{"responseData":{"translatedText":"\uc54c\uace0\ub9ac\uc998","match":0.85},"quotaFinished":false,"mtLangSupported":null,"responseDetails":"","responseStatus":200,"responderId":null,"exception_code":null,"matches":[{"id":0,"segment":"algorithm","translation":"\uc54c\uace0\ub9ac\uc998","source":"vi-VN","target":"ko-KR","quality":70,"reference":"Machine Translation.","usage-count":2,"subject":false,"created-by":"MT!","last-updated-by":"MT!","create-date":"2026-04-04 15:02:26","last-update-date":"2026-04-04 15:02:26","match":0.85,"penalty":null,"model":"neural"},{"id":"282109556","segment":"Hash Algorithm","translation":"\ud574\uc2dc \uc54c\uace0\ub9ac\ub4ec","source":"vi-VN","target":"ko-KR","quality":"0","reference":null,"usage-count":2,"subject":"Computer_Science","created-by":"MatteoT","last-updated-by":"MatteoT","create-date":"2009-12-07 04:13:38","last-update-date":"2009-12-07 04:13:38","match":0.84,"penalty":0},{"id":"282110348","segment":"Encryption Algorithm","translation":"\uc554\ud638 \uc54c\uace0\ub9ac\ub4ec","source":"vi-VN","target":"ko-KR","quality":"0","reference":null,"usage-count":2,"subject":"Computer_Science","created-by":"MatteoT","last-updated-by":"MatteoT","create-date":"2009-12-07 04:13:38","last-update-date":"2009-12-07 04:13:38","match":0.66,"penalty":0}]}