計算機代碼 的英文怎麼說

中文拼音 [suàndài]
計算機代碼 英文
computer code
  • : Ⅰ動詞1 (計算) count; compute; calculate; number 2 (設想; 打算) plan; plot Ⅱ名詞1 (測量或計算...
  • : Ⅰ動詞1 (計算數目) calculate; reckon; compute; figure 2 (計算進去) include; count 3 (謀劃;計...
  • : machineengine
  • : Ⅰ動詞1 (代替) take the place of; be in place of 2 (代理) act on behalf of; acting Ⅱ名詞1 (歷...
  • : Ⅰ名詞(表示數目的符號或用具) a sign or object indicating number; code Ⅱ量詞1 (指一件事或一類的...
  • 計算機 : computer; calculator; calculating machine; computing machinery; electronic wizard; processor; pro...
  • 計算 : 1 (求得未知數) count; compute; calculate; reckon; enumerate 2 (考慮; 籌劃) consideration; pla...
  1. Provides code to play the computer s beep sound

    提供用於播放警告聲的
  2. Extract the source code to the build machine

    將源提取到用於構建的上。
  3. The findings of this thesis reflect that the object - oriented method is an effective means used in developing finite element analysis software, compared with traditional method it possesses the advantages of being more structured, easy to be compiled, maintained and extended and the program code can be much more reused. the oop method not only improve the functions of finite element software but also realize the congruity between the computing model and physical model in the real world, and promote the integrity technique of cad / cae

    本文結果表明,面向對象方法是一種強有力的工具,採用面向對象方法開發大型有限元分析軟體是一種非常有效的方法,與傳統的有限元程序相比,面向對象有限元程序更加結構化、更易於編寫、更易於維護和擴充,程序的可重用成分更大,它不僅能提高有限元軟體的功能,而且能實現數據模型與模型以及現實世界物理模型之間的一致性,方便太原理工大學碩士學位論文cad / cae系統的集成。
  4. In one from of pharming attack, code sent in an e - mail modifies local host files on a personal computer

    其中一種無誘餌釣魚欺騙的形式就是,隨電子郵件發出的(惡意)修改個人上的本主文件。
  5. The program is applied to 1st phase project of dayao bay bulk terminals, dalian port and the result is satis factory. finally, the article discusses the problem in research and brings some advices in further research. based on systems analysis, modem computer simulation technology and technological analysis of large. sized bulk terminals, the article proposes the appliance of ooa to the research of bulk handling system and raises a concept of simulation system

    本論文針對散糧頭系統設與運營中出現的問題,根據系統分析的方法,結合現模擬技術,在對大型散糧裝卸頭工藝系統分析的基礎上,提出了應用面向對象的系統分析方法開展對散糧頭裝卸工藝系統進行分析研究,並建立模擬系統的概念。
  6. Running user code from an untrustworthy source could compromise the information on the computer

    運行來自不可信源的用戶可能危及上的信息。
  7. In order to obtain the complex rcs of the target quickly in high frequency band, the graphical electromagnetic computing software, greco, is used. the modification of the computing kernel code is presented. the judgement of edges of complex targets is more sufficient and the computation of edge wave based on physical theory of diffraction ( ptd ) is more exact after the modification

    為了可以準確地預估雷達目標的rcs ,我們對于航天部207所的圖形電磁軟體( greco )進行了進一步的開發與包裝,用borland公司的c + + builder開發了更加易於使用的基於windows操作系統的新版greco ,並且在考察了原有的greco內核之後,結合圖形學方面的理論,對greco的內核進行了改進,整體上使得邊緣繞射場的結果更加準確。
  8. The design of the front every chaper are realized at the las chapter. as examples, applied progrgn and opefation inteffoce of the business expand subsystem and electric power fees subsystem are medfested in emphases. it shows that power business is promable greatly also these subsystems are correlatve and nested each other, it is behaved by the facts tha it program easily and the amoun of the labor and difficulty is increased

    論文以業擴報裝子系統和電量電費子系統應用程序的操作界面和程序為例,闡述了電力營銷業務是一個流程化很強的業務,各子系統又相互關聯和嵌套,表現為既便於用編程又由於關聯和嵌套較多,而使程序編寫工作量和難度加大。
  9. Turbo codes represent the new code structures, which consist of pccc ( parallel serially convolutional code ) and sccc ( serially concatenated convolutional code ). in this paper, the background of turbo codes are firstly introduced, which includes the base principle of error correction code 、 block code and convolutional code ; the principle of turbo code and the iterative decoding is secondly expanded ; the key decoding algorithm : a revised map algorithm and iterative decoding theory are detailed ; then, a new turbo code structure : hccc ( hybrid concatenated convolutional code ) is presented, and the capacity of this code method is analyzed, the average capacity upper bound is derived ; at last, this code is simulated on awgn ( additive white gaussian noise ) channel and rayleigh fading channel

    本文首先介紹了turbo的背景知識,包括差錯控制的基本原理、分組和卷積;然後闡述了turbo的基本原理,包括turbo編譯器結構及迭原理;較為詳細地描述了關鍵的譯法: ?種改進的最大后驗概率( map )譯法及迭法;提出了一種新的turbo結構:混合turbo(混合級聯卷積) ;並用編性能聯合界分析方法對混合turbo進行了性能分析,得出了其平均性能上界;並在高斯白噪聲通道和瑞利衰落通道上分別作了一些應用研究及模擬實驗。
  10. The cad / cam process of the handle part was implemented, including constructing 3d entity modeler, creating tool path, computer simulating, postprocessing cutter location files into tape files for a specific machine tool, transferring machining information of the handle part by the network - based cad / cam prototype system, nc machining of the handle part at last

    利用網路化cad / cam原型系統實現手柄零件cad / cam過程,包括手柄三維實體造型、刀位軌跡生成、模擬檢驗,後置處理生成特定床的g,通過網路傳輸手柄零件加工信息,最後完成手柄零件的數控加工。
  11. The detail is clarified as follows : l ) based on the chaotic technology and contemporary encryption approach the paper put forward a new chaotic sequence, which introduced the m - sequence and the method of shrink key - the stream generator. the complexity of the sequence was promoted as the random alteration of the parameters of chaotic mapping, and at the same time, the shrinking key was used to enhance the security further more ; 2 ) the performance of one - way hash function was improved and new hash function construction methods are proposed through a novel hash method based on chaotic mapping and the aes - the rijndael algorithm. the algorithm of hashing messages of arbitrary length into 256 bits hash values was designed

    按照這種方法,輸出序列的周期性得以大大提高,理論分析和模擬結果表明,該方法可以產生具有良好統特性的密鑰流,而且易於軟硬體實現: 2 )實現了一種基於混沌映射和分組密rijndael演法的單向hash函數的構造方法,即使用logistic混沌映射產生混沌二值序列,序列的分組與明文序列分組進行按位異或后,進入rijndael加密模塊,所得的結果再加入到反饋端,參與下一分組輸入的異或運,迭結束時的rijndael加密結果即為所求的hash函數值。
  12. If you enter text via a key board, then each time you depress a key, the binary digit code associated with that key is transmitted to the microcomputer.

    假如你採用鍵盤來輸入文本,那麼每當你按下一個鍵時,與該鍵對應的二進制數字便被送入微
  13. Machine code : numerical representations directly executable by a computer ; sometimes called machine language

    :能被直接執行的數字;有時被稱為器語言。
  14. However, an additional variant of the vulnerability was subsequently identified, and on october 30, 2000, the bulletin was updated to advise customers of the availability of an updated patch. the updated patch eliminates all known variants of the vulnerability

    如果用心不良的用戶成功利用了該漏洞,則由服務器控制的web站點會被用來運行,轉發信息,並要在所有訪問用戶的上讀取和寫入cookies 。
  15. Application of computer codes for the assessment of criticality safety

    臨界安全評估的計算機代碼應用
  16. A bit of computer code that is part of a web page, and is executed by the user s web browser when the page is displayed

    一小段計算機代碼,是web頁面的一部分,由用戶的web瀏覽器在顯示該頁面的時候執行。
  17. Provide algorithms in words, figures, or flow charts ( as a step by step algorithmic approach ) for all computer codes developed

    提供在文字,圖片或者是流程圖(如一步步的演法步驟)中用到的演法的所有計算機代碼
  18. This example uses the code element to display text in a font used to represent computer code, such as values or variable names

    下面的例子使用了code元素,將文本以計算機代碼的字體(等寬字體)顯示,如值和變量名。
  19. Is a windows service that generates and maintains native images, which are files containing compiled processor - specific machine code

    是一個生成和維護本映像的windows服務,這些映像是包含已編譯的特定於處理器的計算機代碼的文件。
  20. In this article, i describe ways that computer code can help eliminate unsolicited commercial e - mail, viruses, trojans, and worms, as well as frauds perpetrated electronically and other undesired and troublesome e - mail

    在本文中,我描述了幾種方法,這些方法用計算機代碼來幫助消除不請自來的商業性電子郵件、病毒、特洛伊木馬和蠕蟲病毒以及懷有惡意的欺詐性電子郵件與其它一些不希望收到的和令人煩惱的電子郵件。
分享友人