補充碼 的英文怎麼說

中文拼音 [chōng]
補充碼 英文
complement code
  • : Ⅰ動詞1 (修理; 修補) repair; mend; patch 2 (補充; 補足;填補) fill up; add supplement; supply; ...
  • : Ⅰ形容詞(滿; 充足) sufficient; full; ample Ⅱ動詞1 (裝滿; 塞住) fill; charge; stuff 2 (擔任; ...
  • : Ⅰ名詞(表示數目的符號或用具) a sign or object indicating number; code Ⅱ量詞1 (指一件事或一類的...
  • 補充 : 1 (原來不足或有損失時增加一部分) replenish; supplement; supply; make up; complement; add 2 (在...
  1. 1995. international phonetic association is charged with revising and renewing the international phonetic alphabet and publishes every changes in journal of phonetic teacher. international phonetic alphabet is supplemented and renewed during every development ofiso iec encoding standard by iso iec origination

    同時,在iso iec 10646編標準的每一次更新中,對國際音標進行或多或少的和更新,這不僅體現在國際音標字符集的數量上,也體現在其使用方法的進一步規范化標準化。
  2. " since the impact on the natural topography and vegetation on hei ling chau will be minimal, the conservation potential of hei ling chau and the nearby sunshine island will not be affected, " the spokesman said. he added that the bridge would run from the northwest corner of hei ling chau to the eastern end of mui wo ferry pier road at mui wo

    發言人說:擬建的渡海橋梁會從喜靈洲的西北角伸延至梅窩的梅窩頭路東端,優點是對梅窩現有和計劃中的土地用途、南大嶼郊野公園及陸上和海洋生態的影響輕微,這個方案亦不會影響梅窩的現有考古地點。
  3. " the digital flight data recorder and the cockpit voice recorder were sent to united kingdom last night

    發言人說:尋回的數飛行記錄儀及機艙談話記錄儀已於昨晚送往英國。
  4. Telecommunications - generic procedures for the control of isdn supplementary services - modification to the redirecting number information element

    電信. isdn服務控制的通用程序.改動姓名地址號的信息元素的更改
  5. Connected line identification presentation colp

    被叫號顯示業務
  6. Connected line identification restriction colr

    被叫號限制業務
  7. Microsoft has released a patch that will resolve the hyperterminal saved session can execute malicious code vulnerability that resides in the windows nt4. 0 operating system. the hyperterminal application is a communications utility that installs by default on all versions of windows nt4. 0

    Microsoft已發行一個程式,可解決windows nt4 . 0作業系統中的超級終端機預存工作階段可執行惡意程式hyperterminal saved session can execute malicious code弱點。
  8. The theory of extended shortened codes is a complement of the theory of the common crc codes

    擴展縮短的理論是原crc理論的完善和
  9. Added manager chen ; " some services require costly, difficult procedures, some of which were even impossible in the past, such as making albums, making photo indexes on an a3 paper or printing photo album mini - samples on ordinary paper. but now, with the help of the digital images, these services can be accomplished easily, simply and at low cost.

    「還不止呢, 」陳總道, 「像製作像冊集在一張a3紙面上製作像片索引在普通紙上印刷寫真集小樣等等過去成本過高製作困難或根本不可能實現的服務,也可以利用數影像得到輕松簡單和低成本地完成。
  10. The aim of developing the hkscs is to define a character set which contains special chinese characters that are commonly used in hong kong and are required by the government and the public in electronic communication. the hkscs is for supplementing the character sets of the big - 5 and the iso 10646 standard

    制訂《香港增字符集》的目的,是收納香港特區政府及市民在中文電子通訊中有需要使用及在本地通行的特別字元,以現時大五和iso10646國際編標準內字元的不足。
  11. Beefing up coding standards can all but eliminate some types of coding errors, like bugs related to brace or comment placement

    標準幾乎能夠消除某些類型的編錯誤,如關于放置花括號或注釋的錯誤。
  12. The iso releases information of characters and code points in the iso 10646 standard, while the unicode consortium supplements the characters and code points with implementation algorithms and semantics information

    國際標準化組織提供iso 10646國際編標準內的字元及編資料, unicode學術學會則對這些字元及編資料提出應用的方法以及語義資料作
  13. The iso releases information of characters and code points in the iso 10646 standard, while the unicode consortium supplements the characters and code points with implementation algorithms and semantics information. the iso 10646 standard and unicode are code - to - code identical

    國際標準化組織提供iso 10646國際編標準內的字元及編資料, unicode學術學會則對這些字元及編資料提出應用的方法以及語義資料作
  14. The iso releases information of characters and code points in the iso 10646 standard, while the unicode consortium supplements the characters and code points with implementation algorithms and semantics information. the iso 10646 standard and the corresponding version of unicode are code - to - code identical

    國際標準化組織提供iso10646國際編標準內的字元及編資料, unicode學術學會則對這些字元及編資料提出應用的方法以及語義資料作。 iso10646國際編標準與相應版本的統一所包含的字元及使用的編是相同的。
  15. In their supplementary response, atv and tvb urged the government to wait until the mainland has decided on which dtt standard to adopt or at least until the end of 2002, whichever comes first, before making the decision for hong kong

    回應中,亞洲電視與無電視促請政府等待中國內地選定所採用的數地面電視制式后或等待至2002年底,視乎何者為先,才決定本港採用那種數地面電視制式。
  16. After analyzing the two roi coding methods of jpeg2000 standard, their shortcoming is pointed out, and then a novel roi image coding method with utilizing information hiding technique is proposed. in this scheme, some coded information of the background is embedded into the redundant bits of the roi coefficients. the relative quality of rois and background can be adjusted by changing the quantity of embedded information

    感興趣區編是jpeg2000標準所提供的一項重要特性,本文對標準中規定的兩種感興趣區編方法進行了分析,指出其不足之處,而後創造性地提出利用信息隱藏技術來對其進行,將部分背景區的編信息隱藏在感興趣區系數的冗餘位,通過控制嵌入量可以調節感興趣區和背景區的相對質量。
  17. Interlock code cug ss ic

    閉鎖閉合用戶群業務
  18. It reframes the traceback problem as a polynomial reconstruction problem, and uses techniques from algebraic coding theory to provide robust methods of transmission and restriction. the scheme is a new solution to the traceback problem during a dos attack ; the honeypot for ddos, which is a tool of traceback, lures the attacker to believe that he successfully compromised a slave for his needs, convincingly simulating the architecture of a potential ddos attack ; the source - based approach to ddos defense, which is a useful adjunt to traceback systems, deploys a ddos defense system at source - end networks. attacks are detected by monitoring two - way traffic flows, and the attacks originating from source networks are stopped by rate - limiting ; the routing mechanism based on pushback treats ddos attacks as a congestion - control problem

    最後,就有關ddos攻擊反向追蹤問題,從四個方面對其解決方案進行了研究:在分析比較幾種反向追蹤演算法的基礎上,著重研究了代數方法編反向追蹤信息的方案,該方案把追蹤重構問題當作多項式重構問題,使用代數編理論技術提供魯棒的傳送和重構方法,是dos攻擊過程中的反向追蹤問題的一種新的解決方法; ddos陷阱作為反向追蹤的工具,引誘攻擊者相信自己成功與所需的傀儡主機通話,令人信服地模擬出潛在ddos攻擊體系結構;基於源的ddos防禦方法作為反向追蹤有用的,將防禦系統部署在源網路,通過監控雙向流量檢測攻擊和限制速率終止來自源的攻擊;基於向後倒推的防禦ddos的路由機制把ddos攻擊看作擁塞控制問題,添加功能到每個路由器來檢測並優先丟棄可能屬于攻擊的包,通過向後倒推上級路由器也得到通知而把這樣的包丟棄。
  19. To make the hong kong guide more informative, smo has compiled a separate booklet entitled names of hong kong places, streets and buildings which comprises 192 pages of about 40, 000 names of places, streets, buildings and community facilities, etc. together with their grid references on the guidebook. the booklet is available in bundle with the hong kong guide 2005

    《香港地方、街道及大廈名冊》共收編了一百九十二頁近四萬多項地方、街道、屋? 、大廈及社區設施的中英文名稱,並以《香港街》之頁方格值,標示其所在的位置,提供詳盡實用的信息,了地圖表達信息的局限性。
  20. In addition, there is another encoding scheme called utf - 16 that can also be used to represent supplementary characters

    另外,還有一種稱為utf - 16的編方案,它也可以用來表示字元。
分享友人