解析名字 的英文怎麼說

中文拼音 [jiěmíng]
解析名字 英文
resolve name
  • : 解動詞(解送) send under guard
  • : Ⅰ動詞1. (分開; 散開) divide; separate 2. (分析) analyse; dissect; resolve Ⅱ名詞(姓氏) a surname
  • : Ⅰ名詞1 (名字; 名稱) name; appellation 2 (名聲; 名譽) fame; reputation 3 (名義) name 4 (姓...
  • : Ⅰ名詞1 (文字) character; word 2 (字音) pronunciation 3 (字體) form of a written or printed ...
  • 解析 : analysis; resolution; analyzing; resolving解析幾何 [數學] analytic geometry; cartesian geometry; ...
  1. Which compares strings character by character, you can compare names reported by the parser against string constants by reference

    函數,相反,您可以通過引用將器報告的稱與元串常量進行比較。
  2. In this paper, the author primarily introduces how elliptic curves have been applied to public key cryptography from algebra and number theory, analyzes the advantage and security of ecc. the work the author has done is : ( 1 ) study the arithmetic of ecc on the encryption / decryption, digital signature and key exchange schemes and analyze their security performance ; ( 2 ) propose a new id - based group signature with existed id - based digital signature and discuss its application in digital cash ; ( 3 ) realize the electronic auction system and key authentication system with ecc

    作者所作的主要工作有: ( 1 )研究了基於大素數域上的橢圓曲線密碼在加密密、密鑰交換、數等方面的密碼協議並分了每種協議的安全性能; ( 2 )在現有基於身份的數方案的基礎上提出了基於身份的群簽系統並討論了群簽在數現金中的應用; ( 3 )給出了橢圓曲線密碼在電子拍賣系統、密鑰認證系統方面的實現方案。
  3. Further analyses are given to some important parts of the secure email system, such as digital signature, encryption and decryption. the author also describes in detail how to realize them. in the third part, it is proposed to use ldap server for distribution of the certificates and use sasl authentication in secure email system to ensure information security

    對適于安全電子郵件的演算法從hash 、簽到加密、認證進行了比較分;二是根據s mime協議提出了安全郵件系統的體系結構,對其重要的數、加密和密部分作進一步的分,給出了具體實現步驟並進行了實現;三是基於ldap協議設計了用戶證書和通信簿管理體系,建立了ldap服務器客戶端數認證模型,並進行了實現。
  4. Supported by remote sensing and cis, through image processing, information extracting and based on mathematic models of plural information, in this paper, some favorable gold areas in mian - ning and yan - yuan area have been predicted, and it achieved the following results : ( l ) through remote sensing image digital processing, we made high accuracy remote sensing images and image interpretion maps. constructed a geodatabase of mianning - yanyuan - xichang area, including basic data ( district. drainage, etc. ) and thematic data ( rupture, stratum, magmatic rock, etc. ). this will provide scientific evidences for work of this area in the future

    並取得了以下成果: ( 1 )通過遙感圖像數處理,製作完成了實驗區的高精度遙感影像地圖及遙感譯圖,建立了冕寧-鹽源-西昌一帶空間數據庫,包括基礎數據(行政區、地、水系等)和專題數據(斷裂、地層、地質體等) ,為該區進一步工作提供了科學依據; ( 2 )根據各個多元信息成礦預測模型的優缺點,分了不同預測模型的適用條件和范圍,確定了研究區採用的數學模型。
  5. Entity reference is resolved to an invalid name character

    實體引用被為無效的元。
  6. To overcome their weakness, a kind of improved distributed architecture and domain - based ontlogcial naming and ontology name resolve system named ontology name service ( ons ) have been proposed

    進而提出了改進的ons系統,此系統具有分散式的組織結構,按照領域分層的命方法,以及高效的方法。
  7. Setwtclientqualifier allows the application to change the delimiting character used to parse the nodes of a hierarchical namespace

    函數允許應用程序改變用來各個等級命空間節點的劃界元。
  8. As people enjoyed the opening and sharing of network, they were also distressed about the problem of security. this paper mainly studies the security encryption technology of networks - based e - commerce systems. it analyzes the message encryption and digital signature process of client browser, and the message decryption and validation of merchant server in a integrated e - commerce system, and it also provides an application example

    本文主要研究基於網路環境的電子商務系統安全加密技術,分了一個完整的電子商務應用系統中客戶瀏覽器端和商家服務器端的信息加密、信息密、數、身份驗證,以及pki ( publickeyinfrastructure ,公開密鑰基礎設施)機制、數證書技術在這個過程中的功能,並給出了一個具體的實現例子。
  9. Let s get back to our name and age file - parsing example and look at the code for the lex and yacc files

    讓我們回到和年的文件例子中,看一看lex和yacc文件的代碼。
  10. Through using si analyse in the hardware design of a dtv set top box ( stb ), the main contribution of this paper is to give a series of solutions for si problems according to theoretically analyse and real works. advanced measuring systems have also been shown in the paper. with the help of this paper, the stb system of a world famous corporation has successfully get wide using of ddr sdram

    本文的主要工作是在針對消費類電子( consumerelectronics )領域中的數電視接收機頂盒進行硬體設計的過程中,引入信號完整性分的設計方法進行高速數電路的設計,利用理論分作為設計指導,通過測量、模擬和實際布板的結果進行驗證,得出一系列針對信號完整性問題的決方案和設計流程,成功地決了某世界著企業的機頂盒系統中ddr存儲器工作頻率無法提高的問題,在新一代的機頂盒產品中廣泛使用ddr存儲器,在很大程度上提高了系統的性能,滿足了市場的需求。
  11. This article brings forward an application of a new encryption algorithm and secret hash digital signature that aim at the insecure factors. at the base of these algorithms we can realize the secure credit card system, which can accelerate the development of credit card. in this paper we firstly discuss the general concepts of applied cryptography, and then introduce the mostly used modern encryption methods and technologies

    本文首先介紹了應用密碼學的基本概念,然後介紹了目前常用的加密技術,認真分了對稱密鑰加密方法、公開密鑰加密方法等加密技術的優缺點,提出了一種新型的分組加密方法? ?排列碼加密密演算法以及基於該演算法的保密散列數演算法,並將其應用於信用卡系統,從而在一定程度上降低了信用卡因遺失、被盜、假卡等因素造成的損失。
  12. In general, variable names greater than 32 characters are difficult to read on a monitor set to a low resolution

    通常,多於32個元的變量在低度的監視器上難以閱讀。
  13. This is the least reliable of the name resolution methods as it depends on the target host being on a locally connected subnet

    當目標主機聯接到本地子網時這是最可靠的方法。
  14. Then, it introduce several cryptographic protocol based on elliptical curve, including diffie - hellman key switching, elgamal encryption and decryption, elgamal digital signature, ecdsa, etc. based on these, the author analyze kinds of security threat faced to 3g system and discuss the security rule and security objectives

    然後介紹了基於橢圓曲線的幾種密碼協議,包括diffie ? hellman密鑰交換, elgamal加密, elgamal數, ecdsa等協議。在此基礎之上,分了3g系統面臨的各種安全威脅並對系統的安全原則和安全目標進行了討論。
分享友人