橢圓體高度 的英文怎麼說

中文拼音 [tuǒyuángāo]
橢圓體高度 英文
ellipsoidal height
  • : Ⅰ形容詞(卵形) oval-shapedⅡ名詞[書面語] (長圓形的容器) elliptic vessel
  • : 體構詞成分。
  • : Ⅰ形容詞1 (從下向上距離大; 離地面遠) tall; high 2 (在一般標準或平均程度之上; 等級在上的) above...
  • : 度動詞[書面語] (推測; 估計) surmise; estimate
  • 橢圓 : [數學] oval; oval shaped; ellipse; ellipsoid橢圓規 ellipsograph; [圖] elliptic trammel; 橢圓軌道 ...
  • 高度 : altitudeheightelevation
  1. In the system, the collimation semiconductor laser - scanned beam scanning two perpendiculars direct of one plane of the measured workpiece at the same time is made. the beams with the dimension information of two perpendiculars direct are processed by the scanning receive system, the high - speed photoelectric transition and electronic data process. two measured results of the diametric directs and ellipse tolerance, etc, parameter, of the turning workpiece on the same plane are obtained by non - contact automatic measurement

    在單向激光掃描檢測技術的基礎之上,提出了一種雙向激光掃描檢測系統,其採用激光掃描檢測技術與特殊光學系統相結合,用準直半導激光掃描光束對被測工件徑向某一截面的兩個相互垂直方向同時掃描,經掃描接收光學系統、速光電變換、電子學系統和微機數據處理系統,對將攜帶有垂直方向被測量信息的光束進行處理,實現了回轉工件同一截面兩個垂直方向的徑向尺寸和等參數的非接觸自動測量,解決了同時非接觸測量回轉零件同一截面兩個徑向尺寸的難題,它具有速,和非接觸自動測量等特點。
  2. Firstly, we generalize and analyze the advantages and present research of elliptic curve cryptography ; secondly, we study the basic theory of the ecc ; thirdly, we illustrate the safety of the ecc and discuss the elliptic curve key agreement scheme, elliptic curve encryption scheme and elliptic curve digital signature algorithm ; fourthly, we study fast algorithms of the multiplication and inversion multiplication of the element of in the underlying finite field f2m whose characteristic is two represented by the two basis of optimal normal basis and polynomial basis. we make improvements to the fast algorithm of the polynomial basis multiplication by hankerson and base on the experiments, we describe the properties and compare the advantages of the multiplication and inversion multiplication of the elements in f2m field under optimal normal bases and polynomial basis. results concluding from the study car be used as references in the realization of the elliptic curve cryptosystem ; fifthly, we overview the current fast algorithm of point multiplication, improve the fix base point comb algorithm, advance the speed of the whole system and remark the advantages and disadvantages of the popular algorithms based upon the experimental datas ; sixthly we realize the algorithm library of elliptic curve cryptography based on the f2m. only change slightly in our algorithm library can we realize the ecdh, eces, ecdsa based onf2m of anysize ; seventhly, we realize the ecc on two secure elliptic curves, including ecdh, eces, ecdsa

    本文首先介紹並分析了曲線密碼制的優點及研究現狀;其次研究了曲線密碼制的基本理論;第三,分析了曲線密碼的安全性並介紹了密鑰共享,加密,數字簽名等曲線密碼制;第四,深入研究了特徵為2的有限域f _ 2m中的元素在多項式基和最優正規基表示下的乘法運算和乘法逆運算的快速演算法,並對hankerson等人提出的多項式基下的乘法運算的快速演算法作了改進,而且在實驗的基礎上不僅分析研究了f _ 2m域中元素在多項式基和最優正規基表示下的乘法和乘法逆運算的性能,還對這兩種基表示下的f _ 2m域中元素運算效率的優劣作了比較和研究,所得的結論可供在實現曲線密碼制時參考;第五,研究了目前流行的計算曲線標量乘法的快速演算法,同時改進了固定基點梳形法,提了整個系統的速,並在實驗的基礎上分析研究了流行演算法的優劣;第六,實現了基於f _ 2m的曲線密碼制的演算法庫,在我們的演算法庫中只需稍微改變便能實現基於任意尺寸的f _ 2m上的ecdh , eces , ecdsa等曲線密碼制;第七,實現了兩條安全曲線上的曲線密碼制,包括ecdh , eces , ecdsa 。
  3. A systematic summary of previous work has been given first. then this paper presents a novel multi - stage face detection algorithm, which makes a good use of human face pattern ' s valuable information in colour image sequences. the difficult detection task has been divided into four steps : the preprocessing, which is to gain skin colored regions with human skin color model ; the roughly detection and face region refining by elliptic curve fitting ; the fine detection with facial features " detection and location ; the face / non - face classification step based on pca and gaussian density estimation technique

    本文對彩色序列圖像中的人臉檢測和跟蹤技術進行了深入的研究,其具內容為:對近年來的研究工作進行了系統的介紹;提出了一個由粗到細的多階段的人臉檢測演算法,該演算法充分利用了序列圖像中人臉模式的各種有用信息,將復雜的檢測工作分為了四個部分:膚色區域分割預處理,人臉粗檢及利用擬和的人臉區域提煉,應用人臉基本特徵檢測和定位的人臉細檢, pca結合斯概率密估計的人臉驗證。
  4. Firstly, we discuss the basic theory of the x - ray diffraction for crystal and the crystal spectrometer in detecting x - ray. utilizing the outstanding merits of the focus - bend - crystal spectrometer. tcecs ' s resolving power is enhanced greatly by introducing the elliptical crystal

    本論文首先討論了x射線受晶衍射的基本理論以及晶譜儀在x射線探測中的應用,利用聚焦型彎晶譜儀在進行x射線探測中應用的突出優點,加以改進,採用彎晶結構,大大提了譜儀的解析
  5. For example, digital signature, identity distinguish are both the new technology and application derived from the cryptography. ecc is the one of the known public crypto methods that provide the best strength - per - bit. with the deeper application of ic card in the field of finance and telecom, the ecc crypto system will not only upgrade the application level of ic card, but also open up more application fields

    曲線密碼制( ellipticcurvecryptosystem ? ecc )是目前已知的所有公鑰密碼制中能夠提供最比特強( strength - per - bit )的一種公鑰加密制,而智能卡已廣泛用於金融、電信等領域,利用曲線密碼制不僅將大大提智能卡的應用水平而且還將大大拓寬智能卡的應用領域。
  6. First, the basic raster graphics algorithms for drawing 2d primitives are introduced, including edge coherence and the scan - line algorithm of triangle, brush algorithm of thick line ( and its improved method ) and midpoint circle and ellipse algorithm ; and the current situation of the advanced algorithms is also involved. second, the mapping of high level programming language to hardware description language is described, some principles of the conversion of algorithm to state machine are proposed also ; then, the implementation of basic graphics in hardware is discussed in detail, the state machines are drawn in the paper, and the interfaces of hardware are defined, block diagrams too, and the advanced algorithm of conic is proved ; finally, some issues about test are described, the results of simulation and synthesis are given in the last, and some detailed data are displayed in the appendix

    首先介紹了現有的基本圖形生成演算法,包括三角形邊相關掃描演算法,寬直線的線刷子演算法及其改進和形、的生成演算法,同時介紹了加速演算法的研究現狀;然後,討論了級語言描述到硬描述語言的映射,提出了演算法到狀態機抽象的規律;接著具討論了基本圖形的硬實現,給出了各演算法的狀態機圖,介面定義和實現框架,並且從理論角給出了二次曲線加速演算法的證明:最後採用軟工具進行測試驗證,給出了模擬、綜合實現的結果,並在附錄中有詳細的實驗結果數據。
  7. In view of the commonly - used block cipher and public key cryptography, this article focuses on the improvement we have made for the algorithms about aes, dbs, ecc and rsa. based on the dsp chip tms320c6201 from ti company, we have accomplished the speed of 0. 92 usec per aes encryption / decryption, 1. 335 usec per dbs encryption / decryption, and 3

    針對目前信息安全系中常用的分組密碼和公鑰密碼演算法,本文著重改進了des 、 aes的快速演算法實現,並在基於ti公司dsp晶元tms320c6201的系統中實現了0 . 92usec加(解)密一個aes分組, 1 . 335usec加(解)密一個des分組, 3 . 585usec加(解)密一個tdea分組;同時通過改造,使montgomery約化更易於進行并行處理,並通過改進曲線密碼( ecc )底層運算和倍點演算法,使得rsa和曲線密碼的實現速得到了極大的提
  8. Elliptic curve cryptography ( ecc ) was proposed independently in 1985 by victor miller and neal koblitz. it is a cryptography with the highest security intensity of each bit up until now

    曲線密碼制( ecc )最早是在1985年分別由v . s . miller和nealkoblitz獨立提出的,它是迄今為止每比特具有最安全強的密碼制。
  9. Ecc can provide high security. under the same security level, ecc has smaller key and lesser consurne ( computation, memory, bandwith and power needed ), so it is ideal in constrained systems. in this paper, the author primarily introduce elliptic curve cryptosystems

    曲線密碼制不但可以實現安全性,而且在同等安全強下,曲線密碼制具有較短的密鑰長和較小的開銷(所需的計算量、存儲量、帶寬、軟和硬實現的規模等) ,因而,曲線密碼制在受限環境中是理想的選擇。
  10. The highest safety strength of private key per bit in the public - key cryptography systems is the elliptic curve cryptography at present. under similar secure conditions, the ecc has the advantages such as : less computation amounts, shorter length of private key, smaller storing and bandwidth. moreover, it has been declared as standard documents adopted by many international standard institutions and regarded as the most universally used public key system

    曲線密碼制是目前公鑰制中每比特密鑰安全強的一種密碼制,在相同安全強條件下,曲線密碼制具有較短的密鑰長,較少的計算量、存儲量、帶寬等優點,而且曲線密碼制已經被許多國際標準化機構作為標準化文件向全球頒布,被認為是下一代最通用的公鑰密碼系統。
分享友人