輸出序列 的英文怎麼說

中文拼音 [shūchūliè]
輸出序列 英文
output sequence
  • : Ⅰ動詞1 (運輸; 運送) transport; convey 2 [書面語] (捐獻) contribute money; donate 3 (失敗) l...
  • : Ⅰ動1 (排列) arrange; form a line; line up 2 (安排到某類事物之中) list; enter in a list Ⅱ名詞1...
  • 輸出 : 1 (從內部送到外部) export 2 [電學] output; outcome; outlet; out fan; fanout; 輸出變壓器 output ...
  1. This shows you how to output a set of alphabetized records from a database and lay them out so they look like an index in a book

    這個應用程向你展示了如何從一個數據庫一組按字母順的記錄,並使它們能像一本書的索引那樣的排
  2. Layout alphabetized records like a book - this shows you how to output a set of alphabetized records from a database and lay them out so they look like an index in a book

    這個應用程向你展示了如何從一個數據庫一組按字母順的記錄,並使它們能像一本書的索引那樣的排
  3. Please input machine type and serial number or warranty card number of your machine, then system will determine if your machine is in warranty and manufacture date, or status of registration on iws

    您只需入您的機器型號和號或者保修卡號即可獲得機器的廠日期、保修期和全球聯保登記的的詳細信息。
  4. Some typical i / o addresses include those for the basic serial ports, known in the microsoft world as com1, com2, com3, and com4

    一些典型的位址當做com1 、 com2 、 com3和com4為基本的埠,在微軟公司世界中被知道包括那些
  5. There are several procedures used to reduce these deteriorating effects, including the use of forward error correction techniques, error concealment methods and error resilience schemes. this paper studies error resilient techniques in internet video transmission. in this techeniques, reed - solomon ( rs ) codes across packets is used for error protection against packet loss, and a self - adaptive error concealment method based on motion feature is proposed, which can conceal errors more effectively, particularly for video sequences with acute motion

    本文針對因特網視頻傳中的丟包現象進行研究,一方面利用rs編碼來提高視頻壓縮碼流抵抗誤碼的能力;另一方面,提了一種基於運動特徵的自適應誤碼掩蓋方法,能夠較好的掩蓋視頻傳帶來的誤碼,特別對于運動幅度較大的視頻更能體現其優勢。
  6. If the input byte sequence cannot be converted to an output character, the decoding operation calls the

    如果入位元組無法轉換為字元,則解碼操作調用
  7. When an encoded input byte sequence cannot be converted to a decoded output character

    當編碼的入位元組無法轉換為解碼的字元時引發
  8. If an encoded input byte sequence cannot be converted to a decoded output character

    如果已編碼的入位元組無法轉換為已解碼的字元,則引發
  9. A conforming implementation executing a well - formed program shall produce the same observable behavior as one of the possible execution sequences of the corresponding instance of the abstract machine with the same program and the same input

    當一個符合標準的實現執行一個完備的程時,其產生的可觀察行為應該與該實現的抽象機器對應實例依據同一程和同一產生的可能執行之一相同。
  10. There are many decoding schemes for convolutional code, such as sequence decoding algorithm, fano algorithm, viterbi algorithm. but in fact, what ' s used widely is viterbi decoding algorithm. the viterbi decoding algorithm, proposed in 1967 by viterbi, is a decoding process for convolutional codes in memory - less channel, which takes full advantage of convolutional codes. since viterbi algorithm is proposed, it has obtained rapid development whether in theoretics or in practice and been applied to all kinds of data transmission systems, especially to digital wireless communications and deep space communications

    卷積碼的譯碼演算法方案有很多,如譯碼演算法、 fano演算法、 viterbi演算法,但是真正大規模應用的還是viterbi演算法。 viterbi譯碼演算法是1967年viterbi提的,它是一種對無記憶通道卷積碼進行譯碼的演算法。它充分發揮了卷積碼的特點,因而自viterbi演算法提以來,無論在理論上還是在實踐上都得到了極其迅速的發展,並廣泛的應用於各種數據傳系統,特別是無線通信和衛星通信系統中。
  11. 2 http : www. genome. washington. edu uwgc. 3 pearson w r. searching protein sequences libraries : comparison of the sensitivity and selectivity of the smith - waterman and fasta algorithm. genomics, 1991, 11 : 635 - 650

    由於需要排得到最終的比對結果, megablast採用先計算分值然後的串過程,這樣還導致大量中間結果的積累現內存消耗過大的情況。
  12. The detail is clarified as follows : l ) based on the chaotic technology and contemporary encryption approach the paper put forward a new chaotic sequence, which introduced the m - sequence and the method of shrink key - the stream generator. the complexity of the sequence was promoted as the random alteration of the parameters of chaotic mapping, and at the same time, the shrinking key was used to enhance the security further more ; 2 ) the performance of one - way hash function was improved and new hash function construction methods are proposed through a novel hash method based on chaotic mapping and the aes - the rijndael algorithm. the algorithm of hashing messages of arbitrary length into 256 bits hash values was designed

    按照這種方法,輸出序列的周期性得以大大提高,理論分析和計算機模擬結果表明,該方法可以產生具有良好統計特性的密鑰流,而且易於軟硬體實現: 2 )實現了一種基於混沌映射和分組密碼rijndael演算法的單向hash函數的構造方法,即使用logistic混沌映射產生混沌二值的分組與明文分組進行按位異或后,進入rijndael加密模塊,所得的結果再加入到反饋端,參與下一分組入的異或運算,迭代結束時的rijndael加密結果即為所求的hash函數值。
  13. Our results show that the rate of correlation among the random variables of those output sequences are low although they are not independent ; in addition, the output sequences of those combined generators are homogeneous markov chains which are strictly stationary processes with ergodicity ; the output sequences of those combined generators are also proved to summit to the strong law of large numbers and the central limit theorem ; finally the computation formula of the rate of the accordance between the output sequences and input sequences of those combined generators is given

    我們的研究結論表明:雖然這些中隨機變量之間不具有相互獨立性,但它們的相關程度卻比較低;證明了「停走」生成器, km _ 1m _ 2型組合生成器和加法型組合生成器的概率模型輸出序列都是強平穩的和遍歷的齊次馬氏鏈;討論了這些的概率極限性質,證明了它們均服從強大數定律和中心極限定理;還分別給了各類生成器的輸出序列之間的符合率的計算公式。
  14. By using the probability theory, measurable theory and random process comprehensively, the properties of the output sequences of the combined generators mentioned above are studied, and the finite dimension union distributions of those output sequences are also presented, followed by the mathematical characteristics of those output sequences

    綜合運用概率論、測度論和隨機過程等學科的理論分別對這些鐘控組合生成器的概率模型輸出序列的性質進行了研究,求或討論了「停走」生成器、 km (
  15. Correlation analysis on planar tent map sequences

    平面帳篷映射輸出序列的相關性分析
  16. This property specifies the method used to serialize the output

    此屬性指定用於將輸出序列化的方法。
  17. Therefore, the values are converted to their canonical representations when serialized as output

    因此,當這些值作為輸出序列化時將其轉換為它們的規范表示形式。
  18. Partitions can also be present in data accessed by the software, in time, in input and output sequence, and in state

    劃分可以通過軟體獲取數據,在時間上,在入和輸出序列上和在狀態上進行劃分。
  19. In regard to the bluetooth combiner, we study the probability distributions between its output and input sequences, with which we analyze its correlation immunity, introduce two representative attack methods and give a whole evaluation on the security of bluetooth combiner

    對藍牙組合生成器,首先考察了其輸出序列的基本性質,在此基礎上,研究了它的相關免疫性,介紹了目前有代表性的兩種攻擊演算法,並對藍牙組合生成器的安全性做了總體評價。
  20. For example nonlinearity, algebraic degree, correlation immunity, etc. basing on the method of hill climbing and the properties of boolean function, an algorithm, which is better than hc algorithm, named ihc is gave out to improve the design of nonlinearity of boolean functions. by analyzing the output and input sequences of a nonlinear combined generator, we also give out an algorithm ( lhc ) to evolve the correlation from a random function to a very lower one

    本文研究了hillclimbing演算法以及布爾函數非線性度的性質,對hillclimbing演算法進行改進,提高了該方法下對布爾函數非線性度的優化設計;通過研究非線性組合生成器中驅動輸出序列之間的關系,基於hillclimbing方法,本文進一步提了改善非線性組合相關性指標( f )的組合函數f ( x )的優化設計演算法lhc 。
分享友人