英语人>网络例句>进位 相关的搜索结果
网络例句

进位

与 进位 相关的网络例句 [注:此内容来源于网络,仅供参考]

This, however, may cause small rounding errors , depending on the quantities involved .

这可能会引起许多小的进位错误,这要根据引入的数量。

The sexagesimal scale , or number system based on 60, was used by ancient Babylonians.

古巴比伦人用六十进位制,即以60为基的数系。

But understanding a sexagesimal (base 60) number system, as used by the Sumerians, takes a little more thought.

但理解苏美尔人使用的六十进位(以60为基数)数字系统,还要费点儿脑筋。

For example, six fractional sexagesimal places of a day was used in their specification of the length of the year, although they were unable to measure such a small fraction of a day in real time.

古希腊天文学家,包括希巴谷和托勒密,定义太阳日的24分之一为时。以六十进位细分时,使得秒是一太阳日的86,400分之一。

The day was subdivided sexagesimally, that is by 160, by 160 of that, by 160 of that, etc, to at least six places after the sexagesimal point (a precision of less than 2 microseconds) by the Babylonians after 300 BC, but they did not sexagesimally subdivide smaller units of time.

六十进位制来自巴比伦,她们以六十这个因素做为计算数量的单位。但是巴比伦人并没有将时分割为60分,而是古埃及将一日分为12时的白天和12时的夜晚,她们也这样子来区分四季。

From unrounded figures.

进位的数字计出。

BaTan focus on the town in order to speed up the construction of the town as an opportunity to carry first to target in order to handle the project for a breakthrough to achieve industrialization and urbanization as a development engine.

八滩镇以加快重点镇建设为契机,以进位争先为目标,以项目突破为抓手,把实现工业化、城镇化作为发展的重要引擎。

Till now, there are a lot of generators such as the classical Fibonacci method, mid-square method, linear congruential method, feedback shift register method and combined method; the recent nonlinear congruential method, decimal fraction method, add-with-carry and substract-with-borrow methods, generalized feedback shift register method and MT method, and so on.

至今关于随机数发生器有很多的理论和方法,其中除了传统的Fibonacci法、平方取中法、线性同余法、位移寄存器法和组合方法;最近还有非线性同余法、取小数法、进位加和错位减法、广义反馈位移寄存器法和MT法等等。

The construction tree of set partitions is trans-formed into the number tree and the block tree, and therefore the Pand the...

本文把划分向量V当成一种特殊的数制,找出其进位规则,从而求得V/D和D/V数制转换。所建立的算法经计算机验证,是正确的。

Examples Building text files with injection Building binary files using debug.exe with injection Injection and FTP Injection and remote xterms Injection and TFTP Adding a user with injection Scheduling a process with injection Pluming pipes, ports, and permissions Handles to open resources are sometimes inherited by the child process. If a protected resources is already open, the child process will have unfettered access to the resource, perhaps by accident.

范例 利用注入建立文字档利用 debug.exe 将资料注入到两进位档注入与 FTP 注入与远端 xterms 注入与 TFTP 利用注入新增一个使用者利用注入对程序进行排程利用 pipes, ports 以及权限已开启资源的处理代码有时候会被子程序所继承,也就是说如果一个受保护的资源被开启后,子程序将有可能在无意间不受限制地存取该资源。

第8/43页 首页 < ... 4 5 6 7 8 9 10 11 12 ... > 尾页
推荐网络例句

Objective To investigate the effects of interleukin-1 β converting enzyme gene on the biologic characteristics of ovarian cancer cells.

目的 探讨白细胞介素-1 β转换酶的表达,对卵巢癌细胞生物学特性的影响。

Campylobacter: This illness is the most commonly identified cause of diarrheal illness in the world.

弯曲:这种病是最常见的原因查明腹泻病,在世界上。

Gangs fill the daily lives of many of our poorest and most vulnerable citizens with a terror that the court does not give sufficient consideration, often relegating them to the status of prisoners in their own homes.

法院没有充分的考虑到黑社会的猖獗所带来的恐怖,这使得我们最穷、最可怜的市民每天生活在他们的阴影当中,成为在家的囚犯。