子程式碼 的英文怎麼說
中文拼音 [zichéngshìmǎ]
子程式碼
英文
child code- 子 : 子Ⅰ名詞1 (兒子) son 2 (人的通稱) person 3 (古代特指有學問的男人) ancient title of respect f...
- 程 : 名詞1 (規章; 法式) rule; regulation 2 (進度; 程序) order; procedure 3 (路途; 一段路) journe...
- 式 : 名詞1 (樣式) type; style 2 (格式) pattern; form 3 (儀式; 典禮) ceremony; ritual 4 (自然科...
- 碼 : Ⅰ名詞(表示數目的符號或用具) a sign or object indicating number; code Ⅱ量詞1 (指一件事或一類的...
- 程式碼 : script
- 程式 : form; pattern; formula; modality
-
The high entropy of the real and imaginary parts of sar raw data makes lossless - coding compression techniques unfit for sar raw data. in chapter 4, some compression algorithms for sar raw data compression, such as baq, upq, bavq and wt - subbandcade are analyzed and discussed. an improved unrestricted polar quantizer ( upq ), which can enhance the performance of the quantizer is put forward
第四章分別對塊自適應量化( baq )演算法、非約束式極坐標量化( upq )演算法、塊自適應矢量量化( bavq )演算法和小波變換子帶編碼演算法進行了分析和研究,並詳細討論了這些演算法在工程實際中的應用。Currently, the army is developping military network based oa project with effort among which military email transferring system is an essential application module. this paper proposed a data model of military email transferring as well as detailed design scheme according to the potential threat in email service system, practical condition of current military network and official model as well as document transferring process. it discussed the security requirement of military email transferring system in detail as well as analyzed and design relevent data model, mail exchange protocol and application requirement of cryptogram management
該文針對電子郵件服務系統中存在的安全隱患,基於對目前國內外電子郵件安全技術的分析研究,立足於現有軍事計算機網路的實際現狀,根據目前軍隊的辦公模式、公文傳輸流程,提出了一種適合於軍隊辦公自動化中軍用電子郵件傳輸的數據模型及具體的設計方案,詳細討論了軍用電子郵件傳輸系統的安全服務需求,對相關的數據模型、郵件交換協議、密碼管理的應用需求等進行了詳細的分析和設計。After at least 3000 tests, our product are widely adopted in the applications of cellular phone, digital still camera, digital camcorder, pda, notebook pc, etc. fae provide engineering assistance, floor test director and technical service to our customer. when met the quality and compatibility problem they will discover the cause and settle the problem
公司產品經過三千次以上兼容性測試,我們的產品廣泛應用於手機數碼相機數碼攝像機pda便攜式電腦等各種電子產品, fae部門隨時為客戶提供工程協助現場測試指導及相關技術支持,對個別出現的質量或兼容性問題,迅速查明並給予解決措施。The content of this paper is arranged as foll owing : chapter 1 introduces the concept of credit, credit risk and credit assessment, as well as the history and development of credit assessment ; chapter 2 introduces the history of ai technology, and the background of expert system and neural network. characters and disadvantages of expert system and neural network are presented respectively and the necessity of combining expert system and neural network is lightened ; chapter 3 shows the process of dealing with sample data, including the treatment of exceptional data and factor analysis, and puts forward the concrete framework of the mixed - expert credit assessment system ; chapter 4 introduces concept of object - oriented technology, and constructs object model and functional model after analyzing the whole system. it also illustrates the implementation of concrete classes by an example of rule class and the inference algorithm in the form of pseudocode ; chapter 5 introduces the structure of the whole system, the major functional models and their interfaces, and the characteristic of the system is also generalized ; chapter 6 summarizes the whole work, and points out the remaining deficiencies as well as the prospective of this method
本文具體內容安排如下:第一章介紹了信用、信用風險、信用評價的概念,回顧了信用評價的歷史、發展和現狀,並綜合各種信用評價模型,指出這些模型各自的優缺點:第二章簡單描述了人工智慧技術,著重介紹有關專家系統與神經網路的基礎知識,通過總結它們的優缺點,指出結合專家系統與神經網路構造混合型專家系統的必要性;本章還介紹了神經網路子模塊的概念,提出了混合型專家系統的一般框架與設計步驟:第三章對樣本數據進行處理,包括異常數據的剔除、因子分析等,提出了信用評價混合型專家系統的具體框架結構,介紹了系統知識庫的主要部分、基於優先級的正向推理機制的流程、以及基於事實的自動解釋機制的具體實現方法;第四章介紹了面向對象技術,進而採用面向對象對信用評價系統進行分析,建立了對象模型和功能模型,並在此基礎上,採用c + +語言以規則類為例說明系統中具體類的實現,用偽代碼的形式描述了推理的演算法;第五章描述了整個系統的結構,對系統主要功能模塊和界面進行了介紹,並總結系統的特點;第六章總結了全文,指出本文所構造系統存在的不足以及對將來的展望。In this research, the wheat, rice and tobacco with salt treatment were used as experimental materials to study the molecular mechanism of stress - tolerance in plant and make the relative gene engineering research. the main results are as following : 1. a novel ca2 + channel gene, named as tatpc1, was isolated from wheat, encoding a two - pore voltage - gated channel protein
本研究在總結當前植物鹽脅迫應答分子生物學研究進展的基礎上,以農作物小麥、水稻、煙草作為主要實驗材料,開展了植物耐逆分子機制和相關基因工程研究,主要結果為: 1從小麥中克隆到一個新的ca ~ ( 2 + )通道蛋白基因, tatpc1 ,它編碼的是一種細胞膜上兩孔電壓門控式通道蛋白。Now, with the rapid development of computer and electronics, there have been a great progress in the field of input / output device technology. among this field, pci has been a current standard interface of pc. and in order to accommodate the development of operating system, wdm has been a driver model adopted by industry generally. at the same time, in the respect of sensor ’ s application, a high precision and high integrated incremental rotary encoder has been an outstanding one among the displacement sensors. meanwhile, eda technology and cpld / fpga chip applied in the signal processing circuit are approved by a great number of engineers who are engaged in designing the electronic device
目前,隨著計算機技術和電子技術的飛速發展, i / o設備介面控制技術領域有了長足進步。其中, pci介面成為主流的微機標準介面,而與操作系統平臺的發展相適應, wdm已成為業界普遍採用的驅動程序模式;同時,在傳感器應用方面,高精度、高集成的增量式旋轉編碼器已是位移型傳感器中的佼佼者,而eda技術和cpld / fpga器件在信號處理電路中的應用被廣大電子設計人員所認可。The " change password program " software is designed for use by the subscribers of hongkong post e - cert in changing the password of the e - cert file that is created and saved on a floppy disk through the central key generation service
"更改電子證書檔案密碼程式"軟體為香港郵政電子核證服務登記人而設。經代制密碼匙服務產生電子證書而存入磁碟后,可以利用此軟體更改檔案密碼。In sending the saved copy to his her client, the auditor should not encrypt the supplementary form with the e - form core program. this is because the e - form core program uses the ird s public key in performing the encryption. without the necessary key, the auditor or the auditor s client cannot decrypt the encrypted copy
核數師提交報稅表附表儲存本給其客戶時,無須以電子表格應用程式把報稅表附表加密,因為該電子表格應用程式是使用稅務局的公開密碼匙加密的,如果沒有所須的解密匙,核數師或其客戶將無法把已加密的報稅表附表解密。You and your recipient must have public key certificates and smime compatible e - mail applications in order to send and receive secured e - mail
要發送和接收安全電子郵件,您和您的接收人必須有公開密碼匙證書和兼容smime的電子郵件應用程式。For security concern, this import function will set the ie browser s security level of the imported e - cert as " high " and the e - cert private key as " non - exportable ". the password you set for your e - cert imported into ie ( point 4 above ) is required when your e - cert in ie ( including the private key ) is used
基於保安上的考慮,此匯入程式會將匯入ie瀏覽器的電子證書的安全性等級設定為高,而你的電子證書的私人密碼匙或稱私密金鑰會設定為不能匯出。Adaptive run length coding explores the residual redundancy of the high frequency coefficients in the transform domain. hereby, an embedded image coding algorithm based on binary description run length ( bdrl ) is brought forward
對高頻子帶採用自適應的遊程編碼處理,提出一種二進制描述遊程的嵌入式圖像編碼演算法( bdrl ) 。Firstly, the current testing localization in the detection of electric bow is analyzed and the new system ' s whole construction developed in this thesis is introduced ; in the 2rd chapter, the embedded 110v dc power supply is analyzed and constructed, and with experiments, some dissonant results such as the fluctuation of output pwm ( pulse width modulation ) pulses, the power noise added to output voltage, and the drop of output voltage have been analyzed and the problems have been broken down one by one ; in chapter 3, stepping motor ' s drive has been systematically dissertated, and combing stepping motor ' s subdivided drive technology, the author develops an intelligent mini - step driving circuit using a main - sub microprocessor structure, which is validated in the hybrid stepper based system ; in the 4th chapter, liquid crystal driving and displaying technology is specified in detail, with one sort of lcd modules ( tlm12864h ), the author develops an feasible circuit for the new testing system, designs a menu mode based program struc ture and brings here some programming codes using franklin c51 programming language ; in chapter 5, the above built system is used in the electric bow ' s practical detection, and the differentiating rate of this system is analyzed
論文首先分析了目前機車受電弓檢修方式存在的局限並概述了本論文研製的受電弓測試系統的體系架構;第二章對系統內置110v直流控制電源進行了分析和設計,結合試驗對輸出pwm振蕩、輸出電源噪聲大、輸出電壓下跌等現象進行了分析並提出解決措施;第三章論述了步進電機的驅動,結合步進電機微步驅動技術研製了基於上下位單片機組的混合式步進電機智能驅動電路,並在試驗中得以驗證;第四章詳述了液晶驅動及顯示技術,利用一款液晶顯示模塊tlm12864h研製出本系統用液晶顯示電路,設計了菜單式的程序結構並以franklinc51編程方式給出部分子程序代碼;第五章則將以上構建的整個系統應用在機車受電弓的實測中,並對測試解析度進行了分析。It ? s simply the concept of mainline code that calls out to functions or subroutines that each implement an individual piece of a larger program
它只不過就是呼叫函數或者子程式的主流程程式碼的概念,其中每個函數或者子程式實現了更大的程式的一個單獨的部分。However, you can digitally sign messages to recipients whose e - mail applications support smime
但您可以向電子郵件應用程式支援smime的接收人數碼簽署訊息。E - mail applications that support smime add digital signatures and encryption capabilities to that format
支援smime的電子郵件應用程式使mime格式增加了數碼簽署和加密功能。Entertainment product : consumer electronics, protable and home entertainment, home office appliance, opto - electonics, mobile communications, high - definition television and digital broadcasting, digital electronics, applications of integrated circuits, . graphical program and user interfacing, wireless and smart control, microprocessor and computer
消遣娛樂產品:消費電子、可攜帶及家用電子消遣娛樂產品;家庭辦公室裝置、光電子產品、移動通訊;高清電視及數碼廣播;數碼電子、集成電路應用;圖像程式及用戶聯系;無線及機靈控制、微處理器及電腦。The beauty of this technique is that the encrypt decrypt subroutine is easily referenced from any of the above utilities basic, uniquery, retrieve, or sql, essentially in the same manner as a conversion code
這種技術的漂亮之處就在於,加密/解密子程序實際上是在前面提到的一些實用程序( basic 、 uniquery 、 retrieve或sql )中被引用的,這種方式實際上和變換碼是一樣的。Because the mail merge function in word can allow an access database to run macro code automatically - with no macro protection warnings turned on - malicious users could entice you to open a specially constructed mail merge word document from an e - mail attachment or a link on a hostile web site that might cause arbitrary code to run on your machine
因為word的合併列印功能會允許access在沒有開啟巨集保護警告的情況下,自動執行巨集程式碼。惡意使用者可以藉此安全性漏洞引導您從電子郵件附件或網站連結開啟特定架構的word合併列印文件,因而導致某種巨集程式碼在您的機器上不受控制地執行。It is already possible to pay government bills, look for jobs, file tax returns, check the latest weather forecasts and alerts, purchase government publications, statistical reports and tables, place on hold a book in a public library, or make enquiries about government services with one telephone number, all without leaving home. as a business, you can research business opportunities, tender for government work and apply for licenses and permits online
現時,大家已可安坐家中,以電子方式繳交政府費用查詢職位空缺遞交報稅表查詢天氣預報和警告訂購政府刊物和統計數據書刊預借公共圖書館的書籍或透過同一個電話號碼查詢各種公共服務而企業則可透過網際網路尋求商機競投政府工程及申請多類牌照和許可證。These specialized computer programs can learn to distinguish spam e - mails from valid messages, and they are not so easily confused by additions of a few random letters or words
這些專門的電腦程式可以學習分辨垃圾電子郵件與正常訊息,而且不會那麼容易被額外加入的亂碼或文字愚弄。分享友人