英语人>网络例句>identity function 相关的网络例句
identity function相关的网络例句

查询词典 identity function

与 identity function 相关的网络例句 [注:此内容来源于网络,仅供参考]

We use symmetrical cryptography, bilinear mapping, hash function, identity-based encryption as basic knowledge tools.

在本文的研究工作中,用到了分组密码、双线性映射、单向散列函数、基于身份的加密等知识工具。

New plan not only the identity cancel function that strengthened plan, and certifiable safety is below allegorical model randomly.

新方案不但增强了方案的身份撤销功能,而且在随机寓言模型下是可证实平安的。

The third chapter discusses the function of mythology in cultural reconstruction of Chicano identity.

第三章探讨了神话在奇卡诺身份的重构中所发挥的作用。

The inconsistencies of dimensional reduction and naive dimensional regularization in dealing withChern-Simons-matter theory are analyzed.The consistent dimensional regularization combiningwith higher covariant derivative regularization is adopted to consider Chern-Simons field theorycoupled to complex scalar and spinor field.All the local parts of one-loop two-point functionsand three-point functions are computed.Slavnov-Taylor identity is combined with these explicitcalculation results to give the one-loop local effective action.The finite gauge invariant quantumcorrection is shown and finite wave function renormalization constant for each field is defined.Thelocal part of one-loop three gauge field vertex is especially evaluated and it is verified that thereexists a renormalization choice compatible with BRST symmetry.

然后计算了所有的两点函数和三点函数单圈修正的定域部分,利用S-T恒等式给出了单圈定域有效作用量,定义了场的重正化常数,发现物质场和规范场都存在有限的规范不变的量子修正,并讨论了这些有限的规范不变的量子修正的物理意义,进而通过考察单圈三规范场顶角,表明存在与BRST对称性相容的重正化选择。5、在背景场方法的框架下,选择高阶协变导数正规化与维数正规化的杂化正规化方案计算了背景场两点函数的两圈量子修正,结果表明,标志紫外发散的极点项恰好抵消;进一步利用背景场方法中明显的规范对称性,证明背景场三点函数的两圈图贡献也是有限的。

During the decipherment of Erika"s identity, the author puts in question the Oedipus complex, the proportion of masculinity/ femininity in gender construction and the function of language in the release of Erika"s desires.

作为女性主义研究的课题之一,"身份"问题在后现代主义中找到了新的活力,并发展成为女性主义摆脱长久以来父权下桎梏和约束的有力切入点。

In this paper, the concept of network security and security structures of OSI and Internet is introduced, and various threats confronting the computer network are also discussed. Several kinds of network information security technologies, including firewall technology, virtual private network, intrusion detection system, data encryption technology, identity authentication and security protocol etc. are also examined. The security of internal network is the biggest problem in the construction of each network. The solution to this problem lies in setting up a firewall. The theory of a firewall and the approach to its actualization is studied. Intrusion detection system, an important part of the computer network security system, has gained extensive attention. IDS monitors the computer and network traffic for intrusion and suspicious activities. It not only detects the intrusion from the extranet hacker, but also the intranet users. The emergence of virtual private network paves the way for realizing secure connection of LAN quickly and at a relatively low cost. The concept, function, key techniques, including the tunnel technology, and the ways to realize VPN are expounded in this paper. Also introduced is the data encrypt network technology, which is called the soul of computer network security, such as digital digest, digital signature, digital certificate, digital encrypt arithmetic and so on. At the same time, the principle and the process of implementing network security by digital certificate and digital signature, the basic principle and characters of security protocols, and finally, three of the security protocols, concerning the security problems in network, IPsec, SLL and SET are analyzed in detail Computer network system should be a system of dynamic defence, both dynamic and static, passive as well as active, and even offensive, combined with management and technology.

本文系统地介绍了网络安全的概念、OSI及Internet的安全体系结构,并讨论了计算机网络面临的各种安全威胁;内部网络的安全问题是每个建网单位面临的最大问题,可以认为防火墙技术是解决网络安全的一个主要手段,本文研究了防火墙的原理及其实现手段;作为一种主动的防御措施,入侵检测系统作为网络系统安全的重要组成部分,得到了广泛的重视,TDS对计算机和网络资源上的恶意使用行为进行识别和响应,不仅检测来自外部的入侵行为,也监督内部用户的未授权活动;虚拟专用网技术的出现,为实现网络间的连接提供了快速安全但又相对便宜的手段,本文较深入的探讨了实现VPN的隧道技术,并对VPN的概念、功能、实现途径、基本构成、关键技术及发展前景等问题进行了全面论述;数据加密技术是网络安全核心技术之一,本文从数据加密算法、数字摘要、数字签名及数字证书等几方面简要介绍了数据加密技术,并分析用数字证书和数字签名实现网络安全的原理和过程;对安全协议的基本原理、主要特点进行了较为深入的研究,并就网络的安全性问题剖析了三种安全协议:IPsec协议、SLL协议和SET协议。

No matter from the mechanism of formation or the social function, ideology considered as a projection of a group's ideal, works through the ego construction, the union of the group and the formation of the illusion. It includes the function of ideal, the identity of the idol and the projection of the idea.

作为群体理想性产物的意识形态,无论是从形成的机制或是所具有的社会功能而言,事实上贯穿了整个自我的建构、群体的凝聚以及错觉的形成等一系列过程,其中至少同时包括理想的功能、偶像的认同与观念的投射等不同的面向。

Howeer, the identity and function of many microfibril associated molecules essential for ascular deelopment and function hae yet to be characterized.

但是,很多血管发育和功能中必须的微纤维关联性的分子的身份和功能尚未明确。

Beneath the story of a love affair, Titanic tells another story, that of a spoiled high-society girl with an identity crisis: she is confused, doesn't know what to do with herself, and DiCaprio, much more than just her love partner, is a kind of "vanishing mediator" whose function is to restore her sense of identity and purpose in life.

在表面的爱故事之下,《泰坦尼克》其实还有另一个故事,关于一个被宠坏的富家女的身份危机:她感到迷茫,不知如何是好;DiCaprio不只是她的情人,而是是一个"消失的中界",其作用是恢复女主人公的身份认同和人生目标。

It is concluded in Chapter Eight that: 1 linguistic proficiencies in three languages play a considerable part in code-switching of EFL teachers in trilingual context; the inter-sentential switching outweighs the intra-sentential switching both in frequencies and percentage; discourse-related switching also outweighs participant-related switching in frequencies and percentage; the EFL is maintained longest in EFL classroom and the language maintained second longest depends upon learners" higher proficiency in Chinese or Tibetan. 2 Ethnic identity and educational background is the major causal factor of EFL teachers" Chinese-English switching in trilingual classroom; duration of language contact and relative trilingual proficiencies are the two principal contributors to the English-Tibetan switching; while Tibetan-English switching is mainly driven by EFL teachers" ethnic identity and education background, as well as the duration of language contact; English-Chinese switching is also largely motivated by the duration of trilingual contact; and Chinese-Tibetan switching is determined by trilingual proficiency to a considerable extent. Meanwhile, psychologically, the switching is mainly motivated by a procedure of psychological projection, trilingual system conceptualization and the mentality of trilingual selection. 3 The educational reflections upon this study indicate: firstly, in trilingual context, the teachers" classroom discourse is characterized by the multilingual involvement, flexibility in strategy option as well as the extension and strengthening of the domination of teachers" discourse. Secondly, the discourse movement and code-switching are largely affected by two cultural ecological mechanisms: enculturation and cultural manipulation. Thirdly, the status quo of EFL trilingual teachers are characterized by unbalanced trilingual proficiencies, poor cultural awareness, and little knowledge of trilingual education and trilingual code-switching, therefore, suggestions are advanced in the end to provide them further education. Fourthly, in trilingual context, the EFL curriculum for ethnic minorities is characterized by plurality of aims, complexity of organization and variety of resources. Meanwhile, it is of great necessity to understand the linguistic values of EFL education for ethnic minority learners. To be specific, firstly, we should not only have a deep understanding of the distribution, construction, function as well as communicative effects of the three languages, but also have a comparative study of the three languages and thus provide the standardization and guidance for the trilingual education. In the end, it is advanced that trilingual EFL provision for ethnic minority should pursue to develop learners" multicultural value system in which first language culture and mother language culture take the central position and EFL culture plays a vital role.

3在三语环境下,教师课堂话语具有话语形态多元化、话语选择策略具有灵活性和教师话语权得到延伸和拓展等特征;文化涵化和文化操控是影响三语教师课堂语码转换的两种文化生态机制;参差不齐的三语水平、淡薄的多元文化意识和对三语教学和语码转换缺乏科学认识是我国目前三语师资的主要特点,因此应对三语教师进行职后继续教育;在三语环境下,民族外语课程具有课程目标多元化、课程组织复杂化和课程资源多样化等特点;应对民族外语教育的语言价值进行审视和解读,对三种语言在课堂话语中的分布趋势、结构特征、功能作用和交际效果等问题进行深入研究,加强对三种语言间的对比分析研究,同时对民族外语教育中的三语教学进行规范和指导;在强调民族文化和二语文化在三语文化格局中心地位和外语文化的重要作用的同时,民族地区的外语教育应以构建多元文化价值观为其文化追求。

第2/6页 首页 < 1 2 3 4 5 6 > 尾页
推荐网络例句

He and Nina moved to California and lived at 2005 Ivar Street, Apt.

他和Nina搬到加州,并在2005年伊瓦尔街,公寓生活。

Droperidol ( potently inhibits transfected HERGchannels and this is the probable mechanism for QT prolongation.

氟哌利多有效地抑制了转染的 HERG 钾通道,可能是 QT 间期延长的机制。

The Nazi's cruel treatment of the Jews during the Second World War is beneath contempt .

二战期间纳粹对犹太人的暴行极其可鄙。