法里序列 的英文怎麼說

中文拼音 [liè]
法里序列 英文
farey sequence
  • : Ⅰ名詞1 (由國家制定或認可的行為規則的總稱) law 2 (方法; 方式) way; method; mode; means 3 (標...
  • : 里Ⅰ名詞1 (襯料; 紡織品的反面) lining; liner; inside 2 (里邊; 里邊的) inner 3 (街坊) neighbo...
  • : Ⅰ動1 (排列) arrange; form a line; line up 2 (安排到某類事物之中) list; enter in a list Ⅱ名詞1...
  1. Secondly, some encryption algorithms are introduced, with the analysis and comparison for these encryption algorithms, the author designs an appropriate project to accomplish the end - to - end encryption. thirdly, this paper accomplish the design of an encryption scheme which combining the strongpoint of the rsa algorithm and the idea algorithm. the main process is as following : first, input the digital signal to the encryption device, and then the digital signal exclusive or with the keying sequence which is generated by key stream generator ( ksg ) and the ksg is based on the idea encrypting and deciphering algorithm, the secret key synchronization is also studied

    本課題主要研究的內容是數字集群通信系統加密機制的研究,首先介紹了數字集群通信系統的安全保密機制,講述了單向和雙向鑒權的過程、單呼和群呼的空中介面加密過程及其密鑰的選用和管理,特別介紹了端到端加密;然後介紹了幾種常用的加密演算,通過分析其優劣,提出了端到端加密的解決方案;最後完成了基於rsa演算和idea演算的數字集群通信系統加密方案的設計,其具體過程為將經過數字信號送入加密器,和以idea加密演算為基礎設計的密碼流發生器( ksg )產生的密碼進行加解密運算,並且研究了此加密過程的密碼同步問題。
  2. In this paper, we study and analysis the base distribution in human dna sequences. on the basis of the distribution sphere whose radius equal to 1 / 4 by zhang et al. expounded, with the method of plane mapping figure studying 6000 human dna sequences, and according to the figure of sierpinski gasket ' s patch and the brillouin zones of the face - centered cube, we obtain two new distribution figures, one is the frustum - octahedron, another is the regular - octahedron

    我們在zhangetal .提出的人類dna的堿基分佈為半徑是1 / 4球分佈的基礎上,用平面投影圖的方研究和分析了6000組人類dna的數據,並且根據塞爾賓斯基鋪墊的補形和面心立方的布淵區圖形提出了兩種新的分布圖,一種是正八面體,另一種是截角八面體(十四面體) 。
  3. The serialization engine may provide heuristics here to decide which failures can be ignored and which are unrecoverable

    化引擎可以在這提供試探來確定可以忽略哪些失敗以及哪些失敗不可恢復。
  4. The sequence and activity characteristics of shuikou reservoir induced earthquake are analyzed with several methods, such as probabilistic evaluation, comprehensive effect parameter e evaluation, two - step comprehensive fuzzy evaluation, the maximum magnitude of historical earthquakes evaluation, etc. the results show that the shuikou m ( subscript l ) 4. 1 earthquake on april 21, 1996 is a main - earthquake, and from now on, the possibility occuring m ( subscript l ) > 3 induced earthquake in shuikou reservoir area is low

    摘要應用概率、綜合影響參數預測、兩級模糊評判、古登堡克特公式外推預測等對水口水庫誘發地震以及活動特徵進行了研究,認為: 1996年4月21日發生的m (下標l ) 4 . 1地震為水口水庫誘發地震主震,今後庫區發生大於3級以上誘發地震的可能性較小。
  5. The author mainly realized the method of generating the large random numbers and judging the prime number using lehmann means, then three pairs of secure key with different lengths ( 256 bits, 512 bits, 1024 bits ) was generated to meet the demand of different security grade. in encryption module, modular multiplication arithmetic of large number was realized adopting addition chaining. in decryption module, extended euclid was used to get inverse, and the chinese remainder theorem was used to realize decryption, which increased the speed of decryption greatly

    作者主要實現了大隨機數的生成、採用整除小素數和勒曼測試判定素數,可以生成三種不同長度的密鑰對( 256位、 512位、 1024位)來滿足不同的加密安全等級的需求;加密模塊中,選用了二進制的乘,實現了大數模冪乘運算;解密模塊中,引用了擴展的歐幾求逆元,並採用中國剩餘定理實現解密過程,大大提高了解密速度。
  6. The theory and performance of both batch processing and sequential filtering are detailed respectively in chapter 4

    在第四章將詳細地討論採用批處理的方濾波的方解決唯方位跟蹤問題的原理和性能。
  7. It is here at line 3 that the dispatching to the root deserializer occurs, when the

    時,就是在第3行這發生到根化器的調度。
  8. It comes up with a new notion, d - solution, which is applied to the distance estimation, by virtue of hilbert space ; furthermore, the dissertation has gained a necessary condition which is identity of minimum mean - square value in linear function classes, so that d - solution extends minimum mean - square value within the domain of nonlinear function equation or equation system ; and, the dissertation studies in detail the classical moment estimation and maximal likelihood estimation on the parameters of ar ( p ), a series of theorems in the estimation section shows the moment estimators are consistent on the ground of large samples jikewise, those distribution functions of the estimated parameters accord to maximum likelihood estimation converge gauss distribution if the white noise is gaussan

    首先,藉助hilbert空間理論,提出了距離估計的d -解,給出了d -解的必要條件,這個條件在線性函數類即是極小二乘估計, d -解的必要條件滿足的方程實質上將極小二乘估計推廣到多函數及非線性函數類。再而,詳細地研究了多元弱平穩自回歸模型ar ( p )的參數經典的矩的替代估計和極大似然估計,獲得矩的替代估計的一致性的結果。對基於gauss白噪聲假設多元弱平穩自回歸模型的均值、白噪聲的協方差陣的極大似然估計都有依分佈收斂到多元正態分佈的統計性質。
  9. A topic of my thesis is to consider the new algorithms and improvement of algorithms for general set - valued quasi - variational inequalities and quasi - complementarity problems. in addition, we prove the existence of solutions for the class of general set - valued quasi - variational inequalities and quasi - complementarity problems and discuss the convergence of iterative sequences generated by iterative algorithms

    與以往不同,這討論的是一般多值擬變分不等式及擬補問題的新演算以及改進演算的情形,並給出了此類問題的解的存在性以及由此演算生成的迭代的收斂性。
  10. 5. the 3d reconstruction algorithm with constrained triangulation has been tested on both simulate data and real images with satisfactory results. the long image sequence is taken from 360 degrees around the target

    採用帶邊緣約束的三角剖分演算,對模擬數據和存在遮擋的真實圖像進行三維重建,這的長圖像是圍繞目標物體一周拍攝得到的。
  11. In the latest installment of the series, harry potter and the goblet of fire, the young wizard faces death, jealousy, and, for the first time ever, love

    在這部片的最新一集「哈波特與火焰杯「中,這個年輕的魔師面對死亡,嫉妒,以及,有史以來第一次,愛情。
  12. Through the analysis on the process of hydrological time - series data mining, we can find that there are many similar parts in this process in spite of the complex composition of business logic application. therefore, the process of time series comparability search is composed of three continuous phases, such as data pretreatment, characteristic mode mining and comparability measurement. there are a lot of different algorithms performing same function in every data mining phase

    經過對水文時間數據挖掘過程的分析,可以得到,雖然其中的業務邏輯構成比較復雜,但其基本成份卻有許多相同或相似的部分,所以,一般可以將時間相似性搜索的過程分為數據預處理、特徵模式挖掘和相似性度量等幾個連續的階段,而每個階段都有許多完成相同功能的基本演算
分享友人