碼元組合 的英文怎麼說

中文拼音 [yuán]
碼元組合 英文
grouping of bits
  • : Ⅰ名詞(表示數目的符號或用具) a sign or object indicating number; code Ⅱ量詞1 (指一件事或一類的...
  • : Ⅰ名詞1 (由不多的人員組成的單位) group 2 (姓氏) a surname Ⅱ動詞(組織) organize; form Ⅲ量詞(...
  • : 合量詞(容量單位) ge, a unit of dry measure for grain (=1 decilitre)
  • 組合 : 1 (組織成為整體) make up; compose; constitute 2 (組織起來的整體) association; combination3 [...
  1. The control system included the following units : video decode unit, data format conversion unit, fpga controller, cache unit and d / a monitor. the above self - design control unit plus row and column power supply units make the whole fed driving system, thus drove the 25 inch sample and realized color video display. the 25 inch vga sample thus fabricated could display video images, and obtained its brightness 400cd / m2, contrast ratio 1000 : 1, 256 circuit gray scale

    本文介紹了fed驅動系統的工作原理,重點論述了基於fpga的vga級彩色fed新型驅動控制系統的研製,這種新型fed驅動控制系統主要包括視頻解電路、數據格式轉換電路、 fpga控制電路、數據緩存電路和d / a監控電路,配后級列灰度調制單和行掃描單成完整的fed驅動系統,可以驅動25英寸vga級fed顯示屏,實現彩色視頻顯示,樣機亮度達400cd / m2 、對比度為1000 : 1 ,灰度等級為256級。
  2. Drawing modes are binary raster - operation codes representing all possible boolean combinations of two variables, using the binary operators and, or, and xor ( exclusive or ), and the unary operation not

    繪圖模式是二進制的光柵操作代,使用二操作符and , or和xor ,以及一操作符not ,表達了兩個變量所有可能的布爾
  3. A null mask will accept any combination of characters as input

    空掩接受輸入的任意字
  4. A database of names, addresses and social security numbers ( a common form of identification in america ) might require only 200 characters to contain all possible combinations

    一個由姓名、地址、社保號(美國常用的身份認證形式)成的數據庫僅需約200個字來容納所有可能的
  5. Bar code is one kind of sign composed regularly with a group of bars and spaces, which is used to represent the combination information of characters, numbers and symbols

    是一按一定編規則排列的條、空符號,用以表示一定的字、數字及符號成的信息。
  6. Using the theories of probability, algebra and number theory comprehensively, we investigate a class of boolean functions with three - valued walsh spectrum in the first part of this dissertation : the properties of the extended semi - bent functions, which are constructed from any two bent functions, are studied, followed by the structure characteristics of the boolean functions satisfying propagation criterion with respect to all but two vectors ; the definition and cryptographic properties of k - order quasi - bent functions are proposed whose walsh spectrum takes on only three values. some sufficient and necessary conditions are offered to decide whether a boolean function is a k - order quasi - bent function ; a special method is presented to construct the k - order quasi - bent functions, whose cryptographic properties are explored by the matrix method, which is different from the method of walsh spectrum and that of autocorrelation of boolean functions ; the application of this kind of boolean functions in the fields of stream cipher, communications and block ciphers is discussed, which shows the great importance of the fc - order quasi - bent functions ; some methodology are proposed to construct the k - order quasi - bent functions, including the complete construction by using the characteristic matrices of boolean functions, and the recursive method by two known k - order quasi - bent functions we further extend our investigation to the ring zp, where p is a prime, and the similar results are presented as far as the p - valued quasi - generalized - bent functions are considered

    本文首先綜運用概率論、代數學、數論等基礎學科的理論知識,並以頻譜理論作為主要研究工具,對一類譜值分佈相對均勻的函數? ?廣半bent函數、 k階擬bent函數和p值k階擬廣義bent函數進行了系統、深入的研究,給出了廣半bent函數定義,並探討了廣半bent函數的密學性質;給出了k階擬bent函數和p值k階擬廣義bent函數的定義及等價判別條件;討論了k階擬bent函數和p值k階擬廣義bent函數與部分bent函數和p值廣義部分bent函數的關系,探討了它們的密學性質;給出了k階擬bent函數和p值k階擬廣義bent函數的典型構造方法,並將對k階擬bent函數的密性質的研究轉化到對一類特殊的矩陣的研究上;利用布爾函數的特徵矩陣原則上給出了k階擬bent函數的一種完全構造方法,還給出了從已有的p值k階擬廣義bent函數出發,遞歸構造變個數更多的p值k階擬廣義bent函數的方法;初步探討了k階擬bent函數在序列密、分以及通信中的應用;給出了一類布爾函數walsh譜的分解式,並利用這類布爾函數的walsh譜分解式給出了一類近似穩定的布爾函數的構造,特殊情形下為k階擬bent函數;利用代數數論的知識考察了p值k階擬廣義bent函數的譜特徵,並給出了k階擬廣義bent函數與所有仿射函數的符率特徵等等。
  7. Overall, this means that it s the combination of the logic sequence you use and the bytecode that is generated from this that ultimately affects performance

    總體來講,這意味著您要使用邏輯序列與位,後者是從前者中生成的,最終會影響性能。
  8. In combination with the data types that use utf - 8 encoding, functions like substr and length still work with bytes and not with characters

    在與使用utf - 8編的數據類型結使用時, substr和length等函數仍然處理位而不是字
  9. The java language is a sort of hybrid, in that its code is compiled into bytecode a form of binary for an abstract computer

    Java語言是某種混體:它的代被編譯成位(針對抽象計算機的二進制形式) 。
  10. Good passwords are commonly defined as a random mix of letters upper and lower case, numbers, and symbols at least eight characters in length - longer is better, meaning in this case harder to guess or crack

    健壯的密的定義通常指至少八個字長度越長越好,在這里意味著更難猜或破解的字母(大寫和小寫) 、數字和符號的隨機
  11. In this paper, the general structure of block cipher together with its related properties is firstly discussed, then the main non - linear component of s - boxes in block cipher is analyzed. as to the boolean function in binary field, we studied its non - linearity, linearity structure, output bit independence criterion ( big ), balance, completeness, strict avalanche criterion, propagation criterion, correlation immunity, linear approximation table and xor distribution table. we also discussed the pile - up lama used to compute the combination linear probability and showed an instance of its application

    本文首先討論了分的一般結構及其相關特性,此外還有分主要的非線性成部分s盒。對於二域上的布爾函數主要討論了其非線性性、線性結構、比特獨立準則、平衡性、完整性、雪崩準則、傳播準則、相關免疫性、線性分佈表及異或分佈表等特性。對計算線性概率的迭加定理我們也進行了具體的討論,並給出了運用事例。
  12. The system not only makes ipa input method more standard and suitable to encoding standards, but also resolves a lot of problems such as, too many letters and symbols for fewer keys, hard to master, nonstandard application etc. based on iso iec106446, we divide ipa symbol into two groups, the base ipa characters and combining symbols

    該輸入法不僅使國際音標應用更加規范並符相關編標準,還解決了國際音標字母和符號多鍵位少字母與符號雜亂無章一般文字工作者難以掌握,應用不規范等難題。我們將國際音標的字符集,基於iso iec 10646編的特點分為國際音標基本字字母和國際音標符號兩大類。
  13. Combines letters, numbers, and symbol characters within the password

    使用字母、數字和符號字
  14. Under normal circumstances, this new second path would follow the insertion order, meaning that the iterator for the collection will return the elements in their insertion order not in the order that their hashing codes have them incorporated into the collection, but

    正常情況下,這個新的第二路徑會遵循插入順序,這意味著集的迭代器將按照素的插入順序返回素(而不按它們的散列將其成一個集的順序) ,但
  15. Obviously rc6 is not square - like cipher. square attack can only attack few rounds of rc6, because the data - rotations of rc6 affact the rules of propagation for active and passive words, which makes square attack ineffective. we analyse the square attack against serpent which is bit - oriented cipher, and the result shows that square attack on serpent is weak, because the bit - oriented linear operations interrupt the rules of propagation for active and passive multiset

    我們將square攻擊應用於rc6密,發現square攻擊只能攻擊少數幾輪rc6 ,這主要是因為rc6的數據依賴循環運算打亂了活動位和固定位的傳播路徑,使得攻擊無法進行。我們分析了對serpent密的square攻擊, serpent密的按比特線性混運算打亂了所構造multiset的傳播路徑,使得攻擊只能進行到3輪serpent密
  16. After deeply studying all kinds of problems of current actualization methods, we put forward to a new actualization method of the technology of physical isolation on the base of cpld. we make a lot of research on data encryption and describe the design method of the encryption chip on the base of lfsr ( linear feedback shift register ). after putting forward to the whole design procedure, we design an encryption chip on the base of lfsr, which can provide the high - quantity data stream of encrtption

    在深入研究了常見物理隔離技術實現方案中存在的各種問題后,提出了一種基於cpld的全新實現方案;同時,對于存儲信息的加密也進行了研究,詳細闡述了基於移位寄存器的非線性序列密的設計方法,提出了完整的設計流程,並設計了一個基於fpga的非線性反饋序列密,該晶能提供高質量的偽隨機密鑰流。
  17. The vd is composed of four functional units : 1 ) the branch metrics unit ( bmu ) ; 2 ) the add - compare - select unit ( acs ) ; 3 ) the path metrics unit ( pmu ) ; 4 ) the survivor memory unit ( smu ) ; regarding the power dissipation of the viterbi decoder, the smu is the hottest spot in the viterbi decoder due to the frequent memory accesses. there are two traditional techniques for the realization of survivor memory unit in viterbi decoder - - register exchange ( re ) and trace back ( tb ) method

    這是當前開展低功耗邏輯優化的重要方面,也是本課題採用的方法。 viterbi譯器主要由四個功能單成:分支度量單( bmu ) ,加比選單( acs ) ,路徑度量存儲單( pmu ) ,倖存路徑存儲和輸出單( smu ) 。本文所做的viterbi譯器設計採用模塊化的設計方法,先對各個功能單進行優化設計,然後將各個功能單在一起,形成最終的譯器。
  18. It support label, button, textbox include single line, multiline or password style, radio, checkbox, list box, dropdown list, picture box, group box, panel, progressbar and links between with controls

    支持文本標簽,按鈕,文本框支持單行,多行或密樣式,單選框,復選框,列表,下拉列表,圖片框,框,面板,進度條以及素間的鏈接關系。
  19. A bit or bit pattern in a header of a storage location or unit of data that indicates some special condition ( read - only, defective track

    存儲器單或數據單標題頭中的一位或位,用以指示某種特殊狀態(只讀,故障道) 。
  20. This character code is unique for every combination of a character key and a modifier key

    此字對于字鍵和修改鍵的每個都是唯一的。
分享友人