• Fingerprint readers, onboard data encryption, and other hardware-based security features, now common on laptops, have yet to be incorporated in smartphones and other "post-PC" devices.

    指纹识别器、板载数据加密以及其他基于硬件安全功能现在笔记本电脑上很普遍智能手机其他“后pc”设备依然有待支持。

    youdao

  • The trusted computing based on the hardware security module supporting is the platform to enhance the whole security broadly used in the computation and the communications system.

    可信计算计算通信系统广泛使用基于硬件安全模块支持下的可信计算平台提高整体安全性

    youdao

  • As network processor become core hardware in the next generation network device. The research in this paper is security of network information transmission based-on network processor.

    因此网络处理器成为下一代网络设备核心硬件本文研究问题基于网络处理器网络信息传输安全性

    youdao

  • As network processor become core hardware in the next generation network device. The research in this paper is quality and security of network information transmission based-on network processor.

    因此网络处理器成为下一代网络设备核心硬件本文研究问题基于网络处理器网络服务质量网络信息传输安全性

    youdao

  • Last, the simulations of hardware and software show that the information security system based on chaos algorithm have high security level and high performance-value ratio.

    最后通过硬件软件仿真结果,表明了本文所设计的基于混沌算法信息安全系统能够较好的保障信息安全,系统的性价比较高。

    youdao

  • The thesis describes the framework of the security system based S3C2410 platform in detail, including the design and development process of hardware and software system.

    论文详细描述基于S3C 2410平台安防系统结构框架主要包括硬件系统以及软件系统的设计开发过程

    youdao

  • Because of high security, high speed, and good performance advantages, such as hardware-based encryption technology to protect disk data has become the mainstream of current trends and research focus.

    由于安全性速度快性能等优势硬件加密技术成为当前保护磁盘数据主流趋势研究热点

    youdao

  • Based on the nonuniformity analysis of image in the X-Ray security inspection system, a novel correction method using both software correction and hardware correction is proposed.

    首先分析X射线安检系统应用图像均匀性的原因,此基础提出了一种新的软硬件结合的校正方法

    youdao

  • Hard disk encryption card, which is designed based on the IP reuse in this paper, is a kind of hardware encryption device to ensure storage security.

    基于IP复用方法实现硬盘加密用于保障数据存储安全硬件加密装置

    youdao

  • Based on commonly procedure, with intelligent active security system, computer vision and action image process, we summarized a course to develop and test the DSP hardware and software system.

    DSP系统常规的开发过程基础结合汽车智能主动安全系统中的计算机视觉动态图像处理总结了一套行之有效的DSP软硬件系统的开发、调试过程

    youdao

  • Based on commonly procedure, with intelligent active security system, computer vision and action image process, we summarized a course to develop and test the DSP hardware and software system.

    DSP系统常规的开发过程基础结合汽车智能主动安全系统中的计算机视觉动态图像处理总结了一套行之有效的DSP软硬件系统的开发、调试过程

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定