運算代碼 的英文怎麼說

中文拼音 [yùnsuàndài]
運算代碼 英文
code operation
  • : Ⅰ動詞1 (物體位置不斷變化) move; revolve 2 (搬運; 運輸) carry; transport 3 (運用) use; wield...
  • : Ⅰ動詞1 (計算數目) calculate; reckon; compute; figure 2 (計算進去) include; count 3 (謀劃;計...
  • : Ⅰ動詞1 (代替) take the place of; be in place of 2 (代理) act on behalf of; acting Ⅱ名詞1 (歷...
  • : Ⅰ名詞(表示數目的符號或用具) a sign or object indicating number; code Ⅱ量詞1 (指一件事或一類的...
  • 運算 : [數學] operation; arithmetic; operating
  1. Digital signature operates the born and a series of sign and codes to constitute the electronics password to carry on the signature through a certain password, replace to the writing signature or an official seals, to confirm the body, the data source and integrities of signs, keeping data from burglarize to take, distort and break, thus to attain the purpose of protecting the data

    數字簽名是通過某種密生成一系列符號及組成電子密進行簽名,來替書寫簽名或印章,確認簽名者的身份、數據來源和完整性,防止數據被竊取、篡改和破壞,從而達到保護數據的目的。
  2. Operator can only be used in unsafe code blocks

    符只能在不安全塊中使用。
  3. Running user code from an untrustworthy source could compromise the information on the computer

    行來自不可信源的用戶可能危及計機上的信息。
  4. The content including : ( 1 ) combined with the powerful matrix operation function and the abundant function computation of matlab, a load flow program is developed. due to the deeply research of admittance matrix, jacobian matrix and correction matrix, this program has a great advantage at both speed and code

    其主要內容如下: ( 1 )結合matlab軟體強大的矩陣功能和豐富的函數計功能,對潮流演法中導納矩陣、雅可比矩陣以及修正方程求解的實現方式進行了深入研究,開發出一種速度和量都具有明顯優勢的潮流程序。
  5. Nowadays, all functions of a calculator including calculating units, display driver, keyboard interface and so on, are integrated on one single chip

    器使用一塊集成電路晶元來完成各種、顯示驅動和鍵盤介面等完整功能,依賴的是高度集成的動態cmos邏輯和微設計技術。
  6. In general, turbo equalization algorithms combine equalization and soft output channel decoding in an iterative process

    通常的turbo均衡演法採用均衡與軟輸出譯的迭
  7. The detail is clarified as follows : l ) based on the chaotic technology and contemporary encryption approach the paper put forward a new chaotic sequence, which introduced the m - sequence and the method of shrink key - the stream generator. the complexity of the sequence was promoted as the random alteration of the parameters of chaotic mapping, and at the same time, the shrinking key was used to enhance the security further more ; 2 ) the performance of one - way hash function was improved and new hash function construction methods are proposed through a novel hash method based on chaotic mapping and the aes - the rijndael algorithm. the algorithm of hashing messages of arbitrary length into 256 bits hash values was designed

    按照這種方法,輸出序列的周期性得以大大提高,理論分析和計機模擬結果表明,該方法可以產生具有良好統計特性的密鑰流,而且易於軟硬體實現: 2 )實現了一種基於混沌映射和分組密rijndael演法的單向hash函數的構造方法,即使用logistic混沌映射產生混沌二值序列,序列的分組與明文序列分組進行按位異或后,進入rijndael加密模塊,所得的結果再加入到反饋端,參與下一分組輸入的異或,迭結束時的rijndael加密結果即為所求的hash函數值。
  8. To modify the fp control word, then the run - time startup code will set the x87 fpu control word precision - control field to 53 - bits, so all float and double operations within an expression will occur with 53 - bit significand and 15 - bit exponent

    修改fp控制字,則行庫啟動會將x87 fpu控制字精度控制欄位設置為53位,這樣,表達式內的所有浮點和雙精度都以53位有效數和15位指數進行。
  9. When you run this code under the debugger, the assertion statement is evaluated, but in the release version, the comparison is not made, so there is no additional overhead

    當在調試器下行該時,將計斷言語句,但是在發布版本中,將不進行該比較,因此沒有額外的系統開銷。
  10. However, an additional variant of the vulnerability was subsequently identified, and on october 30, 2000, the bulletin was updated to advise customers of the availability of an updated patch. the updated patch eliminates all known variants of the vulnerability

    如果用心不良的用戶成功利用了該漏洞,則由服務器控制的web站點會被用來,轉發信息,並要在所有訪問用戶的計機上讀取和寫入cookies 。
  11. The integer unit of leon2 embedded processor, published as open source, acts as the processor of this system, which we must further configure for our needs

    系統的處理器採用開放源的leon2整數器,我們根據mp3播放的需要對其進行配置修改。
  12. Defining the pose parameters of the tool as the driving dimensions and the length of actuating limbs as the driven dimensions, the configuration of the simulation mechanism was varied correspondingly with the variation of the driving dimensions and the driven dimensions ( length of actuating limbs ) could be acquired and recorded

    給出了並聯機床機構簡圖和虛擬樣機實體模型,通過將數控進行預處理,進行了並聯機床的虛實映射計,即給定刀具位置和姿態的驅動尺寸、驅動桿件長度的被驅動尺寸,在裝配約束作用下驅動尺寸帶動整個機構動,記錄桿件長度的被驅動尺寸,求解出桿長的值。
  13. Both of the optimized methods for lsp parameters and algebraic codebooks can provide the similar performance as the standard method with less search load

    對分裂矢量量化本搜索方式的優化和本搜索方式的優化都在不明顯降低合成語音質量的情況下有效地減少了量。
  14. The most recognized form of digital wrappers are digital envelopes. those pieces of code are the workhorses of e - mail encryption, locking out intruders who don ' t have the right digital key to open the envelope. the digital envelope is essentially made up of code encrypted with a cipher, or software algorithm, and carries a digital signature that properly identifies the sender to the recipient

    數字包裝器最被認可的形式是數字信封,這些主要完成電子郵件的加密,把想打開信封而沒有正確數字密鑰的入侵者擋在外面,數字信封主要由通過密加密或軟體演法加密的組成,載著能正確讓接收方識別發送方身份的數字簽名。
  15. This thesis presents a new solution called the smart platform, which better tackles the problems by : 1 ) a runtime environment discovery mechanism which allows a new device to automatically find and join the runtime environment ; 2 ) the loose coupled publish - subscribe inter - module coordination model, which caters for the spontaneous interaction between modules ; 3 ) a global - local two - layer runtime environment structure. the transient failure of the wireless network can be recovered at the local environment layer. the asynchronous nature of the interactions in the < wp = 8 > publish - subscribe model also prevents modules from blocking on the transient network failure ; 4 ) distinguishing two classes of communications with different qos requirements, the message - oriented and the stream - oriented

    本文提出並實現了smartplatform ,其特點是: 1 )行環境發現機制,使外來計設備可以自動加入軟體平臺的行環境; 2 )松耦合的發布/訂閱式模塊間協調機制,模塊間關聯可以自發組織; 3 )局部全局的兩層行環境組織策略,無線網頻發的暫時故障可以在計設備的局部行環境層次被屏蔽掉;同時發布/訂閱模型的異步性也使得模塊不會因網路故障而阻塞; 4 )區分智能空間中的兩類不同的通信需求面向消息的和面向流的,並分別為它們提供了優化的通信層支持; 5 )基於多agent抽象模型,為整合不同應用領域的模塊和遺留提供了有力工具。
  16. Byte : a sequence of adjacent bits, usually eight, operated upon as a unit ; the lowest addressable unit in a computer

    編譯器:把計機語言轉化為可執行的機器程序。在程序行之前,編譯器編譯整個程序。
  17. Compiler : program which translates a computer language into executable machine code. a compiler translates an entire program before the program is run by the computer

    編譯器:把計機語言轉化為可執行的機器程序。在程序行之前,編譯器編譯整個程序。
  18. To help protect computer systems from malicious mobile code, to allow code from unknown origins to run with protection, and to help prevent trusted code from intentionally or accidentally compromising security, the. net framework provides a security mechanism called code access security

    為了幫助保護計機系統免受惡意移動的危害,讓來源不明的安全行,防止受信任的有意或無意地危害安全, . net framework提供了一種稱為「訪問安全性」的安全機制。
  19. Code is compiled and run on the client computer

    在客戶端計機上編譯和
  20. This vulnerability could potentially enable a malicious user to cause code of his choice to run on another users computer

    惡意用戶可利用此潛在安全隱患在其他用戶的計機上
分享友人