橢圓線 的英文怎麼說
中文拼音 [tuǒyuánxiàn]
橢圓線
英文
ellipse line-
For a class of quadratic finite element diseretization systems of an elliptic boundary problem with jump coefficients under the unstructured quadrilateral grids, we are concerned with two kinds of quadratic lagrangian finite element equations, by analyzing the relationship between the linear finite element and quadratic finite element basis functions, a hew amg method is designed
摘要針對一類帶間斷系數的橢圓邊值問題,在非結構四邊形剖分下,討論了兩種二次拉格朗日有限元方程的代數多重網格法,通過利用雙線性元和二次元基函數之間的表示關系,給出了一種新的網格粗化演算法和構造提升運算元的代數途徑。Elliptic - beam antennas in satellite communications
衛星通信中的橢圓波束天線They not only inherit the advantages of bezier curves and b - spline curves, also can be used to represent straight lines precisely and some remarkable transcendental curves precisely, such as circular arc, ellipse, cardioids and twisted pair line etc. especially, the uniform t - b - spline curve of three degrees is smoother than b - spline curve and c - b - spline curve of the same order
此外由於它們還具有三角函數的優點,故既可以精確表示直線段、二次多項式曲線段又可以精確表示圓弧、橢圓弧等二次曲線以及心臟線、雙紐線等超越曲線。特別地, 3次均勻t - b樣條曲線曲面比同階均勻b樣條( c - b樣條)曲線曲面具有更高的光滑度。With the concavity and integrability of sublinear terms near zero, the symmetry results for a class of sublinear elliptic equations are given by making use of the moving - plane method
本文利用次線性項在零點附近的凹性和可積性,用移動平面法給出了一類次線性橢圓方程正解的對稱性The digital signature based on elliptic curve crypt system
基於橢圓曲線密碼體制的數字簽名Ecc : elliptic curve crypto
橢圓曲線加密Ecc elliptic curve crypto
橢圓曲線加密In this paper, the security of the wtls is analysed. now elliptic curve and ripemd160 cryptograph algorithm is two latest methods and do not easily attack
橢圓曲線法和ripemd ? 160是兩種目前較新的加密演算法,且不易被破解,本文初步分析和研究了這兩種方法。This thesis mainly analyses security in the wtls and reasons for defects, study two solutions of security in the wtls which are elliptic curve and ripemd160 cryptograph algorithm
本文主要分析了wtls的安全漏洞及其存在的原因,並在此基礎上研究了兩種解決wtls安全問題的方法? ?橢圓曲線和ripemd ? 160演算法。Then the author focus on schemes including identification, digital signature and deniable authentication, and several classical algorithms are addressed as well. in addition, we analyze the differences between standard security paradigm and random oracle paradigm. based on all above, by using elliptic curve, we establish a new identification scheme and its corresponding digital signature scheme under random paradigm
文章詳細的分析了認證系統的三種類型,即身份認證、數字簽名和消息認證,剖析了一些經典的方案,並對標準安全模式與隨機oracle模式做出比較,並基於隨機oracle模式提出了一個新的身份認證演算法及其相應的數字簽名變形,兩個演算法均在橢圓曲線上實現。The main contributions of this dissertation include : firstly, deeply research on underlying techniques of pki system, emphatically analyze dissymmetrical public - key cryptography ecc and compare it with other cryptography techniques
本文首先對pki體系的底層技術進行深入研究,重點分析了非對稱密碼橢圓曲線密碼體制,並將它與其他密碼技術進行了比較。Adds three lines, a rectangle, and an ellipse
添加三段直線、一個矩形和一個橢圓。Discuss the elliptic curve cryptosystems mainly
主要討論橢圓曲線公鑰密碼體制。A group signature scheme based on elliptic curve
一個基於橢圓曲線的群簽名方案Digital signature based on elliptic curve
橢圓曲線數字簽名在電子政務中的應用Asymptotic behavior of solutions to dissipative nonlinear evolution equations with ellipticity
具有橢圓性質的耗散非線性發展方程組解的漸近行為Under the assumption that the elastic tensor satisfies the strong - ellipticity condition, we reduce the two - dimensional equations of linearly elastic membrane shells to a first order linearly symmetric hyperbolic system
摘要在彈性張量滿足強橢圓性條件的假設下,把2 -維線性動態膜殼方程組化為一階線性對稱雙曲組。Previous algorithms either fitted general conies or were computationally expensive. by modifying the ellipticity constraint, we can ensure what we get is an ellipse, so that we can get the symbol to track moving objects
對此文中通過對橢圓擬合約束條件的修改確保擬合的二次曲線為橢圓,從而實現了符號化跟蹤運動物體的系統。Also we study the ecc crypto theory in the field of public crypto system, in which the ecc encrypt principle, safety, reliability, as well as the structure of ecc based on galois field is focused on
研究了公鑰加密系統中的橢圓曲線加密理論,詳細闡述了有限域上橢圓曲線的結構及其基本運算; 3Then we show an algorithm design of the elliptic curve crypto based on galois field. as a main part, the design theory and concrete solution of it are presented step by step, ic chip design method for implementation of the algorithm is described in detail
設計完成了一種基於有限域的橢圓曲線加密演算法,主要包括適合於168bit橢圓曲線加密的有限域乘法、加法、除法器的實現; 4分享友人