查询词典 two bits
- 与 two bits 相关的网络例句 [注:此内容来源于网络,仅供参考]
-
The fundamental of Logic Algebra Decoding is analyzed at first. Then the bit error types of (2, 1, 4) convolutional code are discussed, and 19 bit error types in a constraint length including 10 bits are found, if one or two bit errors are considered.
之后研究了误码判定的规则,证明了伴随式只与错误图样有关,而与编码器输入的信息序列无关,通过分析错误图样,得出了19种误码类型所对应的伴随式。
-
Matching and bit reversal based on prediction arithmetic utilizes the relativity between continuous two frames/slices. It locates error position by setting a number of featured syntax fields and predicted values. The most perfect result is that the arithmetic can correct n+1 bits error by n featured syntax fields.
基于预测的匹配翻转算法充分利用时域上前后传输单位之间头部字段的相关性,通过设置特征字段以及其预测值来确定出错范围,进行纠错,理想情况下设置n个特征字段最高可以纠正n+1个比特错误。
-
It must improve the commonly symmetrical key block cipher arithmetic for ensuring that the data length will not be increased after encryption: using forward shift bits mode in Triple DES with Two Keys; using cipher text stealing mode in RC5 with Cipher Block Chaining.
为保证加密后数据长度不变,应对常用的对称密钥分组密码算法以改进:双密钥三重DES加密采用向前挪位法,RC5密码分组链接加密采用密文窃取方式。
-
In the fourth chapter, firstly it introduces the Boolean functions algebraic expressions of the 2-value clock-controlled stop-and-go generator and Gunther generator. It reveals the balanced property of the two kinds of Boolean functions, and studies the Walsh cycle spectrum and the autocorrelation function. It also obtains the coincidence rate of their output sequences with affine sum of some bits of input sequences, and analyzes their ability of resisting the best affine approximation cryptanalysis and differential cryptanalysis. Secondly, we properly present a new definition of the Best Affine Approximation, namely BAA on the Boolean vector functions, followed by the spectral characteristic of such defined BAA attacks through using the decomposition formula of the union distribution for random variables. A lower bound of such BAA attacks is proposed. Finally, we also study the spectral characteristic of the second kind of nonlinearity of Boolean vector functions, followed by a higher bound of such nonlinearity. Furthermore, the limited relationship between the second kind of nonlinearity of Boolean vector functions and the linear structure of the linear combination of every component is analyzed.
在第四章中,首先给出了2值密钥流"停走生成器"和"衮特生成器"中实际存在的布尔函数的代数表示,揭示了这两类布尔函数的平衡性,随后研究了它们的Walsh循环谱和自相关函数等,得到了它们的输出序列与输入序列中的某些bit的仿射项的符合率,分析了它们抵抗最佳仿射逼近攻击和差分攻击的能力;其次,我们合理地给出了布尔向量函数最佳仿射逼近的新定义,利用布尔随机变量联合分布的分解式考察了相应的谱特征,并给出了布尔向量函数与其最佳仿射逼近的符合率的一个下界;最后,我们还考察了布尔向量函数第二类非线性度的谱特征,给出了布尔向量函数第二类非线性度的一个上界,并揭示了布尔向量函数第二类非线性度与其各个分量的线性和的线性结构之间存在的制约关系。
-
The energy state of an electron within an atom, represented by the electron energy level or shell, can theoretically represent one, two, four, eight, or even 16 bits of data.
用电子能级表示的原子中电子的能态,理论上可以表示1、2、4、8、甚至16位的数据。
-
And there came a poor widow, and she put in two little bits of money, which make a farthing.
12:42 有一个穷寡妇来、往里投了两个小钱、就是一个大钱。
-
A bit inserter segments a received data bit stream into at least two subframes, and inserts the generated specific bits at locations where an error probability is higher in the respective subframes.
位插入器将接收的数据位流分段成至少两个子帧,并将生成的特定位插在各个子帧中出错几率较高的位置上。
-
Two sine signals with inverse phase are used to modulate watermark bits.
利用同频率的正弦信号相位提取水印。
-
A few mornings later Peter and Edmund were looking at the suit of armour and wondering if they could take it to bits when the two girls rushed into the room and said,"Look out! Here comes the Macready and a whole gang with her."
几天以后,彼得和爱德蒙正望着那副盔甲出神,想试试能否把它拆卸下来,两个女孩忽然奔进屋里说:"不好啦,玛卡蕾蒂带着一群人来了!"
-
Alternate connective has a few kinds of cases, I say to basically leave two kinds of commonly used way here: Home page is specification of station of A B C falls: If A C station is two my different sites, b station is the station of the other side, I and the other side change home page connective moment, I use the connection that B of the other side of the put away on A station stands,(This join also is one changes, because a lot of person misunderstood across,join is not one changes,) it is B of the other side next the link that needs to put my C to stand only on the station went, need not go putting the join that my A stands, also be one changes a join, this is the resource station that we provide many bits just.
交叉连接的有几种情况,这里我说下主要下常用的两种方式:首页是 A B C 站说明下:如果 A C 站是我的两个不同的站点,B站是对方的站,首页我和对方换连接的时候,我用A站上放好对方B站的连接,(这个连接也是一个换一个的,因为好多人都误会了交叉连接不是一个换一个,)然后是对方B站上只需要放我C站的连接就行了,不用去放我A站的连接了,也是一个换一个连接,这个是我们提供的资源站多点而已。
- 推荐网络例句
-
The basic concept of FOP can be summarized as to further optimize effective prescription according to the standard of curative effects and with the aid of modern science and technology and theories of traditional Chinese medicine.
其基本内涵可概括为:以确有疗效的中药复方为研究对象,以现代科学技术和传统中医药理论为技术支持,以该复方所治病证的药效响应为评价标准,以优化重组疗效更优的新复方为研究目的。
-
Ever since our world has been a world, native forests have been indiscriminately exploited by man.
自从我们的世界一直是世界原生森林被任意剥削人。
-
I don't… don't know. He's unconscious.
我不……我不知道他休克了。