deciphering 中文意思是什麼

deciphering 解釋
電碼回譯, 判讀
  1. The sumerian cuneiform deciphering skills of zecharia sitchen, a linguist in command of many ancient languages, has set the scientific world on its ear with his astounding interpretations of ancient writings

    扎查里亞西特切的閃族楔形文字破譯技巧,一位語言學家在指揮著很多古代語言,已經把科學世界設計在它的傾聽上,連同著他對古代作品驚人的解釋。
  2. Deciphering the first code is the most difficult step.

    破譯第一個密碼是最困難的一步。
  3. Making for neo - modernism : deciphering the buildings of la defense aera in paris and potsdamer platz in berlin

    巴黎拉德芳斯新區與柏林波茨坦廣場建築解讀
  4. His sisters were gone to morton in my stead : i sat reading schiller ; he, deciphering his crabbed oriental scrolls

    他妹妹們代我去了莫爾頓,我坐著讀起席勒的作品來。
  5. Deciphering the subconsciousness of the han nation

    解讀漢民族潛意識的文本
  6. Deciphering the pathways through which microbial signals operate promises to provide new chemical entities and host targets for enforcing health, and perhaps treating diseases affecting both the intestine and extra - intestinal tissues

    這段話的第二句我是這么翻譯的: 「我們要解釋微生物通過信號操縱來提供新的化學物質和增強宿主健康的機理,治療腸道疾病影響的不光是腸內組織,可能還有腸外組織。 」
  7. Being the method of deciphering used, to answer the above questions, this article, on one hand, provides the model or frame of deciphering, on the other hand, analyses and discusses deeply to draw some conclusions of my own

    本文採用的是解讀的方法,破中有立,邊破邊立,針對上述諸多問題或者給出了新聞攝影的解讀框架和模式,或者深入分析論述之,嘗試性地提出了自己的見解。
  8. You and your deciphering! who needs it ?

    你們這些人,還搞密碼破譯,誰稀罕?
  9. Article eighteen production of pirated software, software for deciphering secret and software with the main function of removing technology - protection measures are prohibited

    第十八條禁止生產盜版軟體和解密軟體以及主要功能是解除技術保護措施的軟體。
  10. The importance of deciphering fault slip is difficult to overstate because when faults slip quickly, they can cause immense damage, sometimes at a great distance from the source

    要去了解、解釋斷層滑動的重要性是無庸置疑的,因為一旦斷層快速滑動,將會造成巨大的災情,有時發生位置甚至離震源還有一大段距離。
  11. Deciphering scientific attainment in new chemical lesson marks

    解讀化學新課標中的科學素養
  12. Secondly, some encryption algorithms are introduced, with the analysis and comparison for these encryption algorithms, the author designs an appropriate project to accomplish the end - to - end encryption. thirdly, this paper accomplish the design of an encryption scheme which combining the strongpoint of the rsa algorithm and the idea algorithm. the main process is as following : first, input the digital signal to the encryption device, and then the digital signal exclusive or with the keying sequence which is generated by key stream generator ( ksg ) and the ksg is based on the idea encrypting and deciphering algorithm, the secret key synchronization is also studied

    本課題主要研究的內容是數字集群通信系統加密機制的研究,首先介紹了數字集群通信系統的安全保密機制,講述了單向和雙向鑒權的過程、單呼和群呼的空中介面加密過程及其密鑰的選用和管理,特別介紹了端到端加密;然後介紹了幾種常用的加密演算法,通過分析其優劣,提出了端到端加密的解決方案;最後完成了基於rsa演算法和idea演算法的數字集群通信系統加密方案的設計,其具體過程為將經過數字信號送入加密器里,和以idea加密演算法為基礎設計的密碼流發生器( ksg )產生的密碼序列進行加解密運算,並且研究了此加密過程的密碼同步問題。
  13. It is responsible for deciphering class files and uploading into java virtual machine ; class verifier is used to the correct internal structure ; security manager is used to customize the access strategy and permission ; and ssl guarantees the data security during transmission. though modeling and testing a prototype system, experiment proved the correctness and efficiency of above design

    類裝載器是java安全體系的第一道防線,它負責將類解密后裝入java虛擬機; class文件檢驗器保證裝載的class文件有正確的內部結構;安全管理器主要用於定製用戶對系統的訪問策略和訪問權限;安全套接字用來保證web傳輸安全。
  14. Organizers of the brain decade coped with the difficulty of deciphering the world ' s most complex machine by setting out a series of comparatively modest challenges for the 1990s

    1990年代,腦的十年計畫主持人為破解世界上最復雜的機器,立下了一連串相對?質的挑戰目標。
  15. Deposits concentrated regions and anamoly concentrated regions can be sort out by comprehensive deciphering of goelogical, geo - chemical and geo - physical informations

    通過地質、地球物理、地球化學等信息的綜合解釋,利用綜合信息圈定礦床密集區和異常密集區。
  16. This paper introduces three instances, which is the data encrypting and deciphering, the complicated target clones, the picture data depositting and withdraw, have told stream technical application method and skill in vb. net, these methods and skills have certain practical value in the course of using procedure making

    通過數據加密解密、復雜對象克隆、圖片數據存取三個實例,講述了vb . net中流技術應用的方法與技巧,這些方法與技巧在應用程序開發過程中具有一定的實用價值。
  17. The formation process of chinese philosophy the latest century is generally thought to be a deciphering process using western philosophy

    摘要近百年「中國哲學」的建構過程,往往是以西方哲學解構中國義理之學的過程。
  18. It is important for investors to research a bond just as they would a stock or mutual fund. the bond rating will help in deciphering the default risk

    象研究股票和共同基金樣研究債券對投資者來說是必要的,辨別債券等級將有助於識別違約風險
  19. With the immense volume of traffic travelling via the internet and the usage of passwords and personal identification numbers key codes, intercepting and deciphering specific messages requires sophisticated equipement as well as a great deal of knowledge about the sender and receivers

    由於網際網路的交通極為繁忙,以及密碼和個人識別號碼的廣泛使用,要進行攔截訊息或解碼,工作便需要利用到復雜的工具才能完成,而且使用的人亦需要對有關方面有相當的認識。
分享友人