threshold key

英 [ˈθreʃhəʊld kiː] 美 [ˈθreʃhoʊld kiː]

【计】阈值键

计算机



双语例句

  1. Research on Elliptic Curve Cryptography Digital Signature Based on Threshold Key Technology on P2P Network
    P2P环境下基于门限方案的椭圆曲线数字签名研究
  2. Threshold Key Updating Based on Ad hoc Network
    基于adhoc的门限密钥更新研究
  3. A no Revocable Threshold Public Key Traitor Tracing Scheme
    一种无废除门限的公钥叛逆者追踪方案
  4. The experiment results, showed that the magnitude of threshold is a key factor to the form of urban rank and function. The functions of advanced city contain all the functions of lower level city.
    结果表明,对城市最终功能分工与等级体系的形成,门槛值的高低是一个关键因素;
  5. A key frame extraction algorithm based on Shot Content Change Ratio ( SCCR) is proposed against miss or redundancy when using single threshold to extract key frames from video with moving objects.
    针对含有运动目标的视频采用单一阈值提取关键帧时易出现漏检或冗余的情况,提出基于镜头内容变化率的关键帧提取算法。
  6. Since the proposed RTKES is also threshold key escrow scheme, when an escrow agency or few agencies is not cooperating, monitor agency can easily reconstruct session key to monitor as long as there are other k effective escrow agencies.
    由于提出的方案是门限密钥托管方案,所以在所有托管人中当有一个或几个托管人不愿合作或无法合作时,监听机构仍能够通过另外有效的k个托管人去重构会话密钥,从而实施监听。
  7. Automation threshold selection is the key to binary processing of gray image.
    图像阈值的自动选取是灰度图像二值化处理中的关键。
  8. How to get the fine threshold is the key of image threshold segmentation.
    选取适当的阈值是阈值法的关键。
  9. A New Secret Sharing Threshold Scheme and Key Escrow System
    一种新的密钥分割门限方案及密钥托管体制
  10. Analysis on the Two Classes of Robust Threshold Key Escrow Schemes
    对两类强壮的门限密钥托管方案的分析
  11. On a Multistage Threshold Key Escrow Scheme
    一种多级门限密钥托管方案
  12. ( t, n) threshold key escrow scheme based on status-tree
    基于状态树的(t,n)门限密钥托管方案
  13. Conclusion Thinner collimation scanning, denser overlapping reconstruction and appropriate threshold are the key technical points for obtaining ideal 3 D skull images.
    结论薄的层厚、重叠重建、适当的阈值可获得最佳的颅骨三维图像。
  14. A Dynamic ( k, n) Threshold Key Escrow Scheme
    一种动态(k,n)门限密钥托管方案
  15. On ( K, N) Threshold Communication Secret Key Sharing Systems Using Concatenated Code
    级连码(K,N)门限通信密钥分散保管系统
  16. A threshold key escrow system with time bounds and an analysis of its security
    时间约束下的门限密钥托管体制及其安全性分析
  17. 3-D segmentation of brain volume data is one of the most important technologies, especially, how to determine the threshold is the key which affects the results.
    三维人脑体数据分割是医疗图像处理中的一项重要技术,其中阈值的选取最为关键。
  18. Threshold scheme of key escrow based on elliptic curve system, which can avoid cheat, is proposed, and its security is analyzed.
    提出了基于椭圆曲线体制的门限密钥托管方案,并对其安全性进行了分析、讨论。
  19. How to choose the threshold is the key to design the fuzzy-PID controller.
    对于模糊&PID复合控制器的设计,切换点的选择成为影响系统性能的关键。
  20. The master private key is shared by the private key of every node. Threshold and identity-based key management and authentication are used.
    各节点使用其身份作为公钥,主密钥由各节点的私钥分享,从而形成基于身份的门限分布式密钥管理。
  21. Threshold choosing is a key problem in wavelet denoising and has a great effect on the image.
    小波降噪中阈值选取是一个影响图像质量的关键问题。
  22. Summary of threshold key escrow scheme
    门限密钥托管方案综述
  23. Conflict threshold is a key factor in determining the quality of group decision making, because a certain level of conflict can effectively inhibit groupthink, ensure the quality of group decision making.
    冲突阈值是决定群体决策质量的关键指标,因为一定程度的冲突水平能够有效抑制群体思维,保证群体决策质量。
  24. The distance threshold value is the key to the whole algorithm.
    这些距离阈值是整个算法的关键。
  25. In image segmentation algorithms, the selection of optimal threshold is the key to segmentation.
    在阈值分割算法中,确定最优阈值是图像分割的关键。
  26. Film damage threshold is the key parameter of thin-film anti-Intense Laser.
    薄膜损伤阈值是薄膜抗强激光作用的关键参数。
  27. It distinguishes the image into objects and background by picking threshold, so the threshold picking is the key technique.
    它通过选取阈值将图像分为目标和背景,关键技术是阈值的选取。
  28. Deeply research partial distributed key management and certificate scheme based threshold mechanism, analyse key management service and share refreshing service, and point out its limitations.
    深入研究了基于门限机制的部分分布式密钥管理和认证方案,分析了该方案的密钥管理服务和密钥更新服务,指出了部分分布式密钥管理和认证方案存在的问题。
  29. Therefore, the calculation of normal flow threshold is the key.
    所以,计算正常流量的阀值是关键。
  30. This transformation depends on the cell through the self feedback formed in a certain range of homeostatic regulation mechanism Temperature threshold is the key to the cell feedback, determines the homeostatic adjustment mechanism start or not.
    这种转化有赖于细胞通过自反馈在一定范围内形成的白稳调节机制。温度的阈值是细胞反馈的关键,决定了自稳调节机制的启动与否。