base point 中文意思是什麼

base point 解釋
基本標定點
  • base : n 1 基底,基,根基,底座;底層,底子;(紀念碑等的)基址;(山)麓。2 【軍事】基地,根據地。3 根...
  • point : n 1 尖頭,尖端;尖頭器具;〈美國〉筆尖;接種針,雕刻針,編織針;小岬,小地角;【拳擊】下巴。2 【...
  1. It expounds the origin of bankruptcy administrator system, gives a general introduction to specific bankruptcy administrator system of such countries like germany, japan, us and uk, etc, and makes summaries and comments on the history and status quo of our bankruptcy administrator system, thus it provides a solid theoretical foundation for the following discussion. in the second section, the author discusses the nature and status of bankruptcy administrator. on the basis of introduction, comparison and evaluation of various theories of legal systems of civil law and common law, this paper comes up with the view point that it is appropriate for china to establish the bankruptcy administrator system with the trustee system as its core, it redefines the bankruptcy administrator and provides theoretical base point for the perfection of the bankruptcy administrator system in china

    本文的第一部分從考察破產管理人制度的歷史沿革入手,在闡釋了破產管理人制度的起源之後對德、日、美、英等國各具特色的破產管理人制度進行了總體的介紹,並對我國破產管理人制度的歷史和現狀進行了綜述和評介,為展開後文的論述提供了深厚的理論背景;文章的第二部分就破產管理人的性質和地位問題展開討論,在介紹、比較和評價大陸法系與英美法系關于該問題的各種學說基礎上,提出了我國宜以信託制度為核心,確立破產管理人制度的觀點,對破產管理人進行了定位,從而為後文完善我國破產管理人制度的構想提供了理論基點;最後,文章就如何完善我國破產管理人制度提出了一些構想,主要對破產管理人的選任和撤換、破產管理人的權利和義務、對破產管理人的監督機制等方面的制度建構和完善提出了一些具有現實意義的設想和建議。
  2. On correcting errors in base map by gathering and adding mapgis - vision control point

    圖像控制點糾正底圖的誤差
  3. Furthermore, the criterion of psychological well - being is a hotspot, base point, and nodus in the researching field of psychological well - being

    心理健康標準更是心理健康研究領域中的「熱點」 、 「基點」和「難點」 。
  4. In the draft of property law and civil law, there are many different opinions on how to form the system and structure of usufructuary right. starting from this base point, the author analyses the basic requirement of the system of usufructuary right, points out the status quo and the limitation of it, sums up the basic systematic values of the usufructuary right

    筆者正是以此為基點,以實現物盡其用的價值目標為核心,分析了體系化理論對我國用益物權體系的基本要求,從宏觀上透視了我國現行用益物權體系的現狀及癥結,歸納了用益物權體系化的基本價值及研究用益物權體系的必要性。
  5. Firstly, we generalize and analyze the advantages and present research of elliptic curve cryptography ; secondly, we study the basic theory of the ecc ; thirdly, we illustrate the safety of the ecc and discuss the elliptic curve key agreement scheme, elliptic curve encryption scheme and elliptic curve digital signature algorithm ; fourthly, we study fast algorithms of the multiplication and inversion multiplication of the element of in the underlying finite field f2m whose characteristic is two represented by the two basis of optimal normal basis and polynomial basis. we make improvements to the fast algorithm of the polynomial basis multiplication by hankerson and base on the experiments, we describe the properties and compare the advantages of the multiplication and inversion multiplication of the elements in f2m field under optimal normal bases and polynomial basis. results concluding from the study car be used as references in the realization of the elliptic curve cryptosystem ; fifthly, we overview the current fast algorithm of point multiplication, improve the fix base point comb algorithm, advance the speed of the whole system and remark the advantages and disadvantages of the popular algorithms based upon the experimental datas ; sixthly we realize the algorithm library of elliptic curve cryptography based on the f2m. only change slightly in our algorithm library can we realize the ecdh, eces, ecdsa based onf2m of anysize ; seventhly, we realize the ecc on two secure elliptic curves, including ecdh, eces, ecdsa

    本文首先介紹並分析了橢圓曲線密碼體制的優點及研究現狀;其次研究了橢圓曲線密碼體制的基本理論;第三,分析了橢圓曲線密碼的安全性並介紹了密鑰共享,加密,數字簽名等橢圓曲線密碼體制;第四,深入研究了特徵為2的有限域f _ 2m中的元素在多項式基和最優正規基表示下的乘法運算和乘法逆運算的快速演算法,並對hankerson等人提出的多項式基下的乘法運算的快速演算法作了改進,而且在實驗的基礎上不僅分析研究了f _ 2m域中元素在多項式基和最優正規基表示下的乘法和乘法逆運算的性能,還對這兩種基表示下的f _ 2m域中元素運算效率的優劣作了比較和研究,所得的結論可供在實現橢圓曲線密碼體制時參考;第五,研究了目前流行的計算橢圓曲線標量乘法的快速演算法,同時改進了固定基點梳形法,提高了整個系統的速度,並在實驗的基礎上分析研究了流行演算法的優劣;第六,實現了基於f _ 2m的橢圓曲線密碼體制的演算法庫,在我們的演算法庫中只需稍微改變便能實現基於任意尺寸的f _ 2m上的ecdh , eces , ecdsa等橢圓曲線密碼體制;第七,實現了兩條安全橢圓曲線上的橢圓曲線密碼體制,包括ecdh , eces , ecdsa 。
  6. Infinity is used as a base point in homemorphic transformation to study infinity for a class of fifth system and isochronous center problems

    摘要通過同胚變換把系統無窮遠點化為原點,研究了一類五次系統無窮遠點中心與擬等時中心問題。
  7. The regulations construction is the foundation of the regular operation of the securities transaction system. it is the indication of the negative entropy flow for maintaining the opening of securities system. furthermore, it is the base point of the article researching the legal misrepresentation - balancing regulations system

    這些相關制度的建設作為證券市場交易系統正常運作的基礎,是維持證券系統開放性的負熵流表現,也是本文研究虛假陳述法律制衡體系的基點。
  8. With the successfully biding of core inserting pulling mechanisms and threading rotation ejection mechanisms supported by nation innovation financial and the approval of establishing large injection forming molds project technology r d center, jinsu company is gradually switch the center of industry structure to produce high precision and automatism high - end molds, and the base point that supports the new development is gradually emerged. i believe in 2007 jinsu will make great progress

    隨著公司「模具開合模抽插芯與螺紋轉動脫模同步機構」的通過論證與國家創新基金項目的獲得與支持,金塑公司在2006年正在逐步地把產業結構重心轉移到生產高精度全自動的新型模具方向上來,支撐新一輪快速發展的基點正在逐步形成,我相信在2007年金塑公司必定會乘風破浪更上一層樓。
  9. Graphic method of determinning base point coordinate based on caxa in part nc programming

    確定零件數控編程基點坐標的圖解法
  10. Its security is ensured by the difficulty of elliptic curve ' s discrete logarithm problem by means of the exclusion of supersingle and anomalous elliptic curves and the adoption of a big prime ( more than 160 bits ) for the order of base - point in elliptic curve in this scheme of data encryption

    加密方案中沒有使用超奇異橢圓曲線及異常橢圓曲線,橢圓曲線上基點的階為大素數(長度160比特) ,保證了橢圓曲線離散對數問題的難解性,從而最終保證了整個方案的安全性。
  11. In the dissertation, a " fast shamir algorithm represented by five - element joint sparse form " is presented. and it is demonstrated that comparing with other similar algorithms, the total numbers of the computation of our algorithm can be saved about 10 %, in the case of 192bit key. ( 5 ) in the implementation of elliptic curve cryptosystem, one of the key steps is to design and implement the base - point choice algorithm of elliptic curve finite group

    已經證明,用本文提出的「五元聯合稀疏形式表示的shamir演算法」計算標量乘法對,在192bit的密碼體制中,其計算量比同類演算法平均減少了10兒( 5 )實現橢圓曲線密碼體制還有一個關鍵的步驟,就是橢圓曲線有限群基點選取演算法的設計與實現。
  12. Radio navigation makes use of wireless wave, which can be divided into land - based and space - based system according to the position of base point

    無線電導航是利用無線電電波的波速進行導航的方法,根據導航基點可分為陸基導航和空基導航。
  13. To use as a base point for calculating performance data

    用作計算性能數據基點的
  14. Taiwan : the base point of america geopolitics strategy in asian - pacific area

    美國亞太地緣戰略的基點
  15. Our improved methods make use of random point to blind the base point, they can resistant against simple power analysis attacks, differential power analysis attacks, refined power analysis attacks and zero - value point attack

    改進后的signedodd - onlycomb演算法和width - wnaf演算法可以抵抗簡單能量分析攻擊、差分能量分析攻擊、改進的差分能量分析攻擊和零值點能量分析攻擊。
  16. With the case study of hangzhou tourism image ads produced by cctv, entropy double - base - point approach is used to assess the social effects of tourism ad

    考慮到實際需要,結合央視杭州旅遊形象廣告案例,採用熵權雙基點法評價了旅遊廣告社會效果。
  17. After the existing algorithms for knapsack problem and selecting the base point of ecc over gf ( p ) are deeply analyzed, a parallel algorithm for knapsack problem and that of selecting the base point of ecc are respectively proposed

    在深入分析背包問題的現有并行演算法和gf ( p )上ecc的基點選取演算法性能的基礎上,分別提出一種基於采樣和mimd結構的背包問題并行演算法和gf ( p )上ecc的并行基點選取演算法。
  18. Third, two methods to generate the safe elliptic curve are introduced. the cm algorithm being ameliorated and algorithm to generate base point are presented by c + +. thus, elliptic curve generated by this algorithm can be safer

    第三,介紹了生成安全橢圓曲線的兩種方法,並用c + +實現了cm演算法和基點的生成演算法,其中對經典的cm演算法進行了改進,使生成的橢圓曲線安全性更高,能夠抵禦mov演算法的攻擊。
  19. This paper fist assumes that the landslide object is a rigid, sets up a dynamic model of landslide, forms double difference observation data by using the gps carrier phase observation data on monitoring point after deformation and base point, proposes a kalman filter model of landslide monitoring

    摘要首先假設邊坡滑坡體為剛體,建立了邊坡滑坡的動態模型,用變形后的監測點和基準點上的gps載波相位觀測值組成雙差觀測值,提出一種滑坡監測的卡爾曼濾波模塑。
  20. The improved parallel algorithm for selecting the base point of ecc over gf ( p ) is implemented by 2m ( m n, m 1 ) processors, m circular buffers and one shared table, which comprises two sub - algorithms : parallel finding the random points of ecc and parallel judging whether or not the random point is the base point

    採用2m ( m n , m 1 )個處理器、 m個循環緩存和一個公共表改進的gf ( p )上ecc的并行基點選取演算法分兩步實現:并行隨機點產生演算法和并行基點判斷演算法。
分享友人