key scheme 中文意思是什麼

key scheme 解釋
關鍵碼方案
  • key : n 1 鑰匙。2 要害,關口,要沖。3 關鍵,線索,秘訣;解法。4 (外國書的)直譯本,圖例,題解,圖解,...
  • scheme : n 1 計劃;方案;路線;設計。2 系統;配合;組織。3 綱目;表;清單;分類表;大綱。4 謀劃,策劃;詭...
  1. Finally, the key link of engineering design reuse, which supports the reuse of the structuralizeation of designing knowledge and of the abstractive scheme, was approached

    探討了工程設計重用關鍵環節支持重用的設計知識結構化、抽象方案。
  2. Then this paper concerns about the network packet intercepting technology of linux os and gives a thoroughly overview of network hacking methods and some application protocol criterion, including http, ftp, telnet, nntp, pop3, smtp etc. then the system design scheme of the transparent proxy has been discussed, this system can be divided to 4 modules below : establishment of transparent charnel, implement of proxy service, gui configuration and management application, accessory filter functions ( such as url filter, command filter and logger etc ). we explain key techniques in all 4 main parts of this system, define the interfaces of each module, what is more the main data structures and software implements codes are all illustrated

    首先,論文陳述了防火墻的相關技術基礎,分析了透明代理作為一種先進易用的防火墻技術的原理,闡述了linux操作系統網路數據包攔截技術和http 、 ftp 、 telnet 、 nntp 、 pop3 、 smtp等應用層協議的協議規范和具體的工作流程。接著敘述了本透明代理服務器的系統總體設計方案,將系統分為以下幾個部分:透明通道建立、代理服務實現、 gui配置管理程序以及過濾功能(如url過濾、命令過濾和日誌審計等) 。論文然後分別介紹各個關鍵部分的具體實現要點,解釋了相互間的介面關系,列出了主要數據結構和實現流程。
  3. Other key features of 10 - year fixed rate mortgage scheme

    10年定息按揭計劃之特色
  4. This paper study practice of small and medium - sized enterprises ' bpr, using weifang charming hometextile co., 1td as research objiect, using author ' participant practice of bpr as background, combine process manage management, project management, iso9000 quality control system and other modern times manage theories. on the basis of analysis of environment, form stratagem programming scheme, this paper search key process analyse process, form new process. at the same time, with institution reform, human resource mechanism desigm, come into being frondose, executable scheme. and validated in the practise

    論文首先對企業內外部環境進行詳細分析、形成企業戰略規劃方案;根據戰略規劃發展的需要,確定關鍵流程? ?產品開發流程和生產管理流程;對關鍵流程進行分析診斷,確定其存在的問題;形成新的工作流程,輔之以機構重組、人力資源及激勵機制設計,形成具體的、具有可執行性的方案,並在實踐中得到一定的驗證。
  5. After elaborating the principle of an 802. lib key modulation scheme - complementary code keying ( cck ), this paper proposes and realizes a hardware circuit solution of 802. 11b pcmcia wlan interface card, which can reliably offer a maximal 11mbps data rate and freely switch within 14 working channels in 2. 4ghz frequency band

    接著在詳細闡述了802 . 11b協議核心調制技術?互補碼鍵控( cck )的原理的基礎上,本文提出並實現了一種峰值傳輸速率為11mbps的802 . 11bpcmcia高速無線網卡的硬體電路設計方案,在2 . 4ghz頻段該網卡可在14個工作通道上自動切換,實現高速突發數據的可靠傳輸。
  6. The sampled representation scheme is the key problem in ibr, as the data structures decide how the reference images are collected and stored as well as how the virtual images are created. we devel op a prismy panoramic model and discuss the acquisition and rendering of the datasets

    圖像模型是基於圖像的繪制技術的關鍵所在,因為圖像的組織形式直接決定源圖像的採集存儲以及新圖像生成的方式和速度,為此我們提出了稜柱面全景圖模型並推導了新圖像生成演算法。
  7. It is known to all that microsoft is maximal the whole world software company, owns, 60, 000 employees in the whole world, 60 countries and regions set up branch companies, holding 50 billion dollars cash, the product is complied with a proscenium until key applies on enterprise level backstage, and is provided end resolving a scheme to the whole course of. the enterprise being to honorable most is judged many times

    眾所周知,微軟是全球最大的軟體公司,擁有全球6萬員工, 60個國家和地區設有分公司,持有現金500億美元,產品從前臺直至企業級后臺關鍵應用,提供端到端的解決方案,並多次被評為最受尊敬的企業。
  8. This article can help you to comprehend the construction scheme and key technique of the post suboffice enveloping and mailing network management system. in programming field, this article also gives a deep discussion, which can help to solve a frontier problem that software ' s developing productivity can restrict computer application ' s advancing. you can also understand powerbuilder on its key techniques and kernel resolution from another point of view

    本文全面介紹了郵政支局封發投遞網路管理系統的實現方案和關鍵技術,在軟體方面對新興的面向對象的編程語言進行了深入探討,從而解決了應用軟體的開發生產率制約計算機應用發展的尖端問題;並從側面介紹了powerbuilder開發的關鍵技術和核心問題的解決方案。
  9. The cost - effective survivable scheme in otn and key technology, primary path and protection path routing and wavelength assignment ( rwa ) are the topics in this thesis

    本文的研究重點是有成本效益的光層保護方案與關鍵技術以及工作通道與保護通道的路由與波長分配問題。
  10. The protocol specifies the definition of inter - library loan service working on c / s mode. by means of 21 apdu messages defined in this protocol and standard encode / decode rule, we can realize the resource sharing between different libraries. this article advances a set of solution scheme for the implementation of inter - library loan on the internet environment, and gives some discussion about the key elements for the implementation which includes the process of apdu, the computer descriptions of asn. l syntax, the ber coding rules and the design for supporting db etc. the exact method and program for implementation of inter - library loan are also presented in the article

    本文在詳細分析和研究館際互借協議內容和工作原理基礎上,根據我國圖書館目前的實際情況,給出了在internet環境下實現館際互借服務的解決方案,論述了基於windows2000操作系統下開發館際互借軟體的具體思路,討論了實現該協議的一些關鍵問題,包括apdu的處理, asn . 1抽象語法表示、 ber編碼規則、數據庫設計等,並給出了具體的解決方法和實現程序。
  11. More and more people begin to attach importance to its potence gradually. according to the basic principle of vbi, this paper acquires related experience from the advanced technique for delivering of control signals during the period of vbi. it introduces a scheme using a single coaxial - cable to transmit video signals and control signals simultaneously, in which the key technique is the transmission of control signals in the vertical blanking interval of video signals

    本文根據場消隱期傳輸技術的基本原理,通過借鑒國內外場消隱期傳輸信號的先進技術和相關經驗,提出一種新型的綜合數據傳輸業務的應用電視,闡述了其圖像信號和控制信號共纜傳輸的總體設計方案,並結合bch糾錯編解碼技術和systemview動態模擬軟體,實現和驗證了控制信號在場消隱期間的穩定可靠傳輸。
  12. The main topic of the thesis is talking about the security services of x - pdm, the realization of the security scheme, and the automatic understanding for electronic circuit schematic drawings, which is the key technology of document management in x - pdm

    本文的主要內容涉及x - pdm系統的安全服務及其實現方案的設計,以及圖檔管理關鍵技術之電子電路原理圖自動輸入與理解系統的研究。
  13. This paper investigates the key technology of the ds - cdma system - psendonoise ( pn ) code acquisition technology. various pn code acquisition scheme has been introduced here

    本文對ds - cdma系統中的關鍵技術?擴頻序列的捕獲?進行了深入的研究,介紹了擴頻序列的多種捕獲方案。
  14. Modern statistics, computational mathematics means and computer technology are used to work out the scheme of developing computer software system of hydrological data reorganization, to study the key technology of overcoming the difficult problems

    利用現代統計、計算數學手段和計算機技術,研究制定了開發灌區水文資料整編計算機軟體系統方案、攻克難點的關鍵技術。
  15. Then we introduce new mobile technology and we emphasize the protocol about short message and the key technology 1n the third chapter, we introduce the cormon system. and based on it, we design the pms systems. we describe the design scheme in server, c1 ient and web

    第三章分析了現有企業簡訊平臺的工作方式,給出了pms企業簡訊平臺的設計目標和系統規劃,針對服務器、客戶端和web端三個部分分別進行了詳盡的設計描述。
  16. Because of the unique issues in the networks, including mobility - induced disconnection, network partition, high out - of - order delivery ratios and channel errors, the congestion control and the error recovery in the network is challenging. in this environment, the interaction between tcp and mac layer protocols, the affection of route protocols on the performance of tcp and the particular congestion control and error recovery mechanism are first discussed. then a particular transport layer protocol scheme based on the non - feedback mechanism is presented, with emphasis on the analysis and simulation of the key parameter

    文中主要討論了兩種不同網路結構中的無線tcp協議改進方案,其一在最後一跳為無線鏈路的網路環境中,針對基本tcp擁塞控制機制存在的缺陷,文中在現有解決方案的基礎上提出一綜合性的方案,其中包括無線鏈路的高誤碼率和連接斷開問題的解決,並重點對方案中出現的交叉層問題進行分析和模擬;其二,考慮的是分散式網路( adhoc ) ,在文中較為詳細的分析了tcp和mac層機制間的相互作用、路由協議中造成tcp性能降低的因素、 adhoc網路中應採取的特殊擁塞控制和差錯恢復機制,在此基礎上提出了一種採用非反饋機制的解決方案,重點對方案中的關鍵參數進行分析和模擬,分析和模擬結果表明此機制可在很大程度上提高adhoc網路中tcp的性能。
  17. Key agreement scheme for dynamic secure multicast based on connected dominating set

    結構的動態安全組播密鑰協商方案
  18. Firstly, we generalize and analyze the advantages and present research of elliptic curve cryptography ; secondly, we study the basic theory of the ecc ; thirdly, we illustrate the safety of the ecc and discuss the elliptic curve key agreement scheme, elliptic curve encryption scheme and elliptic curve digital signature algorithm ; fourthly, we study fast algorithms of the multiplication and inversion multiplication of the element of in the underlying finite field f2m whose characteristic is two represented by the two basis of optimal normal basis and polynomial basis. we make improvements to the fast algorithm of the polynomial basis multiplication by hankerson and base on the experiments, we describe the properties and compare the advantages of the multiplication and inversion multiplication of the elements in f2m field under optimal normal bases and polynomial basis. results concluding from the study car be used as references in the realization of the elliptic curve cryptosystem ; fifthly, we overview the current fast algorithm of point multiplication, improve the fix base point comb algorithm, advance the speed of the whole system and remark the advantages and disadvantages of the popular algorithms based upon the experimental datas ; sixthly we realize the algorithm library of elliptic curve cryptography based on the f2m. only change slightly in our algorithm library can we realize the ecdh, eces, ecdsa based onf2m of anysize ; seventhly, we realize the ecc on two secure elliptic curves, including ecdh, eces, ecdsa

    本文首先介紹並分析了橢圓曲線密碼體制的優點及研究現狀;其次研究了橢圓曲線密碼體制的基本理論;第三,分析了橢圓曲線密碼的安全性並介紹了密鑰共享,加密,數字簽名等橢圓曲線密碼體制;第四,深入研究了特徵為2的有限域f _ 2m中的元素在多項式基和最優正規基表示下的乘法運算和乘法逆運算的快速演算法,並對hankerson等人提出的多項式基下的乘法運算的快速演算法作了改進,而且在實驗的基礎上不僅分析研究了f _ 2m域中元素在多項式基和最優正規基表示下的乘法和乘法逆運算的性能,還對這兩種基表示下的f _ 2m域中元素運算效率的優劣作了比較和研究,所得的結論可供在實現橢圓曲線密碼體制時參考;第五,研究了目前流行的計算橢圓曲線標量乘法的快速演算法,同時改進了固定基點梳形法,提高了整個系統的速度,並在實驗的基礎上分析研究了流行演算法的優劣;第六,實現了基於f _ 2m的橢圓曲線密碼體制的演算法庫,在我們的演算法庫中只需稍微改變便能實現基於任意尺寸的f _ 2m上的ecdh , eces , ecdsa等橢圓曲線密碼體制;第七,實現了兩條安全橢圓曲線上的橢圓曲線密碼體制,包括ecdh , eces , ecdsa 。
  19. This paper deals with some key techniques of differentiated services networks. a design scheme for differentiated services networks is proposed, including bandwidth broker ' s scheme and edge router ' s scheme

    本文就區分服務體系結構的一些關鍵技術進行了研究,提出了區分服務體系結構的系統設計方案,包括bb ( bandwidthbroker )和邊緣路由器的設計方案。
  20. The public and private key scheme is interesting because data encrypted with a public key can only be decrypted with the associated private key

    公鑰私鑰模式的有趣之處在於,使用公鑰加密的數據,只有用相應的私鑰才可以解密。
分享友人