您要查找的是不是:
- Distributed collaborative virtual laboratory techniques for network research and learning are discussed,and an implementation scheme using HLA(high level architecture) and Java 3D for the technology is proposed. 讨论了可用于网络研究和学习的分布式协同虚拟实验室技术,提出了该技术的HLA/Java3D构建方案。
- This application implements a proprietary callback scheme using two Interfaces defined within VB. 这个程序实现了一个主程序回调模式,它使用了在vb中定义的两个接口。
- Our scheme uses a structure of two level secret shares to provide security and manageability. 我们的方案采用了两层式的秘密分享结构以增加安全性和可管理性。
- A quantum key distribution scheme using GHZ states between two parties is proposed. 提出了利用GHZ态的关联在通信双方之间建立密钥的方案。
- Use level survey to mark the paving design elevation of the cement stabilized macadam with obvious mark on indication piles both sides. 利用水准测量,在两侧指示桩上用明显标记标出,水泥稳定碎石的铺筑设计标高。
- A novel reversible binary image data hiding scheme using Run-Length(RL) histogram modification was presented. 提出一种基于游程编码的直方图调整的二值图像无损数据隐藏新方法。
- Under different pH, temperature, use level, and velocity, adsorbance was tested. 在不同pH、温度、用量和搅拌时间下,测试其氟离子吸附率。
- Gets or sets the scheme used to authenticate clients. 获取或设置用于客户端身份验证的方案。
- Indicates the value of the encoding scheme used for the response. 指示用于响应的编码方案的值。
- In terms of sustainable use level of water resources, Xinjiang is at the highest level, while Ningxia is at the lowest. 其中,新疆在五省区中可持续利用综合水平最高,宁夏最低。
- The effect of BTA content on the inhibition efficiency was studied to obtain the optimum use level. 并测定了BTA浓度对金属锌缓蚀效率的影响,确定了其作为缓蚀剂使用的最佳浓度值。
- Proper scale and corrosion inhibitors, coagulant, and bactericide are selected and their use level is optimized. 本文简介了流程的两项改造:在沉降罐上增设除油和排污系统,增设粗过滤器和精细过滤器;
- We introduced ECC to the Diffie-Hellman Key Exchange Protocol,and added new Authentication Scheme using a certificate in the protocol. 协议把ECC引入D iffie-Hellm an密钥交换过程,并在此过程中添加证书认证方案来完成相互认证和密钥协商。
- Based on the clustering of the networks,we propose a distributed key management scheme using the publicly verifiable threshold secret sharing. 本文在将网络进行分簇的基础上,利用可公开验证的门限秘密共享体制,给出了一种分布式的密钥管理方案。
- An image fusion algorithm based on discrete cosine transform (DCT) and an image fusion scheme using wavelet transform combined with DCT were proposed. 摘要提出了一种基于离散余弦变换(DCT)以及一种结合小波变换与DCT变换的图像融合新方法。
- If your use level is above your entitlement, a quote will be generated for you by IBM with the required additional license entitlements. 如果您的使用级别超出了应得级别,那么IBM会为您生成一个报价,其中含有需要追加的许可费用。
- Implement a Custom Callback Scheme for C - This application implements a proprietary callback scheme using two Interfaces defined within VB. 这个程序实现了一个主程序回调模式,它使用了在VB中定义的两个接口。
- OBJECTIVE:To discuss the clinical use and adverse drug reactions(ADRs) of Levofloxacin and to promote rational drug use level. 目的:探讨左氧氟沙星临床应用与其发生不良反应的关系,提高临床合理用药水平。
- This paper introduced an identity-based threshold multi-proxy multi-signature scheme using bilinear pairings for the first time. 摘要首次利用双线性映射提出了一个基于身份的门限多代理多签名方案。
- OBJECTIVE:To analyze the use of total parenteral nutrition(TPN) in our hospital so as to improve the rational use level of TPN. 目的:了解我院全肠外营养液(TPN)的使用情况,以提高TPN使用的合理性。