在空三加密过程中,由于人为因素、地物的复杂性、植被及遮盖物等引起的加密点粗差;
In Geolord-AT three-dimensional triangulation process, artificial factors, complexity of surface feature , vegetation and so on cause the encrypted dot rude difference.
实现这一点的一种常用机制是使用ssl加密。
一旦您做到这一点,所有依赖于DCS的服务都将使用加密的和经过身份验证的传输。
Once you have done this, all services that rely on DCS are now using an encrypted and authenticated transport.
入口点把从环境得到的信息添加到原请求中的同一加密字段中,以修改后的请求作为响应。
This response is the original request to which the Entry Point now added the information deducted from it's environment in the same encrypted field.
在这个例子中,如果db 2admin用户访问保护点,那么将在写入时加密数据,在读取时解密数据。
In this example, if the db2admin user accesses the guard point, data is encrypted when writing, and data is decrypted when reading.
因为变量是从一个Cognos组件(入口点)获取的,传输时经过签名和加密,足够安全,所以提供者会相信它的值。
Because the variable is retrieved form a Cognos component (the entry point) the provider will trust the deducted value as it's transmitted signed and encrypted so it's sufficiently secure.
无线银行对安全性的要求非常高,必须找到速度和加密之间正确的平衡点。
Wireless banking is security sensitive and it's essential to find the right balance between speed and encryption.
您可以对保护点下的文件和目录使用相同或不同的加密密匙。
You can use the same encryption key or different encryption keys against files and directories under the guard point.
编码细节中真正需要解释的一点是第9步,在这里我实际执行了DES - CBC加密。
The only point where the coding details really require explanation is Step 9, where I actually performed the DES-CBC encryption.
一旦我们将某些内容加入XML文档,就很难不让其他人到这些内容(当然是缺少加密),这一点显而易见。
It's almost too obvious that once you stuff something into an XML document, it's hard to obscure it (short of encryption, of course).
无论您使用多少个加密,公开弱点没有一点好处。
No matter how much encryption you use, leaving that vulnerability open won't help a bit.
由于安全性要求规定必须对未授权的查看者保密支付方式(诸如信用卡或银行支票),对Payment元素加密就做到了这一点。
Since the security requirement dictates that the means of payment (such as credit card or bank check) must be hidden from unauthorized viewers, encrypting the payment element pays off.
为了帮助实现这一目的,要设置有线等效加密(Wired EquivalentPrivacy,wep)键,以检测您可以连接到的接入点。
To help with this, set up the Wired Equivalent Privacy (WEP) key to detect an access point that you can connect to.
这里需要重点强调的一点是,这与直接使用WS - Encryption加密方法不同。
The main thing to stress here is that this is quite different from straight WS-Encryption.
此后,只要在保护点的加密密匙上配置了Cached onHost选项,任何访问该主机上的保护点的应用程序都不会中断运行。
After that, any applications that access a guard point on the host will work correctly without freezing if the encryption key of the guard point is configured with the Cached on host option.
这样,在必要时,您就可以很容易地运行未加密的程序,当您想要“嗅探”网络,看看到底有什么东西正在通过网络时,这一点很有用。
Thus, you can easily run your program without encryption when necessary, which can be useful when you want to "sniff" the network to see what is actually traversing the wire.
其结果是,“公钥基础结构”或PK I被证实不是加密数据的可靠系统,而且商业社会也已经注意到了这一点。
As a result, Public Key Institution (PKI) is proved to be the reliable system for encryption of data, which also draws attention of the commercial society.
合成平均速度点的疏密主要由作图比例尺而定,在构造复杂的部位应适当地加密,以便控制速度的横向变化。
The velocity points at the part where geological structure is complicated should be appropriately densified in order to picture the lateral variation of velocity.
在全站仪测定一定数量的3维控制点后,利用数码像机进行近景摄影测量,加密测绘水轮机转轮叶片。
After having measured some 3d control points by total station, the digital close range photogrammetry and surveying the Vance of water wheel can be made.
专业设计的控制开关和点状枪体增加密封装置,保证不渗胶或漏胶,严格控制由于滴胶所造成的废品。
Special designed of control switch and strip type gun with increase seal device, it could guarantee not seep or leak adhesive, strict control result in waster on account of leak adhesive.
如果您使用的是更先进的技术(如公共密钥加密)你可能会需要温习你的数学一点。
If you are using more advanced techniques (like public key encryption) you'll probably need to brush up on your math a little more.
在四点法面积井网的基础上,因地制宜加密井网可提高平面储量动用程度;
On the basis of four - spot areal well pattern, infill well pattern with local conditions will improve the degree of producing reserves on the plane.
实现这一点,你需要知道确切的加密流中有多少字节。
To achieve this you need to know exactly how many bytes are in the encrypted stream.
航测外业控制测量是为内业加密、测图提供准确、完整、清晰的像片控制点成图资料,以保证成图质量。
On the field work of aerial surveying, control surveying offers some mapping data of photograph's control points which are accurate, complete and clear to satisfy the quality of map.
要做到这一点,你可以在你的硬盘上创建虚拟分区和所需的文件存入其中,以及采用相同的加密级别与可移动usb闪存驱动器。
To do that, you can create virtual partitions on your hard disk and store the desired files into them, as well as apply the same encryption level as with the removable USB flash drives.
本发明涉及一种分布系统群点高通量信息密文存储与传输的加密方法。
The present invention relates to an information enciphering method for high-flux information storing and transmission in distributing system.
这是我们可以改变网络名称一样的东西,默认的接入点使用,加密选项。
This is where we can make changes to things like the Network Name, the default Access Point to use, and the Encryption options.
特殊井曲线读点要适当加密,曲线异常部分也要加密。
The intervals between reading points should be smaller for the abnormal part (s) or the special wells.
特殊井曲线读点要适当加密,曲线异常部分也要加密。
The intervals between reading points should be smaller for the abnormal part (s) or the special wells.
应用推荐