查询词典 vector decomposition
- 与 vector decomposition 相关的网络例句 [注:此内容来源于网络,仅供参考]
-
Multilevel decomposition and reconstruction of vector product wavelet transform are disscussed on the basis of vector wavelet.
并讨论了与此有关的矢量积小波变换的多级分解和重构。
-
In the fourth chapter, firstly it introduces the Boolean functions algebraic expressions of the 2-value clock-controlled stop-and-go generator and Gunther generator. It reveals the balanced property of the two kinds of Boolean functions, and studies the Walsh cycle spectrum and the autocorrelation function. It also obtains the coincidence rate of their output sequences with affine sum of some bits of input sequences, and analyzes their ability of resisting the best affine approximation cryptanalysis and differential cryptanalysis. Secondly, we properly present a new definition of the Best Affine Approximation, namely BAA on the Boolean vector functions, followed by the spectral characteristic of such defined BAA attacks through using the decomposition formula of the union distribution for random variables. A lower bound of such BAA attacks is proposed. Finally, we also study the spectral characteristic of the second kind of nonlinearity of Boolean vector functions, followed by a higher bound of such nonlinearity. Furthermore, the limited relationship between the second kind of nonlinearity of Boolean vector functions and the linear structure of the linear combination of every component is analyzed.
在第四章中,首先给出了2值密钥流"停走生成器"和"衮特生成器"中实际存在的布尔函数的代数表示,揭示了这两类布尔函数的平衡性,随后研究了它们的Walsh循环谱和自相关函数等,得到了它们的输出序列与输入序列中的某些bit的仿射项的符合率,分析了它们抵抗最佳仿射逼近攻击和差分攻击的能力;其次,我们合理地给出了布尔向量函数最佳仿射逼近的新定义,利用布尔随机变量联合分布的分解式考察了相应的谱特征,并给出了布尔向量函数与其最佳仿射逼近的符合率的一个下界;最后,我们还考察了布尔向量函数第二类非线性度的谱特征,给出了布尔向量函数第二类非线性度的一个上界,并揭示了布尔向量函数第二类非线性度与其各个分量的线性和的线性结构之间存在的制约关系。
-
Using the theories of probability, algebra and spectral theory comprehensively, we investigate some related characteristics of logic functions in cryptography: Firstly, we introduce m order generalized s - correlation immunity of Boolean vector functions and prove that the higher order generalized ε- correlation immunity can guarantee the lower order generalized ε- correlation immunity. Then by applying decomposition formula of joint distribution of Boolean random vectors, we give a spectrum criterion of m order generalized e - correlation immunity of Boolean vector functions. Furthermore, we show that the algebraic degree of m order generalized e - correlation immune Boolean vector functions is not restricted by the correlation immune orders.
本文主要运用概率论的思想和方法,并结合代数学和频谱理论的相关知识,对密码学中逻辑函数的有关性质进行了研究,主要包括以下三个方面的内容:首先,对布尔向量函数的相关免疫性进行了拓展,给出了k维布尔向量函数m阶广义ε-相关免疫的概念,证明了布尔向量函数的高阶广义ε-相关免疫性蕴含低阶广义ε-相关免疫性,并根据布尔随机向量联合分布分解式得到了布尔向量函数m阶广义ε-相关免疫的一个谱判别条件,还说明了m阶广义ε-相关免疫布尔向量函数的代数次数不受相关免疫阶数的制约。
-
For any dimension vector , there exist the generic decomposition, and a dense and closed subset V of system space R〓 corresponding to this decomposition such that, for each dynamical system M∈V, every indecomposable summand of M thus M is clear.
对任意的维数向量,存在一般分解,以及系统空间Rm,n,p中稠密的开子集V,并且我们对V中每个系统的不可分解直和项知道得很清楚,进而对V中每个系统也非常清楚。
-
A fault diagnosis approach based on intrinsic mode singular value decomposition and support vector machines is put forward.
摘要提出了一种基于内禀模态(Intrinsic mode functions,简称IMFs)奇异值分解和支持向量机(Support vector machine,简称SVM)的故障诊断方法。
-
With singular vector decomposition technique, current method shows vulnerability on SVD attack. It will also make the original privacy evaluation method unavailable.
数据扰乱方法是集中式环境中的主要数据挖掘隐私保护方法,其中加性随机干扰技术具有代表性。
-
The Singular Vector Decomposition analysis of monthly data of the NCEP-NCAR reanalysis and OAFlux reanalysis data for wintertime is used to study the relationship between the Kuroshio anomalous heating and the North Pacific geopotential height at 500 hPa.
利用NCEP/NCAR和OAFlux月平均资料,采用SVD方法分析冬季黑潮海域的热通量和北太平洋500hPa位势高度场之间的关系。
-
The various representations of LPC residual signal are summarized, which can be unified as a Vector Decomposition problem.
在总结了语音LPC模型残差信号的各种表示方法之后,把这些方法都归结为一种统一的表示方法,即残差的矢量展开法。
-
Impedance vector decomposition and static correction are performed to those site data which have local distortion and static shift, respectively.
对发生局部畸变和静位移测点的数据分别进行了阻抗张量分解和静效正。
-
Based upon Adomian decomposition method, we have studied Adomian double decomposition method in this paper. The initial term in Adomian decomposition method has been further decomposed, and modified inverse vector method is obtained.
在求解初边值问题Adomian分解法的基础上,研究了求二维偏微分方程边值问题的双重Adomian分解法,对Adomian分解法的初始项作了进一步分解,使逆算符分解法得到了改进。
- 推荐网络例句
-
We have no common name for a mime of Sophron or Xenarchus and a Socratic Conversation; and we should still be without one even if the imitation in the two instances were in trimeters or elegiacs or some other kind of verse--though it is the way with people to tack on 'poet' to the name of a metre, and talk of elegiac-poets and epic-poets, thinking that they call them poets not by reason of the imitative nature of their work, but indiscriminately by reason of the metre they write in.
索夫农 、森那库斯和苏格拉底式的对话采用的模仿没有一个公共的名称;三音步诗、挽歌体或其他类型的诗的模仿也没有——人们把&诗人&这一名词和格律名称结合到一起,称之为挽歌体诗人或者史诗诗人,他们被称为诗人,似乎只是因为遵守格律写作,而非他们作品的模仿本质。
-
The relationship between communicative competence and grammar teaching should be that of the ends and the means.
交际能力和语法的关系应该是目标与途径的关系。
-
This is not paper type of business,it's people business,with such huge money involved.
这不是纸上谈兵式的交易,这是人与人的业务,而且涉及金额巨大。