Polygon Boolean operation is a key algorithm way in computer graphics.
多边形的布尔运算是计算机图形学的一个关键算法。
The design principles, hardware circuit and key algorithm are introduced simply.
对其设计原理、硬件电路和关键算法作了详细介绍。
A new design flow is summarized and a key algorithm is designed for the new architecture.
针对新的结构,概括了设计流程,设计了核心算法。
The dissertation aims to study a fingerprint key algorithm suitable for fingerprint minutiae.
本文主要研究适用于指纹细节点信息的指纹密钥算法。
This is one of two binary transform the source code, digital image processing is one of the key algorithm.
这是一个关于二值化变换的源代码,是数字图像处理的其中一个重要算法。
In the design, the median filter is chose to process images. The key algorithm is achieved through the VHDL.
在设计时,选用中值滤波算法对图像进行处理,核心算法的实现则通过VHDL语言实现的。
The bulk of the data is encrypted using a symmetric key algorithm that encrypts and decrypts data using a single secure key.
数据块使用一个对称密钥算法进行加密,它使用一个密钥来实现对数据的加密和解密。
The key algorithm of the orebody's face modeling and block modeling were discussed, aiming at the complexity of orebody modeling.
针对非层状矿体三维建模的复杂性,讨论了非层状矿体三维建模中有关矿体表面和矿体块段建模基本算法。
This payment protocol is specially suitable for mobile devices of weaker computation capability which cannot execute public-key algorithm easily.
该协议特别适用于计算能力较弱、不宜执行公钥密码算法的手持移动设备中。
This thesis is mainly about the study and design of the Automatic fingerprint verification system applying for one to one match, including the key algorithm.
论文主要对应用于“一对一匹配”的指纹认证系统的设计及其关键算法的实现进行了研究。
This paper realizes the automatic generation of the test case in the structure coverage test, which takes use of the iterative relaxation method as key algorithm.
利用迭代松弛法作为核心算法实现了结构覆盖测试用例的自动生成。
Based on trapdoor one-way function, this paper presents a RSA -based probabilistic public-key algorithm with security and efficiency and the correctness of algorithm was proved.
根据单向陷门函数的陷门性质,文章设计了一种安全有效的基于RSA的概率公钥密码算法,并对其正确性进行了证明。
On the basis of study of secret key algorithm RSA based smart card identity identification technology then puts forward HASH function based smart card identity identification method.
在研究基于RS A密钥算法智能卡认证技术的基础上,提出了基于散列函数的智能卡访问认证方法。
The feature and figure indication of graduation line in thermodetector figure are detailed analysed, therefore the key algorithm think and edit feature of system program are reflected.
并具体就温度表图像中刻度线的特征和图像识别作详细分析,以体现系统程序的关键算法思想和编辑特征;
In addition to the encrypted content, XML encryption allows you to specify the algorithm used for encryption or the encryption key used as part of the two elements discussed above.
除了加密过的内容以外,XML加密还允许您在上面讨论的两个元素中指定用于加密的算法,或者是加入用于加密的密钥。
This section describes different types of keys, and how to select an algorithm for your key.
这一部分讨论不同类型的密钥,以及如何选择密钥的算法。
Requiring everything to be one-way-encrypted using a strong algorithm key means that your data is very secure, but not convenient to use.
使用强大的算法密钥将所有数据都进行单向加密意味着您的数据非常安全,但是使用时很不方便。
Listing 2 shows a sample algorithm which creates such a key by string concatenation.
清单2显示了一个通过字符串串联创建此类键的示例算法。
An asymmetric algorithm USES a different key for encrypting or decrypting the message; one of the keys must be kept secret, and the other key is usually made public.
非对称算法使用不同的密钥对消息进行加密或解密;其中一个秘钥必须是秘密的,而另一个密钥通常是公开的。
The combination of encryption algorithm and the key length governs the strength of the encryption type.
加密算法和密钥长度的组合决定加密类型的强度。
This specifies the use of the RSA Key Exchange and authentication algorithm, along with the RC4_SHA_US CipherSpec.
它规定了RSA密钥交换和认证算法的使用,还规定了RC4_SHA_US密码规范。
Its key feature is a very fast algorithm that just sends file differences over the data link, thus minimizing the total data flow between machines.
它的关键特性是一个非常快的算法,它只通过数据链路发送文件差异,因此把机器之间传输的数据总量降低到最低限度。
The combination of algorithm and the key length results in having stronger encryption, medium encryption, and weak encryption.
算法和密钥长度的组合产生强加密、中等加密和弱加密。
Such an application must specify additional key, algorithm, processing and rendering requirements.
这种应用程式必须指定附加金钥、算法、处理和再现需要。
The command also includes an alias for the certificate, along with the specification of the algorithm and key size used to generate the key pair.
该命令还包括证书的别名以及用于生成密钥对的算法规范和密钥大小。
Now, as obvious a statement as that is in this algorithm, it turns out that is the key to this whole problem being solved correctly without my algorithm looping infinitely.
这是此算法中很明显的一句话,也是正确解决,整个问题的关键,否则此算法就会陷入死循环。
When you store or get information from a list of memcached servers, the memcached client derives a numerical value from the key using a consistent hashing algorithm.
当想要从一列memcached服务器存储或获取信息时,memcached客户机就会用一个一致的散列算法从这个键获取一个数值。
Instead of having to determine this information, the memcached clients use a simple hashing algorithm on the key you specify when storing the information.
memcached客户机不必决定此信息,它只需对在存储信息时指定的键使用一个简单的散列算法。
Instead of having to determine this information, the memcached clients use a simple hashing algorithm on the key you specify when storing the information.
memcached客户机不必决定此信息,它只需对在存储信息时指定的键使用一个简单的散列算法。
应用推荐