英语人>网络例句>sixteen bit 相关的网络例句
sixteen bit相关的网络例句

查询词典 sixteen bit

与 sixteen bit 相关的网络例句 [注:此内容来源于网络,仅供参考]

If this sounds a bit complicated it does look a bit that way but also think of how complicated bit torrent is getting with seed box and protocol encryption, etc. Also with URD it is possible to create and download an NZB file from specified articles as well.

如果这听起来有些复杂,它看上去有点这样,而且多么复杂察看所有电影想与种子框和协议加密等,同时可以与用户要求文件就可以创建和下载从指定的文章,以及NZB文件。

In latching the feedback random bit sequences, the linear feedback shift register includes a plurality of bi-stable latches for linearly shifting a mixed random bit sequence outputted by an XOR gate, which is combined with the true random bit sequence.

在锁存所述反馈随机比特序列的过程中,所述线性反馈移位寄存器包括多个双稳态锁存器,其用于线性地移位由XOR门输出的混合随机比特序列,所述混合随机比特序列与真实的随机比特序列组合。

Bitwise NOT produces the opposite of the input bit-a one if the input bit is zero, a zero if the input bit is one.

按位NOT生成与输入位的相反的值——若输入0,则输出1;输入1,则输出0。

In this paper,a new small-sized bit is introduced.The bit is mainly composed of a biassed polyconic cutter,a cylindric roller and two bit legs.

文章介绍了一种新型小尺寸钻头,它主要由一个偏置的多锥形牙轮和一个圆柱形滚轮及两个牙掌组成。

ABSTRACT : In this paper,a new small-sized bit is introduced.The bit is mainly composed of a biassed polyconic cutter,a cylindric roller and two bit legs.

摘 要 文章介绍了一种新型小尺寸钻头,它主要由一个偏置的多锥形牙轮和一个圆柱形滚轮及两个牙掌组成。

She tells about Victoria's experience living in the building. Here, she explains the language of Sephardic Jews, called Ladino, and sings part of a sad Ladino song: Oh, it's a very mixed up language. It's like a little bit Spanish...we call it Judeo Espagnol...and it's a little bit Turkish, a little bit Hebrew...a lot of languages mixed up all together.

下面,她向我们解释了西班牙系犹太人的语言,这种语言叫拉地诺语,她还给我们唱了一段悲伤的拉地诺语歌曲:&噢,这是一种非常复杂的语言,它有点西班牙口音,我们称之为犹大伊斯帕格尔…,还有一点土耳其口音,还有一点希伯来口音,这是一种有许多语言混合在一起的语言。&

In order to extend the effect and security of image encryption algorithm.An image encryption algorithm is presented based on three-dimension chaotic system and bit-computation.The permutation sequences and binary sequences are generated using three-dimension chaotic system.Firstly,the image is pretreated using chaotic system and permutation transformation,then the pixel's gray value's bit sequences are permuted using the permutation sequences generated before,at last,the pixel's gray value's bit sequences are computed by using XOR operating and the binary sequences.

为了改进图像加密算法的安全性和效率,提出了一种基于三维混沌系统和位运算的数字图像加密算法,利用三维混沌序列的坐标分量分别产生置换序列和二值序列,在对待加密图像进行预处理的基础上,先应用混沌置换序列对预处理的结果图像进行基于灰度值位序列的置换操作,然后再应用产生的二值序列对结果图像的灰度值位序列进行位异或加密运算。

Adopting the system and method in the invention tessellates to exchange the data according to bit and realizes the function of executing non-blocking exchange according to the bit in time slot; the invention is able to output any input bit on the appointed position of all needed outputting channel, which not only improves the flexibility of the data exchange, but also decreases the cost and has high cost performance.

采用本发明的系统及方法,细化到将数据按照比特进行交换,并且实现了按照时隙中的比特进行无阻塞交换的功能,可以让任意一个输入的比特在所有需要输出通道上的指定位置输出;不仅提高了数据交换的灵活性,而且降低了成本,性价比高。

During the read operation, which connects a bit line or bit line bar to a memory cell, the charges stored in a memory cell may change the voltage level of the bit line.

在读取作业期间,将一位线或位线棒连接至一存储单元,存储于存储单元中的电荷可改变位线的电压电平。

For enhancing the system performance, the simple bit-wise indexing method was applied to the manufacturing defect detection problem, time aspect for manufacturing domains. For improving the flexibility and accuracy, the encapsulated bit-wise indexing method is applied to the pattern matching module of an Internet intrusion detection system. To reduce the processing time, the compacted bit-wise indexing method is applied to the data-driven rough-set based feature selection. Additionally, the proposed feature selection method was adopted in a KA project to discover the desired feature sets to construct a CBR system for a world-wide financial group customer relationship management system's loan promotion function.

而这四个实际系统包含应用在制造过程中由於制程时间的问题所产生的产品缺陷之以遗传演算法之制造缺陷侦测系统、应用在网路入侵侦测系统中的入侵模式的挖掘与比对以提升系统弹性及效率、应用在以资料为导向之约略集合论特徵选取技术并使用於知识撷取系统上以节省执行时间及应用在半导体制造过程中用於缺陷侦测的资料挖掘系统以提升系统效能。

第11/500页 首页 < ... 7 8 9 10 11 12 13 14 15 ... > 尾页
相关中文对照歌词
Christine Sixteen
Little Bit Of Life
Twice My Age
8-Bit World
Sweet Sixteen
Sweet Sixteen
Just A Little Bit
A Little Bit
A Little Bit Of Love (Is All It Takes)
Closer
推荐网络例句

We postulate that this effect may be one of the importan t antiepileptic mechanisms of SV.

提示此效应很可能是蝎毒抗癫痫反复发作的重要的机制之一。

Developing, and it also allows me to take advantages of the features that are provided

发展,也让我接触到的功能优势,提供

A particularly fine recent example of this approach is Le Roy Ladurie's Montaillou (1975; Eng. trans., 1978), in which the social and economic life of a small medieval French village is seen against the backdrop of religious heterodoxy.

格外晴朗,最近的一个例子是这种做法是乐罗伊ladurie的到蒙泰罗( 1975年;英文跨, 1978年),其中社会和经济生活中的一小中世纪法国乡村的背景来看待宗教异端。