相關橢圓 的英文怎麼說

中文拼音 [xiāngguāntuǒyuán]
相關橢圓 英文
correlation elli e
  • : 相Ⅰ名詞1 (相貌; 外貌) looks; appearance 2 (坐、立等的姿態) bearing; posture 3 [物理學] (相位...
  • : Ⅰ動詞1 (使開著的物體合攏) close; shut 2 (圈起來) shut in; lock up 3 (倒閉; 歇業) close down...
  • : Ⅰ形容詞(卵形) oval-shapedⅡ名詞[書面語] (長圓形的容器) elliptic vessel
  • 相關 : be interrelated; be related to; be bound up with; correlation; dependence; relevance; mutuality
  • 橢圓 : [數學] oval; oval shaped; ellipse; ellipsoid橢圓規 ellipsograph; [圖] elliptic trammel; 橢圓軌道 ...
  1. The various colours significant of various degrees of vitality white, yellow, crimson, vermilion, cinnabar : their degrees of brilliancy : their magnitudes revealed up to and including the 7th : their positions : the waggoner s star : walsingham way : the chariot of david : the annular cinctures of saturn : the condensation of spiral nebulae into suns : the interdependent gyrations of double suns : the independent synchronous discoveries of galileo, simon marius, piazzi, le verrier, herschel, galle : the systematisations attempted by bode and kepler of cubes of distances and squares of times of revolution : the almost infinite compressibility of hirsute comets and their vast elliptical egressive and reentrant orbits from perihelion to aphelion : the sidereal origin of meteoric stones : the libyan floods on mars about the period of the birth of the younger astroscopist : the annual recurrence of meteoric showers about the period of the feast of s. lawrence martyr, 10 august : the monthly recurrence known as the new moon with the old moon in her arms : the posited influence of celestial on human bodies : the appearance of a star 1st magnitude of exceeding brilliancy dominating by night and day a new luminous sun generated by the collision and amalgamation in incandescence of two nonluminous exsuns about the period of the birth of william shakespeare over delta in the recumbent neversetting constellation of cassiopeia and of a star 2nd magnitude of similar origin but lesser brilliancy which had appeared in and disappeared from the constellation of the corona septentrionalis about the period of the birth of leopold bloom and of other stars of presumably similar origin which had effectively or presumably appeared in and disappeared from the constellation of andromeda about the period of the birth of stephen dedalus, and in and from the constellation of auriga some years after the birth and death of rudolph bloom, junior, and in and from other constellations some years before or after the birth or death of other persons : the attendant phenomena of eclipses, solar and lunar, from immersion to emersion, abatement of wind, transit of shadow, taciturnity of winged creatures, emergence of nocturnal or crepuscular animals, persistence of infernal light, obscurity of terrestrial waters, pallor of human beings

    顯示出不同程度之生命力的繽紛色彩白淺黃深紅朱紅銀朱諸星之亮度一直包括到七等星以等級標志的諸星之大小諸星的位置御夫座沃爾辛厄姆路172大衛的戰車173土星光環螺旋星雲凝固后形成有衛星的恆星群兩重大陽互依存的旋轉運動伽利略西蒙馬里烏斯174皮亞175勒威耶赫歇耳加勒176等人各自獨立地同時所做的發現波得和開普勒所嘗試的距離的立方與回轉次數的平方的體系化177多毛的眾彗星178那幾殆無限的被壓縮性,以及自近日點至遠日點那廣漠的遠心的重返大氣層的軌道隕石的恆星之起源年紀較輕的天體觀測者誕生的那個時期火星上所出現的「暗波」現象179每年在聖勞倫斯節殉教者,八月十日前後降落的隕石雨每月都發生的所謂「新月抱舊月」現象180于天體對人體的影響的假定威廉莎士比亞出生的時期,在斜倚卻永不沒落的仙后座那三角形上端,一顆不分晝夜散發著極亮光彩的星辰一等星出現了181這是兩個無光死滅了的太陽因撞並汞合為白熱體而形成的燦爛的新太陽大約在利奧波德布盧姆出生時,出現在七星花冠星座里而後又消失了的一顆同一起源亮度卻稍遜的星宿二等星182還有約於斯蒂芬迪達勒斯出生時,出現在仙女座中之後又消失,小魯道爾夫布盧姆出生與夭折數年後出現于御夫座后又消失,以及另外一些人出生或去世前前後後出現在許許多多其他星座中而又消失了的假定是同一起源的實際存在或假定存在的星斗183 。
  2. This thesis is composed of following parts : the fundamental theory of the modern cryptology is briefly researched, in which the mathematic model of cryptology, data encrypt principle and galois field theory related with elliptic curve crypto is discussed

    論文的主要內容為: 1研究了現代密碼學的基本理論,介紹了密碼系統的數學模型、數據加密原理和與曲線加密密切的有限域理論; 2
  3. By computing the between two resolution units, we can estimate terrain azimuthal slopes and derive estimate of terrain elevation. the terrain contour is determined uniquely by ay / from azimuth slop on range gates. american began to study p - sar three - dimensional images technology in 1990s

    Schuler已經證明,對於一個均勻分佈場景, sar圖像上兩個鄰分辨單元的極化方向角偏移量,與地形方位向坡度的對應系是線性唯一的,地形方位向的傾斜度可以通過解唯一地被測定。
  4. A presentation of the fundamentals of modern numerical techniques for a wide range of linear and nonlinear elliptic, parabolic and hyperbolic partial differential equations and integral equations central to a wide variety of applications in science, engineering, and other fields

    本課程講授求解不同線性及非線性、拋物線及雙曲線偏微分方程式與積分方程式等之現代數值技巧基礎,並強調在許多科學、工程及領域上的應用。
  5. Study proves that the accuracy of the underground control measures is much more important than the accuracy of the surface control network, and the basic principle applies to the vertical breakthrough

    通過計算它們的誤差確定貫通點的貫通誤差結果證明,地下控制網的精度比地面控制網的精度更為重要。
  6. Research on the elliptic curve over finite field f2m that is suitable for constructing the cryptosystem, analyze the security basis of the elliptic curve cryptosystem and the common attacks to it. because the security of elliptic curve only has relation to the elliptic curve itself, it is important to select the suited elliptic curve. indicate that making operation on the elliptic curve is very complicated

    對適于建立密碼體制的有限域f2m上的一類曲線進行了研究,分析了曲線密碼體制的安全性和常見的攻擊方法,因為曲線密碼體制的安全性只與曲線本身有,所以選擇合適的曲線非常重要,指出曲線的計算是復雜的,分析研究了利用有限域f2m上的曲線建立密碼體制的問題,利用經過仿射代換后的曲線可以建立公鑰密碼體制,將其上的運算進行映射變換后易於設計演算法和便於實現。
  7. Ecc is considered to be an alternative to rsa. this article provides a brief description of rsa public key cryptography and the associated knowledge, in particular introduces non - supersingular elliptic curves e which is established on the finite field fp with p > 3, in - depth studies present existed scalar multiplication, further proposes an improved signed sliding window algorithm on ecc under the mixed coordinates, the improved algorithm compatible the advantage of the naf, has the least number of zero window and avoid a large number of inverse operation, successfully reduce scalar multiplication calculation

    本文闡述了曲線及其知識,特別說明了建立在有限域fp (其中p是大於3的素數)上的非奇異曲線e ,深入研究目前已有的各種標量乘法,由此提出了曲線密碼演算法在混合坐標下改進的帶符號滑動窗口演算法,該演算法兼容了naf方法的優點,擁有最少數目的非零窗口數,又避免了域元素上的大量求逆運算,較成功地減少了標量乘法計算量。
  8. The effects of heterogeneous anisotropic random fractured rocks with different autocorrelation length and different autocorrelation function were discussed. the results show that : l ) the scattering effects become weaker when the autocorrelation length becomes larger. 2 ) the exponential ellipsoidal random fractured rock has different scattering effects on waves in different coordinates direction, and 3 ). the gaussian random fractured rocks has the same

    通過模擬發現: 1 )隨著自長度的增加,巖石的非均勻性對波的散射作用減弱; 2 )指數型隨機裂縫巖石對彈性波在兩個坐標方向上造成的散射不同; 3 ) gaussian型隨機裂縫巖石對彈性波在兩個坐標方向上有同散射作用。
  9. In this thesis, the basic problem of network security, some correlative protocols and cryptology are discussed at first, math theory in point is also studied. especially, a sort of new matrix method of solving quadratic equation over gf ( 2m ) is given, which is the key of selecting random point over elliptic curves. no better solution has been found in related literature in the world. compared with ieee p1363 ' s method, it is easy to implement the software and obtain high efficiency, etc. then the basic operation of elliptic curve is debated and the steps of finding secure curve and basis point over gf ( 2m ) are presented. moreover, the encryption and decryption schemes of the ecc are designed and the security problem of ecc is also considered. in the end, ecc by koblitz curves are implemented

    文章首先討論了網路安全基本問題、網路安全協議和密碼學;對數學理論進行了研究,特別是給出了一種新的求解gf ( 2 ~ m )上二次方程的矩陣法,而它是選取曲線上的隨機點的鍵步驟,和ieeep1363的方法比,它有易於軟體實現、效率高等優點,在國內外文獻上還未見到更好的求解方法;接著討論了曲線的基本運算,進而給出了在gf ( 2 ~ m )上選取安全曲線及基點的步驟;文章還設計了曲線加密系統的加解密方案,討論了曲線系統的安全性問題。最後文章就koblitz曲線加密系統進行了軟體實現。
  10. In this article, we study the implemetation of fpga for elliptic curve digital signature algorithm. based on number thesis 、 abstract algebra and complex thesis , integrated information theory 、 cryptography and some specific relevant algorithm , we ascertain the implementation of ecdsa for hardware project : according to the design idea of hiberarchy and modularization, we adopt very high speed ic hardware description language ( vhdl ) as design input and simulate the design in every level and every model for the correct of the fundamental design. after finish the top design, we perform the whole simulation. then , we carry out the timing simulation after the logic synthes and layout

    本文從實際應用出發,研究了曲線數字簽名演算法的fpga的實現:以基本的數論理論、抽象代數和復雜度理論為依據,結合信息論、密碼學的一些知識以及一些具體的演算法,確定了ecdsa的硬體實現方案:按照層次化、模塊化的設計思想,採用硬體描述語言vhdl作為設計輸入進行ecdsa的硬體設計;在每個設計層次和每個模塊都進行了模擬驗證,得以保證底層設計的正確性。在確保每個模塊的設計正確后,完成對電路的頂層設計,進行總體的模擬。
  11. Have appeared on the existence of infinitely many solutions and on the multiplicity of positive solution of dirichlet problem, but only few results on the existence of infinitely many solutions and the multiplicity of positive solution of neumann problem. recently, the remarkable result about neumann problem is the work of zhang guiyi and shen yaotian on the existence of infinitely many solutions of a general critical quasilinear elliptic equation with a nonlinear critical boundary condition

    在擬線性方程的研究中,于dirichlet問題多解和正解的多重性已經有了當多的結果,但對neumann問題多解和正解的研究尚不多,近期的主要結果是張桂宜、沈堯天于臨界擬線性方程及臨界增長的neumann問題的多解。
  12. First, the basic raster graphics algorithms for drawing 2d primitives are introduced, including edge coherence and the scan - line algorithm of triangle, brush algorithm of thick line ( and its improved method ) and midpoint circle and ellipse algorithm ; and the current situation of the advanced algorithms is also involved. second, the mapping of high level programming language to hardware description language is described, some principles of the conversion of algorithm to state machine are proposed also ; then, the implementation of basic graphics in hardware is discussed in detail, the state machines are drawn in the paper, and the interfaces of hardware are defined, block diagrams too, and the advanced algorithm of conic is proved ; finally, some issues about test are described, the results of simulation and synthesis are given in the last, and some detailed data are displayed in the appendix

    首先介紹了現有的基本圖形生成演算法,包括三角形邊掃描演算法,寬直線的線刷子演算法及其改進和形、的生成演算法,同時介紹了加速演算法的研究現狀;然後,討論了高級語言描述到硬體描述語言的映射,提出了演算法到狀態機抽象的規律;接著具體討論了基本圖形的硬體實現,給出了各演算法的狀態機圖,介面定義和實現框架,並且從理論角度給出了二次曲線加速演算法的證明:最後採用軟體工具進行測試驗證,給出了模擬、綜合實現的結果,並在附錄中有詳細的實驗結果數據。
  13. After that, an introduction of the relative knowledge of the 802. 1x, pki and the ellipse cipher system is given

    802 . 1x證書認證的pki公鑰設施基礎和曲線密碼體制知識。
  14. With the fast development of internet, the problem of information security looks increasingly important. then on the basis of safe and high efficient encryption algorithm, some related network protocols are produced. compared with some other public key cryptosystems, elliptic curve cryptosystem ( ecc ) has many merits, so the special attention is paid to it by the network safety specialist in the world. ecc is widely argued because of no standard source code. in this article, the research is on the ecc theory and the implementation of it is also done

    隨著網際網路的快速發展,信息安全問題顯得日益重要。網路安全協議應運而生,而它們的基礎都是安全高效的加密演算法,曲線加密系統與其他公鑰加密系統比有許多優點,受到國內外安全專家的極大注。可是曲線加密系統( ecc )並無公開的標準源代碼,還處于「百花齊放,百家爭鳴」的局面,文章對于安全的曲線加密系統做了理論研究和實現工作。
  15. Then in section 2 we discuss the elliptic problem which has time derivative on the boundary condition and obtain the corresponding regularity estimate which is quoted in chapter 3

    第二節討論邊界條件含有時間方向上導數的問題,並且得到的正則性估計,其結果在第三章中被引用。
  16. 3 ) on the other hand, the gaussian heterogeneous anisotropic random fractured model might be a suitable model for the single - scaled and smooth heterogeneous media. the propagation of elastic waves, excited by an explosive point source in exponential ellipsoidal and gaussian heterogeneous anisotropic random fractured rocks, were simulated

    模擬了爆炸點源產生的彈性波在指數型、 gaussian型非均勻各向異性隨機裂縫國防科學技術人學研究生院學位論文巖石中的傳播,討論了具有不同自長度的或者不同類型的非均勻各向異性隨機裂縫巖石對彈性波的散射。
  17. One way to demonstrate a link would be to identify two populations of globular clusters in old elliptical galaxies

    要證明兩者彼此,其中一個方式,就是在古老的星系中,同時辨識出這兩類球狀星團。
分享友人