加密
- 与 加密 相关的网络例句 [注:此内容来源于网络,仅供参考]
-
Since the publication in 1977, has been the international commercial lunwen114confidentiality of communications and computer communications of the most commonly used encryption standard.
自从1977年公布以来,一直是国际上的商用保密通信和计算机通信的最常用的加密标准。
-
In this thesis, we will mainly do research on the novel scheme for Digital image Steganography, Digital Image Secret Transmission in network and the development of the information hiding device for application. The main contributions of this thesis are as following: The novel conversion method for mapping image to complex number is proposed, and the plus, minus, multiply and complex conjugate operation of image are defined based on Positional number systems and complex number system. Following new results have been gotten: 1 The suitable complex number basis to be used to express integers is a big set. 2 Any image can be mapping into a one-to-one point. 3 Lots of image processing problem can be considered based on geometric theory.
在本论文中,研究工作集中在数字图像伪装算法的新模型、图像在网络中的加密传输的新方案和信息伪装设备的研发等三个方面,主要包括:基于位值制记数法和复数系理论,提出利用复数作为基底的数字图像新的表示方法,用复数运算定义了图像和图像间的"加"、"减"、"乘"、"共轭"等运算关系;得到理论结果: 1、能表示任何整数的复数基是很大的一个集合。2、任何一幅图像,都能和复平面上的一个点一一对应。3、可以将图像问题化归为平面几何问题处理。4、复数系下的图像表示适合用于信息伪装。
-
It is clearly advantage that if someone tries to see the plain file, he must try on the all encryption combinations in all encryption methods, strictly speaking, it is a kind of compositor.
如果技术上允许多重叠加的话,可以尝试用更多的加密方法来进行叠加,以达到增加数据对象的安全级别。
-
The continue thing is that the data thief needs to try on all combination and compositor of encryption under knowing the encryption method.
但是,为了数据对象的安全性更高些,还是建议多采用不止一种加密方法的组合叠加。
-
Data applications are set up resources for interoperable model of heterogeneous database environment or file system connected to achieve implementation of the middleware connectivity; at Distributed System, the essential data are concentrated in the data storage server, they can be a relationship between the type, compound document type, with a variety of multimedia-based storage format, or are encrypted or compressed storage, such middleware for virtual buffer at the network access, format conversion, extracting and other convenient
是为了建立数据应用资源互操作的模式,对异构环境下的数据库实现联接或文件系统实现联接的中间件;在分布式系统中,重要的数据都集中存放在数据服务器中,它们可以是关系型的、复合文档型、具有各种存放格式的多媒体型,或者是经过加密或压缩存放的,这类中间件将为在网络上虚拟缓冲存取、格式转换、解压等带来方便
-
You can even encrypt or compress it.
你甚至可以加密或压缩它。
-
Its purpose is to encapsulate data in an encrypted and compressed file.
它的目的是将数据封闭在一个加密和压缩的文件中。
-
The only other alternative is compressing and/or encrypting files with a password.
唯一的其他选择是压缩和/或加密文件与密码。
-
If there is an encryption computer virus, what will happen?
如果有一种加密计算机病毒,将会怎样?
-
The program is fast, and requires relatively few computing resources and little time to encrypt files.
该项目是速度快,而且需要相对较少的计算资源和很少的时间来加密文件。
- 推荐网络例句
-
We have no common name for a mime of Sophron or Xenarchus and a Socratic Conversation; and we should still be without one even if the imitation in the two instances were in trimeters or elegiacs or some other kind of verse--though it is the way with people to tack on 'poet' to the name of a metre, and talk of elegiac-poets and epic-poets, thinking that they call them poets not by reason of the imitative nature of their work, but indiscriminately by reason of the metre they write in.
索夫农 、森那库斯和苏格拉底式的对话采用的模仿没有一个公共的名称;三音步诗、挽歌体或其他类型的诗的模仿也没有——人们把&诗人&这一名词和格律名称结合到一起,称之为挽歌体诗人或者史诗诗人,他们被称为诗人,似乎只是因为遵守格律写作,而非他们作品的模仿本质。
-
The relationship between communicative competence and grammar teaching should be that of the ends and the means.
交际能力和语法的关系应该是目标与途径的关系。
-
This is not paper type of business,it's people business,with such huge money involved.
这不是纸上谈兵式的交易,这是人与人的业务,而且涉及金额巨大。