逆運算元 的英文怎麼說

中文拼音 [yùnsuànyuán]
逆運算元 英文
inverse operator
  • : Ⅰ形容詞1 (方向相反) contrary; counter 2 [數學] inverse; converse Ⅱ動詞1 (抵觸; 不順從) go aga...
  • : Ⅰ動詞1 (物體位置不斷變化) move; revolve 2 (搬運; 運輸) carry; transport 3 (運用) use; wield...
  • : Ⅰ動詞1 (計算數目) calculate; reckon; compute; figure 2 (計算進去) include; count 3 (謀劃;計...
  • 運算 : [數學] operation; arithmetic; operating
  1. When calculous was at it ' s initial stage, newton computed the integral by contradictorily operation of differential, leibniz used the " tiny elements " method

    在微積分的初創時期, newton通過微分法的,即「反流數術』來解決求積問題,而leibniz則採用「微法』 。
  2. On the invertible completions of partial operator matrices

    缺項矩陣的
  3. With relations of operators and matric, we will show that the inverse a - 1 of positive operator a is still a positive operator if and only if that a is a generalized permutation

    利用和矩陣的關系,得到正t的是正的充要條件是t是廣義置換
  4. Reflexive generalized inverse operator of hilbert space

    空間的自反廣義逆運算元
  5. Firstly, we generalize and analyze the advantages and present research of elliptic curve cryptography ; secondly, we study the basic theory of the ecc ; thirdly, we illustrate the safety of the ecc and discuss the elliptic curve key agreement scheme, elliptic curve encryption scheme and elliptic curve digital signature algorithm ; fourthly, we study fast algorithms of the multiplication and inversion multiplication of the element of in the underlying finite field f2m whose characteristic is two represented by the two basis of optimal normal basis and polynomial basis. we make improvements to the fast algorithm of the polynomial basis multiplication by hankerson and base on the experiments, we describe the properties and compare the advantages of the multiplication and inversion multiplication of the elements in f2m field under optimal normal bases and polynomial basis. results concluding from the study car be used as references in the realization of the elliptic curve cryptosystem ; fifthly, we overview the current fast algorithm of point multiplication, improve the fix base point comb algorithm, advance the speed of the whole system and remark the advantages and disadvantages of the popular algorithms based upon the experimental datas ; sixthly we realize the algorithm library of elliptic curve cryptography based on the f2m. only change slightly in our algorithm library can we realize the ecdh, eces, ecdsa based onf2m of anysize ; seventhly, we realize the ecc on two secure elliptic curves, including ecdh, eces, ecdsa

    本文首先介紹並分析了橢圓曲線密碼體制的優點及研究現狀;其次研究了橢圓曲線密碼體制的基本理論;第三,分析了橢圓曲線密碼的安全性並介紹了密鑰共享,加密,數字簽名等橢圓曲線密碼體制;第四,深入研究了特徵為2的有限域f _ 2m中的素在多項式基和最優正規基表示下的乘法和乘法的快速演法,並對hankerson等人提出的多項式基下的乘法的快速演法作了改進,而且在實驗的基礎上不僅分析研究了f _ 2m域中素在多項式基和最優正規基表示下的乘法和乘法的性能,還對這兩種基表示下的f _ 2m域中效率的優劣作了比較和研究,所得的結論可供在實現橢圓曲線密碼體制時參考;第五,研究了目前流行的計橢圓曲線標量乘法的快速演法,同時改進了固定基點梳形法,提高了整個系統的速度,並在實驗的基礎上分析研究了流行演法的優劣;第六,實現了基於f _ 2m的橢圓曲線密碼體制的演法庫,在我們的演法庫中只需稍微改變便能實現基於任意尺寸的f _ 2m上的ecdh , eces , ecdsa等橢圓曲線密碼體制;第七,實現了兩條安全橢圓曲線上的橢圓曲線密碼體制,包括ecdh , eces , ecdsa 。
  6. In order to characterize the linear operators that strongly preserve nilpotence and that strongly preserve invertibility, we first study the case of the binary boolean algebra

    為了刻畫強保持冪零的線性和強保持可的線性,我們首先研究二布爾代數上的情況
  7. By the means of the extension of linear operator, we characterize the linear operators that strongly preserve nilpotence and that strongly preserve invertibility over any boolean algebra

    再利用線性擴張這一工具,我們刻畫了在一般布爾代數上強保持冪零的線性和強保持可的線性
  8. Also, by the means of the pattern of matrix and the pattern of linear operator, we characterize the linear operators that strongly preserve nilpotence and that strongly preserve invertibility over antinegative commutative semirings without zero divisors

    另外,利用矩陣模式和模式等工具,我們在非負無零因子半環上刻畫了強保持冪零的線性和強保持可的線性
  9. The results that are quoted in this paper are classical conclusions. on the basis of the results. this paper discusses the invertibility of operators. ci operators and generalizes. some results about spectral theory of bounded operators and properties of mbekhta subspaces in terms of mbekhta subspaces

    本文中引用的結論大都是此方面的經典結論。在此基礎上,本文作者用mbekhta子空間討論了有界線性予的可性, ci的判定。
  10. The study of direct and inverse theorems on the approximation of linear operators to functions in normed linear spaces is an important subject in the approximation theory. it is significant in theory and application

    線性對賦范線性空間中函數逼近正定理的研究是逼近論中重要的研究課題之一,在理論和實際應用上都具有重要的意義。
  11. The direct and inverse theorem of weighted approximation by generalized baskakov operator

    加權逼近的正定理
  12. In the first part, the simultaneous approximation of this kind of operators is studied ; in the second part the approximation in c [ 0, ) of their linear combination is discussed. absorbing the method of paper [ 20 ], the inverse theorem of a new kind of linear combination operators is obtained in the third part

    第一節研究這類的同時逼近;第二節討論該線性組合在c _ [ 0 , )上的逼近;第三節吸收[ 20 ]的思想,得到了該線性組合逼近的定理;第四節討論該線性組合在c _ [ 0 , )逼近的飽和定理。
  13. An optimization combination genetic algorithm based on reverse by threshold operator

    基於閥值的優化組合遺傳演
  14. In the last part we discuss the relationship between the generalized inverse of an operator and mbekhta ' s subspaces and thet between ci operators and the generalized inverse of an operator. the main results are expressed bellow

    第四節主要討論了廣義逆運算元與ci和m6ekhta子空間的關系。主要內容是: 1已知aen 。 b當下列條件之一成立時, ab是ci
  15. We study the spectral theory of bounded linear operators and the characterization of ci operators by way of mbekhta ' s subspaces. we find a series of operators which are ci operators by the defination and the characterization of ci operators given by weibang gong in [ 3 ]

    利用mbekhta子空間研究一般有界線性的譜理論以及描述ci的特徵;用ci的定義和判定方法尋找更廣泛的ci;同時還討論了廣義逆運算元和ci及mbekhta子空間的關系。
  16. It has been deduced that the search direction remains the same but that the step length decreases in optimizing the improved cost function with the conjugate gradient algorithm from the gradient of the cost function that the fir filter apporaches the contrary point spread function ( psf ) more, and that the estimated image is closer to the original one

    從代價函數的梯度入手推導出共軛梯度演法,其搜索方向保持不變而搜索步長變小,使濾波系數更加退近於點擴展函數逆運算元,從而使估計圖像與原始圖像更加接近。
  17. ( 3 ) for the first hierarchy mentioned above, the multiplication and inversion in gf ( pm ) are two key operations

    ( 3 )對于第一層次的,關鍵是域素的乘法和乘
  18. In this paper, we discusse the stability of perturtation of m - p inverses of closed operator function and then the stability of least square solution of elliptic partial differential equations of second order with unbounded coefficients

    本文討論了閉的m - p廣義的擾動,並由此討論首項系數本質無界的二階散度型橢圓型微分方程的最小范數極小二乘解的穩定性
  19. After studied for several decades, there have appeared several classical edge operators, such as roberts, sobel, laplacian, canny and log. meanwhile, there also have presented several classical algorithms of image restoration, such as inverse filter, wiener filter and constrained least squares filter

    經過多年的研究,已經形成了roberts、 sobel、 laplacian、 canny、 log等經典的邊緣檢測以及濾波、維納濾波、約束最小二值濾波等經典的圖像恢復方法。
  20. The second section discusses properties of left - invertible and right - invertible operator in use of mbekhta ' s subspaces and gives the necessary and sufficent condition. i get results as follows : theorem 2. 6 suppose a b ( x ) is the left - invertible

    第二節主要用mbekhta子空間討論左可和右可逆運算元的性質,並給出的充要條件,得到下面的定理:定理26設aeb ( x )為左可逆運算元
分享友人