key block 中文意思是什麼

key block 解釋
拱頂塊石
  • key : n 1 鑰匙。2 要害,關口,要沖。3 關鍵,線索,秘訣;解法。4 (外國書的)直譯本,圖例,題解,圖解,...
  • block : n 1 片,塊,大塊;粗料,毛料;木料;石料;金屬塊;【建築】塊料,砌塊;【地質學;地理學】地塊。2 ...
  1. The above analysis shows some results as follows : generally the discontinuities including bedding planes are favor to the stability of slope, which means that most of the slopes will not suffer large sliding failure ; most of the high slopes situated in the interest area are stable. however there are some potential unstable wedges which can be identified based on the key block theory ; some suggestions for reinforcing high slope are presented based on the stability analysis and environmental friendly consideration

    結果表明:該區邊坡巖體條件對邊坡整體穩定性有利;區內高陡邊坡以穩定及基本穩定為主,不穩定邊坡較少,但潛在局部不穩定塊體較多;依據邊坡的工程地質特徵及穩定性評價結果,對該區高陡邊坡的防治提出了建議。
  2. Class use a chaining mode called cipher block chaining, which requires a key and an initialization vector to perform cryptographic transformations on data

    類派生的類使用一種稱為密碼塊鏈接( cbc )的鏈接模式,該鏈接模式需要密鑰和初始化向量才能執行數據的加密轉換。
  3. The block cipher classes provided in the base class library use a chaining mode called cipher block chaining, which uses a key and an initialization vector to perform cryptographic transformations on data

    基類庫中提供的塊密碼類使用稱作密碼塊鏈( cbc )的鏈模式,它使用一個密鑰和一個初始化向量( iv )對數據執行加密轉換。
  4. You can choose different encipher algorithms according to requirement. aes is a symmetric block cipher that can process data blocks of 128 bits, using cipher keys with lengths of 128, 192and 256 bits. because the length of block and key has been expanded, security has been enhanced

    Aes ( advancedencryptionstandard )是fip ( federalinformationprocessingstandardspublication )在2001年6月發布的草案,它是分組加密演算法,消息分組為128bit ,有三種密鑰長度128bit 、 192bit 、 256bit ,由於分組長度和密鑰長度加長使得安全性大大的提高,它有望成為21世紀的加密標準。
  5. The first kind of algorithm is based on s - box controlled by key, the algorithm distinguishes most of other block ciphers, its visible quality is that its s - box is not regular and fixative, but controlled by block cipher ' s key. the second kind of algorithm is based on smn ( d ) array code, it makes full use of the visible quality of smn ( d ) array code possessing big code distance ( d ). the thesis discusses the two algorithms " reversibility, security and their qualities, the

    第一種是基於「 s -盒由密鑰控制」的變結構分組密碼,該演算法區別于其它大部分分組密碼最大的特點是它的s -盒不是固定不變的而是由密鑰控制產生;第二種是基於smn ( d )陣列編碼的變結構分組密碼,該演算法充分利用了smn ( d )陣列編碼具有碼距大的特點;文中對這兩個演算法的可逆性、安全性及其性能等進行了探討和分析,分析結果認為這兩個變結構演算法正確、有效且安全。
  6. Key to the control key mobile a key punches, s key light legs, d. key heavy legs, w key block

    方向鍵的鍵控制移動, a鍵拳, s鍵輕腿, d鍵重腿, w鍵擋。
  7. Will remove the key signature block

    將會移除密鑰簽名塊。
  8. This implies that bad block relocation is a key feature of any storage manager or device residing below jfs

    這暗示著,壞塊重定位是任何駐留在jfs下的存儲管理器或設備的一個關鍵特性。
  9. Turbo codes represent the new code structures, which consist of pccc ( parallel serially convolutional code ) and sccc ( serially concatenated convolutional code ). in this paper, the background of turbo codes are firstly introduced, which includes the base principle of error correction code 、 block code and convolutional code ; the principle of turbo code and the iterative decoding is secondly expanded ; the key decoding algorithm : a revised map algorithm and iterative decoding theory are detailed ; then, a new turbo code structure : hccc ( hybrid concatenated convolutional code ) is presented, and the capacity of this code method is analyzed, the average capacity upper bound is derived ; at last, this code is simulated on awgn ( additive white gaussian noise ) channel and rayleigh fading channel

    本文首先介紹了turbo碼的背景知識,包括差錯控制的基本原理、分組碼和卷積碼;然後闡述了turbo碼的基本原理,包括turbo編譯碼器結構及迭代譯碼原理;較為詳細地描述了關鍵的譯碼演算法: ?種改進的最大后驗概率( map )譯碼演算法及迭代譯碼演算法;提出了一種新的turbo碼結構:混合turbo碼(混合級聯卷積碼) ;並用編碼性能聯合界分析方法對混合turbo碼進行了性能分析,得出了其平均性能上界;並在高斯白噪聲通道和瑞利衰落通道上分別作了一些應用研究及計算機模擬實驗。
  10. Basing on the discussion of the development status and the direction of block board in china and the key problem existing currently, this essay mainly discussed the research to the influential factors of bending strength about block board and its importance and necessity

    摘要通過對我國細木工板發展現狀、趨勢和目前存在主要問題的論述,探討對細木工板橫向靜曲強度影響因素研究的重要性和必要性。
  11. The block length and the key length can be independently specified to 128, 192, or 256 bits

    有一個與文件相關的永久整數sid ( psid ) ,該整數隨后映射成分區表中的安全性標簽。
  12. Round keys are taken from this expanded key in the following way : the first round key consists of the first nb nb block length words, the second one of the following nb words, and so on

    安全性策略配置目標包括控制對數據的原始訪問、保護內核和系統軟體的完整性、防止有特權的進程執行危險的代碼,以及限制由有特權的進程缺陷所導致的傷害。
  13. Typically, secret - key algorithms, called block ciphers, are used to encrypt one block of data at a time

    通常,私鑰演算法(稱為塊密碼)用於一次加密一個數據塊。
  14. As the key block of the wireless communication transmitter in rf, it is very useful in improving the output power and efficiency, lowering the loss of the supply, lowering the size and the weight, lengthening the time of communication. class e power amplifier which is suitable to amplify envelop signal is very important in modern communication system

    功率放大器( pa )作為無線通信射頻發射機中不可缺少的關鍵電路,對于提高手機的功率效率、降低電源損耗、減小體積重量、延長通話時間有著舉足輕重的作用,而適用於恆包絡信號放大的e類功率放大器,更是在現代通信系統中佔有十分重要的地位。
  15. Firstly, the dissertation tells something about lonworks technology, the lontalk protocol, the peer - to - peer communicaton etc. secondly, it lucubrates s - 2000 control system based on lonworks, including the design method of the system, the key technology, the characteristic of the intelligent node, the i / o property, the structure of intelligent block, the neuron chip, the design of the data acquisition node and so on

    本文首先闡述了lonworks技術及其特點,總線系統所採用的lontalk協議, peer - to - peer對等通訊,基於lonworks總線網路通訊協議系統等。然後對基於lonworks總線的s - 2000控制系統進行深入研究,重點研究系統的設計方法和關鍵技術,智能節點的特點,輸入輸出特性及智能模塊分析, neuron晶元的分析研究,以及數據採集節點的設計,數據採集控制軟體,組態軟體的設計原理等方面。
  16. The thesis analysed the chief technique problems and designed the solution algorithms, proposed measures of the software fault tolerance techniques suitable for the hardware platform of the robotic system on the base of studying the two key techniques - eddi and cfcss. first, the thesis has done the analysis in theory for the chief technique problems including basic block partition, software signature instructions generation, shadow instructions generation and instructions scheduling, proposed the algorithms suitable for the target platform. then, the thesis introduces the design process of the software fault tolerance

    本文在研究了sihft的兩項關鍵技術?復制簽名檢錯技術和軟體簽名控制流檢錯技術的基礎上,針對小型智能飛行機器人系統的硬體平臺,對軟體檢錯技術的關鍵問題進行了分析並給出了解決問題的演算法,提出了適于小型智能飛行機器人硬體平臺的軟體檢錯技術方案。
  17. We calculate composite block masonry ' s heat transfer coefficients under different conditions, then we discuss these data according to the energy efficiency criterion in wuhan city and come up with the key factors which influence the thermal performance of composite block masonry, . at the end of this paper we summarize and look forward to the future of composite blocks in engineering practice in mechanics and thermal sides

    在熱工性能方面,對復合砌塊砌體的保溫、隔熱性能進行了分析與推導,定量推導了多種情況下復合砌塊砌體的傳熱系數,並結合武漢市的地方節能標準進行了論證,提出了影響復合砌塊砌體熱工性能的關鍵因素。
  18. Can be single or double super - cool mini - games, is aimed to practice martial arts to defeat 10 different levels of opponents, combinations you will use technology to defeat their operation guide : 1p : a s w d above and below control, t beating opponents to kick y, u bond with weapons 2p : key to control above and below, 4, 5, 6 correspond to the left of skills and technology portfolio : jump upward left block under attack t t forward button double - click the button down special

    可以單人或雙打的超爽小游戲,目的就是通過練習武功擊敗10個不同級別的對手,你將利用組合技擊敗他們操作指南: 1p : a s w d為上下左右控制, t為擊打對手, y為踢腿, u鍵為拿武器2p :方向鍵為上下左右控制, 4 , 5 , 6分別對應左方的技能組合技:跳向上左右擋下長擊t向前鍵雙擊t向下鍵特殊技能t y必須等屏幕上方的能量槽蓄滿才可使用狠踢y后鍵
  19. Introduction : can be single or double super - cool mini - games, is aimed to practice martial arts to defeat 10 different levels of opponents, combinations you will use technology to defeat their operation guide : 1p : a s w d above and below control, t beating opponents to kick y, u bond with weapons 2p : key to control above and below, 4, 5, 6 correspond to the left of skills and technology portfolio : jump upward left block under attack t t forward button double - click the button down special enter the name of the game

    可以單人或雙打的超爽小游戲,目的就是通過練習武功擊敗10個不同級別的對手,你將利用組合技擊敗他們操作指南: 1p : a s w d為上下左右控制, t為擊打對手, y為踢腿, u鍵為拿武器2p :方向鍵為上下左右控制, 4 , 5 , 6分別對應左方的技能組合技:跳向上左右擋下長擊t向前鍵雙擊t向下鍵特殊技能t y必須等屏幕上方的能量槽蓄滿才可使用狠踢y后鍵
  20. On the basis of appraising a traditional method, the method of the stereographic projection and proportionally stereographic projection of a solid volume, this paper has introduced such methods as determination of dominant discontinuities, kinematic tests for rock - mass failure modes, geometrical judgment of a removable block, and determination of a key block, extending perfecting the traditional method, and thus making it has better suitability or availability and practicality

    摘要本文在評價用傳統方法即赤平極射投影和實體比例投影方法分析節理邊坡穩定性的基礎上,結合具體工程實例引進了優勢結構面的確定、巖體破壞模式的運動學判釋、可移動塊體的幾何判定和關鍵塊體的確定等方法,使傳統方法得到拓寬和完善,從而具有更好的適用性和可操作性。
分享友人