消息長度 的英文怎麼說

中文拼音 [xiāozhǎng]
消息長度 英文
msl messege length
  • : 動詞1 (消失) disappear; vanish 2 (使消失; 消除) eliminate; dispel; remove 3 (度過; 消遣) pa...
  • : Ⅰ名詞1 (呼吸時進出的氣) breath 2 (消息) news 3 (利錢; 利息) interest 4 [書面語] (子女) on...
  • : 長Ⅰ形容詞1 (年紀較大) older; elder; senior 2 (排行最大) eldest; oldest Ⅱ名詞(領導人) chief;...
  • : 度動詞[書面語] (推測; 估計) surmise; estimate
  • 消息 : 1. (情況報道) news; information 2. (音信) tidings; news
  • 長度 : length; longitude; size; extent; footage
  1. You can choose different encipher algorithms according to requirement. aes is a symmetric block cipher that can process data blocks of 128 bits, using cipher keys with lengths of 128, 192and 256 bits. because the length of block and key has been expanded, security has been enhanced

    Aes ( advancedencryptionstandard )是fip ( federalinformationprocessingstandardspublication )在2001年6月發布的草案,它是分組加密演算法,分組為128bit ,有三種密鑰128bit 、 192bit 、 256bit ,由於分組和密鑰使得安全性大大的提高,它有望成為21世紀的加密標準。
  2. In this protocol, the transmitter organizes the frame according to it, and the receiptor does validity check of the characters, length check, crc check. thus, the system will work more exactly and efficiently. and based on rs - 485 communication, the paper implements a process communication method, which is impulsed by overtime message of timers ’ check

    在這種協議中,發送方根據協議組幀,接收方主要採用了字元合法性校驗、校驗、內容的crc校驗,提高了通信的效率及正確性,最後在rs - 485通信上實現了基於定時器超時檢測驅動的進程通信策略。
  3. Our study concentrates on the birthday attack, the length extension attack, the differential analysis, the message modification method, the multi - collision attack, the fixed point attack and the neutral bit attak

    重點介紹了其中幾種起關鍵作用的攻擊技術:生日攻擊、擴展攻擊、差分分析技術、多沖突攻擊、修改技術、固定點攻擊和不相關位攻擊技術。
  4. We also take two conclusions by foregoing result : first of all, the system becomes more and more complex, the system data bus utilization copy result, time of system timed and length of the news waiting queue become more and more precise basing on stochastic petri net

    通過結果數據分析、比較,本文得出兩點結論:第一,隨著系統復雜程的提高,基於隨機petri網的系統總線利用率、系統延時時間、等候的模擬結果會越來越精確,這特別適合現代越來越復雜的航空電子綜合系統數據總線的分析。
  5. When talking about a common java representation of a message, this commonality lies in the format of the message, not a transformation to a common data model for the message content itself ; that is, a common way to get the length of the message, but not, for example, the po number tag

    當討論公共java表示法的時候,這一通用性在於的格式,不是轉換為內容自身的公共數據模型;換句話說,是獲得消息長度的通用方法,例如, po _ number標簽。
  6. Because of my working condition, the trade place are only limitted in local instruments companies of beijing or dalian

    這里僅僅提供信,對於二手笛實際新舊程的可靠性請朋友們自行與賣方聯系落實。
  7. Under the supervision together from the central propaganda department, the ministry of information industry, the press publication arrange and some correlated departments, the competition between the business activities and market already existed in the press medium and the real strength of them were constantly changing, but all this were limited to some narrow trade, limited areas, and be satisfied with a smattering of a subject. it did n ' t accomplish the completely change from the link of policy to the link of capital on operation and managemen t manner

    在中宣部、信產業部、新聞出版署以及相關行業部門的共同監管之下,傳媒業雖然也有業務和市場的競爭以及實力的此,但僅限於狹窄的行業、有限的區域、淺嘗則止的程之內,在經營和管理方式上依然沒有完成以政策為紐帶向以資本為紐帶的脫胎換骨式的轉變。
  8. The message you specify cannot be more than 16k in length

    指定的消息長度不能超過16 k 。
  9. The parsing overhead is a result of having to read and evaluate the tags and length fields in the message to determine how to handle the data value following the tag

    解析開銷是因為必須計算中的標記和欄位以便決定如何處理標記後面的數據值而造成的。
  10. 2 ) radar incidence angle and surface roughness correction : to make radar incidence correction and eliminate the surface roughness effects, a wide range of surface parameters ( soil moisture, surface rms height, correlation length, incidence angle ) was input to the ibm model to simulate the effect of surface roughness and radar incidence angle on the sensitivity of soil moisture to the radar backscattering coefficient. a simple model was established to simulate the effects of incidence angle and surface roughness. 3 ) establishment of soil moisture change inversion model : according to a modified ibm model simulation results, the bare surface backscattering coefficients can be expressed as a funtion of the dielectric component for a given surface roughness when the surface slope greater than 2. 0, which is valid for most nature surface : in above equation, r0 is the surface reflectivity at normal incidence

    本研究中,首先利用基於微波輻射傳輸方程的微波植被模型和積分方程( iem )模型模擬了各種地表土壤水分含量情況下,植被覆蓋、地表粗糙(包括地表均方根高和相關) 、雷達入射角對c波段(頻率4 . 7ghz )水平極化( hh )雷達後向散射系數的影響,在此基礎上,建立模型除了植被覆蓋、地表粗糙、及雷達入射角對雷達後向散射的影響,利用多時相50m解析radarsatscansar雷達後向散射系數圖像反演得到了地表土壤水分變化模式信
  11. A set of java apis exist for accessing sdos and an sdo model of a message is used to represent data about messages, such as length, format, header information, and so on

    一組java api因訪問sdo而存在並且的sdo模型用於表示關于的數據,例如、格式、頭信等等。
  12. It is found ecn could n ' t solve the problem that the sender responds to congestion slowly, and the average queue length of router is sensitive to the static parameters of ecn. in chapter four we propose an algorithm called fecn, which provides congestion control and indication messages in router, so that the sender could response to congestion in good time. this algorithm can also adjust the max drop probability according to the active conne

    Ik的特性,而且平均隊列和網路吞吐量對ecn的靜態參數較為敏感,因此本文在第4章中提出了一種fecn演算法,該演算法在路山器處提供擁塞控制和指示機制,使源端能夠快速響應路由器發回的擁塞指示,調整發送速率,避兔擁塞的發生,該演算法還可以通過估計鏈路中的活動連接數動態調整最大丟棄概率。
  13. The length or the capacities of the tactical data are always different, and so the conventional data scheduling algorithm which consisted " first in first service " and " shore message first service " are not appropriate in the tactical communication applications. to meet the requirement of the information service priority, we presented a dynamic priority scheduling algorithms, which working on the order programming mode, can improve the efficiency of the asymmetric broadcast channel

    戰場數據分發的數據容量相差懸殊,分析了常規「先入先服務」及「短優先」等調演算法存在的不公平特性,根據戰術通信對信服務優先權的特殊要求,提出了一種「動態優先權」調演算法,在點播模式下,可提高非對稱廣播通道數據的傳輸效率。
  14. In this paper, we present a fast attack algorithm to find two - block collision of hash function md5. the algorithm is based on the two - block collision differential path of md5 that was presented by wang - it et al

    Hash函數也稱雜湊函數或雜湊演算法就是能夠把任意小於264比特的串m映射成某一固定的輸出串h的一種函數。
  15. However, the communication part of vehicles managing navigation system is based on gsm - sms which can not offer real - time applications. the bearing of the vehicles managing navigation system ’ s development is using gprs technology that has high speed and inexpensive expenses to change the gsm part

    而且,與gsm短方式相比,採用gprs技術還具有傳輸速快、可靠性高的優點,尤其是gprs合理、低廉的數據傳輸成本,對于車輛監控系統的期運營具有十分重要的意義。
  16. New delhi : in a remarkable act of long - range maritime snooping, navy ' s reconnaissance aircraft and spy drones detected, tracked and photographed a spanking new chinese destroyer and a tanker traversing through the indian ocean region this weekend

    新德里:在本周末一次不尋常的距離海上窺視行動中,海軍偵察機和無人機探測、跟蹤並拍攝了疾駛穿越印洋的1艘中國新驅逐艦和1艘油船。
  17. For a message digest, the strength of the algorithm is determined by the size of the hash or check sum that the algorithm generates

    對于摘要,演算法的由演算法生成的哈希碼或者校驗和決定。
  18. A tagged message also has the space overhead of allocating variable length data elements to store the retrieved data values

    帶標記的還需要分配可變的數據元素來存儲檢索數據值而帶來的空間開銷。
  19. This is useful for reporting a dynamic situation, where a message may be reporting one event such as road construction ahead, but the details of which change periodically the length of the traffic jam, for example

    這對于報告動態情況比較有用,在這樣的情況下,可能正在報告某個事件(如前方道路施工) ,但事件的詳情經常改變(例如,塞車的) 。
  20. Abstract : in a network system, overflow or overwrite of message buffer will cause missing of messages. for a timed token network, message transmission time and the message buffering space allocation in a node are very important issues on network real time capability. this paper analyses the message buffering mechanism, describes the relationship of message buffering space and message transmission bandwidth allocation, and proposes a space determination method of message buffer for ltpb network. the maximum space redundancy avoiding buffer overflow for “ send ” and “ receive ” buffers has been derived. it is found that the space of “ send ” and “ receive ” buffers is equal to the message size under condition that the message gap time is greater than message latency and node response time

    文摘:在網路系統中,節點緩沖區內發生覆蓋或溢出會造成的丟失,對于限時令牌網路,節點發送時間和緩沖容量的分配是影響實時性的重要因素.針對令牌傳遞網路分析了節點緩沖機制,說明了緩沖容量的確定與網路帶寬分配方法的關系,並提出了緩沖容量的確定方法,導出了避免覆蓋或溢出所需的最大發送和接收緩沖容量余.指出在的產生間隔大於該的最大允許的延遲時間和接收節點響應時間的條件下,發送和接收端的緩沖容量等於被緩沖
分享友人