有效位元組 的英文怎麼說

中文拼音 [yǒuxiàowèiyuán]
有效位元組 英文
effective byte
  • : 有副詞[書面語] (表示整數之外再加零數): 30 有 5 thirty-five; 10 有 5年 fifteen years
  • : Ⅰ名詞(效果; 功用) effect; efficiency; result Ⅱ動詞1 (仿效) imitate; follow the example of 2 ...
  • : Ⅰ名詞1 (所在或所佔的地方) place; location 2 (職位; 地位) position; post; status 3 (特指皇帝...
  • : Ⅰ名詞1 (由不多的人員組成的單位) group 2 (姓氏) a surname Ⅱ動詞(組織) organize; form Ⅲ量詞(...
  • 有效 : effective; valid; efficacious
  1. The 1988 omnibus trade and competitiveness act calls for reporting on " whether countries manipulate the rate of exchange between their currency and the united states dollar for purposes of preventing effective balance of payments adjustment or gaining unfair competitive advantage in international trade. " in submitting today s report, i would like to draw your attention to a special annex in today s report that highlights the complexity of reaching judgments on this issue

    1988年通過的《貿易和競爭力綜合法案》要求就"國家是否為了阻止調整國際收支平衡或在國際貿易中謀取不公平的競爭優勢而操縱其貨幣兌美的匯率"這一問題提出報告。在呈交今日報告之際,我希望提請各注意今日報告中用於闡釋目的的一份特別附件,該附件強調了就這一問題做出評判的復雜性,表明沒任何一項或一指標能夠提供決定性的證據。
  2. The encoder can use the big - endian byte order most significant byte first or the little - endian byte order least significant byte first

    編碼器可以使用big - endian順序(從最高有效位元組開始) ,也可以使用little - endian順序(從最低有效位元組開始) 。
  3. In improved uep scheme, the syntax elements belonged to luminance parts and chrominance parts was reassigned to different data partitions. those packets containing syntax elements belonged to luminance parts were got error protection at high level so as to guarantee their correctness during transmitting in error - prone network. simulation has shown that using proposed scheme, the packing tradeoff is decreased 8240 bytes in error - free channel and also the output bits and bit rate of coded video stream are decreased 2. 70kbits and 0. 33 kbps respectively

    模擬實驗表明,本方案能在無噪通道中降低編碼器端8240的打包開銷和2 . 70kbit的輸出比特數以及0 . 33kbps的比特率,而在噪通道中可使解碼輸出重構視頻圖像的視覺質量得到一定程度的提高,亮度分量峰值信噪比可增加近1db 。
  4. Effective byte location

  5. The memory available to a c + + program consists of one or more sequences of contiguous bytes

    對于c + +程序的存儲由一個或多個連續序列成。
  6. Triple des usually abbreviated 3des or des3 uses the same algorithm as des, but increases the algorithm s security by employing longer keys of up to 192 bits 168 bits of effective length once the " parity " bits are removed and iterative calls of the des algorithm

    Triple des (常簡稱為3des或des3 )使用與des相同的演算法,但是通過採用更長的多達192(除去每個的1個「奇偶」,實際長度為168) ,並重復調用des演算法,增強了演算法的安全性。
  7. The least significant bit of each byte represents the lowest index value : " bytes

    每個的「最低」表示最小索引值:
  8. The ski is composed of a four - bit type field with the value 0100, followed by the least significant 60 bits of the sha - 1 hash of the value of the public key excluding the tag, length, and number of unused bit string bits

    Ski由具值0100的四類型欄成,後跟公鑰值(不包括標記、長度和未使用字數)的sha - 1哈希的60最低
  9. Valid arguments are limited to other variables, 4 - byte integers, and the constants

    參數被限制為其他變量、四整數和常數
  10. Orders by most - significant byte first, whereas

    按最高有效位元組在前排列,然而
  11. Orders by least - significant byte first

    按照最低有效位元組在前排序。
  12. Rohc could compress 40 octets of rtp / udp / ip headers to a minimum of 1 octet while it could work when packet loss and out of order

    Rohc可將rtp / udp / ip長達40個的頭部最少壓縮為1個,同時能抵抗無線鏈路上的丟包及亂序。
  13. When deltas are done at the level of bytes instead of textual lines, that efficiency becomes available to all kinds of files, not just text files

    當增量是在層面運作,取代了文本行級別,那率就變得不僅僅對二進制的文件而是所類型用了。
  14. We described all kinds of obfuscating methods as viewed from byte code and designed effective method to produce redundant code

    論文從碼的角度描述了不同的混淆方法,並設計了的方法來產生冗餘代碼。
  15. In recent years, with the development of communication technologies, digital protection devices are also improved. in this paper, the communications that are used in digital protection device and the protocol they followed are studied. as a kind of field bus technology, can ( control area network ) is applied to the communications of double mcu, which has higher reliability and strong transmission ability

    同以往的通信技術相比, can信號傳輸採用短幀結構,每幀的有效位元組數為8個,因而傳輸時間短,受干擾的概率低,當節點嚴重錯誤時,具自動關閉的功能,以切斷該節點與總線的聯系,使總線上的其他節點和通信不受影響,具較強的抗干擾能力。
  16. If a grid contains double - byte character sets dbcs and non - standard character sets, the application must handle these in order to run effectively

    如果網格中包含雙字符集( dbcs )以及非標準字符集,那麼應用程序就必須處理這些情況才能運行。
  17. To minimize the amount of stack frame space required for a method, the same words of the stack frame may be used for different local variables at different points in the bytecode, as long as the active ranges for the variables don t overlap

    碼中,為了使方法所需要的堆棧空間最小化,不同置的不同本地變量可能會使用堆棧結構中的同一個字,只要變量的范圍不重疊。
  18. Breakdown of memory usage per user, with allocated bytes vs. live bytes memory utilized after allocation

    將每個用戶的內存使用分類為已分配數和有效位元組數(分配后被利用的內存) 。
  19. There is a section for routing, addressing, and message identification ; an optional section where application - specific parameters can be passed ; and a third section where the message payload text, bytes, value map, object, etc. is stored

    其中一個部分( section )用於路由、尋址和消息識別;還一個可選的部分,在這個部分中可以傳遞一些特定於應用( application - specific )的參數;第三個部分存放的是消息的負荷(文本、、值映射( value map ) 、對象,等等) 。
  20. The major problems found in the test was that some overhead bytes of the stm - 1 signal processed on those exchanges were inconsistent with those in the transmission system. this would to some extent undermine the effective cooperation of the nm function between the exchange and the transmission system, obstruct the alarm judgement and locating and impede the realization of the protection rotation function

    測試發現主要問題是各交換機stm - 1信號的部分開銷與傳輸系統不一致,這會在一定程度上影響交換機與傳輸系統二者的網路管理功能的配合,影響告警的判斷與定,影響保護倒換功能的實現。
分享友人