二进制的
- 与 二进制的 相关的网络例句 [注:此内容来源于网络,仅供参考]
-
This means that no sequential access generated by ARM920T will cross a 1KB boundary, which can be exploited tosimplify memory interface design.
这意味着 ARM920T产生的有序二进制位组访问将不会跨越1KB的界限,这个特性简化了内存接口的设计。
-
Find out a class of CA universal rules for Mathematical Morphology and first implement Mathematical Morphology with CNN-UBN. So a class of image processing problems based Mathematical Morphology can be solved with CNN effectively.
找到了数学形态学二维CA实现的通用规则,首次用具有二进制神经元的细胞神经网络实现了数学形态学,使基于形态学的一类图像处理问题可以用CNN来解决。
-
Originally i wanted to use the value in the PE Header as keys to decrypt a few layers of the protection, and the result would have been an unworking binary if this one had been changed.
最初,我想利用PE Header中的数值作为打开保护层的钥匙,但是一旦改变数值,它就变成了一段无效的二进制代码。
-
Binary discernibility matrix-based reduction approaches are characterized by vivacity and operability,which make them widely applied to projects.
基于二进制可辨矩阵的数据约简方法具有直观性和可操作性的特点,因而在实际应用中受到开发人员的青睐。
-
One CIO defended IT's duty to "speak in the language of business", but finance executives retorted that IT tends to propose " faith-based initiatives" that overpromise on ROI and are poorly supported by metrics.
某个CIO声称IT的使命是&用商业的语言讲话&,但财务总监们反驳IT倾向于提出&信仰为基础的提议&,这些提议过度承诺了投资报酬率,并且&二进制&很难支持。
-
For operating systems other than Linux and OS/2, the binaries may not be of the most recent release.
为作业系统以外的其他的Linux和OS / 2 ,二进制文件,可能就不会有最近期的新闻稿。
-
Also deciphers the hidden Windows recycle bin file info2 located in every Recycled/Recycler folder. Displays the original path and filename, date and time of deletion, file size, and more, sometimes even if the recycle bin has been emptied.
通过破解隐藏在windows回收站中的二进制文件info2,能显示原路径和文件名,删除的日期和时间,文件大小等,有时即使回收站已被清空也可以搜索。X-Ways Trace 得到的所有详细资料可以导出为MS Excel。
-
By encapsulating high-level module in COM components, binary reusability and development language independence can be achieved.
使用COM组件的形式封装高层组件,可以实现二进制组件的复用的开发语言无关性。
-
Over a period of five days, it had collected 74 different samples as distinguished by the MD5 hashes of the binaries.
在五天的时间里,它就搜集到了74个根据每个二进制文件不同的MD5哈希值保证唯一性的样本。
-
According to the principle of "fully using known information,not requesting or responding reduplicated information",an anti-collision searching algorithm of delaminating deepness tree in RFID system is proposed,which adopts the method of "detecting the collision in the feedback sequence of tags to obtain the parameters of next request" and is based on the binary tree algorithm.
根据&完全利用已知信息,不发送或反馈重复信息&的原则,采用&判定标签反馈序列的冲突,得到下一步深度搜索参数&的方法,同时有效利用&堆栈技术&及&后退原则&,以二进制搜索算法为基础,提出了分层深度搜索树型RFID防碰撞算法。
- 推荐网络例句
-
We have no common name for a mime of Sophron or Xenarchus and a Socratic Conversation; and we should still be without one even if the imitation in the two instances were in trimeters or elegiacs or some other kind of verse--though it is the way with people to tack on 'poet' to the name of a metre, and talk of elegiac-poets and epic-poets, thinking that they call them poets not by reason of the imitative nature of their work, but indiscriminately by reason of the metre they write in.
索夫农 、森那库斯和苏格拉底式的对话采用的模仿没有一个公共的名称;三音步诗、挽歌体或其他类型的诗的模仿也没有——人们把&诗人&这一名词和格律名称结合到一起,称之为挽歌体诗人或者史诗诗人,他们被称为诗人,似乎只是因为遵守格律写作,而非他们作品的模仿本质。
-
The relationship between communicative competence and grammar teaching should be that of the ends and the means.
交际能力和语法的关系应该是目标与途径的关系。
-
This is not paper type of business,it's people business,with such huge money involved.
这不是纸上谈兵式的交易,这是人与人的业务,而且涉及金额巨大。