• Polygon Boolean operation is a key algorithm way in computer graphics.

    多边形布尔运算计算机图形学一个关键算法

    youdao

  • So far, the research on fingerprint key algorithm is still at its first stage.

    因此指纹密钥算法成熟研究课题,还有很多问题有待解决。

    youdao

  • The design principles, hardware circuit and key algorithm are introduced simply.

    对其设计原理硬件电路关键算法了详细介绍。

    youdao

  • A new design flow is summarized and a key algorithm is designed for the new architecture.

    针对新的结构概括了设计流程设计核心算法

    youdao

  • The dissertation aims to study a fingerprint key algorithm suitable for fingerprint minutiae.

    本文主要研究适用指纹细节点信息的指纹密钥算法

    youdao

  • This is one of two binary transform the source code, digital image processing is one of the key algorithm.

    关于值化变换源代码,是数字图像处理其中一个重要算法

    youdao

  • In the design, the median filter is chose to process images. The key algorithm is achieved through the VHDL.

    设计时,选用值滤波算法图像进行处理核心算法的实现通过VHDL语言实现的。

    youdao

  • The bulk of the data is encrypted using a symmetric key algorithm that encrypts and decrypts data using a single secure key.

    数据使用对称密钥算法进行加密,它使用一个密钥来实现对数据的加密解密

    youdao

  • The key algorithm of the orebody's face modeling and block modeling were discussed, aiming at the complexity of orebody modeling.

    针对非层状矿体三维建模复杂性讨论了非层状矿体三维建模中有关矿体表面矿体段建模基本算法

    youdao

  • This payment protocol is specially suitable for mobile devices of weaker computation capability which cannot execute public-key algorithm easily.

    协议特别适用于计算能力较弱、不宜执行公钥密码算法的手持移动设备

    youdao

  • This thesis is mainly about the study and design of the Automatic fingerprint verification system applying for one to one match, including the key algorithm.

    论文主要对应用于“一对一匹配”的指纹认证系统设计及其关键算法的实现进行研究

    youdao

  • This paper realizes the automatic generation of the test case in the structure coverage test, which takes use of the iterative relaxation method as key algorithm.

    利用迭代松弛作为核心算法实现结构覆盖测试自动生成

    youdao

  • Based on trapdoor one-way function, this paper presents a RSA -based probabilistic public-key algorithm with security and efficiency and the correctness of algorithm was proved.

    根据单向陷门函数的陷门性质,文章设计了一种安全有效的基于RSA概率公钥密码算法正确性进行了证明。

    youdao

  • On the basis of study of secret key algorithm RSA based smart card identity identification technology then puts forward HASH function based smart card identity identification method.

    研究基于RS A密钥算法智能卡认证技术基础上提出了基于散列函数的智能卡访问认证方法

    youdao

  • The feature and figure indication of graduation line in thermodetector figure are detailed analysed, therefore the key algorithm think and edit feature of system program are reflected.

    并具体就温度表图像刻度线特征图像识别详细分析体现系统程序关键算法思想编辑特征;

    youdao

  • This section describes different types of keys, and how to select an algorithm for your key.

    一部分讨论不同类型密钥以及如何选择密钥算法

    youdao

  • Requiring everything to be one-way-encrypted using a strong algorithm key means that your data is very secure, but not convenient to use.

    使用强大的算法密钥所有数据都进行单向加密意味着的数据非常安全但是使用时很方便

    youdao

  • Listing 2 shows a sample algorithm which creates such a key by string concatenation.

    清单2显示了一个通过字符串串联创建此类示例算法

    youdao

  • The combination of encryption algorithm and the key length governs the strength of the encryption type.

    加密算法密钥长度组合决定加密类型强度

    youdao

  • This specifies the use of the RSA Key Exchange and authentication algorithm, along with the RC4_SHA_US CipherSpec.

    规定RSA密钥交换认证算法使用,还规定了RC4_SHA_US密码规范。

    youdao

  • Its key feature is a very fast algorithm that just sends file differences over the data link, thus minimizing the total data flow between machines.

    关键特性一个非常算法,它通过数据链路发送文件差异因此机器之间传输数据总量降低到最低限度。

    youdao

  • The combination of algorithm and the key length results in having stronger encryption, medium encryption, and weak encryption.

    算法密钥长度组合产生加密中等加密和加密。

    youdao

  • Such an application must specify additional key, algorithm, processing and rendering requirements.

    这种应用程式必须指定附加金钥算法处理再现需要

    youdao

  • The command also includes an alias for the certificate, along with the specification of the algorithm and key size used to generate the key pair.

    命令包括证书别名以及用于生成密钥算法规范密钥大小

    youdao

  • Now, as obvious a statement as that is in this algorithm, it turns out that is the key to this whole problem being solved correctly without my algorithm looping infinitely.

    算法很明显一句话也是正确解决,整个问题关键,否则此算法就会陷入死循环。

    youdao

  • Another popular secret-key cryptosystem is the International Data Encryption Algorithm (IDEA).

    另一个流行秘密密钥加密系统国际数据加密算法(IDEA)。

    youdao

  • Instead of having to determine this information, the memcached clients use a simple hashing algorithm on the key you specify when storing the information.

    memcached客户机不必决定信息,它只需对在存储信息指定使用一个简单散列算法

    youdao

  • Despite these examples, most words in the Metaphone algorithm return a single key.

    除了这些例子之外,Metaphone算法中的多数单词还是返回单一

    youdao

  • Despite these examples, most words in the Metaphone algorithm return a single key.

    除了这些例子之外,Metaphone算法中的多数单词还是返回单一

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定