logarithm
英 [ˈlɒɡərɪðəm]
美 [ˈlɔːɡərɪðəm]
n. 对数
复数:logarithms
BNC.27896 / COCA.31934
牛津词典
noun
- 对数
any of a series of numbers set out in lists which make it possible to work out problems by adding and subtracting instead of multiplying and dividing
柯林斯词典
- 对数
In mathematics, thelogarithmof a number is a number that it can be represented by in order to make a difficult multiplication or division sum simpler.
英英释义
noun
- the exponent required to produce a given number
双语例句
- The fifth day is the logarithm stage for the mycelium growth.
菌丝体生长的第五天为菌丝对数生长阶段。 - The merits and deficiencies of the logarithm model in air combat capability assessment of fighter aircrafts are analyzed.
详细分析了对数法模型评估飞机空战能力时的优点和不足之处。 - In this paper, one method of jamming effectiveness evaluation for speech communication based on the power added logarithm spectrum distance of two speech signal is presented.
介绍了利用两个语音信号序列的加权对数谱距离对语音信号的干扰效果进行评估的方法。 - A method is proposed for improving the consistency of inconsistent judgment matrix based on exponential scale, by the value of compatibility index of logarithm.
利用对数意义下的相容性指标提出了一种基于指数标度下判断矩阵的一致性调整方法,并通过算例表明该法是切实可行的。 - Returns the natural logarithm of a number.
返回一个数的自然对数。 - Further, presented the correlations between multifractal spectrum and logarithm of mean traffic.
进一步研究了多重分形谱参数与平均流量对数的关联关系。 - The hyperelliptic curve cryptosystem is based on the hyperelliptic curve discrete logarithm problem, and has the higher safety and the shorter operands compared to other cryptosystems.
超椭圆曲线密码体制是以超椭圆曲线离散对数问题的难解性为基础的,具有安全性高、操作数短等优点,相对于其他密码体制有明显的优势。 - A multi-level threshold multi-secret sharing scheme based on bivariate polynomial and the intractability of the discrete logarithm was proposed.
基于离散对数问题的难解性,利用二元多项式,给出一种多级门限多秘密共享方案。 - Now, let's take care of exponential and logarithm functions.
现在,让我们的指数和对数函数的照顾。 - The elliptic curve discrete logarithm of non singular elliptic curve over finite field has no efficient attack up to now, which made it cannot be widely applied in cryptography.
目前,在有限域上非奇异椭圆曲线离散对数问题还没有有效的攻击方法,使其在加密技术中得到了广泛应用。
