查询词典 key-stone
- 与 key-stone 相关的网络例句 [注:此内容来源于网络,仅供参考]
-
SIFT(Scale Invariant Feature Transform) local feature is chosen because of its scale invariance and the property of accurate key-point localization.The Euclidean distance between different SIFT feature vectors is defined as the measure of similarity to get the pre-matched key-point pairs.The affine transform model is used to realize the registration.In order to get the accurate affine transform parameter,the principal of affine transform error is used to get rid of mismatched key-point pairs from the pre-matched pairs.
该方法选取具有良好尺度、旋转不变性以及精确特征点定位能力的SIFT局部特征,使用其特征向量间的欧氏距离作为相似性度量进行特征点匹配,并依据仿射变换误差准则去除奇异匹配特征点对,采用仿射变换的几何模型,实现了遥感图像的快速自动配准。
-
In word processing, a key, which when operated in conjunction with another key, gives an alternate meaning to the key, such as to initiate a program or execute a function.
在字理技术中的一种键,当与另一种键配合使用时,给该键换一种功能,例如,启动某个程序或执行某种功能。
-
A three row template may be designed for function key combinations with either an alternate key row or control key row for the third row selection.
三年连续模板可设计为功能键的组合,无论是候补的关键行或控制的关键,为连续第三排的选择。
-
To further enhance the security and connectivity for wireless sensor networks,proposed an improved key management scheme.introduced the scheme,a random key predistribution using multiple key spaces and multipath key reinforcement was based on group-based deployment model which in the paper of du wen-liang.analysis and simulations show that the scheme has lower memory and communication overheads, better ability against attacks besides good security performance.
为了进一步提高无线传感器网络的安全连通性,在分析du wen-liang等人的group-based节点投放模型的基础上,提出了一种改进的密钥管理方案:多密钥空间与多路径增强相结合的随机密钥预分配方案。结果分析表明,该方案需要较少的内存存储空间,不仅提高了系统的连通性,还降低了节点的被捕获概率。
-
The menu key function and enter key function interconvert through the menu key translation mode in the present invention, thereby achieving the effect of providing convenient key operation to the left-handed user.
在本发明中,通过菜单键转换模式对菜单键功能与确认键功能进行相互转换,达到了为左撇用户提供方便的键操作的效果。
-
In the symmetrical encryption system aspect, discussed the des algorithm with emphasis, has given it in the key management, the safe application aspect exists question; the problem which in the asymmetrical encryption system aspect, studies in with emphasis which rsa and the application has the question, the ecc merit and should pay attention and so on.through the quite symmetrical key encryption system and the public key encryption system good and bad points,summarize should use the mix key encryption system in the electronic commerce, both guarantee data security, and may enhance encrypts and deciphers the speed.
在对称加密体制方面,重点讨论了des 算法,给出了其在密钥管理、安全应用方面存在的问题;在非对称加密体制方面,重点研究rsa及其应用中存在的问题、ecc的优点及应注意的问题等。通过比较对称密钥加密体制和公开密钥加密体制的优缺点,总结出在电子商务中应采用混合密钥加密体制,既保证数据安全,又可提高加密和解密速度。
-
By introducing XOR operation and one-way function chains to group key management schemes based on the keys tree, a new group key management scheme based on the keys tree, XOR operation and one-way function chains is proposed. Initialization, member adding and member evicting operations are introduced. The new scheme is compared with three other group key management schemes which are based on the keys tree:SKDC, LKH, and OFT. As far as transmission, computation and storage costs are concerned, the performance of the new group key management scheme is the best.
摘 要:在基于密钥树的组密钥管理方案中引入了XOR操作以及单向函数链,提出了一种新的基于密钥树、XOR操作以及单向函数链的组密钥管理方案,介绍了新方案中初始化、成员加入以及成员退出的操作,将新方案与3种基于密钥树的组密钥管理方案SKDC,LKH,OFT进行了比较,数据表明:就传输、计算以及存储开销而言,新的组密钥管理方案性能最优。
-
Its birth is in key word is decision-making in to the search engine optimizes worker enlarge wide train of thought, basis before circumstance, major search engine optimizes service business to pay close attention to most is the core key word in the website, rank that those who emphasize also is core key word, and oversight the key word of a few little flow.
它的诞生在关键字决策中给搜索引擎优化工作者扩宽了思路,根据以往的情况,大部分搜索引擎优化服务商关注最多的是网站中的核心关键字、强调的也是核心关键字的排名,而忽略了一些小流量的关键字。
-
The third key-press is regarded as letter affirmance key-press on mini key-board, at the same time, identifies sound, the identical method is: identifying the three sounds by lengthways three lists, identifying the three rhymes by transverse three rows, the intersectant is the whole identifying key-press of sound.
小键盘以输入第三键作为字符确认键,同时识别声韵,识别方法是:以纵向三列键识别三声;横向三排键识别三韵,纵横交合键位就是该音节的声韵全识别键。
-
The BCH coded authentication data is modulated by chaotic sequence and then embedded into the DCT domain of the image by using the owner's private key.The embedding process is controlled by Just Noticeable Difference of the DCT block.Users can extract the authentication data with the public key,while they can't get the private key to destroy or delete the watermark through the public key.
提出一种基于非对称水印的图像认证改进算法,算法中将经过BCH编码和混沌序列调制的认证信息作为水印,利用所有者私钥嵌入图像DCT域,嵌入过程根据DCT块的可视噪声阈值控制,用户可以利用公钥从水印图像中提取认证信息,但无法从公钥中获取任何私钥信息,从而无法破坏或删除水印。
- 相关中文对照歌词
- Key Lime Pie
- The Key
- Minor Key Sonata
- Down On Longboat Key
- Laid Back 'n Low Key
- Key To Your Heart
- Take The Key
- Dota 2 Beta Key
- My Key
- The Key
- 推荐网络例句
-
With Death guitarist Schuldiner adopting vocal duties, the band made a major impact on the scene.
随着死亡的吉他手Schuldiner接受主唱的职务,乐队在现实中树立了重要的影响。
-
But he could still end up breakfasting on Swiss-government issue muesli because all six are accused of nicking around 45 million pounds they should have paid to FIFA.
不过他最后仍有可能沦为瑞士政府&议事餐桌&上的一道早餐,因为这所有六个人都被指控把本应支付给国际足联的大约4500万英镑骗了个精光。
-
Closes the eye, the deep breathing, all no longer are the dreams as if......
关闭眼睛,深呼吸,一切不再是梦想,犹如。。。。。。