橢圓曲面 的英文怎麼說

中文拼音 [tuǒyuánmiàn]
橢圓曲面 英文
elliptic surface
  • : Ⅰ形容詞(卵形) oval-shapedⅡ名詞[書面語] (長圓形的容器) elliptic vessel
  • : 曲名詞1 (一種韻文形式) qu a type of verse for singing which emerged in the southern song and ji...
  • : Ⅰ名詞1 (頭的前部; 臉) face 2 (物體的表面) surface; top 3 (外露的一層或正面) outside; the ri...
  • 橢圓 : [數學] oval; oval shaped; ellipse; ellipsoid橢圓規 ellipsograph; [圖] elliptic trammel; 橢圓軌道 ...
  1. 2. 5m 2 oval cambered slotted otter board

    2 . 5m開縫網板
  2. They not only inherit the advantages of bezier curves and b - spline curves, also can be used to represent straight lines precisely and some remarkable transcendental curves precisely, such as circular arc, ellipse, cardioids and twisted pair line etc. especially, the uniform t - b - spline curve of three degrees is smoother than b - spline curve and c - b - spline curve of the same order

    此外由於它們還具有三角函數的優點,故既可以精確表示直線段、二次多項式線段又可以精確表示弧、弧等二次線以及心臟線、雙紐線等超越線。特別地, 3次均勻t - b樣條比同階均勻b樣條( c - b樣條)具有更高的光滑度。
  3. On the ground of educative theory, this paper exposits connotation and characteristic of project - based learning and why we should also enforce project - based learning in high school. as far as substance of project - based learning and objective circumstance what it should have are concerned, it points out the practical ability. at last, based on that university physics education has relatively longer cycle, it proposes stage pattern for enforce project - based learning and give two concrete cases, which discuss capacitance of confocal oval - shaped stylar capacitor and potential distribution of charged conductor of surface being uniparted hyperboloid

    本文在具體的教育理論指導下,闡述了研究性學習的內涵及特點;在大學物理中實施研究性學習的意義;以及就研究性學習的實質和所需具備的客觀條件而言,論述了研究性學習在高校中實施的可行性;並根據大學物理教育具有周期性相對較長和專業循序漸進的特點,提出了研究性學習的階段性模式,並給出了具體的實例,利用保角變換法討論了共焦柱形電容器電容及單葉雙帶電導體的電位分佈。
  4. ( 2 ) the causation that the caustic phenomena of electromagnetic wave propagation in two - dimension concave reflectors occurs and the types of singularities in caustic fields are investigated, and the conclusion that there are two types of singularities ( fold and cusp ) in caustic fields in two - dimension concave reflectors is obtained ; by symplectic geometrical method, formulations of computing wave fields in and far away from caustic fields in two - dimension concave reflectors are deduced, and the results are plotted in pictures. ( 3 ) the cause of the caustic phenomena of electromagnetic wave propagation in three - dimension concave reflectors and the types of singularities in caustic fields is discussed, and the conclusion that there are three main types of singularities ( fold, cusp and swallowtail ) in caustic fields in three - dimension concave reflectors is obtained ; by symplectic geometrical method, the formulae of computing wave fields in and far away from caustic fields in three - dimension concave reflectors are deduced. particularly, the wave fields in ellipsoid concave reflector are computed, and the results displayed in special sections are given

    論文主要包括三個方: ( 1 )分析了凹反射的焦散現象,給出了不同凹反射的焦散圖; ( 2 )分析了二維凹反射波動場焦散現象產生的原因及焦散區奇性的種類,得出了二維凹反射波動場焦散區奇性主要有折疊( fold )和尖點( cusp )兩種的結論,利用辛幾何方法構造了反射波動場非焦散區和焦散區的通用計算公式,並給出了及雙反射的計算結果; ( 3 )分析了三維凹反射波動場焦散現象產生的原因及焦散區奇性的種類,得出了三維凹反射波動場焦散區奇性主要有折疊( fom 、尖點kusp和燕尾k )三種的結論,提出了利用辛幾何方法計算三維凹反射波動場非焦散區和焦散區的計算方法,並給出了三軸不等球體凹反射波動場的計算結果剖圖。
  5. Established the system of coordinates of roll testing, getting the parameters of equation of tooth face by solving the non - linear equations set ; according to the differential geometry and meshing principle, deduce the curvature parameters of tooth face and tooth profile, and get the parameters of instantaneous contact ellipse. emulate the contact trace and contact area of the working tooth face, and drawing the instantaneous drive ratio error curve

    建立了克林貝格擺線齒錐齒輪嚙合分析的對滾模型,通過對非線性方程組的迭代求解,得到齒方程的各個參數;由微分幾何和切齒嚙合原理推導了齒上齒廓和齒線方向的率參數,得到了瞬時接觸的參數。根據設計參數和機床調整參數繪制了工作齒的接觸軌跡和接觸區圖形,並求得了瞬時傳動比的誤差線。
  6. A new waveguide made of changing a wide wall of a rectangular waveguide to a uniform curved wall is called conformal waveguide. a kind of expression of approximate solution for domain mode of the new waveguide, including symmetric, unsymmetric arc, parabolic arch, hyperbolic arch, elliptic arch, etc., is constructed by using boundary condition of mental waveguide, variational method and boundary element method. by using the equivalence principle, an approximate calculating formula for equivalent resonant conductance of a narrow longitudinal halfwavelength slot cut in the curved wall of the unsymmetric arcrectangular waveguide is derived, and the result is shown. although this solution is approximate, it can solve the problem in designing the slotted antenna of such conformal waveguide

    把矩形波導一個寬外突成均勻構成的新波導統稱為共形波導.利用金屬波導邊界條件、變分法、邊界元素法構造這種新波導中主模場的一種近似解表達式,包括橫截線為對稱、非對稱弧,拋物線弧,雙線弧,弧等.然後根據等效原理,推導非對稱弧矩形波導上窄的縱向半波長縫隙的等效諧振電導的近似計算公式,給出計算線.這種解雖然是近似的,但卻能解決這類共形波導縫隙天線的工程設計
  7. The main place of innovation of this paper is to grasp the advantage of different algorithms, from different angles and levels improve modular exponentiation algorithm and scalar multiplication algorithm, and achieve new algorithm which can provide reference to the implementation of rsa and ecc, meantime the new algorithm have greater practical value

    本文的創新點在於綜合各種演算法在不同方的優勢,從不同角度和不同層次去改進模冪演算法和標量乘演算法,得到的新演算法可供在實現rsa和線密碼體制時參考,具有較大的實用價值。
  8. Round these two respects, how to structure security elliptic curve cryptography and the implementations of ecc is first discussed in this paper. then we have analysed especially the scalar multiplication on the elliptic curves, and present a new algorithm to quickly implement the fixed point scalar multiplication according to the idea of interleaving exponentiation algorithm and power division. this algorithm is much faster than fixed - base windowing method ; and a little faster than fixed - base comb method

    圍繞這兩個方的問題,本文首先討論了如何構造安全的線密碼體制和線密碼體制的應用;然後重點分析了線上數乘運算的快速實現,並結合interleavingexponentiation演算法和冪分割的思想,提出一種計算固定點數乘的快速演算法,該演算法的計算速度明顯快于fixed - basewindowing演算法,稍快于fixed - basecomb演算法。
  9. The security of elliptic curve cryptography ( ecc ) depends on the intractability of the elliptic curve analogue of the discrete logarithm problem. ecc has gained increasing popularity in public key cryptography, because of its computation and storage

    線密碼是基於線離散對數難題的一種密碼體制,由於它在運算量和安全性方的優勢,是目前最具有廣泛應用前景的一種公鑰密碼體制,近幾年一直是人們的研究熱點。
  10. These stud " can be concluded as following : on the basis of the bhw - 35 steel p - s - n curve and its da ' dn growth law the method of low - cycle fatigue life evaluation of 401 t / h boiler was proposed. and a mechanics model was suggested for calculating the stress of internal pressure suffering elbow. with the elbow fatigue test, a method of evaluation the fatigue growth life of pressure suffering elbow is recommended ; and the elementary use of damage mechanics on the fatigue life evaluation of the boiler drum

    本文創新點為:在bhw - 35鋼的p ? s ? n線及da / dn擴展規律的試驗研究基礎上,提出了410t / h鍋爐汽包的低周疲勞壽命分析與預測方法;建立了一種變厚度彎管承受內壓時的應力計算力學模型,通過壓力彎管的疲勞試驗,本文推薦其低周疲勞擴展壽命預測方法;將損傷力學應用到鍋爐汽包疲勞壽命預測做了初步的探索。
  11. Based on the review, the fluid flow and heat transfer in the curved circular and rectangular pipes have been researched by employing perturbation method and numerical simulation with a physical model under the rotational orthogonal curvilinear coordinate in a rotating curvilinear pipe with multi - parameters. we firstly analyzed the fully developed fluid flow and heat transfer, mixed convection heat transfer, the development of flow and heat transfer in the inlet in different cross section ( circular, elliptical, annular and rectangular crossection ). the variations of the secondary flow, axial velocity, distribution of temperature, the friction force on the wall, the ratio of friction factor as well as the nusselt number with different dimensionless parameters had been examined in detailed

    本文在總結和分析了一個世紀以來有關線管道流動和換熱特性的研究成果的基礎上,以旋轉正交線坐標系統下的多參數旋轉螺旋管道中的對流傳熱為物理模型,通過攝動方法和有限體積法,首次對各種截、環形截、矩形截)旋轉線管道內充分發展流動的流動結構和傳熱特性(包括耦合對流傳熱特性)以及旋轉線管道開口段發展流動的流動結構和換熱特性進行了系統的數值模擬和理論分析,詳細討論了各種無量綱參數對管道內軸向速度分佈、二次流結構、溫度分佈、壁摩擦力、摩擦系數比以及管道nusselt數的影響,獲得了若干創新性成果。
  12. Using the complex potential method in the plane theory of elasticity of an anisotropic body, the series solution of finite anisotropic thin plate containing an elliptical inclusion is proposed with the help of faber series. a hybrid element with an elliptical inclusion for anisotropic materials is obtained by using the hybrid variable principle, and the element efficiency is verified by numerical examples. the state of the damage is modeled by an elliptical soft inclusion, and using the point stress criterion based on characteristic curve and yamada - sun etc. criteria, the prediction of the strength of a composite laminate with damage is set up

    首先基於經典層板理論,將復合材料層板的彈性問題化歸為均勻各向異性板來求解;採用各向異性體平彈性理論中的復勢方法,以faber級數為工具,給出了有限大含核各向異性板彈性問題的級數解形式;利用雜交變分原理,成功導出含核各向異性板雜交應力有限元,並用算例驗證了該單元的可行性和有效性;採用含剛度折減形彈性核的沖擊損傷模型,引入基於特徵線和yamada - sun破壞準則的點應力判據,建立了含損傷復合材料層板剩餘強度的分析方法;通過數值計算詳細討論了各種幾何參數對損傷層板應力分佈、剩餘強度的影響,得到了一系列對工程應用具有實用價值的結論。
  13. In this paper, the author primarily introduces how elliptic curves have been applied to public key cryptography from algebra and number theory, analyzes the advantage and security of ecc. the work the author has done is : ( 1 ) study the arithmetic of ecc on the encryption / decryption, digital signature and key exchange schemes and analyze their security performance ; ( 2 ) propose a new id - based group signature with existed id - based digital signature and discuss its application in digital cash ; ( 3 ) realize the electronic auction system and key authentication system with ecc

    作者所作的主要工作有: ( 1 )研究了基於大素數域上的線密碼在加密解密、密鑰交換、數字簽名等方的密碼協議並分析了每種協議的安全性能; ( 2 )在現有基於身份的數字簽名方案的基礎上提出了基於身份的群簽名系統並討論了群簽名在數字現金中的應用; ( 3 )給出了線密碼在電子拍賣系統、密鑰認證系統方的實現方案。
  14. Firstly, the paper analyzes the basic airfoil profile in theory. its forepart adopts ellipse column shape and its back - end adopts plane shape. simultaneously, the 3d parametrizing model is set up

    首先,本文是從理論上對基準翼型進行了分析,前段線部分採用柱結構,后緣部分採用平結構,建立了飛機機翼的三維參數化模型。
  15. Taking practical situation of this project and much engineering experience into account, the scheme with axle golden section elliptical arc surface is proposed through comparing nine optimization schemes with model test

    結合工程實際和以往經驗,比較了9種進水口線型式的試驗結果,確定了長短軸黃金分割比的的方案。
  16. Drawing the intersection line of two quadric by the method of ellipse arc projection and topological transformation

    投射和拓撲變換解兩相貫線
  17. The most important idea is that over the complex numbers, an elliptic curve looks like a torus, and the points of finite order in the group of the curve have a very simple geometric description

    最重要的思想是復數域上的線是一個環線簇中的有限階點有簡單的幾何描述。
  18. Third, this paper introduce the security structure, security system and algorithm of the 3g system, discussing the security measure of 3g system in the aspect of wireless interface in detail, which including user identity confide ntiality, authentication integrality data, etc. finally, the author stress analyzing the 3g authentication, key agreement protocol and its security, finding the security hole and putting forward new authentication and key agreement protocol based on ecc

    介紹了第三代移動通信系統安全結構、安全體制和演算法,詳細論述了3g系統在無線介的各種安全措施包括用戶身份保密、認證與數據完整性等內容。重點分析了3g認證與密鑰分配協議及其安全性,找出了其中的安全漏洞,提出了新的基於線密碼體制的認證與密鑰分配協議。
  19. With the fast development of internet, the problem of information security looks increasingly important. then on the basis of safe and high efficient encryption algorithm, some related network protocols are produced. compared with some other public key cryptosystems, elliptic curve cryptosystem ( ecc ) has many merits, so the special attention is paid to it by the network safety specialist in the world. ecc is widely argued because of no standard source code. in this article, the research is on the ecc theory and the implementation of it is also done

    隨著網際網路的快速發展,信息安全問題顯得日益重要。相關網路安全協議應運而生,而它們的基礎都是安全高效的加密演算法,線加密系統與其他公鑰加密系統相比有許多優點,受到國內外安全專家的極大關注。可是線加密系統( ecc )並無公開的標準源代碼,還處于「百花齊放,百家爭鳴」的局,文章對于安全的線加密系統做了理論研究和實現工作。
  20. Then, it introduce several cryptographic protocol based on elliptical curve, including diffie - hellman key switching, elgamal encryption and decryption, elgamal digital signature, ecdsa, etc. based on these, the author analyze kinds of security threat faced to 3g system and discuss the security rule and security objectives

    然後介紹了基於線的幾種密碼協議,包括diffie ? hellman密鑰交換, elgamal加解密, elgamal數字簽名, ecdsa等協議。在此基礎之上,分析了3g系統臨的各種安全威脅並對系統的安全原則和安全目標進行了討論。
分享友人