計算機認字 的英文怎麼說

中文拼音 [suànrèn]
計算機認字 英文
computer literacy
  • : Ⅰ動詞1 (計算) count; compute; calculate; number 2 (設想; 打算) plan; plot Ⅱ名詞1 (測量或計算...
  • : Ⅰ動詞1 (計算數目) calculate; reckon; compute; figure 2 (計算進去) include; count 3 (謀劃;計...
  • : machineengine
  • : 動詞1 (認識; 分辨) recognize; know; make out; identify 2 (建立關系) enter into a certain rela...
  • : Ⅰ名詞1 (文字) character; word 2 (字音) pronunciation 3 (字體) form of a written or printed ...
  • 計算機 : computer; calculator; calculating machine; computing machinery; electronic wizard; processor; pro...
  • 計算 : 1 (求得未知數) count; compute; calculate; reckon; enumerate 2 (考慮; 籌劃) consideration; pla...
  1. The pki environemt including development interface such as pem and der encoding and decoding, symmetry cryptography, rsa algrothm, random numeric generate, certificate request pkcs # 10 encoding and decoding, x. 509 certificate encoding and decoding, digital abstract, digital signature and verifying signature, digital envelope and advance services such as certificate authority and register authority

    為滿足設需要的pki底層支持和上層服務平臺,本文設和實現了pki環境,包括底層開發介面: pem與der編解碼、對稱加密、隨數產生、 rsa演法、證書請求pkcs # 10封裝與解碼、 x 509證書和黑名單編解碼、數摘要、數簽名與驗證、數信封等和上層服務:證中心和注冊中心。
  2. Some research on chinese character structure is done, and after some coding schemes of chinese character are summarized and trait of computer vision is considered, a new code - eight - shape code for chinese character is presented, which indicates chinese character structure trait and can be extracted automatically by computer from chinese character images

    對漢的構成進行了研究,在總結多種漢編碼方案優缺點的基礎上,結合視覺的特點,提出一種表徵漢特徵的知漢八形碼編制方法。 4 )仿人漢識別系統。
  3. Basing on the thorough research and analysis of several essential technologies, we have implemented identity authentication, illegal link, network security aduit and anti - virus detection etc. we used digital certificate to accomplish identity authentication which was based on the study and analyzing of all kinds of authentication. in regard to network security audit, we mainly researched on the distributed model of network security audit and the audit strategy of the rule library. in view of the traditional rule library ’ s flaws, with the formalizing description of audit rule, we proposed a dynamic security audit strategy model which was based on the nature deduction system

    在研究並分析各種證技術的基礎上,採用基於數證書的證方式,實現用戶上網資格審查;針對網路安全審,重點研究了網路安全審分散式模型以及基於規則庫的審策略,並針對傳統審規則庫的缺陷,通過對審規則進行形式化描述,提出了一種基於自然演繹系統架構的動態安全審策略模型dsasm ( dynamicsecurityauditstrategymodel ) ,並詳細論述了該模型的定義和推演演法;通過深入研究非法外聯的關鍵技術和檢測模型,提出了基於路由表查找的c / s架構的非法外聯檢測模型;針對病毒檢測,提出了基於主的防病毒檢測思想,在客戶端進行病毒防護。
  4. If the character set attribute is absent or incorrectly defined in the file you want to open, and if the file was created on a machine whose default encoding differs from the one you use, the file s characters will be incorrectly displayed

    如果沒有符集屬性或者要打開的文件的符集屬性定義不正確,或者該文件是在與您的具有不同默編碼方式的上創建的,則該文件的元不會正確顯示出來。
  5. Handwritten character recognition research is a branch of the area of optical character recognition ( ocr ), which deals with the recognition of handwritten english character or digits using computer

    手寫元識別是ocr的一個分支,它的研究對象是:如何利用電子自動辨手寫的英文元和阿拉伯數
  6. Think normally, long - range education already experienced via 3 generation : generation is to teach by correspondence education ; the 2nd generation is broadcasting television education ; the main feature of the 3rd generation is to use computer network and multimedia technology, education activity has below digital signal environment, be called " contemporary and long - range education "

    通常為,遠程教育已經歷經三代:第一代是函授教育;第二代是廣播電視教育;第三代的基本特徵是利用網路和多媒體技術,在數信號環境下進行教學活動,被稱為「現代遠程教育」 。
  7. In recent years, the research of image coding method has become one of the most active fields in information technology by way of the imp of communication, medium store, multimedia computer technology, etc. especially in 21st century, with the development of electronic and communicate technology, it is possible to realize the video telephone, meeting tv, signal tv, information high way and etc. on this occasion, it inevitably becomes one of the main tasks to seek after the effective image coding method

    作為通信、介質存貯、數據發行、多媒體等技術的關鍵環節,圖像壓縮編碼演法的研究是信息技術中最活躍的研究領域之一,尤其是進入21世紀以後,電子技術和通信技術的發展使可視電話、會議電視、數電視、高清晰度電視、多媒體、信息高速公路等的生產和建立成為可能。在這一背景下,探索高效圖像壓縮編碼演法無疑將成為主要任務之一,對其研究也將成為國際公的熱點之一。
  8. First, this paper applied the mature security technology ( digital signature. etc ) to solve the security of electronic check in theory. in another word, how to meet the request of secrecy, integrity, identity identification, resisting denial by using electronic check in internet shopping

    首先,本文運用領域成熟的安全技術(數簽名等) ,從理論上解決電子支票的安全問題,也就是怎樣用電子支票滿足網上購物環境中對交易的保密性、完整性、身份證、抗否性等安全要求。
  9. Cookies are alphanumeric identifiers that we transfer to your computer ' s hard drive through your web browser to enable our systems to recognize your browser and to provide features, such as personalization

    餅干是我們通過你的瀏覽器轉移到你的的硬盤使我們的系統能出你的瀏覽器並且提供特徵的數母的標識符,例如個人化。
分享友人