英语人>网络例句>chaining 相关的网络例句
chaining相关的网络例句

查询词典 chaining

与 chaining 相关的网络例句 [注:此内容来源于网络,仅供参考]

The first type is the chaining colony, between the colony does not have the obvious demarcation line, these colonies are work as when agar-agar and experiment mix, a zoogloea is dispersed the result; The second type is the water film type colony which forms between the agar-agar and the plate bottom; The third kind is the water film type colony which forms in the plate edge or the agar-agar surface.

第一种类型是链状菌落,菌落之间没有明显界线,这些菌落是当琼脂和试验物混合时,一个细菌块被分散所致;第二种类型是在琼脂和平皿底之间形成的水膜样菌落;第三种是在平皿边缘或琼脂表面形成的水膜样菌落。

And does anyone remember the video which the Indian news channel NDTV screened a few years back of the Bihari policeman chaining a petty thief to his motorcycle and dragging him round the streets while the crowed bayed in appreciation?

还有人记得几年前印度新闻台筛除了比哈利警察将一个小偷锁在摩托车上在街道上拖来拖去,而一旁乌鸦正高兴的叫唤着以示感激的画面?

That the larger the chunk size the more secure the encryption -- ideally you would like to encrypt a file in a single data chunk to take full advantage of Rijndael's block chaining functionality

越大的块大小更安全的加密-理想您想在一个加密的数据块文件利用Rijndael算法的块充分利用链接功能

Different from all other current file encryption systems which are also based on DES, our Enhanced File Encryption System is following X9.17 key generation standard to ensure the strength of the primary key, utilizing Cipher Block Chaining mechanism to hold the text structure, and introducing cache technique and Bit / Byte mapping algorithm to enhance the efficiency while reducing the complexity of the system.

与当前许多基于 DES 的文件加密系统不同,我们的增强型文件加密系统采用 X9.17密钥生成规范确保用户主密钥的强度,采用密文分组链接方式保护密文的结构信息,并且通过缓存技术和位/字节映射算法提高系统的执行效率、降低系统的复杂度。

The validity of the provable security of counter with cipher block chaining message authentication code mode and cipher-based message authentication code mode was studied and proved. The illustrations of different communications' encryption have been developed.

对分组密码算法CCM、CMAC加密模式进行描述,用可证安全性理论对它们进行相关研究和证明,并对各种证明情况在不同通信环境下的使用作出说明。

The one-way coupled map lattices and initial condition generation function based on iterative Logistic map are used to realized the data confusion and diffusion between plain-text and key information. And the cipher block chaining mode is used to generate the 128-bit Hash value for plaint-text with arbitrary length.

该方法通过使用单向耦合映射格子和基于迭代Logistic映射的初始状态生成函数实现明文和密钥信息的混淆和扩散,并基于密码块连接方式产生任意长度明文的128位Hash值。

In addition, algorithms used in PBE were discussed in details, including International Data Encryption Algorithm, Advanced Encryption Standard of U.S., safe Hash function named SHA-1, Pseudo Random Number Generator.The modes of operation in blok cipher,such as Electronic Code Book, Cipher Block Chaining, Cipfertext Feedback and Output Feedback,are described in the thesis.

采用DSP TMS320C5409汇编语言编制了以上各种算法,在DSP上实现了一个口令加密系统,数据加密速度达到3Mb/s以上,并实现密钥的安全管理,能满足个人PC机脱离主CPU加密大量数据的需要。

An on-board four-channel DMA controller along with an intelligent micro machine automatically manages memory structures and provides command chaining and autonomous block transfers while two large independent FIFOs accommodate long bus latencies and provide programmable thresholds.

一个机载4信道DMA(Direct Memory Access 直接存储器存储)控制器和一个智能微型设备能够自动管理存储结构并提供命令链和独立块传输,而两个大型独立的FIFOs可以容纳长时间总线延迟并提供可编程阈值。

It must improve the commonly symmetrical key block cipher arithmetic for ensuring that the data length will not be increased after encryption: using forward shift bits mode in Triple DES with Two Keys; using cipher text stealing mode in RC5 with Cipher Block Chaining.

为保证加密后数据长度不变,应对常用的对称密钥分组密码算法以改进:双密钥三重DES加密采用向前挪位法,RC5密码分组链接加密采用密文窃取方式。

The mixed reasoning combining forward chaining with backward chaining, the control strategies combining autodiagnosis with interactive diagnosis and so on are presented. The types of diagnostic information are classified.

将案例征兆分为确定性必要征兆和其他征兆,提出了基于确定性和模糊加权相结合的案例相似度的计算方法,并对相似度算法进行了探讨,提高了案例的检索速度和检索结论的可靠性。

第1/5页 1 2 3 4 5 > 尾页
相关中文对照歌词
Chaining Day
推荐网络例句

Neither the killing of Mr Zarqawi nor any breakthrough on the political front will stop the insurgency and the fratricidal murders in their tracks.

在对危险的南部地区访问时,他斥责什叶派民兵领导人对中央集权的挑衅行为。

In fact,I've got him on the satellite mobile right now.

实际上 我们已接通卫星可视电话了

The enrich the peopling of Deng Xiaoping of century great person thought, it is the main component in system of theory of Deng Xiaoping economy, it is a when our country economy builds basic task important facet.

世纪伟人邓小平的富民思想,是邓小平经济理论体系中的重要组成部分,是我国经济建设根本任务的一个重要方面。