非對稱點 的英文怎麼說

中文拼音 [fēiduìchèndiǎn]
非對稱點 英文
asymmetric point
  • : Ⅰ名詞1 (錯誤) mistake; wrong; errors 2 (指非洲) short for africa 3 (姓氏) a surname Ⅱ動詞1 ...
  • : Ⅰ動詞1 (回答) answer; reply 2 (對待; 對付) treat; cope with; counter 3 (朝; 向; 面對) be tr...
  • : 稱動詞(適合; 相當) fit; match; suit
  • : Ⅰ名詞1 (液體的小滴) drop (of liquid) 2 (細小的痕跡) spot; dot; speck 3 (漢字的筆畫「、」)...
  1. The occurrence of odd-parity shape oscillations in the saddle-point spectrum plays an important role in the interpretation of asymmetry and anisotropy in the fission process.

    在裂變過程中,解釋性和各向同性時,奇宇形狀振蕩在鞍譜中起主要作用。
  2. According to the research, the major work done is as following : < 1 > analyzes the symmetric - key encryption algorithm des and dissymmetric - key encryption algorithm rsa, and makes them easy to realize in hardware. < 2 > according to the algorithms and the thought of reconfigurable computing, the dissertation accomplishes the design of 64 - bit des system architecture and the design of 256 - bit ~ 1024 - bit rsa system architecture. < 3 > using the top - down high level design methodology and the hdl language, accomplishes the description of the des / rsa designs, the simulation and the synthesis

    本論文主要的研究工作: < 1 >現有的加密演算法des演算法和加密演算法rsa演算法進行分析,使其易用硬體實現; < 2 >基於可重構思想和特,完成64位des演算法和256位1024位模長rsa演算法的可重構硬體的設計; < 3 >採用自頂向下的設計方法,利用hdl語言des / rsa設計進行功能描述,並完成軟體模擬,綜合和布線; < 4 >在可重構計算驗證平臺上進行演算法驗證,並設計的可重構和設計的進一步優化進行討論。
  3. The main contributions of this dissertation include : firstly, deeply research on underlying techniques of pki system, emphatically analyze dissymmetrical public - key cryptography ecc and compare it with other cryptography techniques

    本文首先pki體系的底層技術進行深入研究,重分析了密碼橢圓曲線密碼體制,並將它與其他密碼技術進行了比較。
  4. The paper discussed the following four points : the security of java, the implemention of mvc pattern and the principle and implemention of the send and incept of e - mail based on java ; the principles and implemention of smtp, pop3 and imap, and the characteristic of the e - mail server sendmail, qmail and postfix ; the principles and implemention of symmetrical encryption and unsymmetrical encryption technology, and the advantages and disadvantages of them ; the characteristic of rubbish e - mail, and the principles and implemention of anti - rubbish e - mail technology

    本文研究的主要內容包括: java技術安全性, javamvc模式的實現,以及java技術解決電子郵件發送和接收問題的原理和實現方法;電子郵件相關協議smtp , pop3和imap的原理和實現方法,以及電子郵件服務器sendmail 、 qmail和postfix的特;加密與加密技術的原理和實現方法,以及兩者的優和缺;典型垃圾郵件的特徵,以及反垃圾郵件技術的原理和實現方法。
  5. Abstract : in this paper , a ray - optics analysis is performed to investigate the asymmetry of dual beam scanning field produced by a rotating polygon. some basic equations of dual beam scan are derived , such as , the position vector for the incident point , the scalar expression for reflected ray , scan pattern on observation plane ect. the far - field asymmetry of the scanning field has been discussed

    文摘:應用幾何光學理論研究了多光束轉鏡掃描場的性,導出多光束掃描入射位置矢量、反射線標量表達式、觀察面上的掃描軌跡方程,並研究了掃描遠場的性。
  6. To improve the accuracy of node trust evaluation in a distributed network, a trust model based on the experience of individuals is proposed, which establishes a new trust assessment system by introducing the experience factor and the comparative experience factor. the new evaluation system considers the differences between individuals and interactive histories between nodes, which solves the problem that nodes have inaccurate assessments due to the asymmetry of nodes to a certain extent. the algorithm analysis indicates that the new model uses different deviating values of tolerance evaluation for different individuals and uses different updating values embodying node individuation when updating feedback credibility of individuals, which evaluates the trust value more reasonably and more accurately. in addition, the proposed algorithm can be used in various trust models and has a good scalability

    為了提高分散式網路中各節信任評價的準確度,提出了一種基於個體經驗的信任模型.該模型通過引入經驗因子和相經驗因子的方法,建立了新的信任評價體系.這種新的信任評價體系考慮了個體節的差異問題,在計算節的信任值時考慮了節間的交互歷史,這在一定程度上解決了由於節性而導致的信任評價不準確的問題.演算法分析表明:新模型能夠針不同的個體節,採用不同的最大容忍評價偏差,並且個體節的反饋可信度進行更新時,採用不同的更新值,體現了節的個性化特徵,使信任評價更加準確合理.此外,所提出的新演算法能夠運用到多種信任模型中,具有很好的可擴展性
  7. For processing of 3d and 3c seismic data, the reflected p - waves can be processed with the conventional methods, while the reflected converted waves can not be processed with the conventional p - wave processing methods, because their travel paths are asymmetrical, their common midpoint gathers are no longer common reflection point gathers, and their time - distance equation is non hyperbolic

    在三維三分量地震勘探資料處理中,于反射縱波資料可以採用常規方法進行處理;而于反射轉換波資料,由於其傳播路徑的性,轉換波共中心道集不再是共反射道集,轉換波時距方程也不是雙曲方程,因此不能採用常規縱波處理方法來處理轉換波資料。
  8. On the basis of classifmg deflation into moderate deflation and harmful deflation, this paper summarized the achievements of the deflationary research, and made a thorough inquiry into the harm, cause and treatment of deflation. the paper analyzed the fallacy of composition, and pointed out that the fallacy of composition owns two characteristics of self - intensifing and mutual - promoting, which make deflation continue and aggravate. the asymmetry between individual and total is another basic characteristic owned by the fallacy of composition, which changes the economic fluctuation if the fallacy of composition develops continually

    本文「合成謬誤」這一經濟現象進行了初步分析,指出合成謬誤具有自我強化和相互促進的特,在經濟遭受負向外部沖擊的情況下,這使總有效需求累積性收縮,通貨緊縮因此得以自我維持,並被不斷加深;合成謬誤發展的結果是引起短期內經濟波動發生轉換,而這正是由於合成謬誤所具有的個量與總量之間存在著性這一根本特徵所決定的。
  9. According to these accomplishments, several techniques are expounded emphatically in this paper, including 3d refraction statics, coherent noise suppression by prestack wave field separating ( prestack fx noise attenuation ), 3d prestack multiple domain random noise attenuation, multiples attenuation, nmo of unsymmetrical hyperbola, dynamic replacement of wave equation, surface - inconsistent residual static, super bin stacking, poststack depth migration and prestack depth migration. all the techniques have been applied in seismic processing of 2d, 3d and wide - line profiling and obtained good results

    本文根據項目組研究成果,重閘述了三維折射波靜校正技術,疊前波場分離相干噪音壓制方法(疊前fx去噪) ,疊前三維多域隨機噪音衰減技術,多次波衰減技術,雙曲線動校正技術,波動方程動態替換技術,地表一致性的剩餘時差靜校正技術,超面元迭加處理技術,疊后深度偏移處理,疊前深度偏移處理等。
  10. For these reasons, we can apply the theory of the model reference self - adaptive control syetem design based on the theorem of balance point stabilization in the force system of asymmetric cylinder controlled by symmetric valve. the main idea of model reference self - adaptive controller is to make the self - adaptive control error incline to zero as time passed. the task to design adaptive controller is to find the control input that can make the output of the controlled system to follow that of the reference model

    因此將基於平衡穩定定理的模型參考自適應控制系統設計理論應用於閥控缸力系統中,其基本原理是使自適應控制誤差隨時間的推移而趨向于零,自適應控制器設計的目的是尋找使被控系統的輸出漸近一致的跟隨參考模型的輸出的控制輸入,以此來改善被控系統的性能。
  11. Since 90 ' s, with the rapid development in mobile communication technology and internet technology, and extensive application in mobile computer, make many mobile nodes be able to build up connections with network in the mobile process freely

    在移動計算環境中,網路具有性和頻繁斷接性,根據網路的這種特性可以由服務器把大量熱數據組織起來,以周期性的廣播提供給移動客戶。
  12. The synchronization and replication is also an essential technology of mobile database. comparing trade distributed database environment, mobile computing environment has characteristics of high frequency disconnection, network condition diversity, network communications dissymmetry and so on

    移動計算環境與傳統的分散式計算環境相比有頻繁的斷接性、網路條件的多樣性以及網路通信的性等特,這些特使得傳統的分散式數據庫技術不能有效支持移動計算環境。
  13. For some non - symmetric homogeneous domains, we can also get the explicit formulas of their bergman kernel functions by hua method [ xu4 ] [ gi ]. we know the complete orthonormal system of the bounded reinhardt domain made up of monomials, and complex ellipsoid domain is the bounded reinhardt domain, so the explicit formulas of the bergman kernel functions are obtained by summing an infinite series in some cases ( called method of summing series )

    於一些的齊性域,也可以用華羅庚方法得到它們的bergman核函數的顯表達式我們知道,有界reinhardt域的完備標準正交系由單項式組成,而復橢球域是包含原且以原為中心的有界reinhardt域,於是可以通過無窮級數求和函數的方法,計算其bergman核函數的顯表達式,這種求bergman核函數的顯表達式的方法為級數法。
  14. This part analyses pairs of bio - lateral relations and multilateral relations on the current situation and its tendency. section 4 : the influence on the security pattern of asia - pacific resulted by the asia - pacific strategy of bush government

    本部分從利益和需求角度人手,分析了亞太地區幾組雙邊關系和多邊關系的現狀和發展趨勢,包括中俄美三角關系及其抗性、零和性、性特
  15. In the application of pmos - 2000 system, the author carried out a hybrid encryption protocol with is suitable for information security transmission in electricity market with des, rsa and md5. with the pattern characteristics of pmos - 2000 power market operator system, and analyzed and compared with other encryption system, the author puts forward an implementing method, operational process and system structure of information encryption technology used in pmos - 2000, and the operating effects and projects which need further research and discussion were finally given. the research of this dissertation applied information security technology in power system project, which made it possible for information security transmission

    在pmos ? 2000系統的應用中,作者利用des加密演算法、 rsa加密演算法、 md5數字簽名演算法實現了一套適合電力市場信息安全傳輸的混合加密體制,結合了pmos ? 2000發電市場技術支持系統的模式特,通過與別的加密體制的分析比較,把混合加密體制應用於pmos ? 2000系統之上,並提出了這套加密系統在pmos ? 2000電力市場技術支持系統中的實現方法、運作過程和系統體系結構,最後給出了它的運行效果以及進一步可研究和探討的方案。
  16. The thesis has four chapters as follows : the summary and reviews of theories and empirical literature on the asymmetric effect of interest rate policy, the empirical analysis on the asymmetric effect of interest rate changes, the deeper analysis for the effect of interest policy during inflation period and recession period, conclusions and suggestions. the first chapter mainly reviews the theories and empirical literature on the asymmetric effect of interest rate policy. in the first part of this chapter, i summarize the overseas research and find that the research on this topic can be traced back to 1993, and most of empirical researches support the viewpoint that the increase in interest rate will impose more impact on economy than decrease in interest rate

    在具體的結構安排上,全文共分為四章,現將各章節的主要內容和觀分述如下:論文第一章:本章第一節首先綜合歸納了國外關于利率作用於產出和物價的主要傳導渠道;接著就國外「利率沖擊」效應的現有研究成果進行了一個簡要回顧: 1993年d . p . morgan率先將利率變量引入貨幣政策效應的性研究中,隨后一些學者就利率變量產出、就業、物價的沖擊效應分別予以了實證研究,研究結果表明:正、負利率沖擊效果具有性? ?利率正向沖擊因變量的作用強于利率負向沖擊因變量的作用。
  17. We study the theory of asymmetric digital subscriber loop ( adsl ), important in discrete multi - tone ( dmt ) modulation that is the usual international encoder in adsl

    本文系統研究了數字用戶線的理論,重研究了國際上其通用的編碼方式?離散多音調制( dmt )技術。
  18. Similar to hot carrier degradation, asymmetric on - current recovery was also observed and discussed. device degradation behaviors are compared in low vd - stress and in high vd - stress condition

    在自加熱退化中我們也發現了類似熱載流子退化中的性恢復現象,並其退化特和模型進行了討論。
  19. The length or the capacities of the tactical data are always different, and so the conventional data scheduling algorithm which consisted " first in first service " and " shore message first service " are not appropriate in the tactical communication applications. to meet the requirement of the information service priority, we presented a dynamic priority scheduling algorithms, which working on the order programming mode, can improve the efficiency of the asymmetric broadcast channel

    戰場數據分發的長短消息數據容量相差懸殊,分析了常規「先入先服務」及「短消息優先」等調度演算法存在的不公平特性,根據戰術通信信息服務優先權的特殊要求,提出了一種「動態優先權」調度演算法,在播模式下,可提高廣播通道數據的傳輸效率。
  20. In this respect they are no different to the asymmetrical tactics i challenged before, with the exception that they were built on logical frames that the game designers hadn ' t foreseen, rather than exploiting holes and gaps with weird arrows and positions

    出於以上幾些,除卻它們是構建於游戲設計者沒有預見到的邏輯框架之上的這要強過憑借怪異的箭頭和位置去利用漏洞的做法之外,這類戰術和我之前所鄙視的流戰術沒有區別。
分享友人