key address 中文意思是什麼

key address 解釋
鍵地址
  • key : n 1 鑰匙。2 要害,關口,要沖。3 關鍵,線索,秘訣;解法。4 (外國書的)直譯本,圖例,題解,圖解,...
  • address : n 1 (信上的)稱呼,姓名;地址。2 致辭;寒喧;演說;正式請願。3 談吐,風度。4 〈pl 〉 求愛,獻殷...
  1. We might remember, though, that abe lincoln was at a stylistic disadvantage when he wrote his gettysburg address. the poor guy didn ' t have a " help " key to push

    但是,我們不應該苛求一個在小木屋裡長大,徒步到那所只有一間屋子的學校上學,后來也沒有上成大學的人,他也不可能把話講得再好了。
  2. Security, too, is a key issue for switching the traditional private nforork to vpn. security of mpls wn architectur is analyzed thorouguy in this thesis, including septheion of address space and route, hiding of the mpls core smicture, resistance of attacks, impossibi1ity of 1abe1 spoofing

    安全性是虛擬專用網能否取代傳統專用網的關鍵,本文對mplsvpn體系結構的安全性進行了深入分析,包括地址空間和路由的隔離、隱藏mpls核心結構、抵抗攻擊、抵抗標記欺騙等,從而得出mplsvpn與atm framerelay具有相同安全級別的結論。
  3. The key to the fft algorithm is the design of butterfly computation and that of the address logic. the whole schema is designed in the top - down design flow and described in the vhsic hardware description language ( vhdl ), basing on these, we do our research on reconfigurable technology. the result indicates that the data processing ability of reconfigurable system improved greatly

    結果表明,可重構系統在數據處理能力方面比以往的系統有了很大的提高,本設計實現的fft重構處理器可工作於60mhz下,完成一個16點fft需要132個主時鐘周期,完成32點fft需要324個主時鐘周期,而且具有一定可重構性,可以方便地將其運算點數進行擴展,或將其他的圖像處理演算法在實時處理系統中實現。
  4. In this dissertation, the researches on the application of cdma in fiber - optic communication systems have been reviewed, and several key techniques in the application are proposed with theoretical analysis. in traditional researches and applications of the hfc cdma communication system, the gold sequence was used as the users " address code. in this paper, we analyze the characteristics of the m sequence in detail

    本文突破了以往在hfc系統中使用cdma擴頻技術通信時,通常都採用gold序列來作為地址碼的慣例,分析和提出了在hfc的特定環境中,使用同一m序列在某時刻具有的不同相移序列,來構成一個小區的地址編碼,能夠達到多用戶通信時比使用gold序列進行通信具有更好的相關特性。
  5. In an indirectly addressed file, a record whose key randomizes to the address of a home record

    在間接編址文件中,其關鍵字隨機化成起始記錄地址的一種記錄。
  6. In addition, we will proactively assist key sectors to leverage hong kong s strengths or address areas which need enhancement

    此外,我們會以積極進取的態度,協助重點行業充分利用香港的優勢,及處理其他有待改進的問題。
  7. Hitting f4 - key directly starts emulation, and stops when reaching the code window cursor. the break address is not memorized, ie. it is used only once

    通過f4鍵可以直接啟動調試器,並會在到達編碼窗口的游標處中斷運行,那個中斷地址不會被記錄下來。只能使用一次。
  8. Product characteristic : vmate entire, function table model keyboard ; peleco " d p " agreement, baud rate 4, 800, peleco " p " agreement, baud rate 2400rj - 45 connection ; the three dimensional rocking bar may carry in the accuracy control keyboard to quick ball each kind of speed the pressed key to be allowed to choose the camera the address ; transfer ball machine function menu ; processing pre - placed position ; opens and closes the small aperture ; focal variation and focusing lens ; the start stops automatic and the random scanning function

    三維搖桿可對快球的各種速度進行精確控制鍵盤上的按鍵可以選擇攝像機的地址碼調用球機功能菜單處理預置位打開及關小光圈變焦及聚焦鏡頭啟動停止自動及隨機掃描功能
  9. A method of transforming a search key into an address for the purpose of storing and retrieving items or data. the method is often designed to minimize the search time

    為存儲和檢索數據項或數據,把搜索關鍵字轉換為一個地址的一種方法。該方法常用於減少搜索時間。
  10. A key design consideration has been to address the needs of the visually impaired

    新鈔設計的其中一項主要考慮因素,是要照顧到視障人士的需要。
  11. Mrs yau said, " in our digital 21 strategy promulgated last may, we have adopted strengthening the hong kong community for digital exploitation as a key result area, and have set out policies and measures to achieve our goal. " us $ 280 million has so far been spent on various initiatives to address digital divide in four specific fronts, namely, education and training ; technology diffusion in the community ; knowledge and awareness ; and access to online services

    尤曾家麗說:我們于去年五月公布的數碼21資訊科技策略中,把加強香港社群掌握數碼科技的能力列為主要工作范疇之一,並已制訂各項政策和措施,以達到我們的目標。政府至今已動用2 . 8億美元推行在四方面,包括教育及培訓、社會上科技普及、知識和認知、以及網上服務的各項措施,以消除數碼隔膜。
  12. In this article, we introduce the mode of " gsr + l3 + ma " to construct broad - band ip man via ethernet technology. in order to achieve a manageable man, we analyzed and solved several key issue, such as routing layout ip address distributing customer accessing authentication and accounting vlan applying the robust network quality of service network security network administration, etc. i have participated in longyan man construction

    本文利用以太網技術,採用「線速路由器gsr +路由交換機l3 +多業務接入設備ma 」的組網模式,通過分析並解決了路由規劃、 ip地址分配、業務接入、認證與計費方式、 vlan運用、網路的魯棒性( robust ) 、服務質量( qos ) 、網路安全、網路管理等關鍵問題,建設可運營、可管理的寬帶ip城域網。
  13. This course introduces the mathematical modeling techniques needed to address key questions in modern biology

    本課程介紹近代生物學上需要提出重要問題的數學模型方法。
  14. Smpdca architecture has six outstanding excellences : complexity of the control logics of smpdca is lower than large scale superscalar ; supplying shortest inter - processor communication latency using the shared li data cache ; no cost to maintain cache coherence ; hit rate of data cache increase ; easy to reuse many softwares of symmetric multiprocessor ( smp ) ; exploit the parallelism of applications from many levels. this paper present the architecture model of smpdca, and illustrated its function units, and discussed its key techniques, and analyzed the address image policy of multi - ported cache

    Smpdca結構具有六個突出優勢:相對于大規模的超標量結構而言, smpdca結構的控制邏輯復雜性明顯要低得多;相對于通過共享主存來實現處理器之間的通信的結構而言,通過一個共享的第一級數據cache來實現處理器之間的通信的smpdca結構能夠提供非常小的處理器之間的通信延遲;沒有cache一致性維護開銷;數據cache命中率提高;便於smp (對稱多處理器結構)的軟體重用;從多個層次上開發程序的并行性。
  15. The key is deriving the desired endpoint address dynamically

    關鍵在於要動態地派生所需要的端點地址。
  16. Then, you look at a second cache key generation technique to address the need for caching data that is private to a portlet window

    然後,您將了解第二個緩存鍵生成技術,它可以滿足緩存專用於portlet窗口的數據的要求。
  17. The purpose of hk2030 study is to address the key function of how much, what type and when new development land should be provided for the future development of hong kong

    香港2030研究的目的,是研究香港未來發展所需的新發展用地項目,包括用地需求、類型及供應時間。
  18. Theoretical source of transparent model " s advantages is discussed, and then solutions of its key technology, last a programming realization - setting network card promsic to receive packets, keeping mac address, and checking packets base mac frame to realize transparent model in ip protocol rebuilding. the key technologies of firewall are packet filter and application proxy both of which can " t keep in step with network attack development

    鑒於此,本文從透明模式防火墻的特徵和功能出發,探討了其本質、技術實現要點及可行性方案,給出有別于上述兩方案的實現:網卡置於混雜模式,保留mac地址, ip重組、檢查、轉發過程一氣呵成,將透明模式的實現融合在ip重建中,使得整個防火墻體系結構更加緊湊,提高了效率。
  19. In this paper, the key technology - fp recognition algorithm is launched based on the analysis of current situation of automatic fingerprint identification system ( apis ). the structure - based fp representation and its matching algorithm are proposed to address the shortcoming of traditional minutiae - based method, which makes use of limited information in fp images

    針對傳統基於細節點的指紋識別方法只利用了指紋圖像中的有限信息(細節點)的不足,本文提出了基於指紋脊線紋理結構的特徵表達及其匹配演算法,沖破了傳統方法的局限。
  20. The design of optical address code is one of key technologies in ocdma system

    Ocdma系統中的關鍵技術之一就是光地址碼的設計。
分享友人