character array 中文意思是什麼

character array 解釋
字元排列
  • character : n 1 性格,品格;特性,性狀,特徵;【生物學】形質。2 身分,地位,資格。3 名聲,聲望。4 (戲劇、小...
  • array : vt 1 打扮,裝飾。2 使…列隊,排列。3 提出(陪審官)名單,使(陪審官)列席,召集(陪審官)。n 1 整...
  1. In this view, each human being is an array of appetites and aversions, continuously stimulated into existence by sensory events, and continually changing in character, so that there is no overall aim for human action over the course of a lifetime - no such thing as a summum bonum or " highest good ", no condition of being that mankind tries to achieve in order to suit its nature

    從這個觀點來看,人類是慾望和厭惡大拼盤,只憑藉感官上的持續刺激而存活,個性也不斷轉變,即在行為上一輩子都無貫徹到底的目標,也沒有所謂的至善,更沒所謂人類為迎合本性而試著去達到目標之說。
  2. Because of its special antenna structure, testing the antenna ’ s performance is necessary to prove its theory. auto measurement system of cfa array annates can measure the annates ’ s amplitude - phase character and resistance matrix quickly and effectively

    艦載超視距雷達使用交叉場天線cfa ( crossedfieldantenna )作為陣列天線陣元,由於其特殊的天線結構,對其特性的理論研究也需要測量數據來驗證。
  3. As the starting point in the character array

    作為字元數組中的起始點,從流中讀取
  4. The character array to write to the text stream

    要寫入文本流中的字元數組。
  5. The character array from which data is read

    從其讀取數據的字元數組。
  6. Writes a character array to the text stream

    將字元數組寫入文本流。
  7. The character array buffer to copy into

    向其復制的字元數組緩沖區。
  8. The character array to write data from

    要從中寫出數據的字元數組。
  9. Returns the value of the specified column as a character array

    以字元數組的形式返回指定列的值。
  10. The first one demonstrates how to create a character array

    第一個代碼示例演示如何創建字元數組。
  11. And passes the entire character array

    ,並傳遞整個字元數組。
  12. Writes the specified region of a character array to this instance of the

    將字元數組的指定區域寫入到
  13. The main work included : the classical lambda calculus was modified to describe the character of dynamic fuzzy ; the abstract syntax of dfl programming language was described through bnf notation ; an operational semantics model of dfl programming language was proposed with a ternary array < dfsc, dfo, dfss > and then some basic data types and several mechanisms of constructing new data types were defined ; the frame of dfl progaramming language was provided ; it was described how to solve some problems applying the operational semantics model ; the correctness and reliability of the operational semantics model were proved by hoare logic and denotational semantics

    主要內容包括:變形傳統的演算,以更好地描述具有動態模糊性的問題;通過bnf描述了dfl程序設計語言的抽象語法;通過一個三元組< dfsc , dfo , dfss >給出了dfl程序設計語言的操作語義模型;給出了dfl程序設計語言的基本框架結構;給出了該操作語義模型的一些應用實例;通過hoare邏輯和基本指稱語義對本文所定義的操作語義模型的正確性和可靠性進行了證明。由此可見,本文從全新的角度定義了一種可以處理動態模糊問題的程序設計語言。
  14. The essence of edid is to set up a normal behavior fuzzy sub collection a on the basis of watching the normal system transfer of the privilege process, and set up a fuzzy sub collection b with real time transfer array, then detect with the principle of minimum distance in fuzzy discern method the innovation point of this paper is : put forward the method of edid, can not only reduce efficiently false positive rate and false negative rate, also make real time intrusion detection to become possibility ; have independent and complete character database, according to the classification of monitoring program, design normal behavior and anomaly behavior etc., have raised the strongness of ids ; use tree type structure to preservation the character database, have saved greatly stock space ; in detection invade, carry out frequency prior principle, prior analysis and handling the behavior feature of high frequency in information table, have raised efficiency and the speed of detection, make real time intrusion detection to become possibility ; have at the same time realized anomaly intrusion detection and misuse intrusion detection, have remedied deficiency of unitary detection method

    這種方法的實質是在監控特權進程的正常系統調用基礎上建立正常行為模糊子集a ,用檢測到的實時調用序列建立模糊子集b ,然後用模糊識別方法中的最小距離原則進行檢測。本文的創新點是:通過對特權進程的系統調用及參數序列的研究,提出了基於euclidean距離的入侵檢測方法edid ,不僅能有效降低漏報率和誤報率,而且使實時入侵檢測成為可能;設計有獨立而完整的特徵數據庫,根據被監控程序的類別,分別設計正常行為、異常行為等,提高了檢測系統的強健性和可伸縮性;特徵數據庫按樹型結構存儲,大大節省了存儲空間;在檢測入侵時,實行頻度優先原則,優先分析和處理信息表中的高頻度行為特徵,提高檢測的速度和效率,使實時入侵檢測成為可能;同時實現了異常入侵檢測和誤用入侵檢測,彌補了單一檢測方法的不足。
  15. Converts a subset of an 8 - bit unsigned integer array to an equivalent subset of a unicode character array encoded with base 64 digits

    將8位無符號整數數組的子集轉換為用base 64數字編碼的unicode字元數組的等價子集。
  16. For example, a c - language application using odbc can dynamically build one or more sql statements into a character array, then pass that array to the odbc

    例如,使用odbc的c語言應用程序動態將一個或多個sql語句生成到字元數組中,然後將該數組傳遞到odbc
  17. Copies data from an unmanaged memory pointer to a managed character array

    將數據從非託管內存指針復制到託管字元數組。
  18. Copies data from a one - dimensional, managed character array to an unmanaged memory pointer

    將數據從一維的託管字元數組復制到非託管內存指針。
  19. The order of the elements in the character array does not affect the trim operation

    字元數組中的元素順序並不影響剪裁操作。
  20. Method, the order of the elements in the character array does not affect the trim operation

    方法時,字元數組中元素的順序並不影響剪裁操作。
分享友人