選取碼 的英文怎麼說

中文拼音 [xuǎn]
選取碼 英文
access code
  • : Ⅰ動詞1. (挑選) select; choose; pick 2. (選舉) elect Ⅱ名詞(挑選出來編在一起的作品) selections; anthology
  • : Ⅰ動詞1 (拿到身邊) take; get; fetch 2 (得到; 招致) aim at; seek 3 (採取; 選取) adopt; assume...
  • : Ⅰ名詞(表示數目的符號或用具) a sign or object indicating number; code Ⅱ量詞1 (指一件事或一類的...
  • 選取 : select; choose
  1. It mostly includes the analysis of video collection and codeing module, which compared the virtu of existing mpeg codeing mode. and choose the most suitable mode

    主要包括對視頻採集處理技術分析,對視頻採集壓縮處理模塊的分析,比較了現有的mpeg的編方式的優劣,並適當的方式應用於系統中。
  2. Selection of secure elliptic curves, implementation of elgamal encrytion and signature over big prime field ; 2. fpga implementation of point multiplication ; 3. at last put forward two blind signature based on ecc, nyberg - rueppel blind scheme and dsa blind scheme, these two schemes can be used in e - cash svstems

    作者所做的主要工作有: ( 1 )實現了安全橢圓曲線的,實現了基於大素數域上的橢圓曲線的elgamal加解密和數字簽名: ( 2 )設計了標量乘的fpga功能模擬; ( 3 )最後提出兩種用橢圓曲線密體制實現的盲簽名方案,基於ecc的nvberg - rueppel盲簽名方案和基於ecc的dsa盲簽名方案,這兩種方案可以用於電子現金系統獲得匿名性。
  3. In chapter 2, a brief review of the vlb video compression techniques is presented

    第二章,回顧現有的甚低率視頻壓縮編技術和國際標準,h
  4. In this text, we first do some research on the genetic algorithm about clustering, discuss about the way of coding and the construction of fitness function, analyze the influence that different genetic manipulation do to the effect of cluster algorithm. then analyze and research on the way that select the initial value in the k - means algorithm, we propose a mix clustering algorithm to improve the k - means algorithm by using genetic algorithm. first we use k - learning genetic algorithm to identify the number of the clusters, then use the clustering result of the genetic clustering algorithm as the initial cluster center of k - means clustering. these two steps are finished based on small database which equably sampling from the whole database, now we have known the number of the clusters and initial cluster center, finally we use k - means algorithm to finish the clustering on the whole database. because genetic algorithm search for the best solution by simulating the process of evolution, the most distinct trait of the algorithm is connotative parallelism and the ability to take advantage of the global information, so the algorithm take on strong steadiness, avoid getting into the local

    本文首先對聚類分析的遺傳演算法進行了研究,討論了聚類問題的編方式和適應度函數的構造方案與計算方法,分析了不同遺傳操作對聚類演算法的性能和聚類效果的影響意義。然後對k - means演算法中初值的方法進行了分析和研究,提出了一種基於遺傳演算法的k - means聚類改進(混合聚類演算法) ,在基於均勻采樣的小樣本集上用k值學習遺傳演算法確定聚類數k ,用遺傳聚類演算法的聚類結果作為k - means聚類的初始聚類中心,最後在已知初始聚類數和初始聚類中心的情況下用k - means演算法對完整數據集進行聚類。由於遺傳演算法是一種通過模擬自然進化過程搜索最優解的方法,其顯著特點是隱含并行性和對全局信息的有效利用的能力,所以新的改進演算法具有較強的穩健性,可避免陷入局部最優,大大提高聚類效果。
  5. The main task of this article contains : ( l ) compares algorithm and encryption and decryption between the widely - used public key encryption system rsa and ecc ; ( 2 ) directing against present elliptic curve attack algorithm, uses sea algorithm to perform choosing of safe elliptic curve and to achieve based on prime field elliptic curve ' s elgamal encryption and decryption and digital signature ; ( 3 ) discusses elliptic curve ' s application on smart card and proposes two identification plans based on eec

    綜上所述,本論文所作的主要工作有: ( 1 )對目前應用較廣的公鑰密體制rsa和ecc演算法及加解密實現進行比較。 ( 2 )針對目前已有的橢圓曲線攻擊演算法,使用sea演算法實現了安全橢圓曲線的,實現了基於大素數域上的橢圓曲線的elgamal加解密和數字簽名。 ( 3 )討論了橢圓曲線在智能卡上的應用,並提出了兩種基於ecc的身份認證方案。
  6. Mr ip s choice for the time capsule was a set of a dvd and a vcd of two documentary tv series jointly produced by the observatory and rthk. these are of historical significance as they are milestones of the observatory s effort to reach out to the public and to promote the importance of preparedness against natural disasters

    葉先生特別置於時間囊的物品,是分別屬于兩輯電視記錄片集的數影碟( dvd )和影音光碟( vcd ) ,片集由天文臺與香港電臺聯合製作。推出這些記錄片集,正好顯示天文臺竭力為市民大眾拓展各種服務,以及推廣就自然災害作好準備的重要性。
  7. Assuming that the encoding rules of the transmitter and the receiver are chosen according to a uniform probability distribution, the probabilities of deceptions are also computed

    當收方和發方的編規則按等概率分佈時,各種攻擊成功的概率也被算出。
  8. Simultaneously, for preventing prematurity, crossover positions in crossover operator choose according to not equal probability. when bringing into new genes, reverse bit binary strings those have the same number as the optimal individuals are supplied, which settles gene absence problem reproduction results in

    同時為了防止早熟現象,交叉運算元中的交叉位置按非等概率的方法進行;在納入新的基因時,加入與最優個體群等量互補的二進制串,解決了復制操作導致基因缺失的問題。
  9. The author expatiated on the basic structure, coding manners, decoding rules, fitness function selection, self - adapted mutation and crossover operator, the judging flow of chromosome feasibility of the algorithm, finally, put forward the computing result with pattern of data table and gantt graph

    詳細地闡述了演算法的基本結構、編方式、解規則、適值函數的、自適應變異和交叉運算元的設計、染色體可行性的判斷流程,最後以數據表和甘特圖的方式給出了計算結果。
  10. In the design and analysis of block cipher, considering the noncontinuity of encryption and decryption of advanced encryption standard - rijndael algorithm and the arbitrariness of the choice of polynomialm ( x ), we change the modular polynomial and the polynomials used in process of encryption and decryption, which the encryption polynomial and the decryption polynomial are the same polynomials in our choices. the new algorithm have more continuity

    在分組密的設計與分析方面:針對美國即將推出的高級加密標準rijndael演算法的加解密的不一致性和rijndael演算法中模多項式的隨意性,我們修改了rijndael演算法中的模多項式和加解密所用的多項式,使得加解密相同的多項式,這樣加密與解密具有更多相容性。
  11. In the paper, berth length, container yard area, quay cfs, the number of quayside container cranes and container throughput were selected as the indexes of ports efficiency evaluation

    摘要泊位長度、頭面積、頭cfs 、吊橋數量以及集裝箱吞吐量5個集裝箱港口績效指標,擇中國實力相當的6個集裝箱港口進行灰理論的靶心度分析,並以此進行評價排序。
  12. Operation layer is the basic core part in elliptic curve encryption system including how to calculate elliptic curve ' s stairs is a large prime or including a large prime gene to ensure elliptic curve to be safe elliptic curve ; in this article safe elliptic curve is chosen by p1363 sae algorithm. besides, how to achieve fast point multiplication will influence the performance efficiency of the whole encryption system ; in this article, for different situations, signed binary method and rolling window method are respectively applied to perform quick operation of elliptic curve ' s point multiplication

    運算層是橢圓曲線密體制實現的最基礎、最核心的部分,包括如何來計算橢圓曲線的階為大素數或含有一個大的素因子,以保證所的橢圓曲線為安全橢圓曲線,本文根據ieeep1363協議的sea演算法實現了安全橢圓曲線的;另外如何實現標量乘的快速運算,將會影響整個密系統的實現效率,本文根據不同情況對橢圓曲線的標量乘法分別採用了帶符號的二進製法和滑動窗口法進行快速運算。
  13. Signature and verification systems, such as ecdsa etc, the discuss about key exchange systems such as deffie - hellman systeme, etc. this thesis also discussed several applications and information safety products of the elliptic curve cryptosystems at the finite field too, such as digital signature, the group signature, the application in the smart card

    Ecdsa等簽名驗證體制的, deffie - hellman等密鑰交換體制的研究。論文也討論了基於有限域上橢圓曲線公鑰密系統的若干應用和信息安全產品,如數字簽名,組簽名,在智能卡中的應用。
  14. Based on the coding technique and form database, the paper developed a form combinatorial innovation prototype system, presented some convenient realized methods such as to define the condition of actors combined and to select intelligently by define the condition of restriction, and realized them by programming

    以編技術和形態數據庫為基礎,開發了一個初步的形態組合創新的原型系統,提出了設定要素組合條件,擇約束條件對方案進行智能等方便實用的實現方法,並編程實現。
  15. Track your shipment status online by various methods - select from history database, enter tracking number, enter reference number and so on

    您可以透過多種方式來追蹤您的托運狀況-自托運記錄追蹤方式,然後輸入追蹤號參考號等。
  16. Explaining the coding scheme, fitness function, ga operator, etc details. the effectiveness is proved by the simulation result of matlab. 3

    詳細闡述了設計思想、編方案、適應度函數的、遺傳運算元的改進等細節問題,並使用matlab模擬證明該方法的有效性。
  17. Correct clones were selected and plasmid dna was isolated and digested with saci and puvii. a dna fragment of about 2. 1kb was purified and labeled by dig - 11dutp as probe. at least 40 positive clones were obtained from human genomic library by in situ colony hybridyzation with this probe. among them one clone contains human serum album dna by sequence

    以pcr擴增的人血清白蛋白( hsa )基因片段為探針,從人的基因組文庫中雜交篩的陽性克隆中,經測序分析,有一個克隆含有全長hsadna ,用從其它的陽性克隆中兩種dna片段,即dna修復基因hfen1和一段非編大片段cit987sk - 384d8 ,與人hsadna一起,進行顯微共注射,成功制備了轉多基因小鼠。
  18. Detailed address validation is a function you can select to validate the street number range and the suite apartment range of your ship to address for u. s. to u. s. shipments

    您可詳細地址確認功能來驗證美國境內托運收件人地址的街道號范圍以及房號范圍。
  19. In the dissertation, a " fast shamir algorithm represented by five - element joint sparse form " is presented. and it is demonstrated that comparing with other similar algorithms, the total numbers of the computation of our algorithm can be saved about 10 %, in the case of 192bit key. ( 5 ) in the implementation of elliptic curve cryptosystem, one of the key steps is to design and implement the base - point choice algorithm of elliptic curve finite group

    已經證明,用本文提出的「五元聯合稀疏形式表示的shamir演算法」計算標量乘法對,在192bit的密體制中,其計算量比同類演算法平均減少了10兒( 5 )實現橢圓曲線密體制還有一個關鍵的步驟,就是橢圓曲線有限群基點演算法的設計與實現。
  20. 3 ) furtherly, an entropy encoder can compress the quantified values losslessly, and give a better overall compression result, too. in this paper, a new adaptive arithmetic coding scheme is given

    3 )在熵編階段,比較了huffman編和算術編的優缺點,最後了一種自適應的算術編方案。
分享友人