排名演算法 的英文怎麼說
中文拼音 [bèimíngyǎnsuànfǎ]
排名演算法
英文
ranking algorithm- 排 : 排構詞成分。
- 名 : Ⅰ名詞1 (名字; 名稱) name; appellation 2 (名聲; 名譽) fame; reputation 3 (名義) name 4 (姓...
- 演 : 動詞1 (演變; 演化) develop; evolve 2 (發揮) deduce; elaborate 3 (依照程式練習或計算) drill;...
- 算 : Ⅰ動詞1 (計算數目) calculate; reckon; compute; figure 2 (計算進去) include; count 3 (謀劃;計...
- 法 : Ⅰ名詞1 (由國家制定或認可的行為規則的總稱) law 2 (方法; 方式) way; method; mode; means 3 (標...
- 排名 : ranking list
-
We regulate a command - response pair for the encryption / decryption operation based on permutation code, combining rsa and md5 used in cos safety module, and bring forward a safety transmission process for documentation
並給排列碼加密解密操作賦予相應的命令應答對,結合智能卡操作系統的安全模塊中的rsa演算法和md5演算法,提出了使用這種數字簽名卡進行文件安全傳輸的過程。The thesis is organized as below : in chapter 1, the background knowledge is given which is needed for study on bluetooth security mechanism and implementation. first bluetooth technology is overviewed including its develop history, radio interface, physical links, interference, network topology, core protocol, etc. next communication security is introduced according to the model of network security architecture from osi. finally some primary cryptographic techniques are discussed based on symmetric encryption, asymmetric encryption and advanced encryption standard published years ago
本文研究了利用藍牙技術提供各種安全服務和實現的課題,並通過一些具體實現的實例進行闡述,具體安排如下:在第一部分,本文首先回顧了藍牙技術及發展情況,主要包括藍牙發展簡史、藍牙標準的射頻介面、物理鏈路、干擾情況、網路拓撲結構以及核心協議等;然後介紹了通信安全的基礎知識,討論了osi系統中的四層網路安全結構模型;最後給出了各種加密技術的基本理論,包括對稱加密體制如des和blowfish 、非對稱加密體制( rsa公鑰演算法、數字簽名和身份證明等)以及新一代的高級加密標準( advancedencryptionstandard , aes )等。First, the basic theory of the competitiveness is analyzed, evaluating indexes which conclude relative and absolute indexes basic on the last literatures are set up. second, because the data are too many and computing time is too long, the competitiveness of science and technology of 30 areas are clustered using fuzzy clustering model, the areas of the whole nation are clustered several kinds and we can draw some conclusions of same kind. evaluating the competitiveness using single model can produce white noise, so combinational models which concluding neural network, fuzzy theory and genetic algorithm are brought forward to evaluate the competitiveness of areas which are in the same kind with fujian province in the test
本文首先分析科技競爭力的基本理論,並根據以往研究科技競爭力文獻,建立包含絕對指標和相對指標的評價科技競爭力評價指標體系,其次,針對評價福建省科技競爭力在全國范圍內的排名情況數據較多,計算時間較長的具體情況,利用模糊神經網路模型對全國30個省市自治區科技競爭力水平進行聚類分析,將科技競爭力水平接近的地區聚為一類,得出科技競爭力水平相近地區情況,而後,針對已有文獻科技競爭力評價只是利用單一模型可能產生噪聲,影響評價結果,並且主觀性較強的缺點,本文將神經網路、模糊數學、遺傳演算法等智能演算法組合,利用組合評價模型對福建省和與福建省同在一類的其它地區的科技競爭力水平進行橫向、縱向評價,得出福建省在全國范圍內的科技競爭力水平排名。The permutation code encryption and its key management and digital signature by rsa contribute to the high intensity combination security algorithm which is verified by both theory analysis and simulation results with high running speed
理論和實驗結果均表明,應用排列碼演算法加密明文數據並結合rsa演算法進行密鑰管理和數字簽名可以得到加密強度很高的安全演算法且演算法的運行速度也很快。In this paper we mainly study the realization of digital signature card based on permutation code
本文主要研究基於排列碼加密解密演算法的數字簽名智能卡的實現。The secret hash digital signature is a new siganture method that combines the ideas of rsa public - key algorithm, md5 one - way hash function and permutation code at the same time
保密散列數字簽名演算法利用rsa公鑰密碼體制的原理、 md5單向散列函數和排列碼加密的思想,構造了一種能夠快速實現數據保密、數字簽名的簽名方案。The system makes full use of the principle of public key, message digest and permutation code accomplished rapidly data encryption and data transmission, digital signature
應用這種安全演算法的網路數據傳輸系統利用公鑰密碼體制的原理、消息摘要和排列碼加密演算法的思想,構造了一種能夠實現數據快速加密、快速傳輸、並具有數字簽名功能的安全傳輸系統。The secret hash digital signature is a new signature method that combines the ideas of rsa public - key algorithm, md5 one - way hash function and permutation code at the same time, which is more secret, occupies less space and runs in higher speed
保密散列數字簽名演算法結合了rsa公鑰密碼體制、 md5單向散列函數和排列碼加密解密演算法的思想,實現了一種速度快、保密性強的數字簽名方案。This article brings forward an application of a new encryption algorithm and secret hash digital signature that aim at the insecure factors. at the base of these algorithms we can realize the secure credit card system, which can accelerate the development of credit card. in this paper we firstly discuss the general concepts of applied cryptography, and then introduce the mostly used modern encryption methods and technologies
本文首先介紹了應用密碼學的基本概念,然後介紹了目前常用的加密技術,認真分析了對稱密鑰加密方法、公開密鑰加密方法等加密技術的優缺點,提出了一種新型的分組加密方法? ?排列碼加密解密演算法以及基於該演算法的保密散列數字簽名演算法,並將其應用於信用卡系統,從而在一定程度上降低了信用卡因遺失、被盜、假卡等因素造成的損失。分享友人