特徵同現限制 的英文怎麼說

中文拼音 [zhǐtóngxiànxiànzhì]
特徵同現限制 英文
feature co-occurrence restriction
  • : Ⅰ形容詞(特殊; 超出一般) particular; special; exceptional; unusual Ⅱ副詞1 (特別) especially; v...
  • : 名詞[音樂] (古代五音之一 相當于簡譜的「5」) a note of the ancient chinese five tone scale corre...
  • : Ⅰ名詞1 (現在; 此刻) present; now; current; existing 2 (現款) cash; ready money Ⅱ副詞(臨時; ...
  • : Ⅰ名詞(指定的范圍; 限度) limit; bounds Ⅱ動詞(指定范圍, 不許超過) set a limit; limit; restrict
  • : Ⅰ動詞1 (製造) make; manufacture 2 (擬訂; 規定) draw up; establish 3 (用強力約束; 限定; 管束...
  • 特徵 : characteristic; feature; properties; aspect; trait
  • 限制 : place [impose] restrictions on [to]; astrict; restrict; limit; confine; shut down on [upon]: 限制...
  1. Feature co - occurrence restriction

    特徵同現限制
  2. Firstly, we generalize and analyze the advantages and present research of elliptic curve cryptography ; secondly, we study the basic theory of the ecc ; thirdly, we illustrate the safety of the ecc and discuss the elliptic curve key agreement scheme, elliptic curve encryption scheme and elliptic curve digital signature algorithm ; fourthly, we study fast algorithms of the multiplication and inversion multiplication of the element of in the underlying finite field f2m whose characteristic is two represented by the two basis of optimal normal basis and polynomial basis. we make improvements to the fast algorithm of the polynomial basis multiplication by hankerson and base on the experiments, we describe the properties and compare the advantages of the multiplication and inversion multiplication of the elements in f2m field under optimal normal bases and polynomial basis. results concluding from the study car be used as references in the realization of the elliptic curve cryptosystem ; fifthly, we overview the current fast algorithm of point multiplication, improve the fix base point comb algorithm, advance the speed of the whole system and remark the advantages and disadvantages of the popular algorithms based upon the experimental datas ; sixthly we realize the algorithm library of elliptic curve cryptography based on the f2m. only change slightly in our algorithm library can we realize the ecdh, eces, ecdsa based onf2m of anysize ; seventhly, we realize the ecc on two secure elliptic curves, including ecdh, eces, ecdsa

    本文首先介紹並分析了橢圓曲線密碼體的優點及研究狀;其次研究了橢圓曲線密碼體的基本理論;第三,分析了橢圓曲線密碼的安全性並介紹了密鑰共享,加密,數字簽名等橢圓曲線密碼體;第四,深入研究了為2的有域f _ 2m中的元素在多項式基和最優正規基表示下的乘法運算和乘法逆運算的快速演算法,並對hankerson等人提出的多項式基下的乘法運算的快速演算法作了改進,而且在實驗的基礎上不僅分析研究了f _ 2m域中元素在多項式基和最優正規基表示下的乘法和乘法逆運算的性能,還對這兩種基表示下的f _ 2m域中元素運算效率的優劣作了比較和研究,所得的結論可供在實橢圓曲線密碼體時參考;第五,研究了目前流行的計算橢圓曲線標量乘法的快速演算法,時改進了固定基點梳形法,提高了整個系統的速度,並在實驗的基礎上分析研究了流行演算法的優劣;第六,實了基於f _ 2m的橢圓曲線密碼體的演算法庫,在我們的演算法庫中只需稍微改變便能實基於任意尺寸的f _ 2m上的ecdh , eces , ecdsa等橢圓曲線密碼體;第七,實了兩條安全橢圓曲線上的橢圓曲線密碼體,包括ecdh , eces , ecdsa 。
  3. Although uml activity diagram is magnitude component in uml, which agrees with modeling system dynamic process and describing workflow, it is immature in itself with the characteristic of non - oriented - object and essentially different from other uml diagram, and need to be ameliorated especially when applicated in workflow, own to the following limitation : firstly, activity diagram describes the behaviors of object class that response the inner action, so uml activity diagram is generally on the assumption of that there is no interruption caused by outer events during the process and no time defer, which limits the ability of uml activity diagram discribing complicated process ; secondly, user cannot obtain enough information of object data, and cannot make sure the character of mutual objects because of actually complicated object and relatively simple object expression in uml activity diagram ; lastly, owe to lacking rigorous mathematical basis and strict, effective methods of validation and analysis, uml activity diagram cannot support the simulation and optimization of workflow, let alone optimizating the model based on the result

    Uml活動圖是uml的重要組成部分,適用於系統動態行為建模和描述工作流,與uml的其他圖形工具不,它本質上是非面向對象的,而且其本身並不成熟,仍在改進之中,別是在工作流應用方面。首先, uml活動圖描述的是響應內部處理的對象類的行為, uml活動圖通常假定在整個計算處理的過程中沒有外部事件引起的中斷,也沒有時間的延遲,這就了uml活動圖對一些復雜過程描述能力。第二,實世界業務過程涉及的對象數據十分復雜,但是uml活動圖的對象語義卻非常簡略,用戶基本上無法從uml活動圖中獲取關于對象數據的信息,也不能確定參與交互的對象的
  4. Based the humidity theory, the paper adopts the relative humidity as the character value and puts forward using 30 % rh and below 0c dew - point as the on - line monitoring critical value. it gives the method of volume ratio convert at the different temperature. with the standard value, we can conclude the result of moisture content

    針對有規程標準中控水分的指標的缺點和局,提出了採用相對濕度作為監測量並轉換為露點以直觀表示設備絕緣狀況:採用30相對濕度及0以下露點作為監測的臨界值與允許值;時推導出了體積比單位在不溫度下的折算方法,以結合有標準,綜合分析,做出判斷結論。
  5. The difference between share right and share is that the former is a material right, while the later is a subject matter. the share right is transferable which is determined by its character about personal right, which is important to shareholders. the share right transfer is a conduct that a shareholder assigns his share right to somebody else on basis of law or article of association, and it is a significant way to implement the benefit of shareholders

    因此,本文試從股權轉讓的概念、性質、入手,分析歸納股權轉讓的理論基礎與基本原則,並通過對境外相關股權轉讓的觀點及立法例進行比較分析,結合我國當前有責任公司股權轉讓度的具體規定,得出有立法在規范不意轉讓之股東購買義務、優先購買權行使主體、異議股東退股權以及基於夫妻財產分割而發生的股權轉讓等方面存在著不足,並對此提出相關改進或完善建議。
  6. Section i mainly probes into the questions of the conception, nature, characteristics of the mortgage and the classification and variety of mortgage as well. while in section ii, the paper particularly analyzes the questions of the acquiring approach of mortgage, the parties to the mortgage contract, the target objects of mortgage contract, the prescription and content of mortgage contract, mortgage registration, the organizations of mortgage registration, the procedures of mortgage registration, etc. and section iii mainly illustrates the questions of the scope of creditor ' s rights of mortgage guarantee, the scope of target objects connected with the effect of mortgage, the party ' s rights and obligations in mortgage affairs ; the relationship between mortgage and guarantee, the conflicts between mortgage and other real rights granted by way of security

    第一部分主要就抵押權及抵押的概念、性質、、抵押權的分類、種類等問題進行了探討;第二部分著重分析了抵押權的獲得方式、抵押合的當事人、抵押合的標的物、抵押合的訂立、內容,抵押登記、抵押登記機關、抵押登記程序;第三部分闡述了抵押擔保的債權的范圍,抵押權效力所及的標的物的范圍,抵押關系中當事人的權利義務,抵押與保證的關系,抵押權與其他擔保物權的競合,抵押權的處分;第四部分探討了抵押權的實條件,抵押權的實途徑,抵押權的實方式,抵押權實,抵押權的次序,抵押權的消滅;第五部分重點研究了權利抵押權、最高額抵押權中的若干問題。
  7. The algorithm have the good one - way property, high sensitivity to initial values and good security due to the intrinsic characteristic of chaotic system and rijndael algorithm. the simulation experiment demonstrates the convenience and good hash performance ; 3 ) a new scheme of digital voice secure communication was proposed based on chaotic modulation without additional synchronization. the modulation sequence generated by chaotic logical mapping was used to encrypt the digital voice signal

    混沌系統和rijndael演算法的固有點使該演算法具有較好的安全性、對初值有高度的敏感性以及較好的單向性能,並且易於實,是一種有效的單向hash函數; 3 )研究了一種無需步的基於混沌調的數字語音保密通信系統的方案,利用邏輯映射產生混沌調序列,以該序列作為密碼對數字語音進行加密處理,為了更好的隱匿信號,混沌調在小波分解的基礎上,對不的通道使用不的參數進行,並借鑒混沌掩蓋對信息信號進行了幅處理,使密文完全隨機化。
  8. Secondly, the article comments on the disadvantages of the doctrine which are in its lack of establishment and too much subjective judgment. then it introduces different ways of trying to overcome the disadvantages of the doctrine : the limitation of american constitution items ; “ characteristic performance ” in continental legal system ; the trend of rules returning in british and american legal system. ; combining the doctrine with analysis of contents of rules and results of applying rules ; inferring of

    它具有靈活性、追求個案公正等優點,時又帶有確定性不夠、主觀性因素影響太大等缺點,如何克服,本文重點介紹了國外的一些做法,那就是:美國憲法條款的;大陸法系國家的性履行;崇尚靈活方法的英美法系國家也開始出規則回歸的趨勢及將聯系分析與規則、結果分析相結合,採用復式連結點進行規則推定等。
  9. It has been shown by our calculations that conductor loss is greatly reduced under velocity matching with relatively thick coplanar waveguide electrodes and thick buffer layer, but the characteristic impedance can not match with that of the external circuit at the same time, and the modulation bandwidth is confined in this case

    然後,用一般的橢圓積分計算了普通共面波導型調器的有效折射率、阻抗和導體損耗系數。通過計算發,採用厚電極和厚緩沖層結構,在實速度匹配的情況下,可以大大減小導體損耗,但是由於阻抗不能時滿足匹配,調帶寬受到
  10. Then taken four kinds of maps for examples, comparing with m - sequence, their properties are calculated, verifying the advantages of the chaotic sequence generated by the new method. after this, an improved scheme is discussed - - using m - sequence to change the sequence ’ s turn and verifying that the permutation parameters have effect on improving the sequence ’ s properties. in chapter 5, monte carlo simulation method is used to test performances of our sequences ’ applications in the given model of direct spread spectrum cdma system, and results of error rate of the system are given ; the comparing resuls of performances of anti - multi - access interference and anti - multi - address interference of different pn sequence is also shown in this thesis

    本文首先對擴頻通信中常用二進偽隨機序列的產生方法、性能點進行了總結,指出了有二進偽隨機序列的應用局性;其次,根據混沌非線性系統,深入研究了混沌數字序列的產生方法;在此基礎上,提出了一種新的產生方法中間抽取法,然後,以四種混沌映射系統為例,對其所產生的混沌數字序列進行了偽隨機性實驗數據分析,並與m序列進行比較,結果說明了混沌數字序列代替傳統擴頻序列的優點,時驗證了新方法的可行性。
  11. Compensation for restrictions on special property together with public demands limit levy of government which balances social duty of property right with protection of property right

    對財產的必須予以補償即是對上述與防範的度體;它和「公共需要」標準共構成了對權力收行為的
  12. This allows us to use much less elements to model complicated structures such as the stiffened beam and tower in suspension bridge, while it can still reflect various details such as the mechanical character, geometry, spatial position, the contribution to the system stiffness and mass, of each member involved. by adopting the assembled element, we can use usual pcs to perform the nonlinear analysis of long - span suspension bridges

    組合單元突破了傳統有元對于不材料或不構件必須採用相應不單元的,對懸索橋的索塔、加勁梁等復雜結構,能用較少的單元進行模擬,並且仍然能夠仔細反映其內部各個構件的力學、幾何尺寸、所在空間位置以及其對系統剛度、質量的貢獻,實了用普通微機進行大跨度懸索橋空間非線性分析。
分享友人