hashing algorithm 中文意思是什麼

hashing algorithm 解釋
散列演算法
  • hashing : 犬兔追逐游戲〈為世界各地英國僑民所喜愛,游戲時跑在前面的人沿途撒下紙片、粉劑等,大批人尾隨其後跟蹤追趕〉。
  • algorithm : n. 【數學】演算法;規則系統;演段。
  1. In sequential pattern, we describe mfr and the algorithm on how to find frequent access paths. in mining association rules, we introduce famous apriori algorithm and propose the optimized dhp algorithm with hashing

    在關聯規則的挖掘中,深入的分析了經典的apriori演算法,並運用哈希技術改進它得到dhp演算法,其中詳細闡述了該演算法改進的思路。
  2. The general purpose hash function algorithm library contains implementations for a series of commonly used additive and rotative string hashing algorithms in the c + + programming language

    通用哈希函數運演算法則庫包括一系列通常使用的附加的或者循環的字元竄散列法運演算法則,在c + +程序語言中。
  3. The detail is clarified as follows : l ) based on the chaotic technology and contemporary encryption approach the paper put forward a new chaotic sequence, which introduced the m - sequence and the method of shrink key - the stream generator. the complexity of the sequence was promoted as the random alteration of the parameters of chaotic mapping, and at the same time, the shrinking key was used to enhance the security further more ; 2 ) the performance of one - way hash function was improved and new hash function construction methods are proposed through a novel hash method based on chaotic mapping and the aes - the rijndael algorithm. the algorithm of hashing messages of arbitrary length into 256 bits hash values was designed

    按照這種方法,輸出序列的周期性得以大大提高,理論分析和計算機模擬結果表明,該方法可以產生具有良好統計特性的密鑰流,而且易於軟硬體實現: 2 )實現了一種基於混沌映射和分組密碼rijndael演算法的單向hash函數的構造方法,即使用logistic混沌映射產生混沌二值序列,序列的分組與明文序列分組進行按位異或后,進入rijndael加密模塊,所得的結果再加入到反饋端,參與下一分組輸入的異或運算,迭代結束時的rijndael加密結果即為所求的hash函數值。
  4. Select a hashing algorithm from the following list

    請從下表中選擇散列演算法。
  5. What s a good hashing algorithm to use

    什麼是適用的好雜湊演演算法呢?
  6. Thus, it is very difficult to decode the hashing algorithm ; the security is enhanced via using the selected matrix and iteration time as the secret keys

    將所選用的矩陣和迭代次數作為浮水印的密鑰,提高了演算法的安全性。
  7. If you publicly release a regular cryptographic hash for a document, anyone can verify the hash, assuming they know the hashing algorithm

    如果您公開發布一個文件的有規律密碼雜湊,則任何人都可以檢驗該雜湊,假設他們知道雜湊演演算法的話。
  8. The subject is identified as taking part in an integrity check operation that uses only a hashing algorithm

    使用者是在參與只使用哈希演算法的完整性檢查操作過程中被標識的。
  9. The md5 algorithm is the de facto hashing standard for digests

    Md5演算法是事實上的標準摘要哈希演算法。
  10. Message queuing on the source computer uses the hashing algorithm when creating a digital signature for a message

    為消息創建數字簽名時,源計算機上的消息隊列使用此哈希演算法。
  11. On the source computer, message queuing uses the hashing algorithm when creating a digital signature for a message

    在源計算機上,消息隊列在為消息創建數字簽名時使用哈希演算法。
  12. To authenticate messages, the message queuing run - time dll on the source computer uses a hashing algorithm when creating a digital signature for a message

    若要對消息進行身份驗證,源計算機上的消息隊列運行時dll在創建消息的數字簽名時使用哈希演算法。
  13. First, the hashing algorithm is applied to the code they wish to distribute

    首先,對所要分發的代碼應用散列演算法。
  14. If successful, the same hashing algorithm will be applied to the code

    如果驗證成功,則對該代碼使用同樣的散列演算法。
  15. The hashing algorithm is applied to the value of the partitioning key, and generates a partition number between zero and 4095

    散列演算法應用於分區鍵的值,產生0到4095之間的一個分區號。
  16. Trailing blanks in character strings char, varchar, graphic, or vargraphic are ignored by the hashing algorithm

    字元串中( char 、 varchar graphic或vargraphic )的尾部空格會被散列演算法忽略。
分享友人