hash method 中文意思是什麼

hash method 解釋
散列法
  • hash : n 1 切碎的食物〈尤指肉丁和洋芋丁〉。2 拼湊起來的東西;大雜燴。3 重申,復述,推敲。4 〈蘇格蘭語〉...
  • method : n 1 方法,方式;順序。2 (思想、言談上的)條理,規律,秩序。3 【生物學】分類法。4 〈M 〉【戲劇】...
  1. We presented a novel method of searching for similar fragments of 3d curves, with this method, a hash vector is associated with each fixed - length fragments of 3d sherd. each vector consists of low frequence component of fourier - like spectrum for the distance between profile curve and the centroid

    討論了基於hash矢量和fourier變換的輪廓曲線匹配方法,在匹配中不要求一段輪廓線與另外一段輪廓線完全匹配,而是把它們分成很多子段,再用這些子段來進行匹配。
  2. In the preprocessing stage the method of user and session identification often adopt heuristic algorithm for the being of cache and agent. this induce the uncertainty of data resource. the cppc algorithm avoid the limitation and has no use for complicated hash data structure. in this algorithm, by constructing a userld - url revelant matrix similar customer groups are discovered by measuring similarity between column vectors and relevant web pages are obtained by measuring similarity between row vectors ; frequent access paths can also be discovered by further processing of the latter. experiments show the effectiveness of the algorithm. in the fourth part, this thesis bring some key techniques of data mining into web usage mining, combine the characteristic of relation database design and implement a web usage mining system wlgms with function of visible. lt can provide the user with decision support, and has good practicability

    本文演算法避免了這個缺陷,且不需要復雜的hash數據結構,通過構造一個userid - uel關聯矩陣,對列向量進行相似性分析得到相似客戶群體,對行向量進行相似性度量獲得相關web頁面,對後者再進一步處理得到頻繁訪問路徑。實驗結果表明了演算法的有效性。第四是本文將傳統數據挖掘過程中的各種關鍵技術,引入到對web使用信息的挖掘活動中,結合關系數據庫的特點設計並實現了一個具有可廣西人學頎士學位論義視化功能的web使用挖掘系統wlgms 。
  3. Multi - dimensional - data partition based on improved - hash method

    方法的多維數據劃分
  4. Specify client password hash method

    指定客戶機密碼哈希方法
  5. The detail is clarified as follows : l ) based on the chaotic technology and contemporary encryption approach the paper put forward a new chaotic sequence, which introduced the m - sequence and the method of shrink key - the stream generator. the complexity of the sequence was promoted as the random alteration of the parameters of chaotic mapping, and at the same time, the shrinking key was used to enhance the security further more ; 2 ) the performance of one - way hash function was improved and new hash function construction methods are proposed through a novel hash method based on chaotic mapping and the aes - the rijndael algorithm. the algorithm of hashing messages of arbitrary length into 256 bits hash values was designed

    按照這種方法,輸出序列的周期性得以大大提高,理論分析和計算機模擬結果表明,該方法可以產生具有良好統計特性的密鑰流,而且易於軟硬體實現: 2 )實現了一種基於混沌映射和分組密碼rijndael演算法的單向hash函數的構造方法,即使用logistic混沌映射產生混沌二值序列,序列的分組與明文序列分組進行按位異或后,進入rijndael加密模塊,所得的結果再加入到反饋端,參與下一分組輸入的異或運算,迭代結束時的rijndael加密結果即為所求的hash函數值。
  6. This abstract method performs the hash computation

    此抽象方法執行哈希計算。
  7. This method uses a pre - computed hash table to serve as an index for short sequences

    這一方法利用一個預先計算的哈西表作為短序列的索引。
  8. For detecting - analyzing method based on snapshot difference, we implement these snapshot differential algorithm : sort merge algorithm, partition hash algorithm and window algorithm. for detecting - analyzing method based on log, we discuss the analyzing method of log on two relation database systems - oracle and sql server

    對基於快照差分的檢測分析方法,我們實現了三種快照差分演算法: sortmefge演算法、 partitionhash演算法和wndow演算法;對基於日誌的檢測分析方法,討論了oracle和sqlserver兩種關系數據庫的日誌分析方法。
  9. Method is called with a hash of the next action to invoke ; in this case, it simply calls the

    方法;在這種情況下,它只是調用同一控制器的
  10. Method generates a hash code based on the name of the

    對象的名稱生成哈希代碼。
  11. The secret hash digital signature is a new siganture method that combines the ideas of rsa public - key algorithm, md5 one - way hash function and permutation code at the same time

    保密散列數字簽名演算法利用rsa公鑰密碼體制的原理、 md5單向散列函數和排列碼加密的思想,構造了一種能夠快速實現數據保密、數字簽名的簽名方案。
  12. The secret hash digital signature is a new signature method that combines the ideas of rsa public - key algorithm, md5 one - way hash function and permutation code at the same time, which is more secret, occupies less space and runs in higher speed

    保密散列數字簽名演算法結合了rsa公鑰密碼體制、 md5單向散列函數和排列碼加密解密演算法的思想,實現了一種速度快、保密性強的數字簽名方案。
  13. Method to allow a type to work correctly in a hash table

    方法,使類型可以在哈希表中正確地工作。
  14. Finally, we analyzed the security of this system completely which can be used to provide service involving confidentiality, integrality, certificate - based identity authentication and digital signature, etc. this system is consisted of two sub - systems : center of certificate mangement and client based military email transferring component, proposing two methods namely " two - level encryption " and " certification carrying " to ensure the confidentiality of system as well as identity authentication and key distribution with offline method. it uses hash function to allow the integrality of the email transfer and digital signature technology to allow the no - denying of email tranfer, which forms a complete military email transferring system

    該系統包括證書管理中心和用戶端軍用電子郵件傳輸組件兩個子系統,提出了「兩級加密」和「證書攜帶」兩種方式,以確保系統的機密性及離線方式下的身份認證、密鑰分發,利用雜湊函數實現郵件傳輸的完整性,採用數字簽名技術實現了郵件傳輸的不可否認性,形成了一個完整的軍用電子郵件傳輸系統。
  15. Method to get the hash code for the current policy statement

    方法獲取當前策略語句的哈希代碼。此代碼示例摘自一個為
  16. Method returns a hash code of the mail address

    方法返回郵件地址的哈希代碼。
  17. Join plan directives that force optimizer to use the designated join method to join tables in the query, either nested loop join, sort merge join, or dynamic hash join

    連接計劃指示,強制優化器使用指定的連接方法來連接查詢中的表,要麼是嵌套循環連接、分類合併連接,要麼是動態哈希連接。
  18. Method serves as a hash function for a particular type

    Object . gethashcode方法用作特定類型的哈希函數。
分享友人