module key 中文意思是什麼

module key 解釋
模塊關鍵字
  • module : n. 1. 測量流水等的單位〈1秒100升〉。2. 【建築】圓柱下部半徑度。3. 【物理學】模,系數,模數,模量。4. 【無線電】微型組件;組件;模塊。5. (太空船上各個獨立的)艙。
  • key : n 1 鑰匙。2 要害,關口,要沖。3 關鍵,線索,秘訣;解法。4 (外國書的)直譯本,圖例,題解,圖解,...
  1. Then this paper concerns about the network packet intercepting technology of linux os and gives a thoroughly overview of network hacking methods and some application protocol criterion, including http, ftp, telnet, nntp, pop3, smtp etc. then the system design scheme of the transparent proxy has been discussed, this system can be divided to 4 modules below : establishment of transparent charnel, implement of proxy service, gui configuration and management application, accessory filter functions ( such as url filter, command filter and logger etc ). we explain key techniques in all 4 main parts of this system, define the interfaces of each module, what is more the main data structures and software implements codes are all illustrated

    首先,論文陳述了防火墻的相關技術基礎,分析了透明代理作為一種先進易用的防火墻技術的原理,闡述了linux操作系統網路數據包攔截技術和http 、 ftp 、 telnet 、 nntp 、 pop3 、 smtp等應用層協議的協議規范和具體的工作流程。接著敘述了本透明代理服務器的系統總體設計方案,將系統分為以下幾個部分:透明通道建立、代理服務實現、 gui配置管理程序以及過濾功能(如url過濾、命令過濾和日誌審計等) 。論文然後分別介紹各個關鍵部分的具體實現要點,解釋了相互間的介面關系,列出了主要數據結構和實現流程。
  2. At last this module is synthesized using 6s06dpdm technology library. 3, the algorithm used in key module to the performance of data security is thoroughly analyzed. considering both performance of enciphering and degree of complexity of realization, steam cipher algorithm is used

    3 、對數據通信安全性起決定作用的加密模塊所採用的加密演算法進行了深入的分析,綜合加密性能和實現的復雜度的考慮,採用了流密碼的加密演算法。
  3. The paper presents a distribution analysis software platform which is developed combining computer graphical theory and oop ( object - oriented programming ). the platform includes three modules, the graphics module, the database module and the computation module. the graphical module can draw the key diagram of power system ; the database module can save, browse and edit the data of power systems ; the computation module can compute the power flow

    本文運用面向對象的程序設計方法結合計算機圖形學的知識,開發了一套可視化配電網分析軟體平臺,它包括用於繪制電力系統結線圖的圖形模塊、用於保存、瀏覽、修改電網數據信息的數據庫模塊和進行配電網潮流計算的計算模塊。
  4. The key techniques focusing on the implementation of mib managent module are presented in detail

    接著對代理實現中的關鍵技術: mib管理模塊的實現進行了重點的闡述。
  5. The integrated combat is one kind of new operational form in my armed force modern warfare, is increases of the battle efficiency and key of realizes the information. the integrated network is the safeguard which the integrated combat implements, it is one system network which is composed by the many local area network, each local area network separately is responsible for the duty of the corresponding module the combat safe guards, like artillery module, armored module, anti - aircraft module and so on

    一體化聯合作戰是我軍現代戰爭的一種新的作戰形式,是提高戰鬥力,實現信息化的關鍵,確切地說一體化聯合作戰就是信息化戰爭的聯合作戰;是將兩個或兩個以上軍種的作戰力量綜合為一體,在聯合作戰指揮機構的統一指揮控制下,使用一體化c4kisr系統(含信息化武器裝備)所實施的戰役以上規模的整體作戰。
  6. This paper has launched exhaustive analysis and study to every module of pll and its key part ( vco ) is also improved. the history of phase - locked technology and the actuality of research on it are introduced. and then beginning with the fundamental principles of a phase - locked system, we build the mathematical model based on the architecture of the traditional analog pll, and afterwards investigate some of its characters such as tracking, acquisition, noising, and stability

    本文在對鎖相技術的發展歷史和研究現狀調查研究的基礎上,從鎖相系統的工作原理入手,分析了鎖相環的數學模型,並以此為出發點對其跟蹤性能、捕獲性能、穩定性及噪聲性能等性能進行了較為深入的研究,對環路的各項參數指標進行了詳細的推導,得出了鎖相環數理分析的普遍結論。
  7. Based on the study on e - commerce system for specialized marls, focusing on the architecture and key techniques for e - commerce system, and the practice of ehingsun. com, an e - commerce website developed for specialized marts, a scheme and development method of an e - commerce system proved to be sound and workable for specialized marts is introduced by this article, presented for discussion together with the blue sprint, faci 1 ity fixing, network structure, module description and build - up tactic of above - mentioned system

    本文以「專業市場電子商務系統研究」的實際課題為背景,研究了電子商務系統的體系結構和關鍵技術,並以專業市場為應用服務對象,結合作者參與開發的海印電子商務網站,論述了專業市場電子商務系統的設計方案、設備選型、網路架構、模塊描述及構建策略。在項目的實踐過程中,論文所提出的方案及開發方法取得了較好的效果。
  8. B - 3 spline and reversed b - 3 spline is adopted to construct the outer figure of fashion parts. the key points are also defined to support the rigging of fashion parts. the two main modules - style input module and the intelligent rigging module are also described in details

    採用三次b樣條曲線和反算三次b樣條曲線來構造款式部件的外輪廓;定義部件關鍵點支持部件的拼接;對構成智能款式設計的兩大模塊?款式輸入模塊和智能拼接模塊,給出了設計要求和實現效果。
  9. This paper is at introduction foundation of cryptography, analyzes x. 509 certificate, has explained the principle of pki and function of each part, and combines the author ' s project development, explains the running environment and systematic characteristic of jy _ ca, it is to divide jy _ ca into ca initial module, certificate requisition module, certificate signature module, certificate revocation module, certificate inquiry module, privat key recovery module and management module. the realization of each module has been explained briefly at the same time

    本文在介紹密碼學知識的基礎上,剖析了x . 509證書的證書結構,詳盡闡述了pki的原理和各個組成部分的功能,並結合作者的項目開發,對jyca的運行環境和系統特點作了整體說明,把jyca劃分為ca初始化模塊、證書申請模塊、證書簽發模塊、證書吊銷模塊、證書查詢模塊、密鑰恢復模塊及管理模塊,同時對各個模塊的實現要點作了扼要說明。
  10. 4. the report for key module and function

    4 、需要重點關注、測試的模塊以及函數的報告。
  11. Double and quad key module design allows horizontal or vertical placement and easy movement anywhere on the keyboard

    基本選配為112鍵之可程式化鍵盤或另選136鍵qwerty可程式化鍵盤
  12. 2, as the key module to the performance of whole system, anti - collision algorithm was compared and analyzed

    2 、對系統中影響系統性能的關鍵部分:防沖突模塊的演算法進行了比較和分析。
  13. The key module in the model mentioned above is student model, which is basis for other modules to well work

    本文所提出的教學系統模型,以學生模型模塊最為重要,它是其它模塊正常運行的基礎。
  14. The software includes the program of communication with a stand - alone module, of the identification code returned from a stand - alone module, of opening / closing door, of display, of identification the key number, of reading / writing device by i2c bus. the main function of fingerprint menjin system used for the safe is to open door by fingerprint

    軟體主要由與指紋識別模塊的通訊程序模塊、指紋識別模塊返回代碼識別程序模塊、開門模塊程序模塊、關門程序模塊、顯示程序模塊、鍵盤鍵號識別程序模塊、按i ~ 2c總線協議對時鐘晶元和串列e ~ 2prom的讀/寫程序模塊等模塊組成。
  15. Sometimes the huge relevant information in those databases should be managed unitedly, so, it is getting more and more critical to develop applications for building systems that combine relevant data from database sources and present them in a form which is comprehensible for users beginning with the basic theory of module and distributed multidatabase, this paper discusses the technologies about the ejb, corba component used in the oracle8i / 9i database, the schema integration and query decomposition, schema integration and query decomposition are key segment of this thesis

    某些情況下,這些數據庫中的相關信息需要統一的進行管理,這就迫切需要開發出相應的應用系統來集成多數據庫中的相關數據並使用戶能夠充分的理解。本文首先從組件和分散式多數據庫的基本原理出發,詳細討論了模式集成和查詢分解技術與ejb 、 corba等組件技術在oracle8i 9i數據庫中的應用。數據模式集成和查詢分解是本文探討的重點,也是分散式多數據庫的核心內容。
  16. The photography picture sets in the image memory module preserves does not need extra preserved installment ; with the av line and the television connection, presses " puts the picture " the key, may examine the date, the time and photograph picture material

    拍攝的照片在內置的圖象存儲模塊中保存無需額外的保存裝置用av線與電視機連接,按動「放像」鍵,可查看日期時間及拍照的圖像資料。
  17. After that, based on the datum of the dsp and the correlative chips, the paper designed the key circuit in the data processor module. the design of the interface modules of the control system is the following work. they were the interfaces connecting controller with digital, analog network, and the monitor computer respectively

    接下來,設計了系統的整體結構;研究分析了嵌入式控制系統在進行數據處理時所採用的器件以及dsp和相關的晶元資料之後,確定使用tms320vc5402作為系統的數據處理器,設計了數據處理模塊的部分關鍵電路和dsp的16位並口自舉加載方式。
  18. Lastly, this paper give a realization of distributed multipoint multimedia conferences using this encryption scheme. this system include : local key management module key server module encrypt / decrypt module winsocket module and other module, this system solve the problem of security communication in distributed multipoint multimedia conferences system effectively

    混合加密系統主要包括以下模塊:本地密鑰管理模塊、密鑰服務器模塊、加密和認證模塊、網路socket模塊、其它輔助模塊等。本系統有效解決了基於voip技術的分散式網路多媒體會議系統中信息安全傳輸的問題。
  19. The designing thought and the adopted technology of this system from aspects of system development environment, function module, key technologies and design of database are indicated

    系統由設備采購管理、設備跟蹤管理和數據管理組成,實現了從設備采購開始到設備報廢整個生命周期的管理,滿足了高校教學設備儀器管理的大部分需求。
  20. The whole system is divided into access and control of outlook express module, user interface module, security service embedding module, key and trust management module, provision of security service module and configuration module in this dissertation

    將整個安全電子郵件客戶端系統劃分為outlookexpress訪問控制模塊、用戶介面模塊、安全服務嵌入模塊、密鑰和信任管理模塊、以及安全服務提供模塊和系統配置模塊。
分享友人