英语人>网络例句>binary adder 相关的网络例句
binary adder相关的网络例句

查询词典 binary adder

与 binary adder 相关的网络例句 [注:此内容来源于网络,仅供参考]

Repeated eigenvalues occur with high multiplicities in the Laplacian matrices of full binary tree s.

满二叉树的Laplacian矩阵有着高重数的特征值,其中1重复最为频繁。

Encoding these values as binary numbers would result in the following set of nibbles : 0111, 1001, 1011, 1100, 1101, 1110, 1110, 1111, 1111, 1111, 1110, etc.

这些数值被编码成二进制数据:0111, 1001, 1011, 1100, 1101, 1110, 1110, 1111, 1111, 1111, 1110,等。

Dwarf novae , explosions of light from the accretion disk around a white dwarf in a binary system, are examples of this phenomenon.

在双星系统中,环绕白矮星的吸积盘产生光爆而造成的矮新星,就是此现象的例子。

A new method based on the binary switching algorithm is proposed that finds optimized mappings outperforming previously known ones.

一个新方法在二进制转换算法优化的发现与先前的。

The program overwrites all bits in selected files, including cluster slack space, with binary 1's, 0's, and/or random bit patterns.

该计划覆盖所有钻头在选定的文件,包括集束的闲置空间,与1的二进制的,零的,和/或随机的位模式。

This approach encrypts digital image hy permuting on bitmap after pretreatment,and decryption pixels' values of the image which is attacked by shear transformation is computed by using neighboring pixels' values,it can protect the encryption image from shear transformation attack.A binary sequence nonlinear generating method based on chaotic system is also presented.

基于数字图像灰度矩阵位平面进行置乱加密,在恢复过程中通过象素邻域灰度信息进行恢复,能够有效抵御针对加密图像的剪切变换攻击,同时给出了一种非线性的、应用高维混沌系统产生二值序列的方法。

Examples Building text files with injection Building binary files using debug.exe with injection Injection and FTP Injection and remote xterms Injection and TFTP Adding a user with injection Scheduling a process with injection Pluming pipes, ports, and permissions Handles to open resources are sometimes inherited by the child process. If a protected resources is already open, the child process will have unfettered access to the resource, perhaps by accident.

范例 利用注入建立文字档利用 debug.exe 将资料注入到两进位档注入与 FTP 注入与远端 xterms 注入与 TFTP 利用注入新增一个使用者利用注入对程序进行排程利用 pipes, ports 以及权限已开启资源的处理代码有时候会被子程序所继承,也就是说如果一个受保护的资源被开启后,子程序将有可能在无意间不受限制地存取该资源。

This is discovered and put forward firstly by this paper, it established theory base for seting up the binary structure improvement tier alkaline soil improving, and a bit of times without number washing flooding. In improvement process of alkaline soil, the seepage capacity of gypsum was preponderated over 40% than the used capacity of gypsum.

关于石膏混合层与非混合层,在土壤改良过程中,各自具有不同量变到质变的规律,是本文首先发现并提出来的:它为建立碱土改良的二元结构计划改良层并与小定额分次冲洗相结合灌溉,奠定了理论基础。

Such observations, whilst useful to some degree, should not be regarded as comparing the two groups in a simplistic binary, by privileging artists with an overseas education over those who had trained locally.

这样的观察结果虽然在一定程度上不无用处,却也不应当视为过于简单化的二元对比,以留学海外者为优、于本地修习者为劣。

A computer inside the CD player interprets the reflections and scatterings as the ones and zeros of the computer binary code, and reassembles the ones and zeros into music.

CD播放机里的电脑会把反射回来和散射开的激光分别定义为电脑二进制的1与0,再把这些1与0重组为音乐。

第148/172页 首页 < ... 144 145 146 147 148 149 150 151 152 ... > 尾页
相关中文对照歌词
Binary Love
Binary Mind
An Awful Lot Of Running
Binary Reality
Rusted Machines
Temple
Snakes And Ladders
My Grandma Was Pearl Hall
Batman & Robin
Typecast
推荐网络例句

Until now the drug melarsoprol was used to treat patients in the advanced stage of sleeping sickness.

直到现在,美拉胂醇依然被应用在昏睡病晚期病人的治疗中。

The larger gear at center is about 80 microns wide.

大齿轮的中心是在大约80微米宽。

Then the author particularizes the content of local ***s' culture resources in six aspects, from three lays such as ideas, establishment and products.

然后从六个方面,结合具体的情况,从观念、设施和产品三个层面大致列举了地方政府文化资源的范围。