exchange algorithm 中文意思是什麼

exchange algorithm 解釋
交換演算法
  • exchange : vt 1 (以某物與另一物)交換,調換 (for) 2 互換,交流,交易。3 兌換。 vi 1 兌換 (for) 2 交換;...
  • algorithm : n. 【數學】演算法;規則系統;演段。
  1. ( 3 ) temperature field and residual capacity of reinforced concrete member after fire studied by the numbers, various boundary conditions of heat exchange equation and the solutions of them given an account, the formulae of the residual capacity of the members after fire established, the program of temperature field programmed on the basic of finite difference algorithm, a case given to demonstrate

    ( 3 )對火災后構件溫度場的分佈和剩餘承載力的計算進行了系統地分析和研究。討論了熱傳導方程的各種邊界條件及相應的解法,建立了不同構件的剩餘承載力計算公式,並結合工程實例用有限差分法編制了相應的溫度場計算程序,與實例吻合良好。
  2. The advent of the internet and the wide availability ofcomputers, scanners and printers make digital data acquisition, exchange and transmission a simple task. however, making digital data accessible to others through networks also creates opportunities for malicious parties to make salable copies of copyrighted content without permission of the content owner. digital watermarking is likely to be a potential solution to this problem. digital watermarking has been proposed as a solution to the problem of copyright protection of multimedia documents in networked environments. it makes possible to embed a watermark ( such as identification data, serials number, text or image etc. ) to multimedia documents allowing copyright protection, secret communication, document authentication and so on. in this paper, we present a new digital image watermarking method based on svd ( singular value decomposition ), and then give some theoretical analysis about the algorithm. extensive experimental results show that this method is much more robust than other methods presented before

    隨著計算機和網路技術的飛速發展,數字圖像、音頻和視頻產品愈來愈需要一種有效的版權保護方法,另外通信系統在網路環境下的信息安全問題也日益顯露出來.數字圖像水印技術為上述問題提供了一個潛在的解決方案.所謂水印技術就是將數字、序列號、文字、圖像標志等版權信息嵌入到多媒體數據中,以起到版權保護、秘密通信、數據文件的真偽鑒別和產品標志等作用.本文提出了一種新的基於奇異值分解的數字水印演算法並且對該方法的理論基礎給出分析.實驗結果表明這種方法要比目前提出的流行演算法魯棒
  3. Based on these graphic models an efficient routing algorithm, called ieacs ( intensified evolutionary ant colony system ) algorithm is suggested. ieacs merges the acs ( ant colony system ) and ga ( genetic algorithm ), thus features both the mechanism of cooperative learning of acs and the information - exchange capability of ga, is presented in this thesis. in case of asymmetric grid graph and grid - off graph

    然後,介紹了一種兼具生物仿生特性的蟻群和遺傳演算法特點的進化蟻群演算法,並對該演算法模仿蟻群的協同學習機制,以及遺傳演算法的優秀群體中的個體之間信息交換的策略進行了闡述,接著探討了該演算法在總體布線和斯坦納樹問題中的應用。
  4. Graph theory, finite group acting on sets, orbit and equivalent relation are used to discuss the layout structure of networks for heat exchange, and a feasible optimization algorithm is given

    應用圖論、有限群對集合的作用、軌道與等價關系等刻劃了換熱網路布局結構,並給出了可行的優化演算法。
  5. The difficulties of elliptic curve discrete logarithm problem and safety of 3 - des encryption is analyzed in detail. this cryptographic system applies a key exchange scheme based on ecc and trusty data encryption algorithm

    文章最後分析了該密碼系統的安全性,對橢圓曲線離散對數問題的難解性以及三重des加密演算法的安全性作了較詳細的分析。
  6. The difference between this algorithm and traditional genetic algorithm lied in the fact that this algorithm adopted order crossover and cell exchange mutation methods ; at the same time crossover probability and mutation probability were optimized

    與傳統遺傳演算法不同的是,該演算法採用了順序交叉和單元交換變異方式,同時對交叉概率和變異概率進行了優化設計。
  7. The paper discusses the development of web, browser / server mode conception and the content and mechanism of network security based on web, and also describes the basic conception and system of cipher theory, symmetric - based data encryption standard and advanced encryption standard and asymmetric - based rsa. it presents a detailed design of secrecy net of digital government, and advances a des - and - rsa - based security model of information exchange, which makes use of symmetric cryptographic algorithm to encrypt plaintext, and introduces public - key algorithm rsa to encrypt session key to compose digital envelope and to realize digital signature

    本文論述了web的發展及其browser / server模式概念,以及基於web的網路安全的內容與機制;闡述了密碼學的基本概念、分類,對稱密鑰密碼體制des與aes以及公開密鑰密碼體制rsa ;最後,利用一種基於des和rsa的信息交換安全模型,詳細地給出了一個數字政府的保密網系統設計方案。
  8. An optimal routing algorithm for shuffle - exchange networks

    一個針對洗牌交換網的最優路由演算法
  9. Bcc algorithm takes advantage of both a single bacterium ' s reaction to chemoattractants and the exchange of position information among bacteria to find the optimum

    細菌群體趨藥性演算法同時使用單個細菌在引誘劑環境下的應激反應動作和細菌群體間的位置信息交互來進行函數優化。
  10. Then, a fractal interpolation model is put forward for the foreign exchange sequencing, and an interpolated iterative algorithm is presented to predict the tendency of the foreign exchange market

    文中提出了外匯序列分形插值模型,並構造了預測外匯市場趨勢的插值迭代演算法。
  11. The branch exchange algorithm is one of the methods concerning distribution network reconfiguration to reach loss reduction

    本文首先詳細地描述了一種網損最小的配電網路重構演算法? ?支路交換法。
  12. The initialisation key is the first security gate in bluetooth security system, if the initialisation key is got by attacker, the attacker will get the common link key by continue listening the communication. if the common link key is known by others, the two device is no secret before he. the third party can not only listen the two device ' s communication but also assert him one party to authenticate the other. pairing at place where less people here will reduce the attack. to use long pin managed by diffie - hellman key exchange algorithm will also reduce the attack

    初始字是藍牙安全系統的第一道安全屏障,如果初始字被攻擊者得到,攻擊者就可以通過監聽兩設備的后續通訊進而獲得兩設備的公共鏈路字,如果兩設備的公共鏈路字為第三方知曉,那麼兩設備對于第三方面而言就毫無安全性可言。第三方不但可以偷聽兩設備的加密通訊,還可以冒充其中一方向另一方鑒權。
  13. Gets the name of the key exchange algorithm

    已重寫。獲取密鑰交換演算法的名稱。
  14. Property to return the name for the key exchange algorithm

    屬性以返回密鑰交換演算法的名稱。
  15. Gets the key exchange algorithm used by this

    使用的密鑰交換演算法。
  16. The name of the key exchange algorithm

    密鑰交換演算法的名稱。
  17. Property contains the key exchange algorithm used by this connection

    屬性包含該連接使用的密鑰交換演算法。
  18. The key exchange algorithm protects information used to generate shared keys

    密鑰交換演算法保護用於生成共享密鑰的信息。
  19. Gets the name of the key exchange algorithm available with this implementation of

    的這一實現中可用的密鑰交換演算法的名稱。
  20. When overridden in a derived class, gets the name of the key exchange algorithm

    當在派生類中重寫時,獲取密鑰交換演算法的名稱。
分享友人