查询词典 firstly
- 与 firstly 相关的网络例句 [注:此内容来源于网络,仅供参考]
-
Firstly, the working principle and the structure of the fully automatic aluminum wire bonder is introduced.
论文首先介绍了全自动超声波铝丝压焊机的工作原理及基本组成,阐述了机器视觉系统在整机中的重要作用。
-
The specific contents are as follows: Firstly, the process of LED die bonder was presented; LED die bonder is made up three modules.
其中的一些设计思想和方案具有一定的理论意义和实际应用价值。
-
Firstly, The paper introduce two filtering model --Boolean model and Vector Space model.
本文在略述了信息过滤技术的产生背景后,介绍了两种比较常用的信息过滤模型--布尔逻辑模型和向量空间模型。
-
In the fourth chapter, firstly it introduces the Boolean functions algebraic expressions of the 2-value clock-controlled stop-and-go generator and Gunther generator. It reveals the balanced property of the two kinds of Boolean functions, and studies the Walsh cycle spectrum and the autocorrelation function. It also obtains the coincidence rate of their output sequences with affine sum of some bits of input sequences, and analyzes their ability of resisting the best affine approximation cryptanalysis and differential cryptanalysis. Secondly, we properly present a new definition of the Best Affine Approximation, namely BAA on the Boolean vector functions, followed by the spectral characteristic of such defined BAA attacks through using the decomposition formula of the union distribution for random variables. A lower bound of such BAA attacks is proposed. Finally, we also study the spectral characteristic of the second kind of nonlinearity of Boolean vector functions, followed by a higher bound of such nonlinearity. Furthermore, the limited relationship between the second kind of nonlinearity of Boolean vector functions and the linear structure of the linear combination of every component is analyzed.
在第四章中,首先给出了2值密钥流"停走生成器"和"衮特生成器"中实际存在的布尔函数的代数表示,揭示了这两类布尔函数的平衡性,随后研究了它们的Walsh循环谱和自相关函数等,得到了它们的输出序列与输入序列中的某些bit的仿射项的符合率,分析了它们抵抗最佳仿射逼近攻击和差分攻击的能力;其次,我们合理地给出了布尔向量函数最佳仿射逼近的新定义,利用布尔随机变量联合分布的分解式考察了相应的谱特征,并给出了布尔向量函数与其最佳仿射逼近的符合率的一个下界;最后,我们还考察了布尔向量函数第二类非线性度的谱特征,给出了布尔向量函数第二类非线性度的一个上界,并揭示了布尔向量函数第二类非线性度与其各个分量的线性和的线性结构之间存在的制约关系。
-
Using the theories of probability, algebra and spectral theory comprehensively, we investigate some related characteristics of logic functions in cryptography: Firstly, we introduce m order generalized s - correlation immunity of Boolean vector functions and prove that the higher order generalized ε- correlation immunity can guarantee the lower order generalized ε- correlation immunity. Then by applying decomposition formula of joint distribution of Boolean random vectors, we give a spectrum criterion of m order generalized e - correlation immunity of Boolean vector functions. Furthermore, we show that the algebraic degree of m order generalized e - correlation immune Boolean vector functions is not restricted by the correlation immune orders.
本文主要运用概率论的思想和方法,并结合代数学和频谱理论的相关知识,对密码学中逻辑函数的有关性质进行了研究,主要包括以下三个方面的内容:首先,对布尔向量函数的相关免疫性进行了拓展,给出了k维布尔向量函数m阶广义ε-相关免疫的概念,证明了布尔向量函数的高阶广义ε-相关免疫性蕴含低阶广义ε-相关免疫性,并根据布尔随机向量联合分布分解式得到了布尔向量函数m阶广义ε-相关免疫的一个谱判别条件,还说明了m阶广义ε-相关免疫布尔向量函数的代数次数不受相关免疫阶数的制约。
-
Firstly,the definition of validity is given.Then,an idea of comparing validity of three combinations evaluation methods,which are Average,Borda and Copeland method,is proposed and realiz...
在参评方案为5个或6个,单一评价方法为3个或4个的情况下进行了统计实验,分析归纳出了3种组合评价方法的有效性排序,从而解决由于不同组合评价方法而引起的评价结论不一致性问题。
-
Firstly, some fundamental knowledge, such as the describing of laser field, the Kind of electron-atom scattering in a laser field, and so on, are introduced. Then a compution method which is called the Second-order Born approximation and is used to calculate the cross section of electron-atom scattering in a laser field, is provided.
本文首先介绍了激光场的描述、激光场中电子—原子散射的分类等相关理论,接着详细描述了一种计算激光场中电子—原子散射截面的方法——二阶玻恩近似理论。
-
Firstly, the decision matrix is transformed into an objective matrix, and then the weight of every objective is determined by means of entropy coefficient method. By Integration of experts' knowledge, the acceptable lower bound of degree of satisfaction and acceptable upper one of degree of dissatisfaction of every objective are decided. At last, by using the weight vector and the acceptable lower boun...
首先将决策矩阵转化为目标矩阵,然后利用熵权系数法计算各个目标的权重,综合专家的意见得到对于每个目标可以接受的满意度的下界和不满意度的上界,最后利用得到的权重向量以及得到的满意度的下界和不满意度的上界计算各方案的vague估计值,将得到的vague估计值按照评分函数进行排序,得到方案的排序结果。
-
It was firstly demonstrated that the frog mast cells contain tryptase in their cytoplasm and an excellent cross-reaction of the antibody AA1 with frog mast cell tryptase was obtained from the Boun's fluid fixed frog tissues.
首次在Bouin氏液固定的牛蛙组织中证实了牛蛙肥大细胞胞浆中类胰蛋白酶的存在,且单克隆抗体AA1与牛蛙肥大细胞中的类胰蛋白酶可获得良好的交叉反应。
-
It was firstly to apply the three-dimensional Boundary Element Method in the simulation of DS process.
本文首次在定向凝固过程的数值模拟中采用了三维边界元方法。
- 推荐网络例句
-
This one mode pays close attention to network credence foundation of the businessman very much.
这一模式非常关注商人的网络信用基础。
-
Cell morphology of bacterial ghost of Pasteurella multocida was observed by scanning electron microscopy and inactivation ratio was estimated by CFU analysi.
扫描电镜观察多杀性巴氏杆菌细菌幽灵和菌落形成单位评价遗传灭活率。
-
There is no differences of cell proliferation vitality between labeled and unlabeled NSCs.
双标记神经干细胞的增殖、分化活力与未标记神经干细胞相比无改变。