聯機密碼 的英文怎麼說

中文拼音 [lián]
聯機密碼 英文
on line cipher
  • : Ⅰ動詞(聯結; 聯合) unite; join Ⅱ名詞(對聯) antithetical couplet
  • : machineengine
  • : Ⅰ名詞1 (秘密) secret 2 [紡織] (密度) density 3 (姓氏) a surname Ⅱ形容詞1 (距離近; 空隙小)...
  • : Ⅰ名詞(表示數目的符號或用具) a sign or object indicating number; code Ⅱ量詞1 (指一件事或一類的...
  1. Each code card saving ic has its feature ; therefore the general plate printing technique cannot be used. the special printer of lian yeou printing co. can fast print out the code with various information and its quality is extremely high ; on time delivery is guaranteed

    儲值卡具有每一張上面資料都不同的特性,所以無法以一般製版印刷的方式製作,有引進特殊印刷,能夠快速的印出每張不同資料的卡片,品質高、速度快、交貨準時。
  2. Cascaded low - density erasure codes are based on sparse random bipartite graphs. very efficient linear time encoding and erasure recover algorithms with the arbitrarily near erasure channel capacity performance of the codes with respect to the algorithms have made them one of the most optimal coding techniques up to now

    基於稀疏隨二部圖的級型低度糾刪因其線性時間的編譯演算法和可任意逼近刪除通道容量限而成為目前最佳編技術之一。
  3. The miami city mission is a private, nonprofit charitable organization, under federal 501 status. i. r. s. tax i. d

    邁阿市慈善救濟會是依邦501 c法案第3款設立的非營利私立慈善構,其邦稅務號為59 - 1403788 。
  4. The main contributions of the second part of this dissertation are focused on the cryptographic properties of logical functions over finite field, with the help of the properties of trace functions, and that of p - polynomials, as well as the permutation theory over finite field : the new definition of chrestenson linear spectrum is given and the relation between the new chrestenson linear spectrum and the chrestenson cyclic spectrum is presented, followed by the inverse formula of logical function over finite field ; the distribution for linear structures of the logical functions over finite field is discussed and the complete construction of logical functions taking on all vectors as linear structures is suggested, which leads to the conception of the extended affine functions over finite field, whose cryptographic properties is similar to that of the affine functions over field gf ( 2 ) and prime field fp ; the relationship between the degeneration of logical functions and the linear structures, the degeneration of logical functions and the support of chrestenson spectrum, as well as the relation between the nonlinearity and the linear structures are discussed ; using the relation of the logical functions over finite field and the vector logical functions over its prime field, we reveal the relationship between the perfect nonlinear functions over finite field and the vector generalized bent functions over its prime field ; the existence or not of the perfect nonlinear functions with any variables over any finite fields is offered, and some methods are proposed to construct the perfect nonlinear functions by using the balanced p - polynomials over finite field

    重新定義了有限域上邏輯函數的chrestenson線性譜,考察了新定義的chrestenson線性譜和原來的chrestenson循環譜的關系,並利用一組對偶基給出了有限域上邏輯函數的反演公式;給出了有限域上隨變量合分佈的分解式,並利用隨變量合分佈的分解式對有限域上邏輯函數的性質進行了研究;給出了有限域上邏輯函數與相應素域上向量邏輯函數的關系,探討了它們之間性質的系,如平衡性,相關免疫性,擴散性,線性結構以及非線性度等;討論了有限域上邏輯函數各類線性結構之間的關系,並給出了任意點都是線性結構的邏輯函數的全部構造,由此引出了有限域上的「泛仿射函數」的概念;考察了有限域上邏輯函數的退化性與線性結構的關系、退化性與chrestenson譜支集的關系;給出了有限域邏輯函數非線性度的定義,利用有限域上邏輯函數的非線性度與相應素域上向量邏輯函數非線性度的關系,考察了有限域上邏輯函數的非線性度與線性結構的關系;利用有限域上邏輯函數與相信息工程大學博士學位論文應素域上向量邏輯函數的關系,揭示了有限域上的廣義bent函數與相應素域上的廣義bent函數的關系,以及有限域上的完全非線性函數與相應素域上向量廣義bent函數之間的關系;給出了任意有限域上任意。
  5. Machining experiments are finished on a mini precision machining cutter, in the process the nc codes can be used and the cutter radius compensation algorithm of five - axis linked nc machining cutter is turned to be correct

    在小型精數控床上進行了加工實驗,驗證數控代的可行性及五軸動數控床刀具補償演算法的正確性
  6. Including our cleaning service contractors to enhance the hygienic measures and cleaning services to the public areas. we use sterilizing solvent to wipe surfaces frequently touched by the people such as the lift cars and buttons, door gates, handrails, the intercom system and digital locks at the main lobbies and other locations. in addition, we have placed sterilized carpets at the entrances so that people can wipe their shoes before entering the buildings to help prevent the spread of the virus.

    同各優質合作伴-包括各物業的清潔服務承辦商,在屬下各物業公眾地方進行全面清洗服務,清潔工人不斷以稀釋漂白水清潔電梯大堂按鈕墻身大門玻璃扶手對講鎖等公共設施,並且在各物業入口處擺放灑上漂白水之消毒地毯,讓各住戶在進入各物業前先消毒鞋底,協助遏止病毒傳播。
  7. Jpeg2000 based on wavelet transform is a new image compress standard of many excellent characters. iamge compress algorithmic can run more efficiently on dsp. the success of techinique research, including entire digital camera product and the key technique, and the industrialization of digital camera industry can give our own knowledge property right in digital camera technique, and then enhance the function of digital camera, upgrade its ability to compete

    國內數相關技術的研發起步較晚,其主要原因是數涉及到眾多尖端的傳感器技術、微電子技術、精光學技術、微械控制技術、數字信號處理器技術和電腦多媒體技術,而且跟這些技術相關的光學、集成電路、微械控制的加工工藝更是國內的薄弱環節,從而制約了國內數產業的形成和發展。
  8. We have enacted the electronic transactions ordinance which follows the united nations commission on international trade law model law on e - commerce. the eto accords digital signatures and electronic records the same legal status as that of their paper - based counterparts. we have also developed a local public key infrastructure with the establishment of certification authority to support the conduct of secure electronic transactions

    參考合國國際貿易法例委員會的電子商貿法例範本后,我們制定電子交易條例,令數簽署和電子紀錄跟書面簽署和文件紀錄享有同等的法律地位我們又建立本地的公開匙基建設施,設立核證關以確保電子交易在穩妥可靠的環境下進行。
  9. Don t give away your user name or password when completing an on - line form

    不要在填寫以方式遞交的表格時,向網站提供用戶號
  10. As their respective names suggest, a public key is available to everyone on an online and publicly accessible repository maintained by a certification authority, whilst a private key is personal and confidential, known to and maintained by the designated owner alone

    公開匙是公開給大眾的可透過方式接達至核證關的公開儲存庫查閱私人匙則屬于私人的,只有該用戶知悉及由其保管。
  11. With the development of the internet, the security of computer security is playing an important role. one means of providing security in communications is though encryption

    隨著計算網的逐步普及,計算信息的保問題顯得越來越重要。數據保變換,或技術,是對計算信息進行保護的最實用和最可靠的方法。
  12. One night, aleck fed in the password and then operated the networking computer

    一天晚上,亞力克輸入計算然後操作網計算
分享友人