加字首 的英文怎麼說

中文拼音 [jiāshǒu]
加字首 英文
prefix
  • : Ⅰ名詞1 (文字) character; word 2 (字音) pronunciation 3 (字體) form of a written or printed ...
  • : Ⅰ名詞1 (頭) head 2 (首領) leader; head; chief 3 (表示方位) aspect 4 (姓氏) a surname Ⅱ動...
  1. The structure of this paper goes like this, the first chapter introduce the development of e - b / l in practice and in laws. and draw a conclution that the electrification of the b / l is a history tide. in the second chapter, on the basic of reseach the security trap in e - b / l running, 1 conclude six security elements of, e - b / l : the liability of the system, the authenticity of dealers ' identity. the integrity and secrecy of electronic data, and the validity and evidence effectiveness of electronic data. from the third chapter to the eighth, 1 reseach these elements one by one. the third chapter introduce the establishment of the e - b / l security system, and some related laws the fourth chapter introduce the certification authority of e - b / l. in the fifth chapter, 1 introduce the encrypt of electronic information and some countries ' control on use / import / export crytography. the sixth chapter introduce the concept and principle of digital signature, and reseach some related legal issues. the seventh chapter reseach the legal demand of validity, then come to a conclution that to establish a independent electronic information system is necessary. in the eighth chapter, 1 reseach some countries " regulation on the evidence effectiveness of electronic data

    第二章在分析電子提單運作中的安全隱患的基礎上,歸納出其六大安全要素,即系統的可靠性、交易者身份的真實性、數據電訊的機密性和完整性、數據電訊的合法有效性以及交易者行為的不可抵賴性。第三章到第八章分別對這六大要素進行分析:第三章介紹了電子提單網路安全體系的建立以及系統安全保護法規,第四章則介紹了電子提單的安全認證機構,第五章介紹了信息密技術以及各國立法對密碼技術的進出口及使用的控制,第六章介紹了數簽名的概念及原理,並以bolero為例介紹了數簽名的技術方式,對有關法律問題作了論述;第七章先論述了電子提單對有效性的法律需求,然後結合國內法和國際規則的規定論證了數據電訊制度產生的必然性;第八章通過對各國立法對電子證據的法律效力的規定,論述了對電子交易至關重要的數據電訊的不可抵賴性。
  2. For regarding believe - on - me they said it was nought else but notion and they could conceive no thought of it for, first, two - in - the - bush whither she ticed them was the very goodliest grot and in it were four pillows on which were four tickets with these words printed on them, pickaback and topsyturvy and shameface and cheek by jowl and, second, for that foul plague allpox and the monsters they cared not for them, for preservative had given them a stout shield of oxengut and, third, that they might take no hurt neither from offspring that was that wicked devil by virtue of this same shield which was named killchild

    先,伊誘彼等前去之「雙鳥在林」 ,乃天下第一洞,內設置四枕,附四標簽,印有「騎角」 , 「顛倒」 「赦顏」 「狎昵」樣。其次, 「預防法」給彼等以牛腸製成之堅固盾牌,對惡疫「全身梅毒」及其他妖怪,亦無須懼怕。第三,憑借稱作「殺嬰」之盾牌,惡鬼「子孫」亦無從害於彼等。
  3. The event was held at no 10 and was witnessed by the prime minster and deputy prime minister

    儀式在唐寧街10號進行,相與副相也到場參
  4. As well as uncovering many notorious archeological sites - including the atlantean pyramid and the last resting place of the dagger of xian, lara has found fame in other areas she has driven the dangerous alaskan highway from tierra del fuego in south america in record time although this was later denounced by the guinness book of records due to her " reckless driving " and she hit the headlines again when she hunted out and killed bigfoot in north america.

    眾所周知,勞拉發現了許多有名的遺跡,包括亞特蘭蒂斯金塔以及西安匕的最後藏匿之地,除此之外,讓勞拉成名的事還有:她以破紀錄的時間駕車從美國南部的tierra del fuego開始跑完危險的阿拉斯公路盡管后來還因為莽撞駕駛遭到吉尼斯世界紀錄大全的譴責。另外,在北美洲找到並殺死大腳怪之後她又成了頭條新聞。
  5. 7. the sub - committee noted an information paper on the seasonal adjustment of hong kong s monetary statistics, using special high - frequency filtering to take account of increased currency holdings in the chinese new year season and an adjustment for the increase in cash demand associated with y2k as well as increases in demand deposits due to initial public offers ipos, in addition to conventional techniques

    委員會獲悉一份有關香港貨幣統計數的季節性調整的資料文件,除了一般慣用的方法外,有關調整亦運用了特別的高頻過濾法,以計及農歷新年期間公眾增持貨幣的情況,並就因電腦公元二千年問題的現金需求增及活期存款因次公開招股的增而作出調整。
  6. Firstly, we generalize and analyze the advantages and present research of elliptic curve cryptography ; secondly, we study the basic theory of the ecc ; thirdly, we illustrate the safety of the ecc and discuss the elliptic curve key agreement scheme, elliptic curve encryption scheme and elliptic curve digital signature algorithm ; fourthly, we study fast algorithms of the multiplication and inversion multiplication of the element of in the underlying finite field f2m whose characteristic is two represented by the two basis of optimal normal basis and polynomial basis. we make improvements to the fast algorithm of the polynomial basis multiplication by hankerson and base on the experiments, we describe the properties and compare the advantages of the multiplication and inversion multiplication of the elements in f2m field under optimal normal bases and polynomial basis. results concluding from the study car be used as references in the realization of the elliptic curve cryptosystem ; fifthly, we overview the current fast algorithm of point multiplication, improve the fix base point comb algorithm, advance the speed of the whole system and remark the advantages and disadvantages of the popular algorithms based upon the experimental datas ; sixthly we realize the algorithm library of elliptic curve cryptography based on the f2m. only change slightly in our algorithm library can we realize the ecdh, eces, ecdsa based onf2m of anysize ; seventhly, we realize the ecc on two secure elliptic curves, including ecdh, eces, ecdsa

    本文先介紹並分析了橢圓曲線密碼體制的優點及研究現狀;其次研究了橢圓曲線密碼體制的基本理論;第三,分析了橢圓曲線密碼的安全性並介紹了密鑰共享,密,數簽名等橢圓曲線密碼體制;第四,深入研究了特徵為2的有限域f _ 2m中的元素在多項式基和最優正規基表示下的乘法運算和乘法逆運算的快速演算法,並對hankerson等人提出的多項式基下的乘法運算的快速演算法作了改進,而且在實驗的基礎上不僅分析研究了f _ 2m域中元素在多項式基和最優正規基表示下的乘法和乘法逆運算的性能,還對這兩種基表示下的f _ 2m域中元素運算效率的優劣作了比較和研究,所得的結論可供在實現橢圓曲線密碼體制時參考;第五,研究了目前流行的計算橢圓曲線標量乘法的快速演算法,同時改進了固定基點梳形法,提高了整個系統的速度,並在實驗的基礎上分析研究了流行演算法的優劣;第六,實現了基於f _ 2m的橢圓曲線密碼體制的演算法庫,在我們的演算法庫中只需稍微改變便能實現基於任意尺寸的f _ 2m上的ecdh , eces , ecdsa等橢圓曲線密碼體制;第七,實現了兩條安全橢圓曲線上的橢圓曲線密碼體制,包括ecdh , eces , ecdsa 。
  7. The digital if signal is converted to zero if by digital down converter, then taken fft spectrum analysis with hann window in advance

    中頻信號先通過數混頻下變頻至零中頻,然後作海窗的復fft譜分析。
  8. The capital of nevada, in the western part of the state near the california border. it was laid out in1858 on the site of an earlier trading post and named in honor of kit carson. population, 40, 443

    卡森市美國內華達州府,位於該州西部並與利福尼亞邊界毗鄰,於1858年在一個早期貿易點的舊址上建立,為紀念凱特?卡森而以他的名命名。人口40 , 443
  9. A special hand - back service will be provided on january 17, 2003 at the new office, whereby official and privately made unregistered covers with full postage prepaid and bearing the words " first day cover " and a local address will be accepted and impressed with the normal post office datestamp or the philatelic pictorial postmark, depending on the customers choice and handed back to them

    此外,新局亦會在開幕當日發售紀念封,並提供即時蓋印服務。凡已付足郵資、註明日封樣而寫上本港地址的正式及自製非掛號信封,均可蓋郵局普通郵戳或集郵局圖案郵戳,並即時取回。
  10. A special hand - back service will be provided on 4 february 2002 at the new office, whereby official and privately made unregistered covers with full postage prepaid and bearing the words " first day cover " and a local address will be accepted and impressed with the normal datestamp of the office and handed back to the customer

    天悅郵政局會于啟用當日提供特別的即時蓋印服務。凡已付足郵資、註明日封樣並寫上本地地址的正式和自製非掛號信封,均可交予櫃位職員蓋郵局普通郵戳,隨即取回。
  11. A special hand - back service will also be provided at the new office on monday, 1 august 2005, whereby official and privately made unregistered covers with full postage prepaid and bearing a " first day " indication and a local address will be accepted and impressed with the normal post office datestamp at the counter and handed back to customers

    新郵政局亦會在八月一日提供即時人手蓋印服務。凡已付足郵資、註明樣及本港地址的正式及自製非掛號信封,均可蓋郵局普通郵戳,並可即時取回。
  12. Firstly, the system is divided into four sub systems : chinese characters recognition system, character recognition system, recognition system including characters and digits, and digital recognition system ; secondly, the statistic information about left ( right ) scan line free length of every character is used as a group feature

    先將車牌元識別分成四個子識別系統一一漢識另11系統、母識別系統、母和數混和識別系統,以及數識別系統:然後選擇各元的左(石)掃描線空程長度統計信息作為車牌元的一組特徵,與統計模板進行權組合,來共同完成車牌元的識別
  13. We may embellish a story, forget a word of the song, adapt an old technology or concoct a new theory out of old ideas

    我們也許會給聽來的故事添枝葉、忘記一歌里的一個、改造舊技術、以老點子發明新理論。
  14. Chicago tavern said it will begin selling chicken wings coated in one of the world ' s hottest peppers - - a dish so hot that patrons first have to sign a waiver agreeing not to sue for injuries

    哥一間小酒館指出,將開始賣一種塗上堪稱世界上最嗆辣椒的雞翅?這道菜太過辛辣,因此顧客先必須簽,同意放棄法律追訴權。
  15. A chicago tavern said it will begin selling chicken wings coated in one of the world ' s hottest peppers - - a dish so hot that patrons first have to sign a waiver agreeing not to sue for injuries

    哥一間小酒館指出,將開始賣一種塗上堪稱世界上最嗆辣椒的雞翅?這道菜太過辛辣,因此顧客先必須簽,同意放棄法律追訴權。
  16. In this thesis we firstly made all kinds of statistics on chinese character stroke information of chinese national standard code for information interchange ( gb2312 - 80 ), such as the average strokes of each chinese character and each character which uses utility frequency as its weight, the average strokes of each character been added weight or not that can be differed from the other characters, the number of chinese characters which begin with each stroke, the times of each stroke in the chinese character set, the chinese characters which have same strokes in the chinese character set, and the frequency of adjacent stroke, etc. according to the statistic, we have devised a new chinese character keyboard input method named " stroke code " by adopting the stroke sequence of hand - written chinese character as its input codes and designed a kind of key arrangement for the method

    論文先統計了國標二級庫中漢筆畫信息的各種數據,這些數據主要包括:漢的平均筆畫數及按使用頻度權的平均筆畫數、能與其它區分開的漢前若干筆畫的平均數與權平均數、以各種筆畫起筆的漢數、各種筆畫在漢庫中的出現次數、漢庫中筆畫相同的漢以及漢庫中相鄰筆畫的頻度等。根據這些統計數據,我們採用書寫漢時的筆畫順序作為漢輸入碼,設計了筆畫碼漢輸入法和實現該輸入方法的鍵盤。
  17. Firstly, the structure of the laser accelerometer based on psd are designed in this dissertation. the relation between the output pulse difference and the input acceleration is derived

    本論文主要研究內容:先,設計了基於psd的激光速度計系統的結構,針對此結構推導了該數式力平衡速度計輸出脈沖差與輸入速度之間的關系。
  18. Secondly, some encryption algorithms are introduced, with the analysis and comparison for these encryption algorithms, the author designs an appropriate project to accomplish the end - to - end encryption. thirdly, this paper accomplish the design of an encryption scheme which combining the strongpoint of the rsa algorithm and the idea algorithm. the main process is as following : first, input the digital signal to the encryption device, and then the digital signal exclusive or with the keying sequence which is generated by key stream generator ( ksg ) and the ksg is based on the idea encrypting and deciphering algorithm, the secret key synchronization is also studied

    本課題主要研究的內容是數集群通信系統密機制的研究,先介紹了數集群通信系統的安全保密機制,講述了單向和雙向鑒權的過程、單呼和群呼的空中介面密過程及其密鑰的選用和管理,特別介紹了端到端密;然後介紹了幾種常用的密演算法,通過分析其優劣,提出了端到端密的解決方案;最後完成了基於rsa演算法和idea演算法的數集群通信系統密方案的設計,其具體過程為將經過數信號送入密器里,和以idea密演算法為基礎設計的密碼流發生器( ksg )產生的密碼序列進行解密運算,並且研究了此密過程的密碼同步問題。
  19. It also teaches you to enlarge your vocabulary greatly in a short time by memorizing new words from prefixes, suffixes and roots

    並且教你認識各種根、尾的含意,幫助你輕松增匯、記憶生
  20. A multiple of a unit in the international system is formed by adding a prefix to the name of that unit

    經由在單位名稱前面構成國際制度單位的倍數。
分享友人