加密
- 与 加密 相关的网络例句 [注:此内容来源于网络,仅供参考]
-
With the ADAS 3-D data assimilation system, the NCEP/NCAR reanalysis data of 1°×1°, radar echoes and GMS-5 satellite images are assimilated into the ARPS to simulate the torrential rain event.
所利用的资料为:2000 年8 月29-31 日每日4 个时次(00、06、12、18) 1°×1°的 NCEP/ NCAR 再分析资料及713 雷达资料、 GMS-5 红外云图、探空报、地面加密资料。
-
The second layer of encryption is unique to each addressee, at least in that each addressee has a unique key.
第二层加密是独一无二的,以每个收件人的,至少在每个收件人有其独特的关键。
-
Women are free to swim and sunbathe less hindered by clothing on the private beaches west of Alexandria, such as Agami, and at resorts populated by foreign tourists on the Red Sea coasts.
而在亚历山大西部像阿加密这样的私人海滩或游客密集的红海海滩上,女士们在游泳或晒日光浴时,着装的限制就没有那么严格了。
-
The group plans to post Mr. Aid's reclassified documents and his account of the secret program on its Web site, www.gwu.edu/~nsarchiv , on Tuesday.
该小组计划在星期二将艾德先生被重新加密的文件以及他关于秘密计划的说明发布到网站: www.gwu.edu/~nsarchiv 上。
-
A blast of cold air will do the trick of breaking through a computer's encrypted hard drive.
发生爆炸的冷空气也将打破帽子戏法通过计算机的加密硬盘驱动器。
-
For implementing the encryption/decryption and information hiding for digital multimedia, and aiming to generate enough large cipher key space, the accurate period of high dimension random matrix scrambling transformation is studied with the help of number theory and algebraic theory.
为了适合数字多媒体特性,实施多媒体加密与信息隐藏,生成充分大的密钥空间,使用了数论、近世代数、算法分析等工具,对高维随机矩阵置乱变换的精确周期进行了研究。
-
I could encrypt it or alternately I could have fun.
我可以加密,或交替我能得到乐趣。
-
Of course, it is Galaxy series product got paying close attention to not just, this year August, the company announced to release 8 kernels, every kernel the Niagara2 chip of 8 lines Cheng, the network that the function of the buy inside Niagara 2 includes per sec. 10Mbps, add communication of close, PCI Express and 4 memory controller to wait amain, it may be said is an example of odd chip system.
当然,不仅仅是Galaxy系列产品得到了关注,今年8月份,公司宣布发布了8内核,每个内核8线程的Niagara2 芯片,Niagara 2内置的功能包括每秒钟10Mbps的网络、全速加密、PCI Express通讯以及4个内存控制器等,可谓是单芯片系统的一个典范。
-
The network security is an affected area very widespread question, the topic research content: The network security rank, the data encryption technology, the firewall technology concept, the function, introduced the network security faces main threat as well as question countermeasure, and through the example some company network analysis situs chart from the analysis network security movement environment explained the example plan as well as supplements four safe disposition.
网络安全性是一个涉及面很广泛的问题,课题研究的内容:网络安全级别、数据加密技术、防火墙技术的概念、作用,介绍了网络安全面临的主要威胁以及问题的对策,并且通过实例某公司网络拓扑图从分析网络安全的运行环境来说明实例方案以及补充四点安全的配置。
-
Steganos Internet Anonym 7 offers automatic product updates, the ability to change camouflage identities everysecond, the elimination of popup ads, ActiveX dialers and other dangerous Web content, an encryptedfavorites list which protects users favorite Web sites through a password-protected system, a built-in Internet Explorer plug-in which enables direct access to all software functions, and a map of theworld which permits users to view the constantly changing locations of the worldwide proxy serversmasking their real IP address.
Steganos Internet Anonym 7提供自动产品更新,每秒改变伪装身份的能力,清除弹出式广告窗口,ActiveX装置以及其它有害的网络内容,一个通过一个密码保护系统保护用户的网络收藏夹的收藏夹加密列表,一个可以直接访问所有软件功能的内置的IE插件,以及一个允许用户浏览经常变更的掩饰它们的真实IP地址的世界范围的代理服务器的世界地图。
- 推荐网络例句
-
Singer Leona Lewis and former Led Zeppelin guitarist Jimmy Page emerged as the bus transformed into a grass-covered carnival float, and the pair combined for a rendition of "Whole Lotta Love".
歌手leona刘易斯和前率领的飞艇的吉他手吉米页出现巴士转化为基层所涵盖的嘉年华花车,和一双合并为一移交&整个lotta爱&。
-
This is Kate, and that's Erin.
这是凯特,那个是爱朗。
-
Articulate the aims, objectives and key aspects of a strategic business plan.
明确的宗旨,目标和重点战略业务计划。