The other element of the equation, b, turns out to be directly related to T1. It is calculated from the relationship between the logarithms of the attack number, n, and the attack interval, Tn.
至于这个公式里的其他元素,b和T1直接相关,它由袭击次数n的对数和袭击间隔Tn的关系计算得出。
Logs base e (natural logarithms) appear in the calculation of compound interest, and numerous scientific and mathematical applications.
以e为底的对数(自然对数)出现在复合计算以及大量科学和数学应用程序中。
The model of double logarithms is the best in both simulating and predicting among all these models.
各模型中以双对数型模拟、推算效果最佳。
Logarithms were invented to shorten the work of extended numerical computation.
人们发明对数来缩短运算冗长的数值计算工作。
Based on the zero -knowledge proofs and the computational difficulty of computing discrete logarithms, a dynamic multiple secrets sharing scheme is proposed in this paper.
基于中国剩余定理,零知识证明与有限域上计算离散对数问题的困难性,提出了一种新的动态多秘密分享方案。
In this paper, two schemes for digital signature with message recovery are presented. The security of these schemes is based on factorization and discrete logarithms.
本文设计了两种具有消息恢复的数字签名方案,其安全性都是基于因子分解问题和离散对数问题的。
In the problem of dynamic access control, we present a secure and efficient scheme, which is based on discrete logarithms and polynomial interpolation.
在用户层次结构的动态存取控制问题上,本文提出了一种安全有效的方案。
An eminent mathematician, he is regarded as the inventor of the system of logarithms.
作为一名受人尊敬的数学家,龙比亚被誊为对数的发明者。
In this paper, we present a new signature scheme with message recovery and the security of the scheme is based on both factorization and discrete logarithms.
本文设计一种新的具备消息自动恢复特性的数字签名方案,这种方案的安全性同时建立在因子分解和离散对数之上,并对这种方案进行了安全性分析。
Based on the computational difficulty of computing discrete logarithms, a dynamic multiple secrets sharing scheme is proposed.
基于单向函数和有限域上离散对数问题提出一种动态多秘密分享方案。
The scheme is efficient and practical, and its security is based on the difficulty of computing ellipse curve discrete logarithms problem.
方案的安全性基于求解有限域上椭圆曲线离散对数的困难性。
A new key authentication scheme was proposed. This new scheme is based on the intractability of elliptic discrete logarithms. The key is combination of password and private key.
本文利用椭圆曲线上离散对数难解问题,提出了一种新的密钥认证方案,密钥由用户口令和秘密密钥组成。
Make use of the database can logarithms according to carry on the concentrated control and managements, and pass organization and the contact of the datas that the data model means various data.
利用数据库可对数据进行集中控制和管理,并通过数据模型表示各种数据的组织以及数据间的联系。
The system has the function of proceeding data collecting from monitor and can auto analysis reports to the police, still requesting the logarithms according to proceed saving management etc.
系统功能在进行数据采集监测中具有自动分析报警等功能,还要求对数据进行存储管理等。
The system has the function of proceeding data collecting from monitor and can auto analysis reports to the police, still requesting the logarithms according to proceed saving management etc.
系统功能在进行数据采集监测中具有自动分析报警等功能,还要求对数据进行存储管理等。
应用推荐