正規基 的英文怎麼說

中文拼音 [zhēngguī]
正規基 英文
normal basis
  • : 正名詞(正月) the first month of the lunar year; the first moon
  • : Ⅰ名詞1 (畫圓形的工具) instrument for drawing circles 2 (規則; 成例) rule; regulation 3 [機械...
  • 正規 : regular; standard; normal正規部隊 regular troops; regulars; 正規教育 regular education; proper ed...
  1. Standard specification for methyl n - amyl ketone

    酮標準
  2. This article grounded on the cognition and reconsideration to the above issues, through a serial of deep analyzes about the residential district scale, the form of street block, the researches among academe, the organization of transportation and people ' s place, brought forward methods and approach about street block styles suiting for situation in our country. at the last paragraph, combined with some projects such as bei an qin sen in ningbo, the article probed into the urban street blocks construction with small scale and composite utilities

    論文於對上述問題的認識與思考,通過對小區尺度與街坊式住區模式的構成、國內外學術界的研究與街坊式住區的交通組織以及街坊式住區的場所等幾個方面的深入研究分析,提出一些適合我國國情的街坊式住區模式建設的方法和途徑,最後結合以寧波北岸琴森地塊建設為典型的幾個案例,進一步探索的提出了城市小模綜合性的社區開發模式? ?城市街坊式住區模式。
  3. We first present a number of desiderata for an xml - based query language, and based on this criterion, we introduce the syntax of a simple core ian - guage for semistructured data and then describe four extensions that have resulted in working prototypes. second, we present the algorithm for computing the result of a regular expression on data graph with cycles, the first - order interpretation of querying language for semistructured data, and explore structural recursion and bisimulation in semistructured data and propose an efficient and systematic way to computing a bisimulation between the two graphs. we also proposed and implemented a web querying system with database features

    於這些準則,對一個簡單的半結構數據查詢核心語言的語法提出了兩方面擴充;給出了計算數據圖中表達式的演算法;對半結構數據查詢語言的一階邏輯描述、結構遞歸和數據圖的雙態模擬( bisimulation )等問題進行了研究,提出了一種判定數據圖的bisimulation演算法;在xml數據查詢語言研究的礎上,設計並實現了一種具有數據庫查詢特性的web查詢系統原型。
  4. The principle stated above is basically the same for both regular and guerrilla war ; it differs to some degree only in its form of expression

    這個原則,戰爭和游擊戰爭是本上同一的,只在表現形式上有程度的不同。
  5. Are there similar characterizations for the countable paracompact ( mesocompact, metacompact ) space and hereditarily mesocompact space ? in this paper, on the basis of the aboves, we obtain some results about them. and the product properties of mesocompact spaces and hereditarily mesocompact spaces have been paid attention. but there is no good result about them. in this paper we obtain a result about the limit of the inverse system of a normal mesocompact space and a hereditarily normal and hereditarily mesocompact space

    那末,可數仿緊(中緊、亞緊)空間及遺傳中緊空間是否具有類似junnila的刻畫呢?本文圍繞這個問題在上述結果的礎上證明了一些結果。另外,中緊空間和遺傳中緊空間的可乘性問題一直受到人們的關注,但還沒有好的結果,本文證明了一個關于中緊空間及遺傳且遺傳中緊空間的逆極限的結果。
  6. An algorithm on the multiplication table of the normal basis over finite fields

    關于有限域上正規基乘法表的一個演算法
  7. It is based on the above reasons, the leading system of flood, windstorm, drought control and the construction of water conservancy information engineering and the principle of theory and practicality are combined. based on the continuous development the following contents are researched in this paper : 1. the flood occurred law on major rivers and flood problems and flood control measure

    於這種考慮,本論文結合廣州市三防指揮系統工程和廣州市水利信息化工程的建設,本著理論性與實用性相結合的原則,從可持續發展的角度,重點研究以下內容: 1 、廣州市主要河流洪水發生的律及存在問題與防洪措施; 2 、廣州市現有防洪措施的防洪標準與可靠性; 3 、洪水預報與調度系統的方法與技術路線; 4 、現代防洪管理。
  8. Firstly, we generalize and analyze the advantages and present research of elliptic curve cryptography ; secondly, we study the basic theory of the ecc ; thirdly, we illustrate the safety of the ecc and discuss the elliptic curve key agreement scheme, elliptic curve encryption scheme and elliptic curve digital signature algorithm ; fourthly, we study fast algorithms of the multiplication and inversion multiplication of the element of in the underlying finite field f2m whose characteristic is two represented by the two basis of optimal normal basis and polynomial basis. we make improvements to the fast algorithm of the polynomial basis multiplication by hankerson and base on the experiments, we describe the properties and compare the advantages of the multiplication and inversion multiplication of the elements in f2m field under optimal normal bases and polynomial basis. results concluding from the study car be used as references in the realization of the elliptic curve cryptosystem ; fifthly, we overview the current fast algorithm of point multiplication, improve the fix base point comb algorithm, advance the speed of the whole system and remark the advantages and disadvantages of the popular algorithms based upon the experimental datas ; sixthly we realize the algorithm library of elliptic curve cryptography based on the f2m. only change slightly in our algorithm library can we realize the ecdh, eces, ecdsa based onf2m of anysize ; seventhly, we realize the ecc on two secure elliptic curves, including ecdh, eces, ecdsa

    本文首先介紹並分析了橢圓曲線密碼體制的優點及研究現狀;其次研究了橢圓曲線密碼體制的本理論;第三,分析了橢圓曲線密碼的安全性並介紹了密鑰共享,加密,數字簽名等橢圓曲線密碼體制;第四,深入研究了特徵為2的有限域f _ 2m中的元素在多項式和最優正規基表示下的乘法運算和乘法逆運算的快速演算法,並對hankerson等人提出的多項式下的乘法運算的快速演算法作了改進,而且在實驗的礎上不僅分析研究了f _ 2m域中元素在多項式和最優正規基表示下的乘法和乘法逆運算的性能,還對這兩種表示下的f _ 2m域中元素運算效率的優劣作了比較和研究,所得的結論可供在實現橢圓曲線密碼體制時參考;第五,研究了目前流行的計算橢圓曲線標量乘法的快速演算法,同時改進了固定點梳形法,提高了整個系統的速度,並在實驗的礎上分析研究了流行演算法的優劣;第六,實現了於f _ 2m的橢圓曲線密碼體制的演算法庫,在我們的演算法庫中只需稍微改變便能實現於任意尺寸的f _ 2m上的ecdh , eces , ecdsa等橢圓曲線密碼體制;第七,實現了兩條安全橢圓曲線上的橢圓曲線密碼體制,包括ecdh , eces , ecdsa 。
  9. This paper discusses how to cover the non - observed economy so as to achieve exhaustiveness in national accounting. the first chapter introduces the definition of noe and its five components, namely illegal activities, underground activities, informal sector activities, household production for own final use, and other activities missed due to deficiencies of basic data collection programme

    第一章根據oecd的《未觀測經濟測算手冊》 ,介紹了未觀測經濟的定義和五個構成部分,即:非法活動、地下活動、非部門活動、供自己最終消費的住戶生產活動、由於礎數據收集方案的缺陷而遺漏的活動。
  10. They rocketed to fame as the country duo, the judds, and little sister ashley was afforded the chance to attended the university of kentucky, from which she graduated with honors in 1990 judd, then, on her singer - sisters advice, went directly to los angeles at age 23, where her impressive self - assurance got her an immediate agency contract

    家境的改變才使阿什莉有了受教育的機會,她進了肯塔州立大學學習法語。畢業后的阿什莉聽從姐姐的忠告,開始向好萊塢進軍。她憑借非凡的膽量和自信心去尋找代理機構簽約,不久,便有第一次試鏡機會。
  11. With melky cabrera now enjoying service as new york ' s regular center fielder, damon said that manager joe torre took damon aside during the weekend at fenway park and told him that he could see time at first base when the yankees return to national league parks later this month at colorado and san francisco

    隨著小卡現在樂于充當洋中間手,大門說老爹在周末把他叫到一旁且告訴他說:當洋這個月下半段在科蘿拉州與舊金山的時候他可以嘗試一壘的守備位置。
  12. Let us put the view on a slightly more formal basis.

    現在我們把這一觀點建立在更加礎之上。
  13. He said, " we set up the association as a company according to the company law. it is just normal that we now go through a liquidation to settle all the company businesses through proper legal procedures. the funds of the foundation have been handed over to the trustees. " (

    他說:我地當日按照公司法定成立為公司,現經既法律程序,式將公司事務安排清楚,辦理一個清盤結業既程序系好常,而金款項已交左畀幾個信託人營運。
  14. In 1, we give main definitions and basic results that are needed in the paper. in 2, we determine the structures of some groups by using s - normality of sylow subgroups and the maximal subgroups of sylow subgroups. there are the main theorems that 1 ) let g be a finite group and p be a sylow p - subgroup of g where p is a prime divisor of | g |

    我們在1中將給出本文所需的主要概念和本結果,在2中討論sylow子群、 sylow子群的極大子群的s -性對群的結構的影響,主要結果是1 )設g為有限群, p為| g |的素因子, p為g的sylowp -子群。
  15. In addition, eece publications is successfully making eagle s english education synchronous with north america s. studying english at eagle gives children the same results as studying english abroad. eagle s education system model and comprehensive operating guidance model will help students, parents, and franchise partners to experience the same success as our existing students, parents, and franchise partners

    而孩子因為英文能力的及早啟蒙及在教育下奠定的根,家長可體驗到孩子已養成大量閱讀習慣主動探索新知的能力善於表達理念情感及尊重群體范的菁英特質,弋果總是讓孩子成長的過程表現得比同儕優異且更具自信心。
  16. The primitive accumulation of human capital was obtained from preschool education and normal education at school, and further education and after - school education is the basic route of human capital accumulation. “ learning by doing ”, “ learning by using ” and on - the - job training is the basic form of human capital accumulation, which is through one ' s whole life

    人力資本的原始積累是在家庭學前教育和學校教育中獲得的,而學校教育之後的繼續教育和學習是人力資本積累的本途徑。在職培訓和「干中學」 、 「用中學」是專業性人力資本積累的本形式,人力資本積累是一個終生過程。
  17. Expanding the system ' s hamiltonian to a real symmetric matrix in an appropriate orthogonal basis vector and then diagonalizing it, we get the energy spectrum of the system and calculate the energy level spacing distribution function and the spectral rigidity. then we study the statistical character of the energy spectrum under the changing of magnetic field intension and find that the system ' s motion transfers from regular to chaos gradually

    將系統的哈密頓量在一個適當的矢下展開並對角化,得到系統的能譜,分別計算系統能譜的能級間距分佈函數和譜剛度,研究了該系統量子能譜的統計特徵隨磁感應強度大小的改變而表現出的系統運動由則到混沌的漸進變化。
  18. In order to obtain molecule - based magnets, the first important step is to synthesize molecular entities with a large spin in the ground state

    作者結合本課題組的工作,總結了合成高自旋態分子的幾種重要模型,包括磁軌道交、自旋極化、非自旋態及自旋失措模型。
  19. On normal basis of field extension

    關于域擴張上的正規基
  20. One is the 191 bits secure curve of ansi x9. 62, elements in f2m field represented by polynomial basis, the other is the 148bits secure curve in our secure curve library elements in f2m field represented by optimal normal basis ; the conclusion summarizes the whole paper and preview the the further developments of the work we have done

    一條是ansix9 . 62中的191bit的安全曲線, f _ 2m中的元素用多項式表示,一條是我們安全曲線庫中的148bit的安全曲線, f _ 2m中的元素用最優正規基表示;最後對本文進行總結和展望了以後的工作。
分享友人