數的乘冪 的英文怎麼說

中文拼音 [shǔdechéng]
數的乘冪 英文
power of a number
  • : 數副詞(屢次) frequently; repeatedly
  • : 4次方是 The fourth power of 2 is direction
  • : Ⅰ名詞1. [書面語] (覆蓋東西的巾) cloth cover2. [數學] (表示一個數自乘若干次的形式) power Ⅱ動詞[書面語] (覆蓋; 罩) cover with cloth
  1. The key of rsa is the modular exponentiation multiplication of large number, in this thesis, we modify the montgomery algorithm which be used to implement rsa

    Rsa演算法核心是大運算,本文選用montgomery模演算法來實現ras演算法,對montgomery模演算法fpga實現進行了改進。
  2. The 9th power of the 9th power of 9, that, the result having been obtained, 33 closely printed volumes of 1000 pages each of innumerable quires and reams of india paper would have to be requisitioned in order to contain the complete tale of its printed integers of units, tens, hundreds, thousands, tens of thousands, hundreds of thousands, millions, tens of millions, hundreds of millions, billions, the nucleus of the nebula of every digit of every series containing succinctly the potentiality of being raised to the utmost kinetic elaboration of any power of any of its powers

    所得字要用細字密密匝匝地印刷成三十三卷,每卷一千頁。為了統統印刷完畢,就需要購入無刀無令印度紙,整便是一十百千萬十萬百萬千萬億十億,一切級一切字作為星雲核心,以簡明形式所包含可能性推到了極限地能動地開展一切一切
  3. 2. doppler frequency shifting and curve fitting differential methods for measuring velocity are analyzed and compared. the least - squares curve fitting methods based on power functions and orthogonal functions are analyzed and compared

    2 .對測量速度兩種方法,多普勒頻移法和曲線擬合微分法作了分析和比較;對以族和以正交函族為基底最小二曲線擬合法作了對比分析。
  4. Round these two respects, how to structure security elliptic curve cryptography and the implementations of ecc is first discussed in this paper. then we have analysed especially the scalar multiplication on the elliptic curves, and present a new algorithm to quickly implement the fixed point scalar multiplication according to the idea of interleaving exponentiation algorithm and power division. this algorithm is much faster than fixed - base windowing method ; and a little faster than fixed - base comb method

    圍繞這兩個方面問題,本文首先討論了如何構造安全橢圓曲線密碼體制和橢圓曲線密碼體制應用;然後重點分析了橢圓曲線上運算快速實現,並結合interleavingexponentiation演算法和分割思想,提出一種計算固定點快速演算法,該演算法計算速度明顯快于fixed - basewindowing演算法,稍快于fixed - basecomb演算法。
  5. One special feature of this paper is that it provides fast implementation means for the all kinds of modular exponentiation algorithms, which facilitate the implementation of the rsa public key algorithms. the paper improved the sliding window algorithm by largely reducing the space complexity. meanwhile this paper represents an efficient combined algorithm to improve the processing of encryption and decryption

    運算是實現rsa等公鑰密碼基本運算,其運行效率決定了rsa公鑰密碼性能,文章主要研究了各種模演算法快速實現方法,提出運用組合演算法思想來減少演算法運行時間;並對滑動窗口取演算法進行了部分改進,用線性表來存儲預計算據,從而減少了演算法復雜度,進一步提高了rsa加/解密效率,並在試驗測試中得到較為滿意結果。
  6. Next raise both members of the resulting equation to the same power as the index of the radical.

    其次,把得出方程兩邊都到和根式指一樣高次。
  7. Through the flume experimental research, the velocity distribution formulas for rectangular open channel have been found, including parabola form of velocity distribution on the vertical and power form of mean velocity distribution on the transverse direction ; meanwhile, the means of ascertaining correlative coefficient have been given in this paper

    摘要通過對明渠流速水槽試驗研究,建立了矩形斷面明渠沿垂線流速拋物線分佈公式和橫向平均流速分佈公式,同時給出了相關系確定方法。
  8. Power of a number

    數的乘冪
  9. 4. through our research, the whole measuring scheme is finalized for pulse - counting method with analog intervene chosen to measure distance, the differential coefficient method based on the least - squares curve fitting based on power functions chosen to measure velocity and qd optical spot location method chosen to measure angle

    4 .通過研究,最終確定了以模擬插入脈沖計法測距,族基最小二曲線擬合微分法測速,四象限探測器( qd )光斑定位法測角脈沖激光雷達整體測量方案。
  10. The author mainly realized the method of generating the large random numbers and judging the prime number using lehmann means, then three pairs of secure key with different lengths ( 256 bits, 512 bits, 1024 bits ) was generated to meet the demand of different security grade. in encryption module, modular multiplication arithmetic of large number was realized adopting addition chaining. in decryption module, extended euclid was used to get inverse, and the chinese remainder theorem was used to realize decryption, which increased the speed of decryption greatly

    作者主要實現了大隨機生成、採用整除小素和勒曼測試法判定素,可以生成三種不同長度密鑰對( 256位、 512位、 1024位)來滿足不同加密安全等級需求;加密模塊中,選用了二進制序列法方法,實現了大運算;解密模塊中,引用了擴展歐幾里德法求逆元,並採用中國剩餘定理實現解密過程,大大提高了解密速度。
  11. In a floating - point representation, the numeral that is multiplied by the exponentiated implicit floating - point base to determine the real number represented

    浮點表示法中一個字,該上隱式浮點底就決定了所表示
  12. The study results show that the minimum ac flashover voltage decreases with the increase of the ice amount accreted on the insulator surface by an exponential law, and the down - trend of the minimum ac flashover voltage will slow gradually with the bridging of the shed of the insulators by icicles, both the average saturated ice amount and the special exponent m of effect of ice amount for different insulators depend on the radius of shed and the air - gaps of the sheds of the insulators, and that the ac ice flashover voltage decrease with the decrease pressure ratio p / p0 ( rise of the altitude ) by power - law for different esdd and icing - states when the altitude is from 4000m to 5500m. the special exponent n, which show the effects of altitude on the flashover voltage, is various with the type of insulator, icing - states and the surface status of iced insulator etc., and that the minimum ac flashover voltage of iced insulators decreases by power - law with esdd or the freezing water conductivity for different ice amount and atmospheric

    研究結果表明:在不同海拔高度和等值鹽密esdd下,絕緣子最低交流冰閃電壓均隨覆冰量增加而呈指規律降低;當覆冰量增加到一定程度后,最低交流冰閃電壓隨覆冰量增加而降低趨勢趨于飽和;不同絕緣子串平均飽和覆冰量及閃絡電壓覆冰量影響特徵指m均與絕緣子盤徑和傘距等因素有關;在海拔4000 5500m之間,不同等值鹽密esdd和覆冰狀態下,絕緣子交流冰閃電壓隨海拔高度增加(氣壓降低)與p / p0呈關系降低,氣壓影響特徵指n與絕緣子類型、覆冰類型、覆冰表面狀況等因素有關;當覆冰量和氣壓一定時,絕緣子最低冰閃電壓均隨著等值鹽密( esdd )或覆冰水電導率增加而呈關系降低,並逐漸趨于飽和。
  13. Furthermore, the scheme is improved, and it is shown that the improved scheme is more secure than the original by analyzing the security of the improved scheme, and has only one exponentiation modulo p and two hash - function evaluations for verification

    此外,對原方案進行了改進,通過對改進方案安全性分析得出結論;改進方案此原方案更安全,並且消息恢復過程只需要計算一次大和兩次單向函
  14. Using a multiplexer - based method, the datapath of the multiplier is reconfigurable to perform either one 1024 - bit - multiplication or two 512 - bit multiplications in parallel. the chinese remainder theorem increases the decryption data rate by a factor of 3. 8

    據通路設計採用一種基於多選器動態重構方法,其模法器可以執行一個1024位運算,也可以并行執行2個512位運算,從而支持基於中國剩餘定理加速策略。
分享友人