整數分解 的英文怎麼說

中文拼音 [zhěngshǔfēnjiě]
整數分解 英文
integer factorization
  • : Ⅰ形容詞1 (全部在內; 完整) whole; all; complete 2 (整齊) neat; tidy; orderly Ⅱ動詞1 (整理; 整...
  • : 數副詞(屢次) frequently; repeatedly
  • : 分Ⅰ名詞1. (成分) component 2. (職責和權利的限度) what is within one's duty or rights Ⅱ同 「份」Ⅲ動詞[書面語] (料想) judge
  • : 解動詞(解送) send under guard
  • 整數 : 1. (不含分數或小數的數) integer; whole number; integral number2. (沒有零頭的數目) round number; round figure
  1. On the basis of the study on the speech coder algorithms, paper describe an advanced method of developing dsp system software, and as the guidlines, we developed the programme of whole decoder unit. paper stress on analysis of the ecu in decoder unit. aiming at amr algorithms disadvantage of angularity of synthetical speech, paper study on the specutral extrapolation which apply to extrapolate reflect coefficient of track model to make error conceal processing of amr. at last paper analyze existing echo cancellation algorithms using on mobile communication system

    在此基礎上,描述了一種較為先進的大型dsp系統程序開發策略,並以此為指導思想,以美國ti公司c6000dsp開發平臺開發出了個amr碼器單元的系統程序。論文對amr碼器的誤碼隱藏處理單元進行了重點析,針對原有演算法合成語音自然度不好的缺點,論文研究了將譜外推法應用到amr演算法中外推出聲道模型反射系進行誤碼消除處理。
  2. The global regulator csra of e. coli is a specific mrna - binding protein. csra negatively regulates several metabolic pathways that are induced post - exponentially, including glycogen biosynthesis, gluconeogenesis, and glycogen catabolism ; positively controls gene expression within the glycolytic pathway ; and also csra modulates the levels of enzymes that participate directly in pep metabolism

    Csra是體調控網路的調控基因,可負調控指生長後期誘導的一些代謝途徑,包括糖原的生物合成、糖原的代謝、糖異生,而對糖酵的一些重要基因的表達則執行正調控功能, csra也調控直接參與pep代謝的三個酶的活性水平。
  3. In the self - calibration scheme, the thesis emphasizes the accuracy of camera intrinsic and extrinsic parameters. we presents an accurate f method based on corresponding point adjustment. the method adjusts coresponding points according to the fixedness of projective transformed cross ratio, then calculates f matrix accurately through linear and non - linear methods. when computing intrinsic parameter, a matrix, we simplify the step, and stress on the two important parameters of a. the result will be getten through solving kruppa equation based on svd decomposition. in order to compute extrinsic parameters, we use linear method to get initial r and t, then apply non - linear method to accurate them

    提出了基於匹配點調的f求精方法,先根據攝影交比不見性對手工選擇的匹配點進行調,再用線性、非線性結合的方法求精f矩陣;在計算內部參a中,進行了一定的簡化,把重心放在a中重要的兩個參上,用svd法計算kruppa方程;在計算外部參時,首先用線性法求r 、 t ,然後再用非線性法迭代求精。
  4. The article points out the importance and necessity of the information - security from its actuality in our country. the resources in the information system, for instance, hardware, software, data, document, operator, meterial and so on, are evaluated and gived safety grade firstly. and then, it analyses the menace including the nonauthorized access, the information leak, the refused sevice, the internal objection which the system will take. the following are the corresponding control police : confirm the users " rights and duties, including the mode of using account, the limit of accessing resource, the application of password, the building of backup ; confirm the administrators " right and duties, including physical safety, system configuration, account configuration and usufruct, password management, audit and control, backup and individual intimity ; run - of - mill measure of security defence, including access control, symbol and identification, integrality control, password technique, firewall system, audit and resumption, safety of operating system, safety of database system, defence of computers " virus and resisting - deny protocol. in the end, the article offers the strategies of disposing the safety - accident and analyse after ithow. to report it, how to solve it in phase, and how to avoid it happening again. in a word, the article presents a holistic resolvent about keeping away the information system ' s security, and supplies a essential frame for its configuration, management and application

    然後,對系統可能受到的威脅,包括非授權訪問、信息泄漏、拒絕服務和內部缺陷等進行析,並提出了相應的控制策略:確定用戶的權力和責任,包括帳戶使用方式、資源訪問權限、口令應用以及建立備份等;確定系統管理員的權力和責任,包括物理安全、系統配置、帳戶設置及使用權限、口令管理、審計和監控、備份以及個人隱私等方面;一般性的安全防護措施:存取控制、標識和認證、完性控制、密碼技術、防火墻系統、審計和恢復、操作系統安全、據庫系統安全、計算機病毒防護和抗抵賴協議等。最後,對事故處理和事後析提供策略,如何報告安全事故,如何協調決安全事故,如何避免安全事故再次發生。總之,本文對信息系統安全防範工作給出一個體的決方案,為其在配置、管理和應用方面提供了基本的框架。
  5. Finally, approach to improve the performance of the system is put forwards based on the analysis of the experimental results. the following work has been done in this paper : l. have put forward an integrated distributed fbg sensoring demodulation system and have settled the whole set of equipments and experimental devices of the system. software corresponding to a 8 - byte and a 16 - byte sampling card have been developed respectively

    在前人研究的基礎上,設計了一散式fbg傳感調系統,搭建了散式fbg調系統的實驗裝置系統,別設計了使用8位和16位采樣卡進行據接受和處理的軟體系統,並對采樣得到的據進行析和處理。
  6. Accordingly, using graph theory and operating experience abroad for reference, it firstly brings forward a new method of voltage rectification which based on pilot bus with voltage control area in view of the weak coupling among every vca ( voltage control area ), using decomposing method of multi critical value, it realizes the eliminating vinculum of every vca. and then, the rectification starts by pilot bus voltage of every vca. so the resolution of whole power net is diverted into calculating smaller sub - net

    由於各個電壓控制區之間無功電壓的弱耦合性,利用多閥值區演算法,實現區域間的耦,然後根據各個子網路的主導節點的電壓進行校正,從而把求個網路的問題轉化為求各個小的子網路,降低了網路維,減少了無功設備控制動作次,提高了校正成功率,縮短了計算時間。
  7. It will be much easier to understand if the fractions are rounded up to the whole numbers.

    如果把調高為,那麼就更加容易理了。
  8. On the fraction for algebroidal function

    關于體函
  9. The feasibility of decomposition of transition firing sequence, the application of them in the detecting lfs and the reverse course of decomposition - synthesis are discussed. they provide theoretic basis for our algorithm in the field of petri net. supported by the above, two main part is included in the algorithm : at first, x is transacted according to the following method in order to get a set of xb named as basic vector of x which is the firing count vector of a directed path without circle if md is reached from m0 in the rg ( m0 )

    在變遷序列的指導思想下,我們的演算法主要通過以下兩步工作完成: ( 1 )首先對給出的已知條件中滿足狀態方程的n維非負向量進行處理,得到一組x的基礎向量x _ b ,使得在petri網的可達標識圖中,若存在一條由m _ o到m _ d的有向無環路,則x _ b為這樣的路上變遷引發序列的發生向量。
  10. Based on statistic property of all sub - bands coefficients, this paper gives a lossless image coding scheme including dpgm, huffman coding and run length coding. this scheme reduces the calculating complexity and works highly efficiently

    針對圖像小波后的各子帶系的統計特性,提出結合dpcm , huffman及遊程編碼的無損圖像編碼方法,該方法運算簡潔,速度快,易於硬體實現。
  11. The primary advantage that elliptic curve systems have over systems based on the multiplicative group of a finite field ( and also over systems based on the intractability of integer factorization ) is the absence of a subexponential - time algorithm ( such as those of index calculus type ) that could find discrete logs in these groups

    與基於有限域的乘法群系統(及基於整數分解的難性之上的系統)相比,橢圓曲線系統的優勢在於,迄今為止還沒找到這類群上離散對的次指時間演算法(如微積類)
  12. Based on netomac, a software package for power system simulation, the model and algorithm of pre - dispatch schedule in generation markets, excitation system parameter setting, and power system small signal stability anaylsis are studied in this thesis. the main work is as follows : a model of pre - dispatch schedule is proposed, whose target is to minimize the market purchasing price ( mpp ) in the whole pre - dispatch period. then according to the characteristics of pre - dispatch schedule, the model of pre - dispatch schedule is simplified to minimize the mpp in each pre - dispatch time, and a three - step algorithm of pre - dispatch schedule is designed : dealing with the optimal problem in the whole period of pre - dispatch with static planning method, solving the problem of combination of machines with pr1 method, resolving problem of optimal power flow ( opf ) with modified powell method

    本文基於netomac模擬軟體,以發電市場預調度計劃模型及演算法、勵磁系統參定和電力系統小擾動穩定性析為研究內容,主要做了以下工作:建立了以個預調度計劃周期內的市場購電價格最小為目標的發電市場預調度計劃模型,並根據預調度計劃問題狀態多、變量多、混合、非析的特點,將預調度計劃模型的目標函簡化為各時段的市場清算電價最小,設計了三段式預調度演算法:用靜態規劃法求個預調度計劃周期內的優化問題;用優先級法求機組組合問題;用改進的powell法求最優潮流問題。
  13. It has the advantage of high frequency resolution and low phase noise when compared with traditional integer - n phase locked loop ( npll ) frequency synthesis

    頻( fnpll )頻率合成器則是近年來出現的一種新技術,它與傳統的頻頻率合成器相比具有頻率析度高、相位噪聲低等優點。
  14. This paper mainly discusses rational blossoming in computer aided geometry design. specifically, we apply the fact that the binomial theorem is valid for negative integer and fractional exponents, introduce the rational bernstein bases and fractional bernstein bases, discuss the properties of rb curves and poisson curves, give the rational blossom and analytic blossom

    本文主要討論了cagd中的有理blossoming方法,具體來說,利用指為負的二項式定理,引入了負n次bernstein基函次bernstein基函,討論了rb曲線、 poisson曲線的性質,並且介紹了有理blossom與析blossom
  15. 10 goldwasser s, micali s, rivest r. a digital signature scheme secure against adaptive chosen - message attacks. siam journal of computing, 1998, 17 : pp. 281 - 308

    值得注意的是,雖然rsa問題與整數分解問題密切相關,但是基於rsa假設構造變色哈希函的的方法並不能直接用來構造基於整數分解假設的同類方案
  16. Secondly, we described the fundamental concepts and properties of group signature scheme and some general digital signatures that can be used to construct group signature amply, and presented a group signature scheme based on the integer factorization. thirdly, we explained the fundamental concepts and properties of authorized group signature in detail and propounded a secure authorized group signature based upon the discrete logarithm. finally, we illuminated electronic payment system in e - commerce and designed a simple and high secure electronic cash system with multiple banks based on group signature

    首先,對群簽名體制的研究背景、意義以及發展現狀進行了介紹;接著針對群簽名體制的基本概念和性質以及可用於構造群簽名的一些普通的字簽名體制進行了詳細描述,並基於大整數分解問題給出一個群簽名方案;同時還對授權群簽名的基本概念和必須滿足的基本性質進行了詳細說明,並且基於離散對問題給出一個安全的授權群簽名方案;最後,對電子商務中的一個重要組成部? ?電子支付系統進行了詳細的闡述,利用群簽名技術設計出一個簡單、高安全性的多銀行電子現金系統方案。
  17. Here the process of breaking down a large integer formed of two prime numbers into those primes

    這里指將由兩個質組成的大整數分解成那兩個質的過程。
  18. Linear transform ; integer mapping ; serm

    線性變換整數分解serm
  19. A new traitor tracing scheme on large integer factoring problem

    一種新的基於大整數分解困難問題的叛逆者追蹤方案
  20. In proc. the 1st acm conf. computer and communications security, fairfax, va, november 3 - 5, 1993, pp. 62 - 73

    然而,迄今位置,還沒有基於整數分解難題而構造的無密鑰泄漏的變色哈希函
分享友人