英语人>网络例句>functions 相关的网络例句
functions相关的网络例句

查询词典 functions

与 functions 相关的网络例句 [注:此内容来源于网络,仅供参考]

All functions and methods defined in this module are equivalent to the C functions with ALprefixed to their name.

本模组所定义的所有函数及方法和C中以AL前缀的同名函数是等价的。

However, the semantics of modify functions are not entirely equivalent to replace functions.

但是,修改函数的语义并不完全等同于替换函数。

All functions and methods defined in this module are equivalent to the C functions with "AL" prefixed to their name.

本模组所定义的所有函数及方法和 C 中以"AL"前缀的同名函数是等价的。

And proved equivalent relation of characteristic functions with asymptotically of two composite entire functions under given conditions.

证明了在一定条件下两个复合整函数的特征函数具有渐近等价的关系;并给出了复合亚纯函数的特征函数的一个上界。

In Chapter 4, using Newton series, we obtain a divided differences formula of composite functions, and give a matrix equivalent form of these composite functions. Moreover, we derive a divided differences for the reciprocal series.

第四章利用形式Newton级数得到了复合函数的差商公式,并给出复合函数的一个矩阵等价形式,从而得到一个反级数的差商公式。

These new APN polynomial functionsare not Carlet-Charpin-Zinoviev equivalent to Dobbertin functions, and arenot equivalent to the known functions under certain conditions.

该APN函数不Carlet-Charpin-Zinoviev等价于Dobbertin函数,且在特定条件下不等价于已知的函数。

It is wellknown, composition of functions is a fundamental operation in all mathematics and has been studied for a long time, for example, in the iteration of rational functions and in the ergodic theory.

事实上函数的复合是数学各个分支上的一种基本运算,且有悠久的历史,例如有理函数的迭代或可测函数空间上的遍历理论问题。

In Erlang, two functions with the same name and different arity in the same module represent entirely different functions.

在Erlang中,同一个模块中名字相同但arity不同的两个函数是完全不同的两个函数。

We provide a substitution box, exponential permutation which has much measurable security, and give a enumerating result and a fast algorithm of calculating such permutation. An almost perfect nonlinear exponential permutation with high algebric degree is proposed. with some discussion on how to select the parameters of such permutation. The experimental result shows us a conjecture that there exists no such permutation over even dimensional space. As a way of generating substitution boxes, we briefly point out the cryptographic weakness of the exponential functions derived from such permutation. We also present two new cryptographic indexes, fixed point and cyclic structure, on which we investigate the performance of such permutation. Finally, we give a viewpoint about the application of correlation immune functions in designing substitution boxes.

提供了一种可度量安全强度的代换盒-幂置换;详细阐述了幂置换的实现和计数问题;给出了一种计算幂置换的快速算法;从几乎完善非线性幂置换角度讨论了幂置换参数的选取,并提出了一种高次几乎完善非线性置换;通过试验给出了关于偶数维空间上几乎完善非线性幂置换的一个猜想;简要给出了由幂置换派生出的幂函数的密码局限性;针对幂置换,提出了两个密码安全指标:不动点和循环结构;证明了幂置换在这两个指标下的密码性能;简要讨论了相关免疫函数与代换盒设计的关系。

There were enough CD8+T cells in POF women. But their autoimmune reactions were excessive. It should be advanced studied whether CD4+T cells resist the suppression functions of CD8+T cells, the activity of contrasuppression T cells is excess, which cause the function of CD8+ T cells descent and the functions of CD4+T cells increase relatively.

POF患者体内虽有足量的CD8+T细胞,却自身免疫反应亢进,是否与CD4+T细胞对它们的抑制作用具有抵抗性有关,或是因反抑制性T细胞活性过强,致CD8+T细胞功能下降,CD4+T细胞功能相对增强,尚待进一步研究。

第20/100页 首页 < ... 16 17 18 19 20 21 22 23 24 ... > 尾页
推荐网络例句

Finally, according to market conditions and market products this article paper analyzes the trends in the development of camera technology, and designs a color night vision camera.

最后根据市场情况和市面上产品的情况分析了摄像机技术的发展趋势,并设计了一款彩色夜视摄像机。

Only person height weeds and the fierce looks stone idles were there.

只有半人深的荒草和龇牙咧嘴的神像。

This dramatic range, steeper than the Himalayas, is the upturned rim of the eastern edge of Tibet, a plateau that has risen to 5 km in response to the slow but un stoppable collision of India with Asia that began about 55 million years ago and which continues unabated today.

这一引人注目的地域范围,比喜马拉雅山更加陡峭,是处于西藏东部边缘的朝上翻的边框地带。响应启始于约5500万年前的、缓慢的但却不可阻挡的印度与亚洲地壳板块碰撞,高原已上升至五千米,这种碰撞持续至今,毫无衰退。