逆元素 的英文怎麼說

中文拼音 [yuán]
逆元素 英文
inverse element
  • : Ⅰ形容詞1 (方向相反) contrary; counter 2 [數學] inverse; converse Ⅱ動詞1 (抵觸; 不順從) go aga...
  • : Ⅰ形容詞1 (本色; 白色) white 2 (顏色單純) plain; simple; quiet 3 (本來的; 原有的) native Ⅱ名...
  1. We call -a the additive inverse of a.

    我們稱-a為a的加性逆元素
  2. Most of the elements of the proposed offences of secession and subversion are already covered by the existing offences of treason or treasonable offences

    建議中的分裂國家和顛覆罪的大部分已包含在現行的"叛"和"叛性質的罪行"中。
  3. A sufficient and necessary condition for determining singularity of a block circulant matrix over a quaternion division algebra over a field is given, and two algorithms for the inverse of a nonsingular block circulant matrix over the quaternion division algebra are presented

    ?給出了域上的塊循環矩陣可性的充要條件及其矩陣的演算法。 ?給出了四可除代數上的塊循環矩陣可性的充要條件及其矩陣的兩種演算法。
  4. Firstly, we generalize and analyze the advantages and present research of elliptic curve cryptography ; secondly, we study the basic theory of the ecc ; thirdly, we illustrate the safety of the ecc and discuss the elliptic curve key agreement scheme, elliptic curve encryption scheme and elliptic curve digital signature algorithm ; fourthly, we study fast algorithms of the multiplication and inversion multiplication of the element of in the underlying finite field f2m whose characteristic is two represented by the two basis of optimal normal basis and polynomial basis. we make improvements to the fast algorithm of the polynomial basis multiplication by hankerson and base on the experiments, we describe the properties and compare the advantages of the multiplication and inversion multiplication of the elements in f2m field under optimal normal bases and polynomial basis. results concluding from the study car be used as references in the realization of the elliptic curve cryptosystem ; fifthly, we overview the current fast algorithm of point multiplication, improve the fix base point comb algorithm, advance the speed of the whole system and remark the advantages and disadvantages of the popular algorithms based upon the experimental datas ; sixthly we realize the algorithm library of elliptic curve cryptography based on the f2m. only change slightly in our algorithm library can we realize the ecdh, eces, ecdsa based onf2m of anysize ; seventhly, we realize the ecc on two secure elliptic curves, including ecdh, eces, ecdsa

    本文首先介紹並分析了橢圓曲線密碼體制的優點及研究現狀;其次研究了橢圓曲線密碼體制的基本理論;第三,分析了橢圓曲線密碼的安全性並介紹了密鑰共享,加密,數字簽名等橢圓曲線密碼體制;第四,深入研究了特徵為2的有限域f _ 2m中的在多項式基和最優正規基表示下的乘法運算和乘法運算的快速演算法,並對hankerson等人提出的多項式基下的乘法運算的快速演算法作了改進,而且在實驗的基礎上不僅分析研究了f _ 2m域中在多項式基和最優正規基表示下的乘法和乘法運算的性能,還對這兩種基表示下的f _ 2m域中運算效率的優劣作了比較和研究,所得的結論可供在實現橢圓曲線密碼體制時參考;第五,研究了目前流行的計算橢圓曲線標量乘法的快速演算法,同時改進了固定基點梳形法,提高了整個系統的速度,並在實驗的基礎上分析研究了流行演算法的優劣;第六,實現了基於f _ 2m的橢圓曲線密碼體制的演算法庫,在我們的演算法庫中只需稍微改變便能實現基於任意尺寸的f _ 2m上的ecdh , eces , ecdsa等橢圓曲線密碼體制;第七,實現了兩條安全橢圓曲線上的橢圓曲線密碼體制,包括ecdh , eces , ecdsa 。
  5. In the second section, we structure a kind of semirings, namely semidirect product of semirings, and prove an isomorphic theorem of semidirect products. in the third section, we give the characterizations of the relations of all kinds of regular semirings and introduce the concept of pseudo - inverse and the necessary and sufficient conditions of pseudo - invertible element. in the fourth section, we define an equivalence relation on the cartersian product of commutative semiring and its multiplicative subset

    第二部分,先構造一類半環,半環半直積,然後證明半直積的同構定理第三部分,刻劃了半環各類正則之間關系,引入偽的定義,給出了可偽逆元素的充要條件第四部分,在交換半環和乘法集的卡氏積上定義等價關系,進而構造了一類交換半環:分式半環
  6. The image reconstruction technique based on the finite element method is flexible and easily to use for many applications

    採用有限法計算時影像重建的技術經證實是可行且易於應用於其他的研究領域。
  7. ( 3 ) for the first hierarchy mentioned above, the multiplication and inversion in gf ( pm ) are two key operations

    ( 3 )對于第一層次的運算,關鍵是域的乘法和乘運算。
  8. A relation between the inverse elements is found, and a new algorithm for inverting a block tridiagonal matrix is established

    當考慮該表達式的結構特徵時,可得到塊的遞推關系式,由此得到一個求矩陣的新演算法。
  9. In counter - clockwise order, the first model top left uses stereotypes to mark elements

    按照時針的順序,第一個模型(左上角)是用構造型標記
  10. We call - a the additive inverse of a

    我們稱- a為a的加性逆元素
  11. As each human begins to embody all elements including air, water, fire and earth along with the inverse elements of ether, vapor, smoke and lava, humanity will begin to thaw out as there will be enough fire to allow for an internal shift within each.

    當每個人融合入所有的包括氣,水,火和土,連同逆元素如以太,蒸汽,煙和熔巖時,人類將開始解凍,因為這將使每個人的內部被充分點燃(擁有足夠的能量)而允許一個內在轉換的發生。
  12. Am fungi are the widely distributed soil microbe, which can promote host - plant to take up mineral elements from soil, regulate metabolism action inside the host - plant, and enhance anti - reversibility of plants, and promote plant growth, and increase yield of plants, and improve quality of plants

    摘要叢枝菌根真菌是廣泛分佈的一類土壤微生物,與植物共生后,能夠促進宿主對土壤中礦質的吸收,調節宿主體內的代謝活動,增強植物的抗性,促進植物生長,增加作物產量,改善作物品質。
  13. In terms of the unstability of it, we take dopping and coating measures to restrain it. the dopping elements include cr, al, co and ni, and licoo2 is used as the coating material. through xrd ananysis, we can know only dopping al can form limno2, the product of coating licoo2 forms the main phase limn2o4 although liniv04 has high voltage as cathode materials, it is difficult to ni3 + from ni2 +, which makes it hard in the first charge

    基於limno :結構的不穩定性(在充放電過程中會不可的轉變為類尖晶石limnzo4結構) ,對lin [ n02進行摻雜、表面包覆改性實驗研究,通過對limnoz進行摻鉻、摻鋁、摻鉆、摻鎳等,從xrd物相分析可以看出:只有摻入鋁能形成limnoz :用licooz進行包覆得到是以limnzo4為主相的混合物。
  14. Since the introduced metal and nonmetal elements can modify electronic structure, graphite structure and surface of the carbonaceous materilas, their reversible capacity and cycle properties are improved

    通過引入金屬和非金屬,碳材料的可容量、循環性能有了一定提高,這主要是碳材料的電子狀態、石墨結構和表面有明顯的改善。
  15. Ecc is considered to be an alternative to rsa. this article provides a brief description of rsa public key cryptography and the associated knowledge, in particular introduces non - supersingular elliptic curves e which is established on the finite field fp with p > 3, in - depth studies present existed scalar multiplication, further proposes an improved signed sliding window algorithm on ecc under the mixed coordinates, the improved algorithm compatible the advantage of the naf, has the least number of zero window and avoid a large number of inverse operation, successfully reduce scalar multiplication calculation

    本文闡述了橢圓曲線及其相關知識,特別說明了建立在有限域fp (其中p是大於3的數)上的非奇異橢圓曲線e ,深入研究目前已有的各種標量乘法,由此提出了橢圓曲線密碼演算法在混合坐標下改進的帶符號滑動窗口演算法,該演算法兼容了naf方法的優點,擁有最少數目的非零窗口數,又避免了域上的大量求運算,較成功地減少了標量乘法計算量。
  16. We use approximate method to fit the accurate results and find a fast and rather accurate way to design waveguide narrow - wall slots array

    利用邊界法即可求解出二維問題的解后再做fourier變換即可。
  17. The author mainly realized the method of generating the large random numbers and judging the prime number using lehmann means, then three pairs of secure key with different lengths ( 256 bits, 512 bits, 1024 bits ) was generated to meet the demand of different security grade. in encryption module, modular multiplication arithmetic of large number was realized adopting addition chaining. in decryption module, extended euclid was used to get inverse, and the chinese remainder theorem was used to realize decryption, which increased the speed of decryption greatly

    作者主要實現了大隨機數的生成、採用整除小數和勒曼測試法判定數,可以生成三種不同長度的密鑰對( 256位、 512位、 1024位)來滿足不同的加密安全等級的需求;加密模塊中,選用了二進制序列的乘法方法,實現了大數模冪乘運算;解密模塊中,引用了擴展的歐幾里德法求,並採用中國剩餘定理實現解密過程,大大提高了解密速度。
  18. With the lu decomposition of the block tridiagonal matrix, an explicit expression of the block inverse elements is obtained

    由塊三對角矩陣的lu分解,得到了其矩陣塊的顯式表達式。
  19. The contents of all the elements indicated in the document structure schematic, grouped by element type : each individual content item is delimited by a 0x02 byte, while the start of elements of a new type is delimited by a 0x01 byte the last not strictly needed, but it makes reversing the transformation easier

    文檔結構示意圖中指示的所有的內容按類型分組:每個單獨的內容項由0x02位組定界,新類型的開始由0x01位組定界(最後一個沒有嚴格要求,但它使向轉換更容易)
  20. Picture that put forward in the article graph and data structure reciprocal mapping support not merely to map graph from data structure efficiently, besides, regard graphics element as a unit, analyze and discern to user ' s modified graph, produce the corresponding data structure automatically, maintain consistency of graph and data structure efficiently on the foundation of expanding case graphic tools effectively, we direct against the intrinsic characteristic of traditional waterfall model, proposesmall loop model to software analysis based on graph and data structure reciprocal mapping solve problems of slow information feedbackand high track back cost efficiently

    文中提出的圖數互映射的思想,不僅對數據結構到圖形映射進行高效率地支持,同時,以圖形為單位,對用戶修改後的圖形進行分析和識別,自動生成相應的數據結構,有效地維護了圖數一致性。在對case圖形化工具進行有效擴展的基礎上,我們針對傳統瀑布開發模型的固有特點,提出了基於圖數互映射的軟體分析小循環模型,有效解決了傳統軟體分析設計階段信息反饋慢、回溯代價高等問題。
分享友人