key buffer 中文意思是什麼

key buffer 解釋
鍵盤緩沖器
  • key : n 1 鑰匙。2 要害,關口,要沖。3 關鍵,線索,秘訣;解法。4 (外國書的)直譯本,圖例,題解,圖解,...
  • buffer : n 1 【機械工程】緩沖器,緩沖墊;阻尼器,減震器;消聲器。2 【化學】緩沖,緩沖劑。3 緩沖者;緩沖物...
  1. In this paper, the design of a specific chip for circuit emulation based on ip is put forward and realized and the main functional modules and the key algorithms including an all - digital adaptive clock recovery method and a dynamic depth buffer algorithm are described in detail

    文章根據相關標準提出並實現了一種電路模擬專用晶元的設計方案,並對其中主要功能模塊和關鍵演算法作出了詳細說明,包括一種全數字的自適應時鐘恢復方法、動態深度緩沖演算法等。
  2. With the basic theory of air buffer, aiming to the key segment for modeling - flow equation and gas buffering process, theoretical analysis with experimental data is helpful to realize the modeling and simulation research. 3

    介紹了氣動緩沖的基本理論,通過機理分析建立了被研究對象的數學模型,針對建立精確數學模型的關鍵環節? ?流量方程和氣動緩沖過程,提出機理分析與實驗建模相結合的建模方法,並進行了模擬和實驗研究; 3
  3. How to ensure the project implement safely and effectively, esp in the complicated condition of geology, the terrain and its features, is the key to restrict the project finishing successfully ; in this paper, the theoretic analyse and pratical study based on the extension of 309 country road ( from wuan to shexian in hebei province ), adopt the method of theoretical analyse, caculater and experiment, improve the controlling blasting skill and construction crafr of roadbed stonework, control the blasting harm effectively, accomplish the construction quickly and safely in normal conditions. the paper puts forward to the relative parameter applying to roadbed extension in beforecrack blasting, and raises the combination of beforecrack demolition and buffer demolition, which is the main way to conctrol the side - slope stable and taking shape. putting to use the achievement produces great social benifet and economic benefitjt has widely practical future

    特別是在復雜的地質,地形及地物條件下,如何保證工程的安全快速有效實施成為制約工程順利完成的關鍵。本文的理論分析和實踐研究以國道309河北武安至涉縣段改建工程為依託,採用理論分析計算與現場試驗相結合的方法,研究並優化了路基石方控制爆破技術與施工工藝,有效控制了爆破危害,實現了保證現有公路正常運營條件下的快速安全施工,本文提出了在預裂爆破中適合於路基擴塹工程的有關參數。同時提出了預裂爆破與緩沖爆破相結合是控制邊坡穩定和成形的主要途徑。
  4. We analysis the conflict, convert channel and starvation problems of concurrent schedule based on strict - 2pl locking protocal which applies nhstm model, then present a concurrent scheduling algorithm making use of buffer and point p. also, we proved the concurrent schedule algorithm is serializable. at the same time, we introduce the key technical used in nhsdb concurrency control mechanism, and give the implementation details

    我們對應用nhstm模型的,通過應用嚴格兩段鎖協議實施的並發調度中,可能存在的並發沖突,隱通道和饑餓問題進行分析,在此基礎上提出了一種利用緩沖和p點的並發調度演算法,並給出了該演算法的並發調度正確性證明,解決多級安全條件下的隱通道和饑餓問題。
  5. This dissertation is focused on the software system of the underwater - radio buoy system, the main work and results obtained are as follows : the design of data acquisition system software : the key technique of the software is : the data required to record is generous, the period of collection time is long, so the buffer and storage of the data is difficult

    本論文給出浮標監測系統各部分軟體的研究和設計成果,主要內容包括以下三個方面:數據採集系統軟體設計:數據採集系統軟體的技術關鍵在於數據採集系統一次採集記錄數據量大、連續工作時間長,所以數據採集系統軟體實時緩存和存儲就非常困難。
  6. The characteristic and key technologies of the system are as follows : ( 1 ) in realizing the live broadcast of audio and video, the problem of immense multimedia data and low networks bandwidth utilization ratio is solved by using mpeg - 4 as format of audio and video data. audio and video data are collected by video card cv500 which developed by beijing sum tone company ; meanwhile, the contradictory between the delay of networks transmitting and the quality of the image is well solved by setting a " bi - buffer area "

    系統實現中解決的關鍵問題和特色主要有以下幾個方面: ( 1 )在視音頻直播功能的實現中,通過使用北京算通公司的cv500視頻採集卡和cv500sdk進行視音頻數據採集,並採用當今最新的圖像和語音編碼壓縮標準mpeg - 4作為視音頻數據的採集格式,既保證了圖像的質量,又大大縮減了視音頻所佔的帶寬,從而解決了多媒體數據量大、網路帶寬利用率低的問題;同時,通過設置環形緩沖區的辦法來調和網路傳輸延時與圖像質量之間的矛盾,取得了較好的效果。
  7. 3. based on the architecture of the train diagram, analysis the two key factors, the minimum interval and buffer time, which affect the carrying capacity

    ( 3 )從研究列車運行圖結構著手,詳細分析了影響線路通過能力的兩個重要因素:最小列車間隔時間和緩沖時間。
  8. Because of the limit of network resource ( link capacity, buffer length of network node ) and the uncertain of traffic in networks, it should not be avoided that network congestion occurs, and congestion control becomes one of the key technologies in atm networks

    由於網路各類資源(通道容量、節點中緩存器容量等)的有限性和網路中各種數據流的不可確定性,不可避免地導致了網路擁塞的產生,使得擁塞控製成為atm網路亟待解決的關鍵技術之一。
  9. The framework generalizes the necessary steps of common radar processing, and solves the key problems of data registration, double - buffer storage, besides the data competition arbitration, and provides the ability of built - in parallel computation

    該程序框架概括了一般雷達處理流程的必要步驟,解決了數據注冊技術、雙緩存區存儲技術和數據競爭仲裁等關鍵技術問題,提供了內建的雷達并行處理能力。
  10. Later several key methods are emphatically pointed out : the object - oriented method and the inheritance thinking of object are employed to gain visibility and build - up repeatedly of model component in model library ; the technology of double - buffer and multi - thread assure the capability to manage in real time of multi - task system ; the algorithmic design of data - flow solves the problem of simulation calculation, and lay a basis of system expanding for the future. then the paper verifies the system with examples and provides the performance

    隨后重點討論了實現該虛擬模型系統的幾項關鍵技術;運用了面向對象技術和類的繼承思想實現了模塊庫中模型構件的可見性和重構性,雙緩沖存儲和多線程技術保證多任務系統的實時處理能力,數據流向的演算法設計解決了模型的模擬演算法問題,同時為今後的系統擴展提供了基礎。
  11. 3 ) the riparian buffer effectiveness is relate to field slope. 8 % slope buffer is more effective than the 5 % slope buffers at decreasing nitrogen. the slope does not seem to play a important key on phosphor concentration decrease. 4 ) a higher percent nitrogen and phosphor decrease is observed in spring compared to autumn and winter. reasons may be attributed to growth of vegetation

    坡度為8時,緩沖帶對銨氮、總氮、硝氮的消解率均高於坡度為4時的消解率,兩種不同立地模式,緩沖帶對氮營養鹽的消解率存在差異;而緩沖帶對磷的消解效率受坡度影響不大,沒有顯著差異,說明不同的立地模式對氮磷營養鹽的影響是不同的。
  12. Levels of compliance with key water quality objectives in the western buffer wcz

    西部緩沖區水質管制區各主要水質指標的達標情況pdf
  13. Levels of compliance with key water quality objectives in the eastern buffer wcz

    東部緩沖區水質管制區各主要水質指標的達標情況pdf
  14. Public - key cryptographic algorithms use a fixed buffer size whereas secret - key cryptographic algorithms use a variable - length buffer

    公鑰加密演算法使用固定的緩沖區大小,而私鑰加密演算法使用長度可變的緩沖區。
  15. In the chapter of component based database access agent, the component criterion for the agent is selected and the component frame of the agent is designed based on the discussion for the component development technology. in the chapter of the platform of network communication, its operational principle is discussed at first, then the program structure of the platform and the key technology of encrypted network transmission is focused. in the chapter of the design and implementation of the server of the agent, the operational principle is researched, the program structure is designed, and the key technologies of database flux control, data buffer, and database security are studied

    基於組件的數據庫訪問代理設計介紹了組件開發技術、數據庫訪問代理的組件標準選擇及數據庫訪問代理的組件框架設計;網路通信平臺設計和實現研究了網路通信平臺的工作原理、實現過程中使用的基本技術,論述了網路加密傳輸關鍵技術,設計了網路通信平臺的程序結構;代理服務端設計和實現研究了代理服務端的工作原理,論述了數據庫流量控制和訪問優先級調度、數據緩沖及安全數據庫支持等關鍵技術,設計了代理服務端的程序結構;代理客戶端設計和實現研究了代理客戶端的工作原理,設計了代理客戶端的程序結構和組件介面。
  16. 2. putting forward of the overflow localization formula ( z = ( 0xyy - 0x41 ) 10 + ( 0xxx - 0x41 ) ). locating accurately buffer overflow point is one of the key factors for exploiting vulnerability successfully

    2 .給出了溢出點定位公式: z = ( 0xyy - 0x41 ) 10 + ( 0xxx - 0x41 )溢出點的精確定位是漏洞利用成功的關鍵之一,論文給出了一個定位公式,用於溢出點的準確定位。
  17. Class enable applications to manipulate the dimensions of the console window and screen buffer ; to move a rectangular area of the screen buffer, which is useful for performing smooth, simple animation ; and to wait while reading console input until a key is pressed

    類的新成員使應用程序能夠操作控制臺窗口和屏幕緩沖區的大小;移動屏幕緩沖區的矩形區域(這對于執行平滑簡單的動畫很有用) ;並在讀取控制臺輸入時等待,直至按下某個鍵。
  18. The shellcode of key technique about buffer overflow attack is realized in the paper ( including breaking through operating system and its firewall, uploading and downloading attack files )

    包括如何突破系統限制、突破防火墻、攻擊文件的上傳和下載等關鍵技術核心代碼的實現。
  19. Localization formula is presented in this paper for this purpose. 3. realization of buffer overflow attack key technique

    3 .緩沖區溢出攻擊中關鍵技術的代碼實現對緩沖區溢出攻擊中關鍵部分shellcode高級代碼進行了編寫。
分享友人