尾位元組 的英文怎麼說

中文拼音 [wěiwèiyuán]
尾位元組 英文
trail byte
  • : Ⅰ名詞1 (所在或所佔的地方) place; location 2 (職位; 地位) position; post; status 3 (特指皇帝...
  • : Ⅰ名詞1 (由不多的人員組成的單位) group 2 (姓氏) a surname Ⅱ動詞(組織) organize; form Ⅲ量詞(...
  1. Niche breadth of four dominate populations at three age groups was studied by the methods of resource utilization ability and ratio. the result shows that : symplocos sectchuanensis is a typical gengeration species whi ch resource utilization ability is strong, and distribution is wide. meanwhile, go rdonia acuminata, castanopsis fargesis and pinus massoniana specialized at some d egree in resource utilizationm, their distribution is limited. especially, the ju venile of pinus massoniana specialized outstandingly. with the devlopment of pinu s massoniana, which is the pioneer population in mt. jinyun, the environment become s unfit to it ' s juvenile. it turns to needle and evergreen broad - leaves mixed fo r est. because the tolerance toward shading of gordonia acuminata is lower than tha t of castanopsis fargesis, gordonia acuminata will be substituted by castanopsis fargesis and other evergreen broad - leaves species are the edificators. the popul ation ' s ability of resource utilization is the inner factor of population distri bution and community succession. the distribution of light and the concentrate of nutrient ( such as n ) is the outer factors of community succession

    對縉雲山森林植被的4個優勢種群3個年齡級生態寬度進行了研究.結果表明,川灰木利用資源的能力最強、分佈廣,為典型的泛化種.大頭茶、栲樹、馬松對資源的利用在一定程度上特化,分佈上有一定的局限性.馬松的中齡與幼齡特化現象十分顯著.縉雲山森林植被的先鋒種馬松的發展,導致環境的改變不適于其幼齡個體的生長,群落演替到針闊葉混交林階段,最後發展為以栲樹等為建群種的常綠闊葉林.種群的資源利用能力,是種群分佈與群落演替的內在原因,光因子和營養素(如n )是群落演替的主要外部動力
  2. If a parity error occurs on the trailing byte of a stream, an extra byte will be added to the input buffer with a value of 126

    如果在流的尾位元組上出現奇偶校驗錯誤,將向輸入緩沖區添加一個值為126的額外
  3. Invalid bytes at the end of the data block are ignored and the internal buffer is cleared

    ,則忽略數據塊末的無效並清除內部緩沖區。
  4. Including trailing bytes at the end of the previous data block

    所保留的任何狀態信息,包括前一個數據塊結
  5. It is processed in combination with the trail byte that follows immediately after it

    它同緊跟在其後的尾位元組一起處理。
  6. On the same block, so that any trailing bytes from the previous block are included in the calculation

    ,以便在計算中包括前一個塊的所有
  7. Also preserves trailing bytes at the end of data blocks and uses the trailing bytes in the next decoding operation

    還保留數據塊結並將這些用在下一次解碼操作中。
  8. The crt now has more checks for invalid multibyte characters, where a lead byte is followed by a null trail byte

    現在, crt對前導後跟著空尾位元組的無效多要進行更多的檢查。
  9. Object also preserves trailing bytes at the end of data blocks and uses the trailing bytes in the next decoding operation

    對象還保留數據塊結並將這些用在下一次解碼操作中。
  10. The crt was not always detecting invalid multibyte strings, where a lead byte would be followed by a null trail byte

    ) , crt以前並非始終會檢測無效多串,即前導後跟著空尾位元組的字串。
  11. Trailing bytes at the end of the data block are stored in an internal buffer and used in the next decoding operation

    ,則於數據塊結將存儲在內部緩沖區中,並在下一次解碼操作中使用。對一個數據塊調用
  12. Over 13 kb saci restriction fragment was cloned into pgem - 7zf ( + ), mapped for restriction endonuclease sites and an about 5. 0kb fragment was further subcloned and sequenced. through coding region specific primer, we amplied it ' s corresponding cdna, named st901. st901 is 2889bp long, contains 1447bp putative promoter region within 5 " upstream and three exons ( 475bp, 140bp, 39bp ) and two introns ( 472bp, 2s3bp ) in the coding region, encodes a hydrophilic protein of 217 amino acid residues with a molecular mass of 24kda

    以同源探針篩選馬鈴薯基因文庫,得到四倍體馬鈴薯基因dna ? st901 ,基因全長2889bp ,含3個外顯子(長度分別為475bp , 140bp , 39bp )和2個內含子(長度分別為472bp , 253bp ) ; 5 』端含有1447bp的啟動子區段,該區段具備一般啟動子的基本件tatabox和caatbox ; 3 』非編碼區長63bp ,具hind酶切點,沒有發現保守的加信號。
  13. Note that this method can leave trailing lead bytes in the internal buffer, which makes the

    注意此方法會在內部緩沖區中保留部前導,這使
  14. This attack is made much more difficult by the introduction of random bytes at the end of the password before the key derivation

    在密鑰導出之前在密碼末引入隨機將使這種攻擊非常困難。
分享友人