key numbers 中文意思是什麼

key numbers 解釋
片邊號碼
  • key : n 1 鑰匙。2 要害,關口,要沖。3 關鍵,線索,秘訣;解法。4 (外國書的)直譯本,圖例,題解,圖解,...
  • numbers : n. 【聖經】民數記〈=the book of Numbers, 略 Num. 或 Numb. 〉。
  1. The difficulty of decoding based on cryptograph and public key is equal to the difficult } " of dividing the product of two big prime numbers

    從一個公開密鑰和密文中恢復出明文的難度等價于分解兩個大素數之積。
  2. The group events of rhythmic gymnastics will be the key point to obtain more numbers of medals on 2008 olympic games

    摘要藝術體操集體項目是我國2008年奧運會突破獎牌的一個重點項目。
  3. Abstract : the paper introduces various identification methods for tracing the malicious call and calling identification services in spc telephone exchanges, especially describes the malicious call trace methods by using switch boards and " r " key tandem function and telephone set which can display calling subscriber ' s numbers

    文摘:介紹了程式控制電話交換機追查惡意呼叫和主叫用戶信息識別業務的各種識別方法,特別是詳細介紹了利用話務臺和話機上的" r "鍵轉接的功能,以及利用能顯示主叫信息的話機來顯示主叫電話號碼和追查惡意呼叫電話的方法。
  4. The paper introduces various identification methods for tracing the malicious call and calling identification services in spc telephone exchanges, especially describes the malicious call trace methods by using switch boards and " r " key tandem function and telephone set which can display calling subscriber ' s numbers

    介紹了程式控制電話交換機追查惡意呼叫和主叫用戶信息識別業務的各種識別方法,特別是詳細介紹了利用話務臺和話機上的" r "鍵轉接的功能,以及利用能顯示主叫信息的話機來顯示主叫電話號碼和追查惡意呼叫電話的方法。
  5. Along with china ' s entering wto, chinese corporations have to face much more cruel competitions which not only are product and market pri ? competition but also are persons with ability and institution competition0 so, how to design series of schemes which can arrest and make use of the seven seas persons with ability, how to optimize the manpovver resources, this are the key point for ali chinese corporations to found modern enterprise institutionso supervisor stock options are the most popular inspirit at present, which means the supervisors can buy themselves corporation stock at fixed pri ? and during a fixed period, so that they can gain the corporation ' s residual clainio at first, this paper discussed the basic stimulant theories by the numbers, and introduce how does the supervisor stock option take place, and its meanings, operation flow

    如何設計出一種能夠吸引和利用全球一流人才,使人力資源配置最優化,是中國企業建立現代企業制度的關鍵。管理者股票期權是目前世界上最流行的激勵方式,它允許企業的管理者在一定的期限內,依約定的價格購買公司的股票,從而取得企業經營成果的剩餘索取權。本文首先系統地論述了企業家激勵的基本理論,介紹了經營者股票期權的發生、意義及其具體操作流程。
  6. Mr. teeters, who formerly worked as an engineer with the manufacturers who widely introduced electronic key card locks to the industry in the 1980 ' s, said no credit card numbers or other such personal data were directly encoded on key cards in any system of which he was aware

    據一位曾經在80年代參與過后來得到廣泛應用的電子房門卡門鎖製造流程的業內人士透露,客人的信用卡號碼或是其他個人信息並不會直接內嵌進房門卡里。
  7. In the common signature system, the signed document can be verified illimitably, anyone can verifies its validity with the group key. but in some special setting, large numbers of verifier are not appropriate, sometimes document can only be verified by some designated people. this paper proposes the designated - verifier group signature scheme with the udvs on acjt. at last this paper implements the multi - bank system with above schemes, remedies the limitation of forgoing schemes, and resolves the par value problem. the par value is designated by the bank, and it is binding with the signature, thus the problem of user cheating can be avoided

    在普通的簽名系統中,簽名文件是可以無限驗證的,即每個人都可以通過群公鑰來驗證其有效性,但在某些特殊領域,尤其是電子銀行業務中,這樣廣泛的驗證人群在某些情況下是不合適的,有時,某些特殊的簽名文件只能有某些指定的驗證者進行驗證,本文在acjt方案的基礎上,根據通用的指定驗證者的方案構造了指定驗證者的群簽名方案。
  8. Key numbers of chinese names first names today

    今天數據庫共有中國名字數
  9. An ancient hindu astrology used 27 houses of 13 degrees 20 minutes, which are key numbers in the mayan calendar

    一個古代印度占星家利用27間13度20分的房子,是瑪雅歷法的重要數字。
  10. And since, as he shows, it is impossible to be consistently profitable without understanding and using the market ' s key numbers, busby explains how to read the major statistical indicators, as well as illustrates the significance of fuel prices, precious metals, futures indices, and other market indicators

    自此,因為他表明,它是不可能被連續贏利,沒有理解和運用市場的關鍵號碼,巴斯比解釋如何閱讀的主要統計指標,以及說明意義的燃料價格,貴金屬,期貨指數,以及其他的市場指標。
  11. " in our separate interviews with the three witnesses, we found that their recollection of people and events tallied strongly with only minor variances, tony lui noted. " even the appearances of the bribe - takers, their nicknames, the police units they worked for, staff identity numbers and the amount of bribe money they received were consistent. this affirmed that many officers from the police and other agencies had close associations with key members of the drug ring

    呂樹桐稱:我們分別接見三名證人,發覺他們說出的情況,除了少部分記憶較為模糊而有些兒差異外,差不多可以說有九成是互相吻合的就連收賄人的相貌特徵渾號所屬部隊編號甚至收取的銀碼亦相同由此證明販毒集團的主要成員與許多執法人員過從甚密經常見面。
  12. Because the random numbers generators are the key of monte carlo methods and quasi - monte carlo methods. chapter 2 describes the pseudo - random number generators and quasi - random number generators

    因為隨機數發生器是蒙特卡羅和擬蒙特卡羅方法的核心之一,所以第2章介紹了偽隨機數和擬隨機數發生器。
  13. Military exigenciesthe need to feed large numbers of soldiers on the move or in the field over sustained periodshelped to induce several other key innovations in preservation over the past century and a half : canned milk, dried milk powder, factory cheese, irradiation and modern dehydration technology come immediately to mind in this regard

    軍事緊急狀況下,需要在一段持續時間里向戰場上和進軍中的大量士兵提供伙食,成就了過去一個半世紀中幾項其他重要的發明:罐裝牛奶、乾燥奶粉、乳酪生產工廠、放射線食物處理和現代脫水技術等。
  14. Consider : nature, scope and scale of operations and activities key programme areas, budget ceiling, staff numbers, offices facilities projects sites equipment ; boundary of influence policy areas, interaction with other parties including suppliers and contractors, target audiences, service receivers, business partners, local communities ; mainland communities ; overseas communities ; roles and responsibilities ; structure ; relevant policies quality, environmental, social, health and safety policies ; etc

    考慮因素:營運與活動的性質范圍及規模主要工作綱領預算限額員工數目辦公室設施計劃地盤設施權責界限政策范圍與其他方包括供應商承辦商目標讀者服務享用者商業伴本地社群中國內地社群海外社群的相互關系角色及責任結構相關政策質素環境社會健康及安全政策等
  15. Nature, scope and scale of operations and activities key programme areas, budget ceiling, staff numbers, offices facilities projects sites equipment ; boundary of influence policy areas, interaction with other parties including suppliers and contractors, target audiences, service receivers, business partners, local communities ; mainland communities ; overseas communities ; roles and responsibilities ; structure ; relevant policies quality, environmental, social, health and safety policies ; etc

    考慮因素:營運與活動的性質范圍及規模主要工作綱領預算限額員工數目辦公室設施計劃地盤設施權責界限政策范圍與其他方包括供應商承辦商目標讀者服務享用者商業伴本地社群中國內地社群海外社群的相互關系角色及責任結構相關政策質素環境社會健康及安全政策等
  16. Public key and private key the public and private key pair basically comprises two distinct and uniquely matched strings of numbers

    在公匙基建中,公開密碼匙及私人密碼匙是一對既獨立但配對的數字組合。
  17. The author mainly realized the method of generating the large random numbers and judging the prime number using lehmann means, then three pairs of secure key with different lengths ( 256 bits, 512 bits, 1024 bits ) was generated to meet the demand of different security grade. in encryption module, modular multiplication arithmetic of large number was realized adopting addition chaining. in decryption module, extended euclid was used to get inverse, and the chinese remainder theorem was used to realize decryption, which increased the speed of decryption greatly

    作者主要實現了大隨機數的生成、採用整除小素數和勒曼測試法判定素數,可以生成三種不同長度的密鑰對( 256位、 512位、 1024位)來滿足不同的加密安全等級的需求;加密模塊中,選用了二進制序列的乘法方法,實現了大數模冪乘運算;解密模塊中,引用了擴展的歐幾里德法求逆元,並採用中國剩餘定理實現解密過程,大大提高了解密速度。
  18. In the dissertation, a " fast shamir algorithm represented by five - element joint sparse form " is presented. and it is demonstrated that comparing with other similar algorithms, the total numbers of the computation of our algorithm can be saved about 10 %, in the case of 192bit key. ( 5 ) in the implementation of elliptic curve cryptosystem, one of the key steps is to design and implement the base - point choice algorithm of elliptic curve finite group

    已經證明,用本文提出的「五元聯合稀疏形式表示的shamir演算法」計算標量乘法對,在192bit的密碼體制中,其計算量比同類演算法平均減少了10兒( 5 )實現橢圓曲線密碼體制還有一個關鍵的步驟,就是橢圓曲線有限群基點選取演算法的設計與實現。
  19. However, you can re - track up to the latest five tracking numbers in your mobile phone by keying in the last 4 characters of each of the tracking number e. g., key in " tr 3456 " for tracking number 1z23x45e6789123456

    但是,您可以輸入每個貨運單編號的最後4個號碼例如,貨運單編號為1z23x45e6789123456便輸入tr 3456 ,來重新追蹤儲存於您行動電話內的最近五個貨運單編號。
  20. Because, at the bit - length of typical keys, very few numbers are primes, public - key systems must use very large keys to prevent exhaustive searches that try to guess the prime numbers used or to factor the keys

    就典型鑰匙的位長而言,因為素數的數目是非常少的,故公開密鑰系統必須使用非常大的密鑰,以防止窮盡研究把使用的素數猜出來或把密鑰的因子算出來。
分享友人