阐述了海底取样时岩芯形成的理论过程,推导了有关理论计算公式,得出了形成“桩效应”的条件,并论述了取样器静压力及振动锤多项参数的理论计算公。
Also it presents the condition of forming "stake effection" is reached and the theoretic calculation formulas of hydrostatic pressure and multi parameter of vibratory hammer of the sampler.
据英特尔公新闻稿里的计算,Thunderbolt端口传输一部全长高清电影只用30秒。
As Intel calculated in their press release, a Thunderbolt connection can transfer a full-length high-definition movie in 30 seconds.
您需要将这个公钥文件的内容追加到您希望自动地进行登录的每台计算机。
You need to append the public key file contents to each machine you want to log in to automatically.
如果不交换您的公钥,那么使用SSH在多台计算机中运行相应的命令时,您必须为每台计算机输入您的密码。
When using SSH to run commands across multiple machines without exchanging your public key, you need to type in your password for each machine.
SSH的主要优点之一是,通过将您的公钥复制到一台远程计算机,您可以绕过正常的登录和密码交换。
One of the main benefits of SSH is that you can bypass the normal login and password exchange by copying your public key to a remote machine.
步骤8 将公钥复制到远程计算机。
本文讨论了一个智能电网系统的关键安全技术问题,包括公钥基础设施和可信计算。
This paper discusses key security technologies for a smart grid system, including public key infrastructures and trusted computing.
从粒子的观点介绍了辐射压的概念,阐明了辐射压的物理实质,给出了计算辐射压的一般公。
The concept of the radiation pressure and the physical essence of it are presented based on the photon gas.
采用平面公自转行星夹具镀制户外照明用大面积光学薄膜,计算了光学薄膜膜厚的均匀性,经测试得到均匀性的结果。
Flat planetary holder is used in big area optical film for outdoor lighting and film thickness uniformity is counted in this paper. The result of uniformity is gained after testing.
目前的密钥系统无论是单钥体制还是公钥体制都建立在计算安全的模型上。
Both the symmetric key systems and public key systems currently used are based on the model of computational security.
以NC50型钻铤公螺纹作为研究对象,用有限元方法对加工有不同应力减轻槽的钻铤公螺纹接头进行了分析计算。
Take pin threads of NC50 drill collar as an example, Finite Element Method is used to analyze the different stress-relief grooves of pin thread connection.
本文综述了计算机密码学在分组密码,序列密码,公钥密码,混沌密码等方面研究的新进展。
In this paper we survey the new advances in the research on computer cipher, focusing on block cipher, sequence cipher, public key cipher and chaos cipher.
这些公钥密码算法的关键操作为大整数模幂乘操作与椭圆曲线标量乘法操作,均属于计算密集型运算。
In these public key cryptographic algorithms, the kernel operations are modular exponentiation of multi-precision integer and elliptic curve scalar multiplication, which both are computing intensive.
辫子群是一种新兴的适用于量子计算机时代的公钥密码平台,但是目前基于辫子群的密钥协商协议AAG、AAFG和BDH等都有不同程度的安全弱点。
It seems that braid group is a kind of considerable public key cryptography platform, but current key agreement protocols, such as AAG, AAFG and BDH, all have different degrees of security weaknesses.
基于高有效位的数字计算方法和误差估计方法,对目前已提出的基于切比雪夫映射的公钥加密方法进行了改进,得到一种密钥协商协议。
Based on high effective locations algorithm and error estimate, improvement of the public-key scheme based on Chebyshev maps proposed recently was presented and a key agreement protocol was given.
加工公、英制螺纹时,并提供如何计算和选择该装置齿轮箱的齿轮。
Calculating formulae for selecting gears in the gear box is provided for machining various threads of metric or British system.
椭圆曲线公钥系统可以缓解传统公钥系统中大计算复杂度的瓶颈问题。
Elliptic curve public key can be used to relax the bottleneck problem that is large computation in tradition public key system.
本文从密码学的角度出发,对NTRU公钥密码系统及其在移动计算安全中的应用进行了研究。
From the perspective of cryptography, NTRU public key cryptosystem and its applications in the security of mobile computing is studied in this paper.
为了对浙江登陆台风的发生年份进行预测,采用三元可公度式进行排列计算,可以得到其后几年内的可公度式,并根据可公度式频数的峰值进行判断。
In order to forecast the occurrence year of a landing typhoon in Zhejiang, a commensurable formula of three elements was used in arrangement and calculation.
该方案是数字签名和公钥加密的有机集成,除了具有认证性、保密性外,还具有计算量与通信量小等特点。
The scheme perfectly integrates digital signature scheme with public key cryptosystem, it has authentication, secrecy, less computation cost and less communication cost.
该协议特别适用于计算能力较弱、不宜执行公钥密码算法的手持移动设备中。
This payment protocol is specially suitable for mobile devices of weaker computation capability which cannot execute public-key algorithm easily.
由于对运算的计算量较大,结合新的无证书的公钥密码体制,提出一种无需对运算的无证书部分盲签名方案。
Because of the large amount of calculation for pairing, a partially blind signature scheme without pairing was proposed, which combined the new certificateless public key cryptosystem.
另外,不包含公钥标记的引用并不受版本策略的限制,所以从不检查应用程序配置文件和计算机配置文件。
Additionally, references that do not include the public key token are not subject to version policy, so the application and machine configuration files are never checked.
分析了高校计算机公修课面临的问题,提出了计算机公修课分层次教学体系和隐式分层次教学模式。
Introduced the concept , theoretical and practical foundation of teaching at different level, and analysed difficulty that university computer teaching faced.
地震的可公度性能表述这种韵律特征, 特别在活动期内,利用可公度计算预报6 ~7 级的地震应是一种较好的方法。
Commensurability of earthquake can express the rhythm features, which is a fairly good method that used to predict M6 7 earthquake…
地震的可公度性能表述这种韵律特征, 特别在活动期内,利用可公度计算预报6 ~7 级的地震应是一种较好的方法。
Commensurability of earthquake can express the rhythm features, which is a fairly good method that used to predict M6 7 earthquake…
应用推荐