自編密碼 的英文怎麼說

中文拼音 [biān]
自編密碼 英文
private code
  • : Ⅰ代詞(自己) self; oneself; one s own Ⅱ副詞(自然;當然) certainly; of course; naturally; willin...
  • : Ⅰ動詞1 (編織) weave; plait; braid 2 (組織; 排列) make a list; arrange in a list; organize; gr...
  • : Ⅰ名詞1 (秘密) secret 2 [紡織] (密度) density 3 (姓氏) a surname Ⅱ形容詞1 (距離近; 空隙小)...
  • : Ⅰ名詞(表示數目的符號或用具) a sign or object indicating number; code Ⅱ量詞1 (指一件事或一類的...
  1. ( 3 ) according to the characteristics of the selected objects, the selecting processes and the practical problems in the process of establishing a scm - oriented ave, a three - stage plan and evaluation architecture of partner enterprise selection are presented and a multi - objective optimization model for selecting partner enterprises in aves are given. by means of the methods of integer planning, benchmarking, analytic hierarchy process ( ahp ) and so on, the fuzzy values of critical decision - making factors ( such as

    通過實際應用驗證,該erp系統具有統?一致的信息、較好的開放性、集成性、外延性,併兼顧了動與人工、通用化與行業化兩方面,使系統具有較高的柔性和較強的實用性,可輔助企業實現科學、可靠的產品報價和即時生產it卜該erp系統既不失mnyll的系統性和嚴性,又保持了ji
  2. For the anticounterfeiting of printings ( such as certificate ), the existent many ways ( such as rainbow holograms ) are not available as the need for special use : anti - distortion and anti - copy. basing in the double - random - phase transform, this article puts forward a new way that two - dimensional bar code is used as anticounterfeiting label with anti - printing ? scanning and anti - damage properties. the major job are : ( 1 ). basing in the ascii codes, numerals and alphabets are encoded and subsequently transformed into two - value bar code matrix figure. later, using amplitude - based double - random - phase transform, the enciphered gray scale figure is formed. by computer simulation ( 4f system ) and printing as well as scanning ( 20 times ), we get the result that the gray scale figure with little miscoding rate ( 0. 0026 ) by “ matrix expanding way ”

    本文主要開展了以下三項研究工作: ( 1 ) .用定義方案,將數字和字母( ascii)轉換成二值條圖;對該圖形進行振幅型雙隨機相位加變換,得到原信息的加灰度圖;通過4f光學系統計算機模擬和列印-掃描實驗,證明本文提出的「矩陣擴展法」灰度圖具有較小的誤率,對於20次列印-掃描實驗,誤率不大於0 . 0026 。
  3. The angelic vibratory codes held within the archangelic language will increasingly integrate with our own / consciousness forms as we prepare ourselves for the ascension, thus the sound of these vibratory patterns will be incorporated into the matrix of the body of creation

    包含在大天使風格里的天使振動)日益與我們己的遺傳基因/意識體結合在一塊,如同我們在做升天的準備一樣,這樣這些振動模式的聲音就會結合在一起進入創造物身體內的能量矩陣裏面去。
  4. Newly released and custom written keyloggers designed for specific attacks, will not normally be blocked by conventional signature detection methods

    最新釋放的殊特了為及以的攻擊目的而採取定義寫設計器取竊的,將很難通過傳統的特徵偵測方較。
  5. Receivers use a combination of the sender ' s public key and their own private encryption key to unlock the secret code for that message and decipher it

    接收者利用發送者的公開鑰和他們己的秘鑰的結合,解開該報文的秘,並解之。
  6. We further developed an adaptive packet marking scheme based on one of our router numbering schemes. the maiking scheme is better than others in that there is leys workload, fewer false positives and fewer packets are required in path reconstruction. the last also reduces the time delay before responding to dos attacks

    我們在此基礎上提出了一個基於路由器適應包標記方案,該方案無論在路徑追蹤的運算量上、在追蹤的誤報率上,還是在追蹤所需的數據包的數量上(這與在攻擊中進行追蹤所需的時間緊相關,從而直接影響到對攻擊響應的快慢)等多個方面都比同類的方法優越。
  7. The work of this dissertation is focused on research of some key technics in signal design and processing of mcpc signal. the main content of the dissertation is summarized as follows : it gives a detailed description of the form of the mcpc waveform and its mathematical model, and analyses the formation and properties of phase coded sequence. it discusses the effect of signal parameters on autocorrelation, power spectra and ambiguity function in forms of single pulse and pulse train and compares different kinds of single pulse signals and pulse train signals

    本文圍繞著多載波相位信號在信號設計與信號處理的若干關鍵問題進行了研究,主要做了以下工作:描述了多載波相位信號( multicarrierphasecoded ,簡稱mcpc )的信號形式,給出了其數學模型,對其中相位序列的構成方式與特性進行了分析;從單脈沖和脈沖串兩種信號形式入手,對多載頻相位信號的參數在相關函數、功率譜度和模糊方程上的影響作了詳細地討論,對不同調制方式的單脈沖和脈沖串信號進行了比較。
  8. Rfc821, 2821, 2554, 2822, 2920, 3030 have defined the protocol smtp. i use self - programming method, which is the certification rfc2554 supplied, to transmit emails by ldap in qmail system. i store username and password in ldap, which can speed up the access

    Rfc821 , 2821 , 2554 , 2822 , 2920 , 3030等對smtp協議做出了規范,我們使用rfc2554提供的認證機制,採用程方式認證,提出了在qmail系統中使用ldap轉發郵件的機制,利用ldap存儲用戶名和,大大提高了訪問速度,能滿足大規模用戶的訪問需要。
  9. The qpme label, which contains key information of the qpme, would need to be printed by the applicants on a piece of white paper and affixed to the approved equipment when it is in use

    申請人需在指定的網頁以配的登入,輸入有關申請批核優質機動設備的資料,然後用白紙行列印出優質機動設備標簽。
  10. Fortunately, ipsec provides us security services for ip layer and higher layers, such as access control, connectionless integrity, data origin authentication, rejection of replayed packets ( a form of partial sequence integrity ), confidentiality ( encryption ), limited traffic flow confidentiality, and so on. the thesis gives a type of network security architecture based on ipsec system, it includes the following contents : 1 analyzing the security problem in tcp / ip protocol stack, current main network attack methods and regular defense methods. 2 studing the overall architecture, main security protocols, application environments, and working mechanism of ipsec

    本文所提出的新一代網路安全體制就是建立在ipsec體系基礎上的,在本文的撰寫過程中,我主要進行了如下一些工作: 1深入分析了由tcp ip協議棧本身帶來的安全問題、當前主要的網路攻擊方法以及常採用的防範對策; 2研究了ipsec標準的總體結構、主要安全協議、應用場合以及其工作機制; 3研究了當前常用的各種數據加解機制以及演算法,深入分析了它們各的特性和具體的使用方式; 4閱讀了大量關于混沌的文獻資料,了解目前混沌的研究動態和成果,研究混沌體制的工作機理,然後利用vc + + 6 . 0作為開發平臺對一類混沌體制進行了實現,並為它寫測試代評估其性能。
  11. With the same tin and password, a taxpayer can enquire about his personal tax information on the internet through the interactive tax enquiry service under the electronic service delivery scheme too. such a service was formerly available to those with digital certificates

    市民亦可利用同一稅務號和通行,替代數證書在網上核實身分,使用公共服務電子化計劃下的互動稅務查詢服務查詢己的稅務資料。
  12. With his tin and password, a taxpayer can also enquire about his personal tax information on the internet through the interactive tax enquiry service under the electronic service delivery scheme www. esd. gov. hk finance eng index. asp. such a service was formerly available only to those with digital certificates

    市民亦可利用同一稅務號和通行,在網上使用公共服務電子化計劃下的互動稅務查詢服務www . esd . gov . hk finance chi index . asp查詢己的稅務資料。
  13. Those who cannot access the internet can make use of a " taxpayer identification number " and a password to make enquiries on their personal tax affairs anytime through a touch - tone phone

    市民可以透過網際網路以電郵方式遞交利得稅報稅表;未能利用網際網路的市民,也可以使用稅務號和通行,透過音音頻電話,隨時隨地查詢己的稅務資料。
  14. Ever since its initial appearance, network coding has quickly developed into a research field that has fundamental influence on information theory, coding theory, networking, switching theory, wireless communications, computer science, cryptography, operations research, and matrix theory. it is now one of the hottest topics being worked on by researchers from leading universities and industrial laboratories worldwide, and international conferences on network coding have been held on a regular basis

    網路理論( networkcodingtheory )始源於香港中文大學,是網路通信研究領域中一項重要突破,從首次提出以來,網路已迅速發展成一個重要的研究范疇,並對信息論、、通信網路、網路交換理論,無線通信、計算機科學、學、運籌學、矩陣理論等領域帶來影響深遠。網路是現今世界各地一流大學及工業實驗室最熱門研究領域之一,亦是許多國際研討會的熱門議題。
  15. Network coding has brought about a paradigm shift in network applications. ever since its appearance, network coding has quickly developed into a research field that has fundamental influence on information theory, coding theory, networking, switching theory, wireless communications, computer science, cryptography, operations research, and matrix theory

    網路帶給網路應用一場範式革命,提出以來,網路已迅速發展成一個重要的研究范疇,並對信息論、、通信網路、網路交換理論,無線通信、計算機科學、學、運籌學、矩陣理論等領域帶來影響深遠。
  16. Users should activate the teletax service as soon as they receive the access code and register their self - chosen password. you should keep both the taxpayer identification number and password confidential

    用戶收到啟動后,應盡快啟動服務及登記選的通行;並且把稅務號及通行都保
  17. When the user is a public commercial entity, like an online retailer, this is reasonable, as customers need reliable proof that they are communicating with the right company

    許多人發現寫他們己的演算法很有吸引力,希望如果這些演算法不牢靠,含糊的安全性將用作安全網路。
  18. This is the opening weekend for the movie version of “ the da vinci code. ” the mystery about art, religion and murder is based on the book by dan brown

    在本周末舉行了電影《達芬奇》開幕式,這是一部有關藝術,宗教和謀殺的懸疑片,改丹.布朗的作品。
  19. Electronic enquiry services are not only available on the internet to holders of digital certificates, they are also available on the telephone to the registered users of teletax. by using his taxpayer identification number and password, a registered teletax user can use a touch - tone phone to check his personal tax information, including tax return lodgement status, assessment status, charge payment status and tax reserve certificate account balances. he can also request duplicate returns or assessment notices, payment confirmations or tax reserve certificate account statements anytime, anywhere via the telephone

    納稅人除了可以利用數證書透過網際網路查詢稅務事宜外,還可以登記成為電話稅務通用戶,利用己的稅務號和通行透過音頻電話,隨時隨地取得屬于己的稅務資料,包括查詢他是否有尚未遞交的報稅表、稅務局是否已向他發出評稅通知書,他已繳或未繳稅款的詳情和儲稅券帳戶結余;以及索取尚未遞交的報稅表及評稅通知書副本、繳稅證明書或儲稅券帳戶結單等等。
  20. The new service is free of charge. to use the service, taxpayers need to register with the ird as a " tele tax " user. they will be allotted a taxpayer identification number and an access code for them to activate the service by registering a password of their own choice

    這項全新的報稅服務費用全免,納稅人只須登記為稅務局的電話稅務通用戶,便會獲派一個稅務號和啟動,用戶在系統登記一個選的通行后,即可使用有關服務。
分享友人