二进制
- 与 二进制 相关的网络例句 [注:此内容来源于网络,仅供参考]
-
The read and write methods make no assumption about type and format of data send or received, you must take into account if you are handling a character or binary format, if there is Unicode, mbcs, etc. The open function if defined as follows:virtual BOOL OpenLPCTSTR PortName, DWORD BaudRate, BYTE ByteSize, BYTE Parity, BYTE StopBits
读写方法,不作任何类型和对数据格式发送或接收,你必须考虑到,如果你正在处理一个字符或二进制格式的假设,如果是Unicode,的MBCS等功能的开放,如果定义如下:"/页"虚拟布尔公开赛(LPCTSTR端口名,双字节值波特率,字节ByteSize,字节校验,字节停止位
-
I argued that drum memory was superior to core memory, that decimal coding was intrinsically superior to binary.
我争辩说,磁鼓记忆装置比核心内存更好,十进制编码天生就比二进制好。
-
The pattern 11010010, for example, might be binary data—in this case, the decimal number 210—or it might be an instruction telling the computer to compare data stored in its switches to data stored in a certain memory-chip location.
例如,11010010这个模式可能是二进制数据——在这种情况下,代表210这个十进制数字——或者它可能是一条指令,告诉计算机将存储在其交换设备中的数据与存储在存储芯片某个位置的数据进行比较。
-
I mentioned earlier that a metafile is a collection of GDI function calls encoded in binary form.
我早先提到元文件是以二进制形式编码的 GDI 函数调用的集合。
-
Metafiles A metafile is a collection of GDI commands stored in a binary form.
元文件 -元文件是以二进制形式存储的 GDI 命令的集合。
-
Then a bit sequence CID is determined by the interest,and CID is the main metric to organize topology—nodes with the close CID will form a community which is a dense subgraph.
在这种模型里,每个节点由自身的资源整体类型倾向决定自己的兴趣,并且采用树形结构来表达兴趣;然后节点由兴趣产生一个二进制序列的CID,CID将成为拓扑形成的主要依据--具有相近CID的节点能聚集成一个连通性较高的子图。
-
This is what MIME uses to send binary data in e-mail.
这是使用的MIME在电子邮件发送二进制数据的电子邮件。
-
In the fourth sub-problem mixture property constraints concerning the miscibility of the solvents among themselves in the mixture e.g.
在第四次混合财产的限制问题,有关它们之间的混合溶剂混溶例如2(该溶剂的相容性,如果一个二进制mixt
-
Then came assembly language, which is just a set of mnemonics used in place of the binary machine instructions.
之后出现了汇编语言,它只是用一组助记符代替了二进制机器指令。
-
The author mainly realized the method of generating the large random numbers and judging the prime number using Lehmann means,then three pairs of secure key with different lengths (256 bits,512 bits,1024 bits) was generated to meet the demand of different security grade. In encryption module,modular multiplication arithmetic of large number was realized adopting addition chaining. In decryption module,extended Euclid was used to get inverse,and the Chinese remainder theorem was used to realize decryption,which increased the speed of decryption greatly.
作者主要实现了大随机数的生成、采用整除小素数和勒曼测试法判定素数,可以生成三种不同长度的密钥对(256位、512位、1024位)来满足不同的加密安全等级的需求;加密模块中,选用了二进制序列的乘法方法,实现了大数模幂乘运算;解密模块中,引用了扩展的欧几里德法求逆元,并采用中国剩余定理实现解密过程,大大提高了解密速度。
- 推荐网络例句
-
We have no common name for a mime of Sophron or Xenarchus and a Socratic Conversation; and we should still be without one even if the imitation in the two instances were in trimeters or elegiacs or some other kind of verse--though it is the way with people to tack on 'poet' to the name of a metre, and talk of elegiac-poets and epic-poets, thinking that they call them poets not by reason of the imitative nature of their work, but indiscriminately by reason of the metre they write in.
索夫农 、森那库斯和苏格拉底式的对话采用的模仿没有一个公共的名称;三音步诗、挽歌体或其他类型的诗的模仿也没有——人们把&诗人&这一名词和格律名称结合到一起,称之为挽歌体诗人或者史诗诗人,他们被称为诗人,似乎只是因为遵守格律写作,而非他们作品的模仿本质。
-
The relationship between communicative competence and grammar teaching should be that of the ends and the means.
交际能力和语法的关系应该是目标与途径的关系。
-
This is not paper type of business,it's people business,with such huge money involved.
这不是纸上谈兵式的交易,这是人与人的业务,而且涉及金额巨大。