按位異或 的英文怎麼說

中文拼音 [ànwèihuò]
按位異或 英文
exclusive or
  • : Ⅰ動詞1 (用手或手指壓) press; push down 2 (壓住; 擱下) leave aside; shelve 3 (抑制) restrain...
  • : Ⅰ名詞1 (所在或所佔的地方) place; location 2 (職位; 地位) position; post; status 3 (特指皇帝...
  • : 形容詞1 (有分別; 不相同) different 2 (奇異; 特別) strange; unusual; extraordinary 3 (另外的;...
  1. As object lessons to explain : 1 the nature and habits of oviparous animals, the possibility of aerial flight, certain abnormalities of vision, the secular process of imbalsamation : 2 the principle of the pendulum, exemplified in bob, wheelgear and regulator, the translation in terms of human or social regulation of the various positions clockwise of movable indicators on an unmoving dial, the exactitude of the recurrence per hour of an instant in each hour, when the longer and the shorter indicator were at the same angle of inclination, videlicet, 5 5 11 minutes past each hour per hour in arithmetical progression

    他把它們作為實物教材,用以說明: 1卵生動物的本性與習性,空中飛行的可能性,一種常的視覺器官,世俗界用防腐藥物保存屍體的方式。 2體現于擺錘輪與整時器上的鐘擺的原理不動的針盤上那可移動的正轉的長短指針在各個置作為人社會規范所包含的意義長針和短針每小時在同一傾斜度相遇的那一瞬間,也就是說,照算術級數,每小時超過5 5 11分的那一瞬間,每小時重復一次的精確性146 。
  2. Computes the bitwise exclusive - or of its operands

    將計算操作數的」 。
  3. The detail is clarified as follows : l ) based on the chaotic technology and contemporary encryption approach the paper put forward a new chaotic sequence, which introduced the m - sequence and the method of shrink key - the stream generator. the complexity of the sequence was promoted as the random alteration of the parameters of chaotic mapping, and at the same time, the shrinking key was used to enhance the security further more ; 2 ) the performance of one - way hash function was improved and new hash function construction methods are proposed through a novel hash method based on chaotic mapping and the aes - the rijndael algorithm. the algorithm of hashing messages of arbitrary length into 256 bits hash values was designed

    照這種方法,輸出序列的周期性得以大大提高,理論分析和計算機模擬結果表明,該方法可以產生具有良好統計特性的密鑰流,而且易於軟硬體實現: 2 )實現了一種基於混沌映射和分組密碼rijndael演算法的單向hash函數的構造方法,即使用logistic混沌映射產生混沌二值序列,序列的分組與明文序列分組進行按位異或后,進入rijndael加密模塊,所得的結果再加入到反饋端,參與下一分組輸入的運算,迭代結束時的rijndael加密結果即為所求的hash函數值。
  4. Are popped from the stack and their bitwise xor computed

    並進行按位異或計算。
  5. Property contains the results of the bitwise xor

    屬性包含」運算的結果。
  6. Computes the bitwise xor of two integer values and returns an integer

    計算兩個整數值的按位異或,並且返回一個整數。
  7. Instruction computes the bitwise xor of the top two values on the stack and leaves the result on the stack

    指令計算於堆棧頂部的兩個值的按位異或,並且將結果留在堆棧上。
  8. Is a numeric value representing the bitwise exclusion exclusive bitwise disjunction of two numeric bit patterns

    是代表兩個數值組合模式的按位異或運算(互斥析取)的數值。
  9. Computes the bitwise xor of the top two values on the evaluation stack, pushing the result onto the evaluation stack

    計算於計算堆棧頂部的兩個值的按位異或,並且將結果推送到計算堆棧上。
  10. Exclusive or means that if the two operand bits are different the result is 1, otherwise the result is 0. the following table shows the results of an exclusive or operation

    不包含式)按位異或意味著,如果兩個運算數相應比特不同,其結果為1 ,否則結果為0 .下表顯示運算結果
  11. And finally, the complement operator inverts the value of each bit of the operand : if the operand bit is 1 the result is 0 and if the operand bit is 0 the result is 1

    最後,上面的互補運算符(按位異或)對兩個操作數的每個比特進行值的轉化:操作數比特是1的(另一個為0 )運算后的(比特)結果為1 ,比特為0 (而另一個操作數為1的) ,計算后結果為1
  12. The bitwise exclusive or, or xor ( ^ ), produces a one in the output bit if one or the other input bit is a one, but not both

    若兩個輸入的某一個是1 ,但不全都是1 ,那麼xor ( ^ ,)在輸出里生成一個1 。
  13. Performs a bitwise exclusive - or operation on the supplied

    參數執行」運算。
  14. Performs a bitwise exclusive - or operation on the specified

    結構執行」運算。
  15. Performs a bitwise exclusive - or operation on the supplied parameters

    對提供的參數執行」 xor運算。
  16. Performs a bitwise exclusive - or operation on integral operands and logical exclusive - or on

    對整數操作數執行」運算,對
  17. The results of the bitwise xor operation

    」運算的結果。
  18. Structure that contains the results of the bitwise xor operation

    結構,它包含」運算的結果。
  19. The algorithm encrypt a file by random factor by bit add xor add circular cryptographic key

    該演算法採用隨機碼數列++循環密鑰的方式進行加密。
分享友人