chaining 中文意思是什麼

chaining 解釋
測鏈測量
  1. Data encryption standard cipher block chaining packet encryption

    數據加密標準密碼分組鏈接分組加密
  2. Cipher block chaining mode is the default cipher mode for xml encryption

    密碼塊鏈接( cbc )模式是xml加密的默認密碼模式。
  3. The cipher block chaining

    密碼塊鏈(
  4. Cipher block chaining ; a process whereby a plain text block is xored with the previous cipher text block before being encrypted

    密碼分組鏈接( cipher block chaining ) ;在加密明文塊前將它與以前的密文塊進行xor運算的過程。
  5. Class use a chaining mode called cipher block chaining, which requires a key and an initialization vector to perform cryptographic transformations on data

    類派生的類使用一種稱為密碼塊鏈接( cbc )的鏈接模式,該鏈接模式需要密鑰和初始化向量才能執行數據的加密轉換。
  6. The block cipher classes provided in the base class library use a chaining mode called cipher block chaining, which uses a key and an initialization vector to perform cryptographic transformations on data

    基類庫中提供的塊密碼類使用稱作密碼塊鏈( cbc )的鏈模式,它使用一個密鑰和一個初始化向量( iv )對數據執行加密轉換。
  7. Under acid condition open chaining crown ether diaromatic aldehyde can react, and they will synthesize a compound of chaining crown ether diaromatic aldehyde thiosemi - carbazone kind

    摘要鏈狀冠醚二芳醛在酸性條件下與氨基硫脲反應,合成了鏈狀冠醚二芳醛縮氨硫脲類化合物。
  8. Little audible links, they are, chaining together great inaudible feelings and purposes.

    它們是小小的有聲的鏈子,把巨大的無聲的感情和意圖連在一起。
  9. Synthesis of open chaining crown ether compound

    開鏈冠醚衍生物的合成
  10. Non - backtrace backward chaining dynamic composition of web services based on mediator

    無回溯反向鏈動態合成
  11. Compared with the regular rule - based expert system, the bayesian network based es can reason on the incomplete input information using the prior probability distribution ; the topological structure of the network being used to express the qualitative knowledge and the probability distributions of the nodes in the network being used to express the uncertainty of the knowledge, which made the knowledge representation more intuitively and more clearly ; applying the principle of the bayesian chaining rule, bidirectional inference which allow infer from the cause to the effect and from the effect to the cause can be achieved

    與一般基於規則的專家系統相比,貝葉斯網專家系統利用先驗概率分佈,可以使推理在輸入數據不完備的基礎上進行;以網路的拓撲結構表達定性知識,以網路節點的概率分佈表達知識的不確定性,從而使不確定性知識的表達直觀、明確;利用貝葉斯法則的基本原理,可以實現由因到果及由果到因的雙向推理。
  12. By the browser / web server / database structure and the technology of asp. net and xml, we achieve the expert system running on the network, extend the application and ensure its backward compatibility ; we have the deep research to the representation of knowledge and apply it to the system, extend the traditional method of rule based knowledge representation ; introduce the fuzzy sets, analyze the generalized possibility interval sets, and combine the linguistic variables and fuzzy sets ; the system adopts the forward and backward chaining, researches the reasoning under uncertainty and inexact reasoning ; and we depart knowledge base and inference engine, make the upgrade simple and maintenance convenient. in the last, we construct the potato produce manage system according to the phases of potato ' s growth to give a detailed instruct to its produc e

    Net和xml技術,實現了網路化的專家系統,同時擴大了專家系統的應用范圍,提高了系統的後向兼容性;對專家系統中的知識表示技術作了深入探討,在傳統的基於規則的知識表示方法的基礎上,提出了基於規則擴展的知識表示方法,並較好地將其應用到本系統中;引入了模糊集合,分析並推導了廣義可能區間集,將其應用於模糊知識的表示,將語言變量和模糊集合結合起來;提出對系統採用互動式知識獲取途徑、雙向推理控制策略,對不精確推理和不確定性推理的傳播演算法作了一定的研究,成功地將其應用到馬鈴薯專家系統的構建之中;採用知識庫和推理機相分離的方法,使得系統升級簡單易行。
  13. To solve these problems respectively, the color space transformation and bp neural network are firstly used to realize the classification and threshold processing of images. then the images processing including thinning, interval linking, code word chaining, seed filling, boundary fitting is performed well by some methods in mathematical morphology and computer graphics and interpolation in numerical value analysis

    為了逐一解決這些困難,運用了色彩空間變換以及bp神經元網路的方法對圖像進行分類和閾值處理,利用數學形態學和計算機圖形學以及數值分析中的插值等方法對圖像進行了細化、間隙連接、鏈碼、種子填充、邊界擬合等處理。
  14. If 1839 invention of photography, change several century since the people watching and knowing peripheral visual angling of thing, it becomes possible to catching and reproducing in the twinkling of an eye to enable ; then in today, it photographs to be each handheld people of camera not merely, can used for, record one ‘ s own daily life, give play to general way that individual imagine and create, a kind of independent form of contemporary art, the experiment of pioneer whose an idea and technology make up - - and tian taiquan ‘ s photography works, is the pipeline attempting to find chaining between these two, this is value that his photography can appear too

    如果說, 1839年攝影術的發明,改變了人們數世紀以來觀看和認識周邊事物的視角,並使對瞬間的捕捉和再現成為可能;那麼在今天,攝影不僅僅是每個手持照相機的人,都可以用來記錄自己的日常生活、發揮個人想象與創造的普遍方式,還是當代藝術的一種獨立形式,一個觀念與技術彌合的先鋒實驗? ?而田太權的攝影作品,就是試圖在這兩者之間找到鏈接的管道,這也是他的攝影得以呈現的價值。
  15. Chaining is added by me

    鏈結為中朝網所加。
  16. Basing on them, we propose a new algorithm of removing pseudo elements by which we can ensure the candidate edge generated by the broken line in 2d views is pseudo element if it is inside of the face which can be seen completely. at last delete other pseudo elements by the topological information of former methods. 2. for the low efficiency and bad capability of disposing multi - solutions of the decision - making after generating face loops, we thoroughly analyzed the former divide - conquer algorithm and decision - chaining algorithm

    以這些定義和定理為基礎,提出了新的假元刪除演算法,通過判斷視圖中的二維虛線邊所生成的候選邊是否在完全可見有界平面內來判斷該候選邊是否為假元而將其刪除,再結合前人的成果利用三維拓撲信息刪除其它假元,從而降低了面環的生成數目和決策求解的搜索空間,提高了三維重建的效率。
  17. This is known as certificate chaining

    這就是證書鏈。
  18. I record the size of each representation, then turn around and process the generated output as input to measure the input processing overhead just parsing the text form, chaining a

    我記錄下每種表示的大小,然後反過來把生成的輸出作為輸入來衡量輸入處理的開銷(只需要解析文本形式,對于gzip壓縮文本,向解析器鏈接一個
  19. The author mainly realized the method of generating the large random numbers and judging the prime number using lehmann means, then three pairs of secure key with different lengths ( 256 bits, 512 bits, 1024 bits ) was generated to meet the demand of different security grade. in encryption module, modular multiplication arithmetic of large number was realized adopting addition chaining. in decryption module, extended euclid was used to get inverse, and the chinese remainder theorem was used to realize decryption, which increased the speed of decryption greatly

    作者主要實現了大隨機數的生成、採用整除小素數和勒曼測試法判定素數,可以生成三種不同長度的密鑰對( 256位、 512位、 1024位)來滿足不同的加密安全等級的需求;加密模塊中,選用了二進制序列的乘法方法,實現了大數模冪乘運算;解密模塊中,引用了擴展的歐幾里德法求逆元,並採用中國剩餘定理實現解密過程,大大提高了解密速度。
  20. Within the java core collection classes, most maps are implemented using chaining, which works so that if more than one key maps to the same index location in the table, then that index location holds a linked list of all the elements mapping to that location

    在java核心集合類中,多數映射都是使用鏈接實現,就是說如果多個鍵映射到表中的同一索引位置,則索引位置保存一個鏈表,其中存放映射到該位置的所有元素。
分享友人