運算代碼 的英文怎麼說
中文拼音 [yùnsuàndàimǎ]
運算代碼
英文
code operation- 運 : Ⅰ動詞1 (物體位置不斷變化) move; revolve 2 (搬運; 運輸) carry; transport 3 (運用) use; wield...
- 算 : Ⅰ動詞1 (計算數目) calculate; reckon; compute; figure 2 (計算進去) include; count 3 (謀劃;計...
- 代 : Ⅰ動詞1 (代替) take the place of; be in place of 2 (代理) act on behalf of; acting Ⅱ名詞1 (歷...
- 碼 : Ⅰ名詞(表示數目的符號或用具) a sign or object indicating number; code Ⅱ量詞1 (指一件事或一類的...
- 運算 : [數學] operation; arithmetic; operating
-
Digital signature operates the born and a series of sign and codes to constitute the electronics password to carry on the signature through a certain password, replace to the writing signature or an official seals, to confirm the body, the data source and integrities of signs, keeping data from burglarize to take, distort and break, thus to attain the purpose of protecting the data
數字簽名是通過某種密碼運算生成一系列符號及代碼組成電子密碼進行簽名,來代替書寫簽名或印章,確認簽名者的身份、數據來源和完整性,防止數據被竊取、篡改和破壞,從而達到保護數據的目的。Operator can only be used in unsafe code blocks
運算符只能在不安全代碼塊中使用。Running user code from an untrustworthy source could compromise the information on the computer
運行來自不可信源的用戶代碼可能危及計算機上的信息。The content including : ( 1 ) combined with the powerful matrix operation function and the abundant function computation of matlab, a load flow program is developed. due to the deeply research of admittance matrix, jacobian matrix and correction matrix, this program has a great advantage at both speed and code
其主要內容如下: ( 1 )結合matlab軟體強大的矩陣運算功能和豐富的函數計算功能,對潮流演算法中導納矩陣、雅可比矩陣以及修正方程求解的實現方式進行了深入研究,開發出一種速度和代碼量都具有明顯優勢的潮流程序。Nowadays, all functions of a calculator including calculating units, display driver, keyboard interface and so on, are integrated on one single chip
現代計算器使用一塊集成電路晶元來完成各種運算、顯示驅動和鍵盤介面等完整功能,依賴的是高度集成的動態cmos邏輯和微碼設計技術。In general, turbo equalization algorithms combine equalization and soft output channel decoding in an iterative process
通常的turbo均衡演算法採用均衡與軟輸出譯碼的迭代運算。The detail is clarified as follows : l ) based on the chaotic technology and contemporary encryption approach the paper put forward a new chaotic sequence, which introduced the m - sequence and the method of shrink key - the stream generator. the complexity of the sequence was promoted as the random alteration of the parameters of chaotic mapping, and at the same time, the shrinking key was used to enhance the security further more ; 2 ) the performance of one - way hash function was improved and new hash function construction methods are proposed through a novel hash method based on chaotic mapping and the aes - the rijndael algorithm. the algorithm of hashing messages of arbitrary length into 256 bits hash values was designed
按照這種方法,輸出序列的周期性得以大大提高,理論分析和計算機模擬結果表明,該方法可以產生具有良好統計特性的密鑰流,而且易於軟硬體實現: 2 )實現了一種基於混沌映射和分組密碼rijndael演算法的單向hash函數的構造方法,即使用logistic混沌映射產生混沌二值序列,序列的分組與明文序列分組進行按位異或后,進入rijndael加密模塊,所得的結果再加入到反饋端,參與下一分組輸入的異或運算,迭代結束時的rijndael加密結果即為所求的hash函數值。To modify the fp control word, then the run - time startup code will set the x87 fpu control word precision - control field to 53 - bits, so all float and double operations within an expression will occur with 53 - bit significand and 15 - bit exponent
修改fp控制字,則運行庫啟動代碼會將x87 fpu控制字精度控制欄位設置為53位,這樣,表達式內的所有浮點運算和雙精度運算都以53位有效數和15位指數進行。When you run this code under the debugger, the assertion statement is evaluated, but in the release version, the comparison is not made, so there is no additional overhead
當在調試器下運行該代碼時,將計算斷言語句,但是在發布版本中,將不進行該比較,因此沒有額外的系統開銷。However, an additional variant of the vulnerability was subsequently identified, and on october 30, 2000, the bulletin was updated to advise customers of the availability of an updated patch. the updated patch eliminates all known variants of the vulnerability
如果用心不良的用戶成功利用了該漏洞,則由服務器控制的web站點會被用來運行代碼,轉發信息,並要在所有訪問用戶的計算機上讀取和寫入cookies 。The integer unit of leon2 embedded processor, published as open source, acts as the processor of this system, which we must further configure for our needs
系統的處理器採用開放源代碼的leon2整數運算器,我們根據mp3播放的需要對其進行配置修改。Defining the pose parameters of the tool as the driving dimensions and the length of actuating limbs as the driven dimensions, the configuration of the simulation mechanism was varied correspondingly with the variation of the driving dimensions and the driven dimensions ( length of actuating limbs ) could be acquired and recorded
給出了並聯機床機構簡圖和虛擬樣機實體模型,通過將數控代碼進行預處理,進行了並聯機床的虛實映射計算,即給定刀具位置和姿態的驅動尺寸、驅動桿件長度的被驅動尺寸,在裝配約束作用下驅動尺寸帶動整個機構運動,記錄桿件長度的被驅動尺寸,求解出桿長的值。Both of the optimized methods for lsp parameters and algebraic codebooks can provide the similar performance as the standard method with less search load
對分裂矢量量化碼本搜索方式的優化和代數碼本搜索方式的優化都在不明顯降低合成語音質量的情況下有效地減少了運算量。The most recognized form of digital wrappers are digital envelopes. those pieces of code are the workhorses of e - mail encryption, locking out intruders who don ' t have the right digital key to open the envelope. the digital envelope is essentially made up of code encrypted with a cipher, or software algorithm, and carries a digital signature that properly identifies the sender to the recipient
數字包裝器最被認可的形式是數字信封,這些代碼主要完成電子郵件的加密,把想打開信封而沒有正確數字密鑰的入侵者擋在外面,數字信封主要由通過密碼加密或軟體演算法加密的代碼組成,運載著能正確讓接收方識別發送方身份的數字簽名。This thesis presents a new solution called the smart platform, which better tackles the problems by : 1 ) a runtime environment discovery mechanism which allows a new device to automatically find and join the runtime environment ; 2 ) the loose coupled publish - subscribe inter - module coordination model, which caters for the spontaneous interaction between modules ; 3 ) a global - local two - layer runtime environment structure. the transient failure of the wireless network can be recovered at the local environment layer. the asynchronous nature of the interactions in the < wp = 8 > publish - subscribe model also prevents modules from blocking on the transient network failure ; 4 ) distinguishing two classes of communications with different qos requirements, the message - oriented and the stream - oriented
本文提出並實現了smartplatform ,其特點是: 1 )運行環境發現機制,使外來計算設備可以自動加入軟體平臺的運行環境; 2 )松耦合的發布/訂閱式模塊間協調機制,模塊間關聯可以自發組織; 3 )局部全局的兩層運行環境組織策略,無線網頻發的暫時故障可以在計算設備的局部運行環境層次被屏蔽掉;同時發布/訂閱模型的異步性也使得模塊不會因網路故障而阻塞; 4 )區分智能空間中的兩類不同的通信需求面向消息的和面向流的,並分別為它們提供了優化的通信層支持; 5 )基於多agent抽象模型,為整合不同應用領域的模塊和遺留代碼提供了有力工具。Byte : a sequence of adjacent bits, usually eight, operated upon as a unit ; the lowest addressable unit in a computer
編譯器:把計算機語言轉化為可執行的機器代碼程序。在程序運行之前,編譯器編譯整個程序。Compiler : program which translates a computer language into executable machine code. a compiler translates an entire program before the program is run by the computer
編譯器:把計算機語言轉化為可執行的機器代碼程序。在程序運行之前,編譯器編譯整個程序。To help protect computer systems from malicious mobile code, to allow code from unknown origins to run with protection, and to help prevent trusted code from intentionally or accidentally compromising security, the. net framework provides a security mechanism called code access security
為了幫助保護計算機系統免受惡意移動代碼的危害,讓來源不明的代碼安全運行,防止受信任的代碼有意或無意地危害安全, . net framework提供了一種稱為「代碼訪問安全性」的安全機制。Code is compiled and run on the client computer
在客戶端計算機上編譯和運行代碼。This vulnerability could potentially enable a malicious user to cause code of his choice to run on another users computer
惡意用戶可利用此潛在安全隱患在其他用戶的計算機上運行代碼。分享友人