輸入序列 的英文怎麼說

中文拼音 [shūliè]
輸入序列 英文
list entries
  • : Ⅰ動詞1 (運輸; 運送) transport; convey 2 [書面語] (捐獻) contribute money; donate 3 (失敗) l...
  • : Ⅰ動詞1 (進來或進去) enter 2 (參加) join; be admitted into; become a member of 3 (合乎) conf...
  • : Ⅰ動1 (排列) arrange; form a line; line up 2 (安排到某類事物之中) list; enter in a list Ⅱ名詞1...
  • 輸入 : 1 (從外部送到內部) import 2 [電學] input; entry; entering; in fan; fan in; 輸入變壓器 input tra...
  1. An example would be a utility to put material into columnar form

    這樣的一個例子就是將材料劃分為的實用程
  2. That is, vibration caused by the first part of the command signal is canceled by vibration caused by the second part of the command. input shaping is implemented by convolving a sequence of impulses, an input shaper, with any desired command

    成型通過把參考信號和一系脈沖進行卷積,得到成型信號,而成型信號作用於控制對象,其中這脈沖就是成型器。
  3. The parallel form of the input sequence is decoded by means of a logical decoding circuit.

    此并行形式通過邏輯解碼電路
  4. Please input machine type and serial number or warranty card number of your machine, then system will determine if your machine is in warranty and manufacture date, or status of registration on iws

    您只需您的機器型號和號或者保修卡號即可獲得機器的出廠日期、保修期和全球聯保登記的的詳細信息。
  5. In the proposed join algorithms, although some algorithms such as mpmgin algorithm [ 23 ], outperform standard rdbms join algorithms, they perform a lot of unnecessary computation and i / o for matching basic structural relationships, especially in the case of parent - child relationships ; other algorithms such as the stack - tree - desc algorithm [ 24 ], represent the state - of - the - art in structural joins, however, they do not utilize indexed structures but sequentially scan the input lists. thus, i / o ' s can be wasted for scanning element that do not participate in the join, and join speed can be influenced

    另外,在所提出的演算法中,盡管有的演算法,如mpmgjn演算法[ 23 ]優于標準的rdbms連接演算法,但是該演算法為匹配基本的結構關系,特別是在父子關系情況下,執行了大量不必要的計算和佔用了大量的i / o資源;有的演算法雖然代表了結構連接演算法的先進水平,如stack - tree - desc [ 24 ]連接演算法,但是它沒有利用索引結構而是順瀏覽表。
  6. In the study of directional spectrum and reflection coefficient of multidirectional wave, firstly the wave elevation trains overlapped by the incident wave and the reflected wave of multidirectional wave are simulated in the method of a frequency corresponding to a direction. then the composed wave trains are analyzed respectively by the mbdm and the mmlm. during the numerical study, the input factors include the various wave parameters, the different measuring wave system and the various reflect characteristic

    在多向不規則波射波方向譜和反射系數的分析研究中,利用方向頻率對應法模擬了多向不規則波射波與反射波疊加的波面,將此合成波分別應用mbdm和mmlm進行分析,通過各種波浪參量、不同波浪測量系統和各種反射特性等因子,檢驗了mbdm和mmlm方法的適用條件,對兩種分析方法的性能進行了比較分析。
  7. At first, the text is segmented to words and converted to a sequence of part - of - speech tags ; then based on the pos tags sequence parameters and phrase - break distance information from training, markov model is used to get the most likely phrase break sequence

    首先,文本進行分詞,並轉換為一由詞性標記所組成的;然後使用馬爾可夫模型,利用人工標注數據庫訓練詞語連接處詞性標注的概率分佈和連接類型的距離信息,得到的詞性標記對應的具有最大似然概率的連接類型,最後利用后處理規則進行適當的糾錯。
  8. The morphological diagnostic characters for many mature and early instar larvae are still lacking in china. partial sequences of the mitochondrial cytochrome oxydase i and ii and a transfor rna ( co i co ii and trna ) gene of the adults and larvae from caddisflies were. lepidostomaflavum, l. fui, l. arcuatum, paraphlegopteryx morsei, apsilochorema unculatum and apsilochorema hwangi, and the larval and adult stages of these species were sequenced and associated

    採用dnastarpackage中的editseq軟體進行編輯、 orf查找;採用clustalx軟體進行比對( alignment ) ;比對結果mega2 . 1軟體計算各樣品間的遺傳距離,並基於kjmura2 - parameter模型,用鄰接法( neighbor - jojning , nj )構建系統發生樹,通過自展( bootstrap1000次)檢驗獲得系統樹分支的置信度。
  9. Some typical i / o addresses include those for the basic serial ports, known in the microsoft world as com1, com2, com3, and com4

    一些典型的出位址當做com1 、 com2 、 com3和com4為基本的埠,在微軟公司世界中被知道包括那些
  10. The detail is clarified as follows : l ) based on the chaotic technology and contemporary encryption approach the paper put forward a new chaotic sequence, which introduced the m - sequence and the method of shrink key - the stream generator. the complexity of the sequence was promoted as the random alteration of the parameters of chaotic mapping, and at the same time, the shrinking key was used to enhance the security further more ; 2 ) the performance of one - way hash function was improved and new hash function construction methods are proposed through a novel hash method based on chaotic mapping and the aes - the rijndael algorithm. the algorithm of hashing messages of arbitrary length into 256 bits hash values was designed

    按照這種方法,的周期性得以大大提高,理論分析和計算機模擬結果表明,該方法可以產生具有良好統計特性的密鑰流,而且易於軟硬體實現: 2 )實現了一種基於混沌映射和分組密碼rijndael演算法的單向hash函數的構造方法,即使用logistic混沌映射產生混沌二值的分組與明文分組進行按位異或后,進rijndael加密模塊,所得的結果再加到反饋端,參與下一分組的異或運算,迭代結束時的rijndael加密結果即為所求的hash函數值。
  11. In the previous section, we saw that lex recognizes tokens from an input sequence

    在上一節中,我們看到lex從輸入序列中識別標記。
  12. Any person found guilty of importing or exporting unmanifested cargo under the import and export ordinance is liable on conviction on indictment to a fine of $ 2 million and seven years imprisonment

    任何人士若觸犯《進出口條例》出或于載貨單的貨物,一經循公訴程定罪,最高刑罰為罰款200萬元及監禁7年。
  13. And sometimes you need to be able to specify exact inputs or sequences of inputs

    而且有時,你需要能指明準確的輸入序列
  14. For example, someone looking to bypass a registration and verification process can search for the string displayed when the program asks the user for a serial number

    例如,一些設法跳過注冊和驗證過程的人可以搜索程要求用戶輸入序列號的字元串。
  15. After this step is completed, the next time you run dotfuscator or try to register again, you will be prompted for your serial number and confirmation code

    完成此步驟后,在下次運行dotfuscator (或嘗試再次注冊)時,應用程將提示您輸入序列號和確認代碼。
  16. Our results show that the rate of correlation among the random variables of those output sequences are low although they are not independent ; in addition, the output sequences of those combined generators are homogeneous markov chains which are strictly stationary processes with ergodicity ; the output sequences of those combined generators are also proved to summit to the strong law of large numbers and the central limit theorem ; finally the computation formula of the rate of the accordance between the output sequences and input sequences of those combined generators is given

    我們的研究結論表明:雖然這些中隨機變量之間不具有相互獨立性,但它們的相關程度卻比較低;證明了「停走」生成器, km _ 1m _ 2型組合生成器和加法型組合生成器的概率模型都是強平穩的和遍歷的齊次馬氏鏈;討論了這些的概率極限性質,證明了它們均服從強大數定律和中心極限定理;還分別給出了各類生成器的輸入序列之間的符合率的計算公式。
  17. In fact, xslt 2. 0 processors can have multiple nodes supplied as an input sequence

    事實上, xslt 2 . 0處理程允許在中給出多個節點。
  18. Partitions can also be present in data accessed by the software, in time, in input and output sequence, and in state

    劃分可以通過軟體獲取數據,在時間上,在上和在狀態上進行劃分。
  19. In regard to the bluetooth combiner, we study the probability distributions between its output and input sequences, with which we analyze its correlation immunity, introduce two representative attack methods and give a whole evaluation on the security of bluetooth combiner

    對藍牙組合生成器,首先考察了其的基本性質,在此基礎上,研究了它的相關免疫性,介紹了目前有代表性的兩種攻擊演算法,並對藍牙組合生成器的安全性做了總體評價。
  20. Sql scan requires one of the following items as input

    Sql掃描程要求項目之一
分享友人