編密碼系統 的英文怎麼說

中文拼音 [biāntǒng]
編密碼系統 英文
encryption system
  • : Ⅰ動詞1 (編織) weave; plait; braid 2 (組織; 排列) make a list; arrange in a list; organize; gr...
  • : Ⅰ名詞1 (秘密) secret 2 [紡織] (密度) density 3 (姓氏) a surname Ⅱ形容詞1 (距離近; 空隙小)...
  • : Ⅰ名詞(表示數目的符號或用具) a sign or object indicating number; code Ⅱ量詞1 (指一件事或一類的...
  • : 系動詞(打結; 扣) tie; fasten; do up; button up
  • : Ⅰ名詞1 (事物間連續的關系) interconnected system 2 (衣服等的筒狀部分) any tube shaped part of ...
  • 系統 : 1. (按一定關系組成的同類事物) system 2. (有條理的;有系統的) systematic
  1. ( 3 ) according to the characteristics of the selected objects, the selecting processes and the practical problems in the process of establishing a scm - oriented ave, a three - stage plan and evaluation architecture of partner enterprise selection are presented and a multi - objective optimization model for selecting partner enterprises in aves are given. by means of the methods of integer planning, benchmarking, analytic hierarchy process ( ahp ) and so on, the fuzzy values of critical decision - making factors ( such as

    通過實際應用驗證,該erp具有?一致的信息、較好的開放性、集成性、外延性,併兼顧了自動與人工、通用化與行業化兩方面,使具有較高的柔性和較強的實用性,可輔助企業實現科學、可靠的產品報價和即時生產it卜該erp既不失mnyll的性和嚴性,又保持了ji
  2. The contents adds the to code the system ". the colloquy dvd sees the arithmetic figure to add the project. only the that the dvd that css admit to broadcast the to can just break password see data

    「內容加」 。正式的dvd視頻數字加方案。僅css許可的dvd播放器才可以破譯視頻數據的
  3. For the anticounterfeiting of printings ( such as certificate ), the existent many ways ( such as rainbow holograms ) are not available as the need for special use : anti - distortion and anti - copy. basing in the double - random - phase transform, this article puts forward a new way that two - dimensional bar code is used as anticounterfeiting label with anti - printing ? scanning and anti - damage properties. the major job are : ( 1 ). basing in the ascii codes, numerals and alphabets are encoded and subsequently transformed into two - value bar code matrix figure. later, using amplitude - based double - random - phase transform, the enciphered gray scale figure is formed. by computer simulation ( 4f system ) and printing as well as scanning ( 20 times ), we get the result that the gray scale figure with little miscoding rate ( 0. 0026 ) by “ matrix expanding way ”

    本文主要開展了以下三項研究工作: ( 1 ) .用自定義方案,將數字和字母( ascii)轉換成二值條圖;對該圖形進行振幅型雙隨機相位加變換,得到原信息的加灰度圖;通過4f光學計算機模擬和列印-掃描實驗,證明本文提出的「矩陣擴展法」灰度圖具有較小的誤率,對於20次列印-掃描實驗,誤率不大於0 . 0026 。
  4. Quantum entanglement shared by more than two particles or parties is the essential base for developing quantum communication networks. using the multipartite entanglement the novel telecloning, controlled dense coding, sharing secure quantum states and reduction of communication complexity can be realized

    為了研究量子網路,必需研究兩個以上子之間的糾纏,即多粒子或多組份糾纏,利用它可以實現遠程克隆( telecloning ) 、可控、共享秘量子態以及減小通訊復雜性( reductionofthecommunicationcomplexity )等。
  5. Depending on cellular location and function of thioredoxins, there are two thioredoxin systems in high plants, one is nadp / thioredoxin system mainly existing in chloroplast of high plant and eucaryote algae and oxygenic photosynthetic prokaryote, which is composed of nadph, nadph - dependent thioredoxin reductase, thioredoxin - f and thioredoxin - m

    在高等植物中,存在兩個與硫氧還蛋白切相關的硫氧還蛋白:一個是位於葉綠體中的鐵氧還蛋白-硫氧還蛋白,該中含有兩類核基因的硫氧還蛋白即f -型trx和m -型trx 。
  6. At first, double random phase encoding techniques are looked back and its improved methods are introduced in detail. in connection with characteristics of spherical wave gene and function of phase mask, one random phase encoding techniques are proposed with spherical wave based on 4f system

    本文首先對雙隨機相位加技術進行了回顧,並對它的一些改進方案的特點作了詳細介紹,並在此基礎上,根據球面波相位因子的特點和相位掩模在加解中作用,提出了一種利用球面波照射4f的單隨機相位的新方法。
  7. Encrypted data is returned either as a binary string or, optionally, as a base64 encoded string, which is useful for ensuring that the encrypted string does not accidentally contain system delimiter characters a topic that is discussed in more detail later in this article

    被加的數據或者以二進制字元串的形式返回,或者以base64的字元串返回,後者對于確保加的字元串不包含定界字元很有用(在本文後面會更詳細地討論這個話題) 。
  8. The system employs 128 - byte encryption [ c8 ], the same as banks, to ensure security and privacy

    和銀行加強安全和保的措施一樣,這個也使用了128位元組的
  9. " in the login page. then enter the contact email address used during registration. a new system generated password will be sent to you via email

    的連結,並輸入登記時的電郵地址,我們將立即將紅人名稱及選之電郵給你。
  10. After successful login with the new system generated password, please go to " my account change username or password " and reset your own personal password

    收取選之后,你可以到我的紀錄更改紅人名稱及內更改
  11. We discuss the theory and technology of coding and cryptology in the study of information security and information reliability in the disseration. some valuable theoretic results are presented, most of these results are published on the important journey of china, parts of these results are used in some application system. in the design and analysis of error - correcting codes, we obtain the following results

    本文探討了信息安全和信息可靠性研究中的理論與技術,在糾錯的設計與分析、序列的設計與分析以及分組的設計與分析等方面,得到了一些有價值的理論結果,大多數結果已在國內核心刊物上發表,有些結果已用於實際的應用
  12. Specialist uk - based cable manufacturer. web site features comprehensive information on the company ' s renowned flex and flow product cable lines, plus a securely encrypted on - line ordering system

    專家位於英國的纜線製造業者.網站為關于公司的有名電線的廣泛資訊作廣告,而且流量產品打海底電報線,加上一安全地的線上命令
  13. In this dissertation, the basic principles of the coding and decoding of ldpc codes are studied systematically, and some code - design problems such as the design of degree distribution sequences, the design of girths and the design of efficient encode - able ldpc codes are analyzed in detail. based on all these efforts, some positive results are obtained and summarized as follow : 1

    本文在對低度校驗現有理論的研究基礎上,地分析了低度校驗在刪除通道下的糾錯性能和度序列設計、低度校驗的圍長設計和快速設計等設計問題,獲得了一些研究成果,主要概括為: 1
  14. Another argument is that with freely available blueprints, crackers will have it easy writing malicious code to attack systems

    另一條理由是:有了可免費獲得的設計,解高手在寫攻擊的惡意代時將更為容易。
  15. One important feature of radio signals ’ is that the signals are easy to catch and to disturb. in order to disturb the radio signals, parameters, including code rate, modulation, protocol, protection methods and channel coding, about satellite ’ s signals should be known. so, it is possible to receive the data from satellites and obtain lots of information from it, and even to destroy the undesired information

    衛星通信的遙控遙測信息都是通過無線通道傳遞,而無線電信號的一個很重要的特性就是發射易被接收、易被干擾,實現干擾的前提是對衛星信號參數的極大了解,這包括明確信號的速率、調制方式、所用協議、保措施及通道等,因此,通過接收衛星數據以獲取大量的未知信息,甚至破壞掉對己的不利信息就成為可能。
  16. Rfc821, 2821, 2554, 2822, 2920, 3030 have defined the protocol smtp. i use self - programming method, which is the certification rfc2554 supplied, to transmit emails by ldap in qmail system. i store username and password in ldap, which can speed up the access

    Rfc821 , 2821 , 2554 , 2822 , 2920 , 3030等對smtp協議做出了規范,我們使用rfc2554提供的認證機制,採用自程方式認證,提出了在qmail中使用ldap轉發郵件的機制,利用ldap存儲用戶名和,大大提高了訪問速度,能滿足大規模用戶的訪問需要。
  17. Utilizing entanglement, we can implement the disembodied transport of an unknown quantum state from one place to another remote place with high - fidelity, i. e. quantum teleportation. via entanglement, we can also improve the channel capacity of classical signal in quantum channel, i. e. quantum dense coding, even we can entangle two quantum systems that have never directly interacted with each other by means of entanglement swapping

    利用量子糾纏,通訊雙方可以實現對一個量子態的高保真度遠程傳輸,即量子離物傳態;利用量子糾纏,通訊雙方可以實現經典信息的高通道容量傳輸,即量子;甚至可以使原本不糾纏的量子產生糾纏,即糾纏交換。
  18. Ieice trans. fundamentals, 2003, e86 - a : 2844 - 2852

    尤其是訊號處理錯誤控制的設計。
  19. Requires double authentication. you have to pass the authentication procedures by inputting two pieces of information i. e. the taxpayer identification number and password

    雙重核實使用者的身分,你須輸入稅務號及通行,通過的確認身分檢查,才可使用服務;
  20. Requires double authentication. you have to pass the authentication procedures by inputting two pieces of information i. e. the taxpayer identification number and e - tax password

    雙重核實使用者的身分,你須輸入稅務號及稅務易通行,通過的確認身分檢查,才可使用服務
分享友人