ) as investigating object, establishes soot accumulation loss and soot blowing energy loss models for its water cooling wall, superheater, economizer and air preheater respectively, set up instructions for soot blower operating. simulating calculation results are compared with site data to verify usefulness of key models. the article introduced the operation optimizing design of soot blowers of yanzhou no2 power plant based on theoretical research

    本文以600mw汽包自然循環鍋爐(蒸汽吹灰)為具體分析對象,分別建立其水冷壁、過熱器、省煤器、空預器的積灰損失和各受熱面吹灰能量損失的模型,建立相應的吹灰器運行規則指導,對設計中的關鍵模型問題,通過模擬計算及與現場數據作比較的方法,驗證其可用程度。
  7. Does not give permission to sign or decrypt files using the private key, but it does allow a user to verify file signatures and to encrypt files

    並沒有提供使用私鑰對文件進行簽名或解密的權限,但它允許用戶驗證文件簽名並加密文件。
  8. With the characteristic function method, necessary and sufficient algebraic criteria have been developed for a class of three - delay linear difference systems. the key of the criteria is to verify that the value of a trigonometric polynomial is less than one

    藉助特徵函數法,獲得了一類三時滯線性差分系統的充要代數準則,其核心是判定某三角多項式的值小於1 ,這一問題由繪圖法解決。
  9. The key to prediction of casting shrinkage / porosity lies in ascertaining the critical value of temperature gradient and niyama criterion. the thesis put forward two methods to ascertain the value, one is which is positive - direction and the other is negative - direction. we verify the realistic arithmetic of temperature gradient method and niyama criterion method by experiment, and we can draw a conclusion that the arithmetic is correct and reasonable in most cases and choice of developing tool is sound

    臨界梯度值和新山判據臨界值的確定是實現縮孔縮松預測的關鍵,本文提出了確定臨界值的正向法和反向法,並以高鉻鑄鐵件縮孔縮松預測和鑄造工藝改進為研究對象,應用正向法,確定了溫度梯度法的臨界值為180 m 。
  10. However, when you update the server key file to use a new private key and certificate signed by some signer, you must ensure that the java clients can verify those certificates

    然而,當您更新服務器密鑰文件以使用新的私鑰和由簽署者簽署的證書時,您必須確保java客戶端能夠驗證這些證書。
  11. First, this paper introduces the notation, categories and properties of security protocols, and formal methods to verify security protocols and small system model. the emphasis is the research and analysis of the principle of the model checking method. we study the mechanism and syntax of symbolic model checking tool smv, model check the authentication version of needham - schroeder public key protocol and woo and lam ij symmetric key protocol

    文章主要介紹了安全協議的概念、分類和性質,安全協議的形式化驗證方法,以及小系統模型的原理;重點分析和研究了符號化模型檢驗工具smv的原理和語法及其對安全協議進行模型檢驗時的工作機理,而且使用smv對needham - schroeder公鑰協議和wooandlam對稱鑰協議進行了形式化建模與模型檢驗,發現了它們的安全漏洞。
  12. Can be used to verify that this block of data was really created by that private key

    才可用以核實這組數據確實由該私人密碼匙產生。
  13. As far as the system observation for accuracy evaluation of carrier rocket is concerned, there may exist different types of observed data and priors. heterogeneous information means that the different information describing the different characteristics of the same object. since all of the information is relevant to the same object, the fusion is possible. it is a key problem that how to fuse the heterogeneous information to obtain the better evaluation result. therefore, the different heterogeneous information and data is thoroughly studied, moreover, the mathematical description for information fusion of different parameter priors and data is constructed in this paper. based on their relationship between different parameters, indirect prior and observation data is transformed into prior in impact point observation space, which is fused with original prior by weight determined by maximum entropy rule to obtain the mixed posterior distribution. therefore, the test results can be given by combining posterior distribution and impact error observed data. then its application on evaluating guidance systematic error is elaborated as it applies trajectory tracking data, test value of coefficients of guidance instrumentation systematic error, impact point observation data and prior. especially, the advantage of this method lies in its application in case that guidance instrumentation systematic error may not be computed precisely. finally a detailed example on evaluation of carrier rocket is given to verify the theory

    為充分利用運載火箭觀測中的不同觀測空間和過程的信息來進行精度評估,針對該背景建立了異質先驗融合的數學描述.研究了飛行試驗中不同觀測空間和過程的異質先驗信息和數據,基於不同觀測過程的解析關系,將間接過程的先驗和觀測數據算出的后驗分佈轉換成落點觀測空間上的先驗,與原落點的先驗進行了最大熵加權融合,得到混合后驗分佈,從而結合落點觀測數據給出評定結果.在無法解算出精確的制導工具誤差系數的情況下,這種方法充分利用了彈道跟蹤數據、工具誤差系數的地面測試先驗值、落點先驗及落點數據,穩健性更好,準確性更高
  14. This system provides management and verify for ca ( certificate authority ), ra ( certificate registration authority ), kmc ( key managment center ) and other systems. contraposing the management of inside resources, roles and authorities that each system can supplie, jurisdiction - checking is handled by system background automatically

    本系統為證書權威( ca ) 、注冊管理系統( ra ) 、密鑰管理中心( kmc )以及其他系統提供訪問權限的管理和校驗,針對每個系統可以提供其內部資源、角色和授權的管理,訪問權限的校驗在系統后臺由系統自動處理。
  15. The thesis describes the conception of the object - oriented modeling and integrated simulaton enviroment, and discusses the below topics : ( 1 ) describe the reasonable structure of the modern fighter simulation system, and design the data transfer interface. ( 2 ) discuss the modeling method of the key subsystem of future fighter system especially the aerodynamics and the control system in detail. ( 3 ) construct the 3d model of the aircraft and scene, and verify the graphic simulation technique based on pc

    本文詳細討論了面向對象建模方法以及一體化模擬環境的基本概念框架及基本結構並在此基礎上提出了合理的現代戰斗機模擬系統結構,設計了模擬系統的數據傳遞介面;詳細討論了現代戰斗機模擬系統關鍵子系統? ?飛機本體、飛行控制系統建模方法;建立了用於研究的飛機以及視景的三維顯示平臺;並在此基礎上實現了實驗性的基於pc的現代戰斗機圖形模擬平臺,對模擬模型有效性確認和驗證工作做了初步的探討,研究比較了傳統飛行動力學和運動學方程和四元數法在飛行模擬中的效果。
  16. Machining deformation of aircraft monolithic component is simulated by finite element method ( fem ) and validated by experiment. the initial residual stress in pre - stretched plate is generated by simulating quenching and stretching processes. with a single tool - tooth milling process fem, the machining loads in monolithic component material removing is obtained. restart - calculation is put forward to complete the whole simulation of machining process. to verify the fem result, an experiment is carried out. the deformation distribution of the monolithic component resulting from fem shows a good agreement with the experiment result, which indicates that the key technologies presented in the paper are practicable and can be used to simulate the milling process of monolithic component to predict its deformation. lengthy and expensive trial and error experiment process can be avoided

    在模擬淬火、拉伸過程獲得含有初始殘余應力的預拉伸板材以及模擬單齒切削過程獲得切削載荷的基礎上,提出並採用接力演算法,對一航空整體結構件的材料銑削過程進行有限元模擬,同時進行了試驗研究.結果表明,有限元模擬的整體結構件的變形與試驗具有一致性,從而證明提出的整體結構件加工模擬關鍵技術的可行性,避免了為研究加工變形而進行的繁瑣的試錯法
  17. Table is the foreign key table, and verify that the

    表是否為「外鍵表」 ,並驗證兩個表是否都選定了
  18. The scc checks registry key values to verify proper incrementing for installation of sql server perfmon counters

    Scc檢查注冊表項的值以驗證sql server perfmon計數器安裝的增量是否正確。
  19. Because the original message might be quite long, and public key algorithms to generate and verify digital signatures are resource intensive, the sender normally calculates a short version of the original message called the " digest " and digitally signs only this version

    因為原始消息可能相當長,而且生成和驗證數字簽名的公鑰演算法是資源密集的,所以發送方通常計算稱為「摘要」的原始消息的短版本並且僅對該版本進行數字形式的簽署。
  20. Automobile impacting experiments are essential testing to verify safety of automobile, and dummies which are elementary tools of automobile impacting experiments play a key role in automobile safety business

    汽車碰撞試驗是檢驗汽車安全性能的重要測試手段,而假人作為汽車碰撞試驗的基礎工具,它對汽車安全事業的發展有著無法替代的作用。
分享友人