英语人>网络例句>unitary homomorphism 相关的网络例句
unitary homomorphism相关的网络例句

查询词典 unitary homomorphism

与 unitary homomorphism 相关的网络例句 [注:此内容来源于网络,仅供参考]

And then the definition of simply complete Lie colour algebra and L self-homomorphism are given .A Lie colour algebra is simply complete if and only if it can not be decomposed .

然后给出了单完备李color代数的定义,并给出了一个李color代数是单完备的充要条件,即是不可分解的,同时引入了L的L自同态的定义。

A quasigroup homomorphism is just a homotopy for which the three maps are equal.

三个映射都相同时,就是一个拟群同态。

In addition, the concept of generalized fuzzy quotient group is introduced and the correspondence theorems of generalized fuzzy quotient groups and fuzzy quotient subgroups are obtained respectively under group homomorphism.

另外,我们引入广义模糊商群概念,建立了环同态下广义模糊商群的对应定理及模糊商子群的对应定理。

Exponential operator equation; super-stability ; Ger-stability; asympotic behavior; ring homomorphism

基础科学,数学,数学分析指数算子方程;超稳定性; Ger-稳定性;环同态;渐进性态

Subalgebra and homomorphism of completely distributive lattices and meet continuous lattices.

介绍了完全分配格、交连续格的商集、子代数、同态的概念。

The Signal can analyze the credibility,safety and boundness of hybrid systems with the clocks consequence.It can not only intuitively show all kinds of variables in the restrictive relation,but also obtains the temporal characteristic of a system using a homomorphism.

Signal语言是一种同步语言,它通过时钟推理机制来反映复杂系统的确定性、安全性、有界性等问题,能够直观地表示系统元素之间的约束关系及特性,通过构造同步实时评估模型来反映系统的实时性。

But in using the Harn scheme,the homomorphism attack can not be resisted and the random key k can not be used reduplicatively.

但该方案,不能抵抗同态攻击,并且随机密钥k不能重复使用。

Aiming at this drawback, an improved scheme is introduced,in which not only the advantages of the Harn scheme are kept,but also the homomorphism attack is resisted effectively. In addition, the new scheme can ensure the scheme's security when the same random key k is used.

文章针对该方案的不足,提出一种改进方案,新方案不但保留了Harn数字签名计算速度快及容易实现密钥共享等优点,而且能够有效抵抗同态攻击,并且在随机密钥k重复使用时能够确保方案的安全性。

In this paper, we have proposed a flexible encryption blocks selection buyer-seller watermarking protocol integrated the RSA asymmetric encryption system and homomorphism mechanism to protect the ownership of digital contents and fit real life. And consider the secondhand transaction in the real life. We also propose a buyer-reseller watermarking protocol based on the flexible encrypt blocks selection buyer-seller watermarking protocol to offer a solution of secondhand transaction. In our scheme, it's more light data transport requirement than other schemes. All roles in protocol will benefit by their participation. Our scheme can overcome various of the known attacks and security problems in the buyer-seller watermark protocol, such as buyer's right problem, unbinding problem, piracy tracing problem, conspiracy problem, buyer's participation in the dispute resolution problem, man-in-the-middle attack problem and anonymous problem. Furthermore, the seller and arbiter can verify the buyer's watermark without decrypting it in our scheme.

本文除应用RSA非对称式加密与秘密同态机制,提出了一个符合现实生活中买卖交易行为、可弹性调整加密范围数位内容买卖浮水印协定,强化了目前研究中对於数位内容买-卖浮水印协定的安全性,并进一步的考量二手商品交易行为,在可弹性调整加密范围数位内容买卖浮水印协定基础上,提出一个结合数位内容二手买卖与盗版追踪的二手数位内容买卖浮水印协定,达到让参予买卖的角色可以在安全的情形下完成二手数位内容所有权的移转并从中获取相对应利益的目标的数位内容转卖浮水印协定来增强了目前数位内容买卖浮水印协定研究中对於二手交易欠缺之处,解决了数位内容买卖浮水印协定中所可能遭遇的重要安全性议题,如:买方权益、盗版追踪、资讯不连结、共谋、买方需要参与仲裁、中间者攻击及匿名性问题。

In this paper, a method from the basic matrix of MU(1) formula is used to prove that a tree resolution proof for an unsatisfiable formula F can be transformed into a homomorphism proof from a MU(1) formula for F.

利用基础矩阵的方法证明了:一个不可满足公式 F 的树消解证明,可以在多项式时间内转换成一个来自 MU(1)中公式的同态证明。

第8/36页 首页 < ... 4 5 6 7 8 9 10 11 12 ... > 尾页
推荐网络例句

I was up all night because I was in pain, she said.

我整夜,因为我在疼痛,她说。

A crow caws /craoks.

乌鸦叫。 51-论文网

It certainly hampers Estonia's efforts to counter Russian propaganda that portrays the country as a fascist hellhole.

这种行为肯定是阻碍了爱沙尼亚抵制俄罗斯宣传的种种努力-要知道俄罗斯将爱沙尼亚说成是一个到处都弥漫着法西斯主义的鬼地方。