行二進 的英文怎麼說

中文拼音 [hángèrjìn]
行二進 英文
column binary
  • : 行Ⅰ名詞1 (行列) line; row 2 (排行) seniority among brothers and sisters:你行幾? 我行三。where...
  • : Ⅰ數詞(一加一后所得) two Ⅱ形容詞(兩樣) different
  • : 進構詞成分。
  1. This paper put forward the optimized methods include reconstructing the characteristic curve by reasonable use of the adjust tools and analyse tools of the modeling software, admeasuring the automotive model surface correctly, simulating the breaking surface and creating the surface in the right turns which is good for modeling a smooth and exactitude surface. at last, after the correct analysis of the factors which are effect to the surface construction, a smooth and exactitude surface of the similar diamond concept car has been constructed by using the right optimize method

    本文通過合理利用反求軟體中的造型工具和分析工具,正確劃分反求模型的造型區域,使用正確的曲面造型方法,對反求曲面的特徵網格線次優化,並對突變曲面擬合再生成處理及建立合理的曲面生成順序等方法,最終獲得了仿型度和光順度都很高的反求曲面。
  2. My project is to research and devise a enterprise scm software system, that based the two grades and four libraries ( department development library, department controlled library, department development library, enterprise controlled library, enterprise product library ), and use the jbcm which was devised by the beijing beida software engineering co., ltd. as the antitype. we call it cmis

    本課題就是以中國電子科技集團公司第十研究所為需求方,以北大軟體配置管理工具軟體jbcm為原型,次開發,研製一套基於兩級四庫(即部門開發庫、部門受控庫、企業受控庫和企業產品庫)模式下的企業級軟體配置管理系統( cmis ) 。
  3. The non - permanence and synchronization way solution adopts hbwsp. the permanence and asynchronism way solution exchanges data after save data into files of binary format

    非持久同步方式採用hbwsp ;持久異步方式把數據保存成制文件后數據交換。
  4. Viruses do not undergo binary fission.

    病毒並不分裂。
  5. The encryption method is n ' t considered the characteristic of the video signal, regard the image data file as the general binary scale data file to encrypt

    一是用純密碼演算法加密技術,將圖像數據文件當作一般的制數據文件加密。
  6. While the platform - independent xml has the flexibility of localization, the ibm java resource buddle gives a far better performance as it is compiled and run as binary code

    盡管獨立於平臺的xml可以靈活地本地化, ibm java resource buddle還是提供了更好的性能,用制碼編譯和運xml 。
  7. Figure 5. 1 shows a network that decodes a given bit sequence.

    圖51是一個對給定制序列解碼的網路。
  8. Figure 1 gives a diagrammatic representation of the ste in analysing a binary statically for the presence of malicious behaviour

    圖1給出靜態分析制代碼檢查惡意為的圖示。
  9. Figure 1 gives a diagrammatic representation of the steps in analysing a binary statically for the presence of malicious behaviour

    圖1給出靜態分析制代碼檢查惡意為的圖示。
  10. Then based on the method of dimidiate pixel model, the current model is improved, and the model of deriving vegetation fraction from normalized difference vegetation index ( ndvi )

    然後在像元分模型的基礎上對已有模型,建立用ndvi歸一化植被指數估算植被覆蓋度的模型。
  11. The management work data of oil - field earthquake exploration and oil - well position, which has not only data of current space position, but also entitative attribute data describing, have great capacity, traditional cad graphics describing the data plus the model database managing mode ca n ' t already adapt the modem exploration with well geography information for management work demand, so it is necessary to realize the unique management of exploration and oil - field well space data and attribute data use advanced geography information system ( gis ) technique, this thesis is based on the excellence ' s table ' s top geography information system - the maplnfo software, using the second process technique, the digital relief map and tectonic map as the base map, the earthquake exploration database as the original data, established the gis of the exploration and oil - field well in the area of the liaohe oil - field, realize visualization management, it provides a reference thereunder for the earthquake exploration deplo ying the workload and proceeding the technique design, and completed lots of practical work

    油田地震勘探與油井井位管理工作數據量大,既有空間位置數據,又具有實體的屬性描述數據,傳統的cad制圖+屬性數據庫管理模式已經不能適應現代勘探和井位管理工作的需要,採用先的地理信息系統( gis )技術,實現勘探和油田井位空間數據和屬性數據的統一管理是必然的趨勢。本文以優秀的桌面地理信息系統mapinfo軟體為開發平臺,在此基礎上次開發,以數字化地形圖、構造圖為載體,以地震勘探數據庫為數據源,建立了遼河油田范圍內的地震勘探和油田管理信息系統,實現了數據的可視化管理,為地震勘探部署工作量、技術設計,提供了圖形和數據的參考依據。並完成了很多實際工作。
  12. Performs a binary sort

    行二進制排序。
  13. The tidal locking situation for asteroid moons is largely unknown, but closely - orbiting binaries are expected to be tidally locked, as well as, obviously, contact binaries

    給星狀的衛星潮汐的鎖定情形相當未知,但是接近地-繞軌道而行二進被期望潮汐地被鎖,連同,顯然地,連絡
  14. Retention because this cannot be supported when doing binary weaving weaving using. class files as input

    持久性的注釋的連接點匹配,因為在行二進制織入的時候不支持這項功能(織入時用
  15. This method performs a binary search ; therefore, this method is an o log

    此方法執行二進制搜索;因此,此方法是運算復雜度為o ( log
  16. Binary search performing a binary search requires that the elements in the array be sorted

    制搜索執行二進制搜索要求數組中的元素已經排序。
  17. When performing binary operations, if one of the operands is a floating - point type,

    在執行二進制運算時,如果一個操作數為浮點類型(
  18. Binary file opened for binary access

    行二進制訪問而打開的文件。
  19. This method performs a binary search ; however, the elements are moved up to fill in the open spot, so this method is an o

    此方法執行二進制搜索,但會上移元素以填充空白區域,因此,此方法的運算復雜度為o (
  20. The only exception is the result of a binary operation on two values with the dt decimal data type, which returns a result with the dt numeric data type

    唯一的例外是,如果對兩個dt _ decimal數據類型的值執行二進制操作,則它將返回dt _ numeric數據類型的結果。
分享友人