英语人>网络例句>key 相关的网络例句
key相关的网络例句
与 key 相关的网络例句 [注:此内容来源于网络,仅供参考]

The BCH coded authentication data is modulated by chaotic sequence and then embedded into the DCT domain of the image by using the owner's private key.The embedding process is controlled by Just Noticeable Difference of the DCT block.Users can extract the authentication data with the public key,while they can't get the private key to destroy or delete the watermark through the public key.

提出一种基于非对称水印的图像认证改进算法,算法中将经过BCH编码和混沌序列调制的认证信息作为水印,利用所有者私钥嵌入图像DCT域,嵌入过程根据DCT块的可视噪声阈值控制,用户可以利用公钥从水印图像中提取认证信息,但无法从公钥中获取任何私钥信息,从而无法破坏或删除水印。

SIFT(Scale Invariant Feature Transform) local feature is chosen because of its scale invariance and the property of accurate key-point localization.The Euclidean distance between different SIFT feature vectors is defined as the measure of similarity to get the pre-matched key-point pairs.The affine transform model is used to realize the registration.In order to get the accurate affine transform parameter,the principal of affine transform error is used to get rid of mismatched key-point pairs from the pre-matched pairs.

该方法选取具有良好尺度、旋转不变性以及精确特征点定位能力的SIFT局部特征,使用其特征向量间的欧氏距离作为相似性度量进行特征点匹配,并依据仿射变换误差准则去除奇异匹配特征点对,采用仿射变换的几何模型,实现了遥感图像的快速自动配准。

In word processing, a key, which when operated in conjunction with another key, gives an alternate meaning to the key, such as to initiate a program or execute a function.

在字理技术中的一种键,当与另一种键配合使用时,给该键换一种功能,例如,启动某个程序或执行某种功能。

A three row template may be designed for function key combinations with either an alternate key row or control key row for the third row selection.

三年连续模板可设计为功能键的组合,无论是候补的关键行或控制的关键,为连续第三排的选择。

Provable Security is a formal method for proving the security of cryptographic schemes, in which the difficulty of breaking a particular scheme is formally related to that of solving a widely believed computational hard problem. Provable security has already become an important theme of theoretical researches in modern cryptography. This dissertation investigates the provable security of public-key encryptions and hybrid encryptions of asymmetric and symmetric encryptions. This includes the various formal security notions and the constructions can be proved to achieve them. Among the constructions, hybrid encryptions are themselves an important way to obtain public-key encryption schemes with chosen ciphertext security. The main results are as follows:(1) The one-wayness of the trapdoor one-way function in NTRU depends on the randomness of the session key, which is different from previous ones. Based on this observation, a new kind of trapdoor one-way function, trapdoor one-way functions with an auxiliary random variable is proposed.

可证明安全性是一种证明密码学方案安全性的形式化方法,它将密码学方案的安全性归约为公认的计算难题,已成为现代密码学领域中理论工作的主线,本文主要研究公钥加密与单双钥混合加密的可证明安全性,这包括它们的各种形式化安全性定义以及达到这些安全性定义的方案构造,而单双钥混合加密本身也是一种构造选择密文安全公钥加密的重要方法,本文得到的主要结果如下:(1)在研究NTRU公钥加密的特殊性基础上,对于公钥加密的陷门单向函数加密模型进行了扩展,提出了具有辅助陷门单向函数的概念,并将其扩展到多元的情况,讨论了可能的密码学用途。

To take advantage of the text arrangement functionality in devices with a keyboard, the component provides the '''insertAscii''' method. When Canvas or GameCanvas is used, the keyPressed method provides the ascii code of the button pressed. For normal keypad phones this is the ascii of the number pressed, for qwerty devices it will be the value of the key pressed. The device changes automatically the character set if the shift or numbers key is pressed and so the ascii received is different and corresponds to the intended key. The backspace character is also received as an ascii code, so it is not necessary to call in explicit way the delete function.

要充分利用键盘在设备里的文字安排功能,这个部份提供'''insertAscii'''方法,当Canvas或GameCanvas使用时,keyPressed方法提供按钮按下的ascii码,对於正常键盘手机来说这是按下数字的ascii,对qwerty设备来说它会是按下键的值,假如shift或数值键被按下该设备会自动改变字元集,所以所收到的ascii是不同的并且对应於所要的键,倒退键字元也会以ascii码来收取,所以没有必要用明确的方式来呼叫删除的函式。

Our products cover several tens of varieties such as glockenspiel series(wooden key series, metal key series, colored key series), drum series(bango drum, conga drum, hall drum, samba drum, waist drum, ground drum, sea drum, war drum, tambourine, wave drum), maraca, chicken shake, jingle ring series, sand block, shaker, castanet, finger castanet, block series, agogo series, clave, triangle, hand bell, sleigh bell series, wooden fish, guiro, cabasa, finger cymbal and so on; To improve craftwork level, our products design aims the requirements from clients and the innovation in varieties; to satisfy the clients' requirements on various grades and various batch scales, our manufacture introduces Flexible Manufacturing Process to control the procedure more rationally and guard the products quality more strictly; to set up a popular brand in market, we perseveres in a long term effort on service including that after sale and digs more latent clients' requirements.

本厂的产品涵盖打击琴类(木琴、金属键琴、儿童彩琴)、鼓类(邦戈鼓、康佳鼓、堂鼓、桑巴鼓、腰鼓、地鼓、印地安鼓、海鼓、战鼓、手鼓、铃鼓、波浪鼓)、砂球、砂蛋、铃圈、砂板、砂筒、响板、舞板、梆子、响筒、打棒、三角铁、碰钟、响铃、木鱼、鱼蛙、卡巴萨、指镲等数十个品种;本厂的产品设计立足于满足客户需求,不断创新,追求工艺品质;产品生产严把质量关,合理控制生产流程,可以满足客户不同档次规格和不同批量规模的产品需求;本厂注重产品的销售及售后跟踪服务,深度挖掘客户潜在需求,力争树立优质、完整的市场品牌形象。

Afterward, the main control desk encrypts the session key by using a public key, and transfers encrypted configuration information and session key to configuration server of network phone.

然后,主控台以一公开密钥对会话密钥进行加密,并传送已加密过的配置信息与会话密钥至网络电话配置服务器。

In terms of the difference between encryption key and decryption key,it can divide into symmetry cryptogram and public key cryptogram.

根据加密密钥和解密密钥在性质上的差异,可以将密码体制分为对称密码和公钥密码两大类。

Such as tiffany rings, earring, necklace, neck chain, bracelet, bangle, cuff link, money clip, key ring, key chain, key buckle .

如凡尼戒指,耳环,项链,头颈链,手链,手镯,袖口环线,钱夹,钥匙圈,钥匙链,钥匙扣。

第5/500页 首页 < 1 2 3 4 5 6 7 8 9 ... > 尾页
相关中文对照歌词
Down On Longboat Key
Key Lime Pie
The Key
Ring Ding Dong
Love Is The Key
J'Adore
Key West
Paranoia Key Of E
Key Of Life
Key To The Kingdom
推荐网络例句

More direct, directer ; most direct, directest

径直的,笔直的

Do you know how to use a chain saw?

你知道如何使用链锯吗?

This is close to the cost of the purchase price.

这样的收购价已接近成本。