子程式碼 的英文怎麼說

中文拼音 [zichéngshì]
子程式碼 英文
child code
  • : 子Ⅰ名詞1 (兒子) son 2 (人的通稱) person 3 (古代特指有學問的男人) ancient title of respect f...
  • : 名詞1 (規章; 法式) rule; regulation 2 (進度; 程序) order; procedure 3 (路途; 一段路) journe...
  • : 名詞1 (樣式) type; style 2 (格式) pattern; form 3 (儀式; 典禮) ceremony; ritual 4 (自然科...
  • : Ⅰ名詞(表示數目的符號或用具) a sign or object indicating number; code Ⅱ量詞1 (指一件事或一類的...
  • 程式碼 : script
  • 程式 : form; pattern; formula; modality
  1. The high entropy of the real and imaginary parts of sar raw data makes lossless - coding compression techniques unfit for sar raw data. in chapter 4, some compression algorithms for sar raw data compression, such as baq, upq, bavq and wt - subbandcade are analyzed and discussed. an improved unrestricted polar quantizer ( upq ), which can enhance the performance of the quantizer is put forward

    第四章分別對塊自適應量化( baq )演算法、非約束極坐標量化( upq )演算法、塊自適應矢量量化( bavq )演算法和小波變換帶編演算法進行了分析和研究,並詳細討論了這些演算法在工實際中的應用。
  2. Currently, the army is developping military network based oa project with effort among which military email transferring system is an essential application module. this paper proposed a data model of military email transferring as well as detailed design scheme according to the potential threat in email service system, practical condition of current military network and official model as well as document transferring process. it discussed the security requirement of military email transferring system in detail as well as analyzed and design relevent data model, mail exchange protocol and application requirement of cryptogram management

    該文針對電郵件服務系統中存在的安全隱患,基於對目前國內外電郵件安全技術的分析研究,立足於現有軍事計算機網路的實際現狀,根據目前軍隊的辦公模、公文傳輸流,提出了一種適合於軍隊辦公自動化中軍用電郵件傳輸的數據模型及具體的設計方案,詳細討論了軍用電郵件傳輸系統的安全服務需求,對相關的數據模型、郵件交換協議、密管理的應用需求等進行了詳細的分析和設計。
  3. After at least 3000 tests, our product are widely adopted in the applications of cellular phone, digital still camera, digital camcorder, pda, notebook pc, etc. fae provide engineering assistance, floor test director and technical service to our customer. when met the quality and compatibility problem they will discover the cause and settle the problem

    公司產品經過三千次以上兼容性測試,我們的產品廣泛應用於手機數相機數攝像機pda便攜電腦等各種電產品, fae部門隨時為客戶提供工協助現場測試指導及相關技術支持,對個別出現的質量或兼容性問題,迅速查明並給予解決措施。
  4. The content of this paper is arranged as foll owing : chapter 1 introduces the concept of credit, credit risk and credit assessment, as well as the history and development of credit assessment ; chapter 2 introduces the history of ai technology, and the background of expert system and neural network. characters and disadvantages of expert system and neural network are presented respectively and the necessity of combining expert system and neural network is lightened ; chapter 3 shows the process of dealing with sample data, including the treatment of exceptional data and factor analysis, and puts forward the concrete framework of the mixed - expert credit assessment system ; chapter 4 introduces concept of object - oriented technology, and constructs object model and functional model after analyzing the whole system. it also illustrates the implementation of concrete classes by an example of rule class and the inference algorithm in the form of pseudocode ; chapter 5 introduces the structure of the whole system, the major functional models and their interfaces, and the characteristic of the system is also generalized ; chapter 6 summarizes the whole work, and points out the remaining deficiencies as well as the prospective of this method

    本文具體內容安排如下:第一章介紹了信用、信用風險、信用評價的概念,回顧了信用評價的歷史、發展和現狀,並綜合各種信用評價模型,指出這些模型各自的優缺點:第二章簡單描述了人工智慧技術,著重介紹有關專家系統與神經網路的基礎知識,通過總結它們的優缺點,指出結合專家系統與神經網路構造混合型專家系統的必要性;本章還介紹了神經網路模塊的概念,提出了混合型專家系統的一般框架與設計步驟:第三章對樣本數據進行處理,包括異常數據的剔除、因分析等,提出了信用評價混合型專家系統的具體框架結構,介紹了系統知識庫的主要部分、基於優先級的正向推理機制的流、以及基於事實的自動解釋機制的具體實現方法;第四章介紹了面向對象技術,進而採用面向對象對信用評價系統進行分析,建立了對象模型和功能模型,並在此基礎上,採用c + +語言以規則類為例說明系統中具體類的實現,用偽代的形描述了推理的演算法;第五章描述了整個系統的結構,對系統主要功能模塊和界面進行了介紹,並總結系統的特點;第六章總結了全文,指出本文所構造系統存在的不足以及對將來的展望。
  5. In this research, the wheat, rice and tobacco with salt treatment were used as experimental materials to study the molecular mechanism of stress - tolerance in plant and make the relative gene engineering research. the main results are as following : 1. a novel ca2 + channel gene, named as tatpc1, was isolated from wheat, encoding a two - pore voltage - gated channel protein

    本研究在總結當前植物鹽脅迫應答分生物學研究進展的基礎上,以農作物小麥、水稻、煙草作為主要實驗材料,開展了植物耐逆分機制和相關基因工研究,主要結果為: 1從小麥中克隆到一個新的ca ~ ( 2 + )通道蛋白基因, tatpc1 ,它編的是一種細胞膜上兩孔電壓門控通道蛋白。
  6. Now, with the rapid development of computer and electronics, there have been a great progress in the field of input / output device technology. among this field, pci has been a current standard interface of pc. and in order to accommodate the development of operating system, wdm has been a driver model adopted by industry generally. at the same time, in the respect of sensor ’ s application, a high precision and high integrated incremental rotary encoder has been an outstanding one among the displacement sensors. meanwhile, eda technology and cpld / fpga chip applied in the signal processing circuit are approved by a great number of engineers who are engaged in designing the electronic device

    目前,隨著計算機技術和電技術的飛速發展, i / o設備介面控制技術領域有了長足進步。其中, pci介面成為主流的微機標準介面,而與操作系統平臺的發展相適應, wdm已成為業界普遍採用的驅動序模;同時,在傳感器應用方面,高精度、高集成的增量旋轉編器已是位移型傳感器中的佼佼者,而eda技術和cpld / fpga器件在信號處理電路中的應用被廣大電設計人員所認可。
  7. The " change password program " software is designed for use by the subscribers of hongkong post e - cert in changing the password of the e - cert file that is created and saved on a floppy disk through the central key generation service

    "更改電證書檔案密"軟體為香港郵政電核證服務登記人而設。經代制密匙服務產生電證書而存入磁碟后,可以利用此軟體更改檔案密
  8. In sending the saved copy to his her client, the auditor should not encrypt the supplementary form with the e - form core program. this is because the e - form core program uses the ird s public key in performing the encryption. without the necessary key, the auditor or the auditor s client cannot decrypt the encrypted copy

    核數師提交報稅表附表儲存本給其客戶時,無須以電表格應用把報稅表附表加密,因為該電表格應用是使用稅務局的公開密匙加密的,如果沒有所須的解密匙,核數師或其客戶將無法把已加密的報稅表附表解密。
  9. You and your recipient must have public key certificates and smime compatible e - mail applications in order to send and receive secured e - mail

    要發送和接收安全電郵件,您和您的接收人必須有公開密匙證書和兼容smime的電郵件應用
  10. For security concern, this import function will set the ie browser s security level of the imported e - cert as " high " and the e - cert private key as " non - exportable ". the password you set for your e - cert imported into ie ( point 4 above ) is required when your e - cert in ie ( including the private key ) is used

    基於保安上的考慮,此匯入會將匯入ie瀏覽器的電證書的安全性等級設定為高,而你的電證書的私人密匙或稱私密金鑰會設定為不能匯出。
  11. Adaptive run length coding explores the residual redundancy of the high frequency coefficients in the transform domain. hereby, an embedded image coding algorithm based on binary description run length ( bdrl ) is brought forward

    對高頻帶採用自適應的遊處理,提出一種二進制描述遊的嵌入圖像編演算法( bdrl ) 。
  12. Firstly, the current testing localization in the detection of electric bow is analyzed and the new system ' s whole construction developed in this thesis is introduced ; in the 2rd chapter, the embedded 110v dc power supply is analyzed and constructed, and with experiments, some dissonant results such as the fluctuation of output pwm ( pulse width modulation ) pulses, the power noise added to output voltage, and the drop of output voltage have been analyzed and the problems have been broken down one by one ; in chapter 3, stepping motor ' s drive has been systematically dissertated, and combing stepping motor ' s subdivided drive technology, the author develops an intelligent mini - step driving circuit using a main - sub microprocessor structure, which is validated in the hybrid stepper based system ; in the 4th chapter, liquid crystal driving and displaying technology is specified in detail, with one sort of lcd modules ( tlm12864h ), the author develops an feasible circuit for the new testing system, designs a menu mode based program struc ture and brings here some programming codes using franklin c51 programming language ; in chapter 5, the above built system is used in the electric bow ' s practical detection, and the differentiating rate of this system is analyzed

    論文首先分析了目前機車受電弓檢修方存在的局限並概述了本論文研製的受電弓測試系統的體系架構;第二章對系統內置110v直流控制電源進行了分析和設計,結合試驗對輸出pwm振蕩、輸出電源噪聲大、輸出電壓下跌等現象進行了分析並提出解決措施;第三章論述了步進電機的驅動,結合步進電機微步驅動技術研製了基於上下位單片機組的混合步進電機智能驅動電路,並在試驗中得以驗證;第四章詳述了液晶驅動及顯示技術,利用一款液晶顯示模塊tlm12864h研製出本系統用液晶顯示電路,設計了菜單序結構並以franklinc51編給出部分序代;第五章則將以上構建的整個系統應用在機車受電弓的實測中,並對測試解析度進行了分析。
  13. It ? s simply the concept of mainline code that calls out to functions or subroutines that each implement an individual piece of a larger program

    它只不過就是呼叫函數或者的主流的概念,其中每個函數或者實現了更大的的一個單獨的部分。
  14. However, you can digitally sign messages to recipients whose e - mail applications support smime

    但您可以向電郵件應用支援smime的接收人數簽署訊息。
  15. E - mail applications that support smime add digital signatures and encryption capabilities to that format

    支援smime的電郵件應用使mime格增加了數簽署和加密功能。
  16. Entertainment product : consumer electronics, protable and home entertainment, home office appliance, opto - electonics, mobile communications, high - definition television and digital broadcasting, digital electronics, applications of integrated circuits, . graphical program and user interfacing, wireless and smart control, microprocessor and computer

    消遣娛樂產品:消費電、可攜帶及家用電消遣娛樂產品;家庭辦公室裝置、光電產品、移動通訊;高清電視及數廣播;數、集成電路應用;圖像及用戶聯系;無線及機靈控制、微處理器及電腦。
  17. The beauty of this technique is that the encrypt decrypt subroutine is easily referenced from any of the above utilities basic, uniquery, retrieve, or sql, essentially in the same manner as a conversion code

    這種技術的漂亮之處就在於,加密/解密序實際上是在前面提到的一些實用序( basic 、 uniquery 、 retrieve或sql )中被引用的,這種方實際上和變換是一樣的。
  18. Because the mail merge function in word can allow an access database to run macro code automatically - with no macro protection warnings turned on - malicious users could entice you to open a specially constructed mail merge word document from an e - mail attachment or a link on a hostile web site that might cause arbitrary code to run on your machine

    因為word的合併列印功能會允許access在沒有開啟巨集保護警告的情況下,自動執行巨集。惡意使用者可以藉此安全性漏洞引導您從電郵件附件或網站連結開啟特定架構的word合併列印文件,因而導致某種巨集在您的機器上不受控制地執行。
  19. It is already possible to pay government bills, look for jobs, file tax returns, check the latest weather forecasts and alerts, purchase government publications, statistical reports and tables, place on hold a book in a public library, or make enquiries about government services with one telephone number, all without leaving home. as a business, you can research business opportunities, tender for government work and apply for licenses and permits online

    現時,大家已可安坐家中,以電繳交政府費用查詢職位空缺遞交報稅表查詢天氣預報和警告訂購政府刊物和統計數據書刊預借公共圖書館的書籍或透過同一個電話號查詢各種公共服務而企業則可透過網際網路尋求商機競投政府工及申請多類牌照和許可證。
  20. These specialized computer programs can learn to distinguish spam e - mails from valid messages, and they are not so easily confused by additions of a few random letters or words

    這些專門的電腦可以學習分辨垃圾電郵件與正常訊息,而且不會那麼容易被額外加入的亂或文字愚弄。
分享友人