線對標簽 的英文怎麼說

中文拼音 [xiànduìbiāoqiān]
線對標簽 英文
pair identification tag
  • : 名詞1 (用絲、棉、金屬等製成的細長的東西) thread; string; wire 2 [數學] (一個點任意移動所構成的...
  • : Ⅰ動詞1 (回答) answer; reply 2 (對待; 對付) treat; cope with; counter 3 (朝; 向; 面對) be tr...
  • : Ⅰ名詞1 [書面語] (樹梢) treetop; the tip of a tree2 (枝節或表面) symptom; outside appearance; ...
  • : Ⅰ動詞1 (簽名) sign; autograph 2 (簽署意見) make brief comments on a document3 (粗粗地縫) ta...
  • 標簽 : label; tag; counter mark; pag; mark; tally; swatch (染布時用); reader; price tag
  1. Then the author focus on schemes including identification, digital signature and deniable authentication, and several classical algorithms are addressed as well. in addition, we analyze the differences between standard security paradigm and random oracle paradigm. based on all above, by using elliptic curve, we establish a new identification scheme and its corresponding digital signature scheme under random paradigm

    文章詳細的分析了認證系統的三種類型,即身份認證、數字名和消息認證,剖析了一些經典的方案,並準安全模式與隨機oracle模式做出比較,並基於隨機oracle模式提出了一個新的身份認證演算法及其相應的數字名變形,兩個演算法均在橢圓曲上實現。
  2. Firstly, the complex characteristics of the seal images caused in the process of producing conditions are analyzed. to solve these problems respectively, the circularity clusters and the ostu method are firstly used to realize the shape classification and threshold processing of different seal images. then the image denoise is performed well by scanning beam seed filling and labeling algorithm

    論文中首先分析了印鑒圖像由於蓋印條件造成的圖像本身的一些復雜特點,提出了運用圓形度聚類和最大方差比演算法圖像進行形狀分類和閾值處理,隨后利用掃描種子填充演算法和貼刪演算法進行噪聲的去除等預處理。
  3. 6 pairs of twin strands - 6 is star of david and merkaba a label we put on the way in which we spiral / spin from one reality to another

    6雙生子- 6就是我們以盤旋投身進的道路的大衛之星和卡巴拉/從一個實相到另一個實相的旋轉。
  4. To add " there are many loopholes in the operation and sales practices of telecommunications service providers, " after " that, as " ; to add " and such complaints from the public are often not followed up effectively by government departments, " after " in recent years, " ; to add " stipulate corresponding penalties " after " to cover pay television, " ; and to add " ; furthermore, as the hong kong housing authority has signed agreements with pay television operators, these operators can enter the buildings to set up and maintain communal aerial systems and can deploy front - line promoters to approach the residents to sell other various commercial services, using the provision of exclusive maintenance and supply services as a selling point and adopting unscrupulous means to entice or mislead the residents into signing an agreement with them, causing great disturbance to the residents ; in this connection, the government must adopt measures to combat such sales malpractices, take the initiative to inform public rental housing tenants of the rights and responsibilities of the operators and, when the operators resort to malpractices or malpractices are reported by residents, take immediate action to investigate the matter and issue warning to and penalize the operators concerned ; the government must also review the problem of inequity in accessing system information by consumers and the telecommunications service providers, whereby consumers have no means or right to obtain true and accurate information about the systems that they are using and can only pay the fees according to the volume, system and time slots of their calls shown on the records provided unilaterally by the service providers, and in case of queries about such information, the decision of the service providers prevails and there is no channel for the consumers to dispute or verify ; to this end, the government should expeditiously study how to ensure that consumers have the rights to know, choose, verify, appeal and claim for compensation in the provision of telecommunications services including pay television, local and cross - boundary telecommunications and internet services " after " in the contracts "

    在"鑒于"之後加上"各電訊服務提供者的營運和銷售存在不少漏洞, "在"不斷增加, "之後加上"而市民的投訴又往往得不到政府部門的有效跟進處理, "在"收費電視, "之後加上"訂定相應的罰則, "及在"準合約條款"之後加上"此外,由於香港房屋委員會與收費電視營辦商訂協議,該等營辦商可進入大廈鋪設及維修公共天系統,並調派前銷售人員,以獨家提供維修及供應服務作為招徠,向住戶推銷其他各種商業服務,以不當手法誘使或誤導住戶與他們約,居民造成很大困擾就此,政府必須採取措施打擊上述違規營銷的手法,並主動告知公屋住戶該等營辦商的權責范圍,遇有營辦商作出違規的行為或居民舉報營辦商的違規行為時,須立即追查,並向有關營辦商發出警告及作出處分政府亦須檢討現時消費者與電訊服務供應商所獲系統資訊並不等的問題,即消費者無從及無權得知他們所選用系統的真實資料,令他們只能按服務供應商單方面提供有關通話量通話系統及通話時段的記錄繳交費用,遇有消費者質疑上述資料時,往往只由服務供應商作最終決定,消費者無從申辯或查證就此,本會促請政府盡快研究如何就各類電訊服務包括收費電視本地及跨境電訊網際網路等的提供,確保消費者享有知情權選擇權覆核權投訴權及索償權" 。
  5. Firstly, we generalize and analyze the advantages and present research of elliptic curve cryptography ; secondly, we study the basic theory of the ecc ; thirdly, we illustrate the safety of the ecc and discuss the elliptic curve key agreement scheme, elliptic curve encryption scheme and elliptic curve digital signature algorithm ; fourthly, we study fast algorithms of the multiplication and inversion multiplication of the element of in the underlying finite field f2m whose characteristic is two represented by the two basis of optimal normal basis and polynomial basis. we make improvements to the fast algorithm of the polynomial basis multiplication by hankerson and base on the experiments, we describe the properties and compare the advantages of the multiplication and inversion multiplication of the elements in f2m field under optimal normal bases and polynomial basis. results concluding from the study car be used as references in the realization of the elliptic curve cryptosystem ; fifthly, we overview the current fast algorithm of point multiplication, improve the fix base point comb algorithm, advance the speed of the whole system and remark the advantages and disadvantages of the popular algorithms based upon the experimental datas ; sixthly we realize the algorithm library of elliptic curve cryptography based on the f2m. only change slightly in our algorithm library can we realize the ecdh, eces, ecdsa based onf2m of anysize ; seventhly, we realize the ecc on two secure elliptic curves, including ecdh, eces, ecdsa

    本文首先介紹並分析了橢圓曲密碼體制的優點及研究現狀;其次研究了橢圓曲密碼體制的基本理論;第三,分析了橢圓曲密碼的安全性並介紹了密鑰共享,加密,數字名等橢圓曲密碼體制;第四,深入研究了特徵為2的有限域f _ 2m中的元素在多項式基和最優正規基表示下的乘法運算和乘法逆運算的快速演算法,並hankerson等人提出的多項式基下的乘法運算的快速演算法作了改進,而且在實驗的基礎上不僅分析研究了f _ 2m域中元素在多項式基和最優正規基表示下的乘法和乘法逆運算的性能,還這兩種基表示下的f _ 2m域中元素運算效率的優劣作了比較和研究,所得的結論可供在實現橢圓曲密碼體制時參考;第五,研究了目前流行的計算橢圓曲量乘法的快速演算法,同時改進了固定基點梳形法,提高了整個系統的速度,並在實驗的基礎上分析研究了流行演算法的優劣;第六,實現了基於f _ 2m的橢圓曲密碼體制的演算法庫,在我們的演算法庫中只需稍微改變便能實現基於任意尺寸的f _ 2m上的ecdh , eces , ecdsa等橢圓曲密碼體制;第七,實現了兩條安全橢圓曲上的橢圓曲密碼體制,包括ecdh , eces , ecdsa 。
  6. Rfid antennas we research operate at 915mhz, which belong to vhf, therefore microstrip patch antenna is adopted as base station antenna and various balanced dipole antennas are employed as tag antennas. then, a brief introduction is given on the radiating principles of the microstrip antenna

    由於本課題所研究的rfid天主要工作於915mhz ,屬于甚高頻波段,因而基站天主要採用微帶貼片型,主要採用各種稱振子型天
  7. Bst - ant - s series hf long range antenna can read or write the iso iec15693 rfid tag matching with the hf long range device. its range can up to 65cm

    Bst - ant - s系列高頻遠距離天,可配合高頻遠距離讀寫設備符合iso iec15693準的電子進行數據的讀寫操作,讀卡距離可達65cm 。
  8. Bst - ant - d01 series hf long range desk antenna can read or write the iso iec15693 rfid tag matching with the hf long range device. its range can up to 35cm

    Bst - ant - d01高頻遠距離桌面型天,可配合高頻遠距離讀寫設備符合iso iec15693準的電子進行數據的讀寫操作,讀卡距離可達35cm 。
  9. Antennas are feed by 50ohm coaxial cable and feed networks are unnecessary. and then, tag antennas are analyzed and designed, which include plate balanced dipole antenna, triangle balanced dipole antenna and inductively coupled feed meander - line antenna. theory analysis and simulations are given and optimal results are achieved

    然後,進行了分析與設計,分別片狀稱振子天、三角形稱振子天、感應耦合饋電折疊等天形式進行了研究,給出理論分析和模擬計算,得到滿足設計要求的各種形式的
  10. Aiming at the disadvantage of bar code, this paper suggests the use of electronic label identify technology of wireless ; then it introduces the design of new pattern balance and payment system in supermarket, including the structure model, the net model and the security strategy

    摘要首先提出採用無電感應式電子識別技術來改善現代超市中因條形碼不足而帶來的超市結算支付速度低及管理不善等弊端;然後新型的結算支付系統的設計進行描述,包括結構模型、網路模型及系統的安全策略。
  11. The desktop reader is one high efficiency reader which is specially developed by best technology company. the reader uses the big area antenna, and has wide and big radial reading range. the product is suitable for high efficiency reading or writing

    臺式寫密儀是倍思得公司專為高效讀寫電子而開發的一款讀寫器,讀寫器使用大面積的天傳感器,擁有寬距離以及大半徑的讀卡面積,適合讀寫性能要求高及批量讀寫卡的應用。
  12. The desk encryption device is one high efficiency reader which is specially developed by best technology company. the reader uses the big area antenna, and has wide and big radial reading range. the product is suitable for high efficiency reading or writing

    小臺式寫密儀是倍思得公司專為高效讀寫電子而開發的一款讀寫器,讀寫器使用大面積的天傳感器,擁有寬距離以及大半徑的讀卡面積,適合讀寫性能要求高及批量讀寫卡的應用。
  13. The elliptic curve digital signature algorithm ( ecdsa ) is the elliptic curve analogue of the digital signature algorithm ( dsa ). it was accepted in 1999 as an ansi standard, and was accepted in 2000 as ieee and nist standards. unlike the ordinary discrete logarithm problem and the integer factorization problem, no subexponential - time is known for the elliptic curve discrete logarithm problem. for this reason, the strength - per - key - bit is substantially greater in an algorithm that uses elliptic curves

    橢圓曲數字名演算法( ecdsa )是數字名演算法( dsa )的橢圓曲等。它先後成為ansi , ieee , nist和iso的準,而且其它的一些組織正在考慮成為其準。不象普通的離散數問題和因數分解問題,橢圓曲離散數問題沒有已知的亞指數演算法,所以使用橢圓曲的演算法在密鑰的位強度是足夠高的。
  14. It is demonstrated that changing parameters of the dipole antenna is an effective method to adjust its resonant characteristics ; the good reduced size can be achieved by properly altering its parameters ; and the meander - line dipole antenna are suitable for the application as rfid tag antenna

    結果表明,彎折偶極子天的參數改變諧振特性有較強的調節作用,適當的改變天的參數可以獲得較好的天尺寸縮減特性,適合rfid的應用。
  15. For example, you may want to align the horizontal snaplines of text - based controls, such as labels, with the top and base lines of the text instead of the top and bottom edges of the control

    例如,您可能希望將基於文本的控制項(如)的水平與文本的頂和基(而不是控制項的頂部和底部邊緣)
  16. Then, it introduce several cryptographic protocol based on elliptical curve, including diffie - hellman key switching, elgamal encryption and decryption, elgamal digital signature, ecdsa, etc. based on these, the author analyze kinds of security threat faced to 3g system and discuss the security rule and security objectives

    然後介紹了基於橢圓曲的幾種密碼協議,包括diffie ? hellman密鑰交換, elgamal加解密, elgamal數字名, ecdsa等協議。在此基礎之上,分析了3g系統面臨的各種安全威脅並系統的安全原則和安全目進行了討論。
分享友人