英语人>网络例句>exchange algorithm 相关的网络例句
exchange algorithm相关的网络例句

查询词典 exchange algorithm

与 exchange algorithm 相关的网络例句 [注:此内容来源于网络,仅供参考]

The FIR digital filter designed with Remez exchange algorithm is applied in the processing of loran-C signal.

用Remez交换算法设计优化的FIR数字滤波器并应用于罗兰C信号处理中,然后结合这两种方法,进行去噪仿真。

The Kerberos protocol is analyzed, and there is guessing attack defects. DH key exchange algorithm and public-key cryptosystem are introduced to Kerberos authentication protocol.

对Kerberos协议分析指出,协议存在猜测攻击的缺陷,提出将DH密钥交换算法和公钥密码体制引入到Kerberos认证协议中。

This paper extends the ant colony algorithm which is used for solving 0-1 knapsack problem in reference [7], and gets enlightenment from the ant colony algorithm with 2-opt local optimization for solving traveling salesman problems: Exchange strategy can make the algorithm have faster convergence rate and get better quality solution. So this paper presents the ant colony algorithm based on exchange stragegy.

本文推广了文献[7]中求解单维0-1背包问题的蚁群算法,并从结合2-opt等局部优化的蚁群算法求解旅行商问题中得到启示:通过交换策略可以加快算法的收敛速度和获取更高质量的解,因此提出了基于交换策略的蚁群算法。

Imitate server attack ; dynamic password authentication ; cryptographic protocols ; jacking connection attack ; Diffie-Hellman key exchange algorithm

冒充服务器攻击;动态口令认证;密码协议;劫取连接攻击; Diffie-Hellman密钥交换算法

Since the step that is most computationally expensive and causes computational imbalance between clients and server in the SSL handshake protocol is the decryption computation of the server,we show that a client balanced secret exchange algorithm can be used to speedup SSL session initialization and undertake the previous computation tasks of server's decryption.

由于在SSL握手协议中最耗费计算资源和造成客户端与服务器端计算不平衡的步骤是服务器端解密运算,提出了客户端平衡的密钥交换算法,用来加速SSL会话的初始化和承担服务器端的解密的预运算。

Based on the concepts of complex product, standard operation, virtual operation, no-wait and the expansion processing tree defined in this paper, the standard operations are processed by allied critical path method and best fit scheduling method, and the virtual operations are processed respectively on corresponding machine with movement and exchange algorithm in order to translate scheduling problem with no-wait operations into the general scheduling problem with virtual operations.

该方法在提出复杂产品、标准工序、虚拟工序、零等待和扩展加工工艺树的概念基础上,对扩展加工工艺树中的标准工序采用拟关键路径法和最佳适应调度的车间调度算法进行调度,对虚拟工序采用移动交换算法在相应设备上分离调度,将存在零等待约束的调度问题转化为存在虚拟工序的无零等待约束的调度问题。

The design includes many new technologies in data exchange and data security, they are: Converting non-XML data to XML in order to apply the XML security technology to more data types; Using the technology of XKMS and PKI to manage the public key in order to overcome the shortage of complexity and difficulty in using PKI and improve the efficiency of the public key management; Using Diffe-Hellman algorithm combining with the public key technology to exchange secret key in order to furthest increase the security of the key; Using the technology of XML digital signature algorithm to ensure the integrity, message authentication and signer authentication of the data; Using the technology of XML encryption to ensure confidentiality of the data; Defining delegable access rules on the structure and content of the XML documents to provide fine-grained access control. According to the XML security framework, a XML security library is designed and implemented.

在对XML及其安全技术主要包括XML加密技术、XML数字签名、公钥管理、密钥产生和交换进行研究的基础上,结合传统密码技术和XML安全技术提出了一种基于XML的数据安全模型,模型中包含了目前网络数据交换和安全领域的一系列最新技术,主要有:将非XML格式数据转换为XML格式数据的方法,以保证现有的大部分网络数据能够应用XML安全技术;使用XML公钥管理技术结合PKI技术管理公钥,以克服PKI技术实施和部署复杂、难度大等问题,提高公钥管理的效率;使用Diffie-Hellman算法结合公钥技术交换密钥,以最大限度保证密钥的安全;使用XML数字签名技术保证数据的完整性、不可否认性和发送方身份认证;使用XML加密技术保证数据的机密性;根据XML文档的内容和结构定义授权访问规则进行良好的访问控制。

The main features of this paper is: nothing to do with the platform, this system can be compatible with the majority of software and hardware used by the platform, as well as various database platform, shielding the differences of hardware and software platform such as network, operating systems, databases, application systems and so on, so that enterprises and institutions could achieve seamless, transparent data exchange through data exchange system; Java technology used to develop the system transplantability; using data exchange center to achieve centralized data processing, different data format conversion, increased system scalability; from data transmission, authentication, access control, encryption and more news content log-class areas enhanced data exchange system security; using DES and RSA algorithm , increased the confidentiality of data transmission; create WrapperTimer category achieved data transmission timing implementation and reduce the dependence on artificial.

设计的系统与平台无关,能兼容企业所用的大多数软硬件平台,以及各种数据库平台,屏蔽网络、操作系统、数据库、应用系统等软硬平台的差异,使企事业单位通过数据交换系统实现无缝的、透明的交换数据;采用数据交换中心来实现数据的集中处理、不同数据格式的转换,增加了系统的可扩展性;从数据传输、身份认证、权限控制、消息内容加密和多级日志等多方面增强数据交换系统的安全性;用DES和RSA算法对XML文件或XML文件中的元素进行加密,增加传输数据的保密性;创建WrapperTimer类实现了数据传输的定时执行,降低了对人工的依赖性。

In the end of this thesis, the data independent detection model of exchange ratedata stream is built. Then, the algorithm provided in this thesis is used on the model to solve the problem of detecting the abnormal data block in exchange rate data stream. Experimental data are also provided.

最后,本文根据实时汇率数据流的特点,建立了数据点相互无关的实时汇率数据流的检测模型,然后采用本文提出的数据流的变化检测算法解决实时汇率数据流的异常检测问题,并给出了实验结果。

Compared with the exchange and mutation operation in genetic algorithm ,crossover operation becomes helpless when adaptive value of most individules in demes have little difference.The algorithm falls into local solution and can't be solved by exchange. Although mutation can make it shake off local convergence and jump out of local solution, denteric mutation may destroy the produced module that is constructive to form the optimal solution.

相比遗传算法中的交换和变异操作,当种群的多数个体适应值相差不大时交叉操作就显得无能为力,算法陷入局部解而不能由交换解决,突然变异能够使之摆脱局部收敛而跃出局部解,但是后期的变异可能破坏已产生的对形成最优解有建设性作用的模块。

第2/6页 首页 < 1 2 3 4 5 6 > 尾页
推荐网络例句

This one mode pays close attention to network credence foundation of the businessman very much.

这一模式非常关注商人的网络信用基础。

Cell morphology of bacterial ghost of Pasteurella multocida was observed by scanning electron microscopy and inactivation ratio was estimated by CFU analysi.

扫描电镜观察多杀性巴氏杆菌细菌幽灵和菌落形成单位评价遗传灭活率。

There is no differences of cell proliferation vitality between labeled and unlabeled NSCs.

双标记神经干细胞的增殖、分化活力与未标记神经干细胞相比无改变。