捕獲的機理 的英文怎麼說

中文拼音 [huòde]
捕獲的機理 英文
mechanism of trapping
  • : 捕名詞(姓氏) a surname
  • : Ⅰ動詞1. (捉住; 擒住) capture; catch 2. (得到;取得) obtain; win; reap 3. (收割) reap; harvest Ⅱ名詞(姓氏) a surname
  • : 4次方是 The fourth power of 2 is direction
  • : machineengine
  • : Ⅰ名詞1 (物質組織的條紋) texture; grain (in wood skin etc ) 2 (道理;事理) reason; logic; tru...
  • 捕獲 : 1. (捉到; 逮住) catch; capture; succeed in catching; acquire; arrest; seize 2. (俘獲) trapping
  • 機理 : mechanisation; mechanization; mechanism
  1. The synchronization of frequency hopping method referenced the jtrs radio system of usa military, and designed a synchronization method used in our radio include creating the frequency hopping map and the base band frame architecture in frequency hopping mode. the paper also analyzed the synchronization capability on theory. it has been proved correct on theory by showing the false probability, capture probability and the synchronization time

    對跳頻圖案產生和跳頻幀結構,本文不僅從論上分析了同步性能,給出了虛警概率和檢測概率,估算了同步時間,證明均能滿足系統指標要求,而且通過與合作單位進行聯調和實測證實了該方案可行性。
  2. The signal format of gps is analyzed, the principle models and mathematical models are established, the ber performance is analyzed in a channel interfered with wide - bandwidth awgn, narrow - bandwidth awgn, transmitted signal, single - tone signal respectively. based on the results above interference methods are discussed and simulated. then the performance of code acquisition and code trace of a digital gps receiver are discussed. the modem of linkl 1 and link4a are modeled and their ber performances are analyzed and simulated in channel s interfered with awgn, single - tone signal and multi - tone signal respectively

    建立了jtids收發終端數學模型,分析它在噪聲干擾、相關干擾、互相關干擾下誤碼性能,提出較佳干擾方法和干擾碼型,並進行模擬模擬;分析了gps信號格式,建立了gps框圖模型、信號數學模型,並對其在寬帶噪聲干擾、窄帶噪聲干擾、轉發干擾、單頻干擾等情形下誤碼性能進行了分析比較,提出相對較佳干擾方法,並做了計算模擬,針對一數字式gps接收中擴頻碼與跟蹤環特性進行分析;建立了link11和link4a數據鏈調制解調數學模型,對它們在噪聲干擾、單音干擾、多音干擾等下誤碼性能進行分析,最後對干擾情況進行了模擬模擬。
  3. The study concludes that optical signals from the little flashing led ( light emitting diode ) lights, usually red and dotting everything from modems to keyboards and routers, can be captured with a telescope or long - distance lens and processed to reveal all the data passing through the device

    該研究報告結論是:從微小而不斷閃爍發光二極體(通常為紅色且應用到各類設備,從數據到鍵盤和路由器等)發出光波信號,可以被望遠鏡或遠程透鏡,然後在經過處后將通過這些設備數據一覽無遺。
  4. In the case of tight financial situation, key investment ca n ' t be used in key positions. luzhong mining company adopts traditional stock management as " coping with things ", with " three grades " management, handwork operation, careless management, a very lengthy process and massive structure, so it is impossible to react efficiently to manufacturing needs and outside information changes. therefore makes it hard to control stock and capture profit

    魯中礦業集團公司採取傳統「應付情況」庫存管方式, 「三級」管,手工操作,管粗放,構龐大,業務流程冗長,在日益加劇市場競爭中,不能對生產需求和外界信息及時有效地做出反應,速度慢,效率低,難以進行有效庫存控制和會,資金大量積壓,經濟效益差,在市場競爭中不佔優勢。
  5. Illuminated by human immune system, this paper presents a continuous learning model for intrusion defense that follows the principle of how bacterin stimulates the immune system to generate antibody. this model presents how to get the important “ bacterin ” to add to the database, which is used to do signature matching and anomaly detection, and thus protect system from unknown intrusion ( virus )

    受到疫苗和人體免疫系統工作方式啟發,本文提出一種入侵預防系統模型,它模擬人體注射疫苗后免疫系統產生相應抗體抵抗抗原:通過設置最新外部入侵病毒並將其加入病毒特徵庫,通過特徵匹配和異常檢測兩種方式檢測識別病毒並將其隔離消除。
  6. However, our traditional steel company is low in its information, and the efficiency and level of information utilization are not high. in order to enhance its competitive power, china steel company needs widely to introduce the conception of erp, which can help it to reach business reengineering, organization adjustment and mis reintegration. under the way of advanced management, the company can better catch new opportunity for economy growth and easer escape from the risk

    面對「全球化、知識化、信息化」趨勢,為了提高企業自身競爭能力,使其在激烈市場競爭中長期勝,中國鋼鐵企業急需全面引入企業資源計劃( erp )念、管思想和管方法,通過它達到業務重組、構重組和管系統重組,在先進手段支持下提高企業決策體系和市場運作體系反應水平,提高企業捉發展遇、規避市場風險能力。
  7. Secondly, to achieve the independent regulation of active and reactive power output from the generator side which is designed for the purpose of tracing the maximum wind - energy capturing. the paper has analyzed the mathematic model of the ac excited doubly - fed machine and the stator field orientation control strategy of the motor as vscf wind power generator. thirdly, it has put forward and designed the dual pwm converter with the capacity of energy flowing bidirectional aimed at the demand of rotor energy bidirectional flow. the author constructed reliable and integrated experimental system and did a series of experimental study including no - load, cutting - in network and power generation at, below and above the synchronous speed

    論文首先分析了風運行特性及其最佳風能利用原,通過模擬及實驗驗證了採用直流電輸出特性模擬風力最大輸出功率曲線可行性,並給出了模擬系統硬體結構;然後為了實現交流勵磁發電有功、無功功率獨立調節,分析了交流勵磁雙饋發電數學模型和在追蹤最大風能變速恆頻風力發電時必需定子磁鏈定向矢量控制策略;針對雙饋發電轉子能量雙向流動要求,提出並設計了具有能量雙向流動能力雙pwm交流勵磁用變頻器;最後為實現從論到實踐全面研究,研製出了一套小功率完整雙pwm變頻器交流勵磁雙饋風力發電實驗系統,進行了空載、並網、同步速及上、下發電運行等一系列運行實驗;所完成模擬和實驗研究均驗證了論、模型和控制策略正確性、可行性。
  8. This dissertation adopts a universal digital ds / dmpsk modulation and demodulation scheme which is based on fpga. this scheme adopts quadrature balanceable modulation, intermediate frequency sampling, digital matched filtering, delay differential demodulation techniques and so on. it directly processes the digital signals on intermediate frequency without down - conversion, and doesn ’ t need pseudo random codes synchronization and carrier wave extraction circuits

    本文採用了一種基於fpga通用數字調制解調方案,該方案在調制端採用了正交平衡調制技術,在解調端採用了中頻帶通采樣、數字匹配濾波、延時差分解調等技術,直接在中頻上進行數字信號處,不需要進行下變頻,也不需要增加額外偽隨碼同步和載波提取電路。
  9. Firstly, the principle and realization of the step acquisition and delay locked loop are discussed

    首先,論文討論了步進延遲鎖定環及實現
  10. Based on theoretical studies on these algorithms, by means of computer simulation and the water tank experiment, we analyzed the performance of these algorithms in uniform linear array, which included the separation and reconstruction of source signals and doa estimation performance

    在詳細分析各種演算法內在基礎上,針對均勻線列陣,通過大量計算模擬實驗與水池實驗數據處結果,分析、討論了幾種演算法對目標源信號分離、能力以及方位估計性能。
  11. The method is based on the theory of statistic random signal and adopts the serial manner. the acquisition judge is performed by automatic threshold control

    該演算法基於統計隨信號檢測基本論,採用串列方式,並且利用自適應門限值作為判決門限,完成
  12. In the initial setup the host machine ' s hard drive is formated, persistent directories are created, network information is entered, and specific variables to handle data control, data capture, and automated alerting are set

    初始化安裝時主硬盤會給格式化,會建立永久性目錄,網路配置信息需要你輸入,會設置處數據控制,數據和自動告警相關變量。
  13. According to the tracking principle being exploited, we make the simulation plan and flow chart, and emphasis on discussing the facts that the tracking receiver in antenna systems affects the capturing and tracking systems. the data simulation model of the tracking receiver is built up. using matlab simulation, we verify the fact, investigate the accuracy factors and finally conclude all in practice

    在自動跟蹤系統中,跟蹤接收作為核心控制單元,根據所採用跟蹤方式,制訂模擬方案,確定模擬流程,重點討論了天線系統跟蹤接收性能對跟蹤系統影響,研究並建立了跟蹤接收數字模擬模型,通過matlab模擬軟體系統進行了模擬分析和驗證,研究了各種參數對系統精度影響,得到了有實用價值結果。
  14. Another 20 kinds of non - designed contact points are given for the first time. contact determining algorithm of all the above contact types is given using z - buffer algorithm for 3 - d observation, and simulation results show high accordance with results of vector - associated method. simulation for non - designed contact mode with random initial conditions has been done too, and statistics from the simulation indicates that it is important to predict non - designed contact points in practical rvd efforts

    全文工作包括以下幾個方面內容: 1 .建立了周邊式對接復雜幾何外形數學描述,描述了對接初始條件范圍內,兩對接構相互接近、過程中可能出現20種設計接觸模式,並針對初始接觸點首次提出20種非設計接觸模式;利用計算圖形學中可見面判別z -緩沖演算法原,給出了所有接觸模式檢測演算法,該演算法模擬結果與輔助向量法高度一致,驗證了演算法有效性;進行了300組確定首次接觸點模擬,統計結果表明,在飛船上實時進行非設計接觸模式預測是非常重要
  15. So it can be argue that the basic tasks of growth management of knowledge enterprises are to carry out knowledge strategy, enhance acquirement and storage capabilities of knowledge, and improve the mechanism of knowledge transference and creation

    因此,對知識型企業實施知識戰略,提高知識和儲存能力,完善知識轉移和創造制是知識型企業成長管基本任務。
  16. This paper introduces development of a tv monit system, and details technical difficulty and method of reaserch, including video capture and recognition. according to the analysis of tvprogram, it presents video capture based on time, and “ hot region ” capture based on centre focus of photograph principle, and image recognition based on dispersion degree

    介紹了一個微電視監播系統研製開發,講述了研製技術難點及解決方法,包括視頻和識別.基於對電視節目分析,提出了基於時間視頻,基於中心聚焦攝影原「熱區」取法,以及基於散度圖像識別方法
  17. The main technological characteristics include not only the integrated optimizing design of variable speed and constant frequency, ensuring the wind turbines to adapt to diversified wind plants with different temperatures and geographical conditions, but also the maximum wind power captured at optimized tip speed ratio below the rated wind speed and security protection of constant power output above the rated wind speed by variable pitch regulation

    主要技術特點是整體綜合優化設計、變速恆頻運行、適合不同氣候特點和地環境風電場;風全翼展變漿距功率調節、額定風速以下最佳變速比運行最大風能、額定風速以上恆功率輸出具有安全保護功能。
  18. It then builds a theoretical framework for entrepreneurial work. the main contents of the first part go as follows : 1. the defining of the concept of entrepreneurial work entrepreneurial work is a process of spotting and capturing opportunities, integrating entrepreneurial resources, and hence creating new products or services, and realizing its potential values

    全文分三個大部分,第一部分論述了中小企業創業、創業資源概念、創業及構建了創業論框架,主要內容包括: 1 、關于創業概念界定創業是一個發現和會,整合創業資源,並由此創造新穎產品或服務和實現其潛在價值過程。
  19. The thesis describes the common network attack types as well as research condition of network intruding inspection system, and analyses the basic theory of network data packets transfer on account of protocol tcp / ip, and finally discusses network safe system framework on account of p2drr, which takes linux operating system as the development platform, has c as the development tool, uses libpcap as a tool to capture network data packets, and decode according to various protocols, along with the preprocess function on account of such inspection as i / o port scanning, and analyses the misuse inspecting technology deeply on account of key word mode matching, and studies theory abnormal inspecting system on account of data mining. the inspecting and output function of the whole system is designed as mold in plug - mechanism, so as to transplant and extend the system

    論文介紹了網路常見攻擊模式及網路入侵檢測系統研究現狀,分析了基於tcp ip協議網路數據包傳輸基本原,討論了基於p2drr模型網路安全系統架構,本系統以linux操作系統為開發平臺,採用c作為開發工具,利用1ibpcap庫為工具網路數據包,並根據不同協議實現報文解碼,實現了基於埠掃描等檢測預處功能,對基於關鍵字模式匹配誤用檢測技術作了深入地分析,並對基於數據挖掘異常檢測系統進行了探討,整個系統檢測與輸出功能均以插件制設計成模塊,以便系統移植和擴展。
  20. The a / d and cap circuits on dsp sample the voltage and current signals coming from the signal sampling circuit and the speed signal of the motor respectively. the " dead time " register of the dsp prevent directive - through of the igbts on the up and the down bridge arms

    利用dsp上死區寄存器設置ipm驅動信號死區時間防止上下橋臂igbt直通;利用板上集成a / d轉換器採集經過板級外圍電路處電路信號;利用板上單元cap採集通過轉速計輸出從而得到電轉速。
分享友人