助手标题  
全文文献 工具书 数字 学术定义 翻译助手 学术趋势 更多
查询帮助
意见反馈
   bit wise 的翻译结果: 查询用时:0.202秒
图标索引 在分类学科中查询
所有学科
更多类别查询

图标索引 历史查询
 

bit wise
相关语句
  逐比特
     The proposed iterative decoding algorithm,a natural extension of the standard decoding algorithm for TCM,is similar to the bit wise one for binary turbo codes with the BPSK modulation.
     这种迭代译码算法是标准格码调制译码算法的一种自然推广 ,同时也类似于二元Turbo码在BPSK调制下的逐比特译码算法 .
短句来源
  位操作
     Bitwise Optimization for IXP Network Processor
     网络处理器IXP的位操作优化
短句来源
     And based on binary bitwise operations,it can implement high efficient Hilbert mappings.
     在逐层编解码过程中,把不断变化的映射形态转成固定的Hilbert单元映射方式,同时采用二进制位操作进行计算,从而实现高效的N维Hilbert映射转换.
短句来源
  按位
     The Bitwise Exclusive OR Operator and its Application to Strategy for Playing
     按位异或及其在求解游戏策略问题中的应用
短句来源
     First, each significant wavelet coefficient was split into odd position and even position coefficients by bitwise down sample, where the odd position coefficient was made from the bits in the odd positions, whereas the even position one was made from the bits in the even positions.
     通过对每一个小波系数进行按位下采样,把一个系数分裂为奇数位系数和偶数位系数。
短句来源
  “bit wise”译为未确定词的双语例句
     Using the SISO Turbo decodeing method ,based on bitwise logarithm likelyhood ratio, his paper simulates the performance of non-binary Turbo codes in 802.16 stand.
     本文采用基于SISO的Turbo译码方法,基于比特似然比,对802.16中非二进制Turbo 码的性能进行了仿真研究;
     The relation between f s(x) and f (x) over field GF(2) is presented, in which f s(x) and f (x) are the minimum generate polynomials of the pseudo random sequences s ∞ and its bit wise negative sequences ∞ respectively.
     提出了域GF(2 )上伪随机序列s∞ 的极小多项式fs(x)与s∞ 按位取反后所得序列 s∞ 的极小多项式f s(x)之间的关系表达式 .
短句来源
     The second improved algorithm uses bitwise techniques and it adopts the bad character rule of BM algorithm. The algorithm is very rapid in practical running.
     第二种是基于位逻辑运算符的算法,该算法采用了BM的坏字符规则,在实际运行中速度很快。
短句来源
     I present an example which manifests the impact on code execution efficiency which include method invoke, array accessibility, substitution of bitwise to multiplication and division, variable announcement, Switch conditional jump, string manipulation, inner class, data exchange based on XML and after processing, you can use JAX and ProGuard to obfuscate the bytecode.
     我拿一个具体的例子说明了方法调用、数组访问、移位与乘除的替换、变量声明、Switch分支条件跳转、字串操作、内部类、基于XML的数据交换等方面对代码执行效率的影响。
短句来源
     The article analyzes the delay, source using and bitwise restrict of hardware design.
     对于硬件实现,本文分析了硬件处理所带来的延时,占用的资源,以及位宽等对于整个芯片性能及成本的影响。
短句来源
更多       

 

查询“bit wise”译词为其他词的双语例句

     

    查询“bit wise”译词为用户自定义的双语例句

        我想查看译文中含有:的双语例句
    例句
    为了更好的帮助您理解掌握查询词或其译词在地道英语中的实际用法,我们为您准备了出自英文原文的大量英语例句,供您参考。
      bit wise
    While SBX and polynomial mutation operators are used to handle d and D, a single-point crossover and bit-wise mutation are used to handle N.
          
    We simply compute a bit-wise AND operation of the b0 bits, the b1 bits, and the b2 bits.
          
    Unpacking the bit-wise coded data samples and reconstructing base-band signals.
          
    The recovered bit pattern has bit wise matching value where the peak matching value is 96%.
          
    The results are presented in the form of graph in which bit wise matching values are plotted against the tolerance factor described in Section III.
          
    更多          


    A symmetry block cipher is introduced in this paper,the algorithm encrypts256bit plaintext and decrypts256bit ciphertext with256bit key.It produces sub-keys with a primitive polynomial,using shift and bit-wise etc.to increase the security of the cryptography,and is realized easily at micro-computer.

    提出了一种采用256bit密钥对256bit明文进行加解密的对称分组密码算法,它利用本原多项式产生子密钥,采用移位、异或等操作增加加密系统的强度,并能在单片机上很方便地实现。

    A design for Turbo trellis coded modulation (TCM) systems is proposed with nearly half of the encoding delay caused by the conventional scheme.An introduction is also given to the associated constraint that the interleaver has to satisfy.An estimate of channel values in decoding is suggested so as to improve the accuracy of extrinsic information calculations and thus the decoding performance.The proposed iterative decoding algorithm,a natural extension of the standard decoding algorithm for TCM,is similar to...

    A design for Turbo trellis coded modulation (TCM) systems is proposed with nearly half of the encoding delay caused by the conventional scheme.An introduction is also given to the associated constraint that the interleaver has to satisfy.An estimate of channel values in decoding is suggested so as to improve the accuracy of extrinsic information calculations and thus the decoding performance.The proposed iterative decoding algorithm,a natural extension of the standard decoding algorithm for TCM,is similar to the bit wise one for binary turbo codes with the BPSK modulation.The bit error rate 10 -5 of this scheme needs signal to noise ratios within 0.4dB from the Shannon limit 2.85dB for the throughput 2bits/s/Hz with the 8PSK modulation.

    本文设计了一种比传统体制减少了一半延时的Turbo编码调制系统 ,介绍了交织器的相关限制 .提出了一种在译码过程中对信道值的估计方法 ,使得外信息的计算更加趋于精确 ,从而提高了译码性能 .这种迭代译码算法是标准格码调制译码算法的一种自然推广 ,同时也类似于二元Turbo码在BPSK调制下的逐比特译码算法 .采用吞吐率为 2bits/s/Hz的 8PSK调制 ,比特错误率为 10 -5所需的信噪比与Shannon限相距不到 0 4dB .

    The linear transformation of the block cipher Serpent is studied in detail through the introduction of a new concept called "influence set of a bit", and another concept called "Λ Set based on a nibble" is also introduced. In virtue of these two concepts, a modified Square attack based on a nibble is designed to attack on the reduced Serpent of 3 rounds with 16 chosen plaintext ciphertext blocks and average 2127 inverse S box operations. The detailed attack steps are as following: ① Finding ciphertext...

    The linear transformation of the block cipher Serpent is studied in detail through the introduction of a new concept called "influence set of a bit", and another concept called "Λ Set based on a nibble" is also introduced. In virtue of these two concepts, a modified Square attack based on a nibble is designed to attack on the reduced Serpent of 3 rounds with 16 chosen plaintext ciphertext blocks and average 2127 inverse S box operations. The detailed attack steps are as following: ① Finding ciphertext blocks corresponding to the 16 plaintext blocks satisfying some conditions given in the paper; ② Arbitrarily taking 128 bit key K 3 , and evaluating the exclusive OR's of this key and the 16 ciphertext blocks given above; ③ Finding the inverse S 2 operations on the resulting 16 blocks; and ④ Finally evaluating the bit wise exclusive OR's of the 16 blocks obtained in ③ above; if the result is 0, then K 3 is the right key, otherwise return to step ②.

    对加密算法 Serpent中的线性变换进行了仔细的研究 ,证明了该线性变换的一些性质 .根据这些性质 ,并引进 Λ-集合和影响集的概念 ,得到了对于 3轮 Serpent加密算法实施 Square攻击的如下步骤 :1获取满足一定条件的 16个明文分组所对应的密文分组 ;2任意选取 12 8位的密钥 K3,并求其上述 16个密文分组的异或 ;3对所得到的 16个分组施行 S2 的逆变换 ;4求这 16个分组的按位异或 ,若为 0 ,则说明 2中所选取的 K3是正确的 ,否则返回 2 .该攻击法需要 16个选择明文分组和平均 2 1 2 7的异或运算和 S2 逆变换 .其中 S2 表示第 2轮的 S-盒变换

     
    << 更多相关文摘    
    图标索引 相关查询

     


     
    CNKI小工具
    在英文学术搜索中查有关bit wise的内容
    在知识搜索中查有关bit wise的内容
    在数字搜索中查有关bit wise的内容
    在概念知识元中查有关bit wise的内容
    在学术趋势中查有关bit wise的内容
     
     

    CNKI主页设CNKI翻译助手为主页 | 收藏CNKI翻译助手 | 广告服务 | 英文学术搜索
    版权图标  2008 CNKI-中国知网
    京ICP证040431号 互联网出版许可证 新出网证(京)字008号
    北京市公安局海淀分局 备案号:110 1081725
    版权图标 2008中国知网(cnki) 中国学术期刊(光盘版)电子杂志社