排名演算法 的英文怎麼說

中文拼音 [bèimíngyǎnsuàn]
排名演算法 英文
ranking algorithm
  • : 排構詞成分。
  • : Ⅰ名詞1 (名字; 名稱) name; appellation 2 (名聲; 名譽) fame; reputation 3 (名義) name 4 (姓...
  • : 動詞1 (演變; 演化) develop; evolve 2 (發揮) deduce; elaborate 3 (依照程式練習或計算) drill;...
  • : Ⅰ動詞1 (計算數目) calculate; reckon; compute; figure 2 (計算進去) include; count 3 (謀劃;計...
  • : Ⅰ名詞1 (由國家制定或認可的行為規則的總稱) law 2 (方法; 方式) way; method; mode; means 3 (標...
  • 排名 : ranking list
  1. We regulate a command - response pair for the encryption / decryption operation based on permutation code, combining rsa and md5 used in cos safety module, and bring forward a safety transmission process for documentation

    並給列碼加密解密操作賦予相應的命令應答對,結合智能卡操作系統的安全模塊中的rsa和md5,提出了使用這種數字簽卡進行文件安全傳輸的過程。
  2. The thesis is organized as below : in chapter 1, the background knowledge is given which is needed for study on bluetooth security mechanism and implementation. first bluetooth technology is overviewed including its develop history, radio interface, physical links, interference, network topology, core protocol, etc. next communication security is introduced according to the model of network security architecture from osi. finally some primary cryptographic techniques are discussed based on symmetric encryption, asymmetric encryption and advanced encryption standard published years ago

    本文研究了利用藍牙技術提供各種安全服務和實現的課題,並通過一些具體實現的實例進行闡述,具體安如下:在第一部分,本文首先回顧了藍牙技術及發展情況,主要包括藍牙發展簡史、藍牙標準的射頻介面、物理鏈路、干擾情況、網路拓撲結構以及核心協議等;然後介紹了通信安全的基礎知識,討論了osi系統中的四層網路安全結構模型;最後給出了各種加密技術的基本理論,包括對稱加密體制如des和blowfish 、非對稱加密體制( rsa公鑰、數字簽和身份證明等)以及新一代的高級加密標準( advancedencryptionstandard , aes )等。
  3. First, the basic theory of the competitiveness is analyzed, evaluating indexes which conclude relative and absolute indexes basic on the last literatures are set up. second, because the data are too many and computing time is too long, the competitiveness of science and technology of 30 areas are clustered using fuzzy clustering model, the areas of the whole nation are clustered several kinds and we can draw some conclusions of same kind. evaluating the competitiveness using single model can produce white noise, so combinational models which concluding neural network, fuzzy theory and genetic algorithm are brought forward to evaluate the competitiveness of areas which are in the same kind with fujian province in the test

    本文首先分析科技競爭力的基本理論,並根據以往研究科技競爭力文獻,建立包含絕對指標和相對指標的評價科技競爭力評價指標體系,其次,針對評價福建省科技競爭力在全國范圍內的情況數據較多,計時間較長的具體情況,利用模糊神經網路模型對全國30個省市自治區科技競爭力水平進行聚類分析,將科技競爭力水平接近的地區聚為一類,得出科技競爭力水平相近地區情況,而後,針對已有文獻科技競爭力評價只是利用單一模型可能產生噪聲,影響評價結果,並且主觀性較強的缺點,本文將神經網路、模糊數學、遺傳等智能組合,利用組合評價模型對福建省和與福建省同在一類的其它地區的科技競爭力水平進行橫向、縱向評價,得出福建省在全國范圍內的科技競爭力水平
  4. The permutation code encryption and its key management and digital signature by rsa contribute to the high intensity combination security algorithm which is verified by both theory analysis and simulation results with high running speed

    理論和實驗結果均表明,應用列碼加密明文數據並結合rsa進行密鑰管理和數字簽可以得到加密強度很高的安全的運行速度也很快。
  5. In this paper we mainly study the realization of digital signature card based on permutation code

    本文主要研究基於列碼加密解密的數字簽智能卡的實現。
  6. The secret hash digital signature is a new siganture method that combines the ideas of rsa public - key algorithm, md5 one - way hash function and permutation code at the same time

    保密散列數字簽利用rsa公鑰密碼體制的原理、 md5單向散列函數和列碼加密的思想,構造了一種能夠快速實現數據保密、數字簽的簽方案。
  7. The system makes full use of the principle of public key, message digest and permutation code accomplished rapidly data encryption and data transmission, digital signature

    應用這種安全的網路數據傳輸系統利用公鑰密碼體制的原理、消息摘要和列碼加密的思想,構造了一種能夠實現數據快速加密、快速傳輸、並具有數字簽功能的安全傳輸系統。
  8. The secret hash digital signature is a new signature method that combines the ideas of rsa public - key algorithm, md5 one - way hash function and permutation code at the same time, which is more secret, occupies less space and runs in higher speed

    保密散列數字簽結合了rsa公鑰密碼體制、 md5單向散列函數和列碼加密解密的思想,實現了一種速度快、保密性強的數字簽方案。
  9. This article brings forward an application of a new encryption algorithm and secret hash digital signature that aim at the insecure factors. at the base of these algorithms we can realize the secure credit card system, which can accelerate the development of credit card. in this paper we firstly discuss the general concepts of applied cryptography, and then introduce the mostly used modern encryption methods and technologies

    本文首先介紹了應用密碼學的基本概念,然後介紹了目前常用的加密技術,認真分析了對稱密鑰加密方、公開密鑰加密方等加密技術的優缺點,提出了一種新型的分組加密方? ?列碼加密解密以及基於該的保密散列數字簽,並將其應用於信用卡系統,從而在一定程度上降低了信用卡因遺失、被盜、假卡等因素造成的損失。
分享友人