劣碼 的英文怎麼說

中文拼音 [liè]
劣碼 英文
poor code
  • : 1. (壞; 不好) bad; inferior; of low quality 2. (小於一定標準的) minor
  • : Ⅰ名詞(表示數目的符號或用具) a sign or object indicating number; code Ⅱ量詞1 (指一件事或一類的...
  1. 2, under equally see the quantity, compress the calculate way s exportation code plain deal connect the good and bad that decide its function of the good and bad, or say, output the code the term of same alike rate the bottom, and the portrait quantity reflected the function of the compression calculate way. adopt with dv all because of the m - jpeg an inside compress the way, efficiency of their compression certainly want lower than mpeg2. certainly, this is an average circumstance, at the time that low code rate, the mpeg2 can compare the m - jpeg compression the ratio high and a lot of but keep the good diagram to resemble the quantity ; but at request the diagram to resemble the quantity the good time for example the sow the room program edit with empress period creation, their difference to is not very big. too is to say, just at the compression efficiency that not emphasize the portrait quantity that the circumstance, mpeg2 is high

    2在同樣的視頻質量下,壓縮演算法的輸出率直接決定其性能的優,或者說,輸出率相同的條件下,圖象質量的優反映了壓縮演算法的性能。由於m - jpeg和dv都是採用幀內壓縮方式,它們的壓縮效率當然要比mpeg2低。當然,這是一個平均情況,在低率的時候, mpeg2可以比m - jpeg的壓縮比高很多而保持較好的圖像質量而在要求圖像質量很好的時候比如演播室節目編輯和後期製作,它們的差別不是很大。
  2. It mostly includes the analysis of video collection and codeing module, which compared the virtu of existing mpeg codeing mode. and choose the most suitable mode

    主要包括對視頻採集處理技術分析,對視頻採集壓縮處理模塊的分析,比較了現有的mpeg的編方式的優,並選取適當的方式應用於系統中。
  3. Firstly, we generalize and analyze the advantages and present research of elliptic curve cryptography ; secondly, we study the basic theory of the ecc ; thirdly, we illustrate the safety of the ecc and discuss the elliptic curve key agreement scheme, elliptic curve encryption scheme and elliptic curve digital signature algorithm ; fourthly, we study fast algorithms of the multiplication and inversion multiplication of the element of in the underlying finite field f2m whose characteristic is two represented by the two basis of optimal normal basis and polynomial basis. we make improvements to the fast algorithm of the polynomial basis multiplication by hankerson and base on the experiments, we describe the properties and compare the advantages of the multiplication and inversion multiplication of the elements in f2m field under optimal normal bases and polynomial basis. results concluding from the study car be used as references in the realization of the elliptic curve cryptosystem ; fifthly, we overview the current fast algorithm of point multiplication, improve the fix base point comb algorithm, advance the speed of the whole system and remark the advantages and disadvantages of the popular algorithms based upon the experimental datas ; sixthly we realize the algorithm library of elliptic curve cryptography based on the f2m. only change slightly in our algorithm library can we realize the ecdh, eces, ecdsa based onf2m of anysize ; seventhly, we realize the ecc on two secure elliptic curves, including ecdh, eces, ecdsa

    本文首先介紹並分析了橢圓曲線密體制的優點及研究現狀;其次研究了橢圓曲線密體制的基本理論;第三,分析了橢圓曲線密的安全性並介紹了密鑰共享,加密,數字簽名等橢圓曲線密體制;第四,深入研究了特徵為2的有限域f _ 2m中的元素在多項式基和最優正規基表示下的乘法運算和乘法逆運算的快速演算法,並對hankerson等人提出的多項式基下的乘法運算的快速演算法作了改進,而且在實驗的基礎上不僅分析研究了f _ 2m域中元素在多項式基和最優正規基表示下的乘法和乘法逆運算的性能,還對這兩種基表示下的f _ 2m域中元素運算效率的優作了比較和研究,所得的結論可供在實現橢圓曲線密體制時參考;第五,研究了目前流行的計算橢圓曲線標量乘法的快速演算法,同時改進了固定基點梳形法,提高了整個系統的速度,並在實驗的基礎上分析研究了流行演算法的優;第六,實現了基於f _ 2m的橢圓曲線密體制的演算法庫,在我們的演算法庫中只需稍微改變便能實現基於任意尺寸的f _ 2m上的ecdh , eces , ecdsa等橢圓曲線密體制;第七,實現了兩條安全橢圓曲線上的橢圓曲線密體制,包括ecdh , eces , ecdsa 。
  4. John woo directs this " exciting " premiere " against all odds battle adventure " the toronto star written by john rice and joe batteer and inspired by the true story of the navajo soldiers whose courage and sacrifices helped win the war in the pacific

    這場戰爭使軍官與發布員之間由勉強朋友變成患難之交,祖與岳斯面臨最惡的抉擇:如果已經無法保護自己的密發布員,他們會否不惜一切,甚至犧牲同袍,令密不致被泄露?
  5. This method provides unequal protection for spiht bet stream with different importance, and adaptively adjusts the source and channel coding rates according to the time - varying characteristic of the channel, thus yields good performance and high reliability without adding extra bandwidth. simulations in rayleigh channel show that the scheme can obviously improve the image quality compared to eep and uep scheme, especially when the channel is in bad condition

    本方法通過對spiht編流重要性的不同而進行不同程度的保護,並利用通道的時變特性自適應地調整信源和通道編速率,從而在不增加額外帶寬的前提下有效地提高了系統的性能和可靠性,經過計算機模擬模擬,得出了在瑞利通道中,傳輸條件惡的情況下,本方法比eep和uep能更好的提高重建圖像的質量。
  6. If nothing else, rush hour 3 explains why owners often kill damaged race horses rather than retire them : inferior breeds beget inferior offspring and studs put out to pasture often mate

    , 《尖峰時刻3 》為飼馬人總是殺死老弱病殘的馬匹而不是讓它們退休下了個很好的註解:優勝汰。
  7. The section of piles from above the water of the piled jetties in service is seriously corroded or damaged due to atrocious environmental factors

    摘要現役高樁頭水平面樁頭部分由於惡環境因素導致的腐蝕等破壞令人擔憂。
  8. A risk exists that uncertified, poorly written or malicious code could impact the overall stability of the installation

    風險存在於不確定的,拙地編寫或是惡意的代能夠影響安裝的總的穩定性。
  9. As the step of the color tv ( the second generation ) to the digital tv ( the third generation ) is larger and larger, the research of digital television terrestrial broadcasting ( dttb ) become more and more important in china, we are concentrating on the standard of dttb which is suit for our country after describing and analyzing the technical stipulation and speciality of dttb, this paper compares atsc 8 - vsb with dvb - t cofdm and isdb - t bst - ofdmo the emphasis of this article lies in the technical solution about transferring system, channel coding is important component of dttb, which can resist from the bad circumstances o because of lots of varieties and different performance, channel coding become one of the emphasis of the research work this paper analyzes and researches the theory and performance of the different channel coding particularly, points out an effective theoretic analysis method and computer demo of performance comparison a theoretical method for estimating the performance of concatenated codes is proposed in this paperc this is achieved by combining the performance of single level coding rayleigh fading channel and the character of channel modulation it may be useful to research and development of the future digital television terrestrial broadcasting standard of our country

    通道糾錯編是數字電視地面廣播傳輸系統的重要組成部分,是抵禦地面惡環境的有效手段。由於通道編的種類繁多,性能各異,因此是目前研究工作的重點之一。本文詳細分析和研究了幾種通道糾錯編的原理和性能,並針對外級聯糾錯結合地面通道瑞利衰落提出了一種有效的理論分析方法和性能的計算機比較演示方案,總結了不同級聯方案的性能特點,對於我國目前的數字電視地面廣播標準的研究和通道級聯糾錯方案的確立及其參數選擇具有一定的參考價值。
  10. Numerical results show that the ber performances of ideal mrc are the lower bounds on the ber performances of non - ideal mrc and deteriorate as the maximum doppler frequency increases or the snr of channel estimate decreases

    數值分析結果表明,非理想通道估計下最大比合併的誤率性能是以理想通道估計的結果為下界,並隨著最大多普勒頻移的增加或通道估計信噪比的減小而逐漸化。
  11. If your text is buried under hundreds of lines of code, then you ' ll be at a disadvantage compared to the top - ranking and well - optimized websites that compete for your keyword

    如果你的文本隱藏在幾百行的代中,那麼你與排名前列優化良好的網站相比將處於勢。
  12. Secondly, some encryption algorithms are introduced, with the analysis and comparison for these encryption algorithms, the author designs an appropriate project to accomplish the end - to - end encryption. thirdly, this paper accomplish the design of an encryption scheme which combining the strongpoint of the rsa algorithm and the idea algorithm. the main process is as following : first, input the digital signal to the encryption device, and then the digital signal exclusive or with the keying sequence which is generated by key stream generator ( ksg ) and the ksg is based on the idea encrypting and deciphering algorithm, the secret key synchronization is also studied

    本課題主要研究的內容是數字集群通信系統加密機制的研究,首先介紹了數字集群通信系統的安全保密機制,講述了單向和雙向鑒權的過程、單呼和群呼的空中介面加密過程及其密鑰的選用和管理,特別介紹了端到端加密;然後介紹了幾種常用的加密演算法,通過分析其優,提出了端到端加密的解決方案;最後完成了基於rsa演算法和idea演算法的數字集群通信系統加密方案的設計,其具體過程為將經過數字信號送入加密器里,和以idea加密演算法為基礎設計的密流發生器( ksg )產生的密序列進行加解密運算,並且研究了此加密過程的密同步問題。
  13. In the constructing of the diagnosis module using the technology of the combination of the fuzzy logic and neural network, which based on the fuzzy adaptive learning control network, a simple kind of capable method for consummate the structure and performance of network is introduced, which includes the rules extraction based on the maximum weights matrix and the parameters amendment based on genetic algorithm by floating - point coding. during the monitoring of the parts condition, the output of the condition monitoring system shows the good working condition of the executing agency by fuzzily deducing from the control instruction send by the auv ' s controller and motion status, and so offers the proof to complete mission and return safely

    在珍斷模塊建模中採用模糊邏輯與神經網路結合的技術,以模糊自適應學習控制網路為核心,提出了一種簡單可行的基於最大權值矩陣的規則提取及基於浮點數編的遺傳演算法的參數調整的,完善網路結構與性能的方法,並在狀態監測過程中,通過對由控制器輸入的水下機器人運動控制量以及運行狀態的模糊推理,得到執行部件(推進器或舵)的工作狀態優程度,為保證水下機器人完成任務,安全返回提供控制依據。
  14. They are vref, iref, current matrix, switch matrix, latch and decoder. vref, current matrix, switch matrix and decoder are the key parts in dac design. the errors caused by them are analyzed and suppressed in the paper

    其中,基準電壓電路,電流源陣列、開關陣列和譯電路是整個設計的重點和難點,它們設計的好壞直接影響著dac電路特性的優
  15. In code - division multiple - access ( cdma ) systems, the auto - and cross - correlation properties of the spreading sequences employed play an important role on the level of the self - interference ( si ), multiple access interference ( mai ) and adjacent cell interference ( aci ), and therefore directly influence the performance and capacity of the systems

    分多址( cdma )系統中,擴頻序列自相關和互相關特性的好壞在很大程度上決定了系統自干擾( si ) 、多址接入干擾( mai )和鄰區干擾( aci )的大小,從而直接影響著系統性能優和容量大小。
  16. Ec employs a coding technology and some genetic operations. under the pressure of selection, which means " fits survive ", the algorithm can produce an optimal solution

    它採用簡單的編技術來表示各種復雜的結構,並通過對編進行簡單的遺傳操作和優勝汰的自然選擇來指導學習和確定搜索的方向。
  17. Simulation results indicate that the algorithm can reduce the delay ' s uncertainty range greatly, even with great position errors the uncertainty range still can be reduced to the half, and is effective for the fast acquisition of long cycle code

    數值計算表明,演算法能夠大大壓縮不同導航星和不同場景用戶之間傳播時延的不確定范圍,即使在用戶與衛星位置誤差較大的惡應用背景下也能將不確定范圍壓縮一半,從而有效地輔助長快捕的實現。
  18. The embedded instrument can communicate with host the by the interface of bluetooth which can solve the difficulty of using the cable in this area and avoid the high error code rate. in the paper, we select the tms320vc54x dsp and the ericsson bluetooth module, on the basis of rfcomm, developing a embedded instrument

    2 、針對發電廠內環境惡生產區域的特殊要求,設計了帶有藍牙通信功能的嵌入式工業儀器儀表,使得現場儀表能夠通過藍牙介面與工控機進行通信,從而解決此區域中鋪設線纜困難以及其它通信方式信息傳輸誤率高等不足。
  19. 3. in order to improve searching quality of restricting optimization, good and bad gene code method has been brought forward. its focus lays in emphasizing the value of gene to targets and more precisely simulate evolvement mechanism so that useful information in problem space will be used completely

    為提高約束優化的搜索質量,提出了基因優,其重點是精確模擬自然進化機制,著重強調各基因位對優化目標的價值作用,越有利於優化目標的基因位越有價值,從而使問題空間的有益信息得到了充分利用。
  20. And the third is solid - state store witch record the stereo picture - pair. this thesis is provided in four chapters. chapter 1 and chapter 2 describe base knowledge, chapter 3 discusses key techniques used in on - board stereo image processing system, and chapter 4 focuses upon the successful application

    數據圖像的獲取主要解決如何將像元數據從ccd相機輸出的數據流中提取出來;數據的組幀編主要負責將從三個ccd陣列得到的簡單的像元數據恢復成彼此相關的立體像對;而數據的固態存儲則主要探討了大量數據在空間惡環境下的固態存儲技術。
分享友人