操作碼部分 的英文怎麼說

中文拼音 [cāozuòfēn]
操作碼部分 英文
operator part
  • : Ⅰ動詞1 (抓在手裡; 拿; 掌握) hold; grasp 2 (做; 從事) act; do; operate 3 (用某種語言、方言說...
  • : Ⅰ名詞(表示數目的符號或用具) a sign or object indicating number; code Ⅱ量詞1 (指一件事或一類的...
  • : Ⅰ名詞1 (部分; 部位) part; section; division; region 2 (部門; 機關或組織單位的名稱) unit; mini...
  • : 分Ⅰ名詞1. (成分) component 2. (職責和權利的限度) what is within one's duty or rights Ⅱ同 「份」Ⅲ動詞[書面語] (料想) judge
  • 操作 : 1 (按照一定的程序和技術要求進行活動) operate; manipulate; handle 2 (所進行的若干連續生產活動的...
  • 部分 : (整體中的局部或個體) part; section; portion
  1. The article points out the importance and necessity of the information - security from its actuality in our country. the resources in the information system, for instance, hardware, software, data, document, operator, meterial and so on, are evaluated and gived safety grade firstly. and then, it analyses the menace including the nonauthorized access, the information leak, the refused sevice, the internal objection which the system will take. the following are the corresponding control police : confirm the users " rights and duties, including the mode of using account, the limit of accessing resource, the application of password, the building of backup ; confirm the administrators " right and duties, including physical safety, system configuration, account configuration and usufruct, password management, audit and control, backup and individual intimity ; run - of - mill measure of security defence, including access control, symbol and identification, integrality control, password technique, firewall system, audit and resumption, safety of operating system, safety of database system, defence of computers " virus and resisting - deny protocol. in the end, the article offers the strategies of disposing the safety - accident and analyse after ithow. to report it, how to solve it in phase, and how to avoid it happening again. in a word, the article presents a holistic resolvent about keeping away the information system ' s security, and supplies a essential frame for its configuration, management and application

    然後,對系統可能受到的威脅,包括非授權訪問、信息泄漏、拒絕服務和內缺陷等進行析,並提出了相應的控制策略:確定用戶的權力和責任,包括帳戶使用方式、資源訪問權限、口令應用以及建立備份等;確定系統管理員的權力和責任,包括物理安全、系統配置、帳戶設置及使用權限、口令管理、審計和監控、備份以及個人隱私等方面;一般性的安全防護措施:存取控制、標識和認證、完整性控制、密技術、防火墻系統、審計和恢復、系統安全、數據庫系統安全、計算機病毒防護和抗抵賴協議等。最後,對事故處理和事後析提供策略,如何報告安全事故,如何協調解決安全事故,如何避免安全事故再次發生。總之,本文對信息系統安全防範工給出一個整體的解決方案,為其在配置、管理和應用方面提供了基本的框架。
  2. The open source software narval the name basically means " narwhal ", a type of whale combines several techniques from ai into a general scheduling, and task and information management system that can help automate a lot of your mundane tasks

    開放源代軟體narval (這個名字的原意是「獨角鯨」 ( narwhal ) ,是鯨類的一種)把各種人工智慧技術組合成了一個可以進行日常工安排,任務和信息管理的系統,該系統可以幫助您自動化的日常任務。
  3. Audio - visual, video and television equipment and systems - control, synchronization and address codes - method of operation for pulsed cue tone control systems for two still projectors

    視聽視頻電視設備及系統.第5:控制同步和地址.第2節:雙片式投影儀脈沖音調控制設備方法
  4. In this paper, the main content includes three parts. firstly, some compounds such as i / o blocks and algebraic and logic blocks and pid blocks are exploited. secondly, the software of configuration could configurate online or offline, and debug and diagnose the control systems. thirdly, management system disposes the exchange of data, and executes strategy of control, manages the real - time database

    該軟體以i / a系列dcs為主要參照對象,它將整個系統的控制與模型本身離開來,其控制的組態在站管理系統進行,不用加入模型,也不用生成控制源代,因此很自然的就實現了在線調整、實時控制等類同於實際現場的模式。
  5. In this text, we first do some research on the genetic algorithm about clustering, discuss about the way of coding and the construction of fitness function, analyze the influence that different genetic manipulation do to the effect of cluster algorithm. then analyze and research on the way that select the initial value in the k - means algorithm, we propose a mix clustering algorithm to improve the k - means algorithm by using genetic algorithm. first we use k - learning genetic algorithm to identify the number of the clusters, then use the clustering result of the genetic clustering algorithm as the initial cluster center of k - means clustering. these two steps are finished based on small database which equably sampling from the whole database, now we have known the number of the clusters and initial cluster center, finally we use k - means algorithm to finish the clustering on the whole database. because genetic algorithm search for the best solution by simulating the process of evolution, the most distinct trait of the algorithm is connotative parallelism and the ability to take advantage of the global information, so the algorithm take on strong steadiness, avoid getting into the local

    本文首先對聚類析的遺傳演算法進行了研究,討論了聚類問題的編方式和適應度函數的構造方案與計算方法,析了不同遺傳對聚類演算法的性能和聚類效果的影響意義。然後對k - means演算法中初值的選取方法進行了析和研究,提出了一種基於遺傳演算法的k - means聚類改進(混合聚類演算法) ,在基於均勻采樣的小樣本集上用k值學習遺傳演算法確定聚類數k ,用遺傳聚類演算法的聚類結果為k - means聚類的初始聚類中心,最後在已知初始聚類數和初始聚類中心的情況下用k - means演算法對完整數據集進行聚類。由於遺傳演算法是一種通過模擬自然進化過程搜索最優解的方法,其顯著特點是隱含并行性和對全局信息的有效利用的能力,所以新的改進演算法具有較強的穩健性,可避免陷入局最優,大大提高聚類效果。
  6. Specification for audio - visual, video and television equipment and systems - control, synchronization and address codes - synchronized tape visual operating practice

    視聽視頻電視設備及系統.第5:控制同步和地址.第1節:磁帶圖象同步慣例
  7. An action can be part of a production ; it is marked by braces and contains perl code

    可以是產品的一;它由花括號{ }標出,並包含perl代
  8. Each hand wheel shall be fitted with a circular nameplate which is in english language on stainless steel material, indicating the valve number

    每個手輪(盤/駕駛盤)的不銹鋼須帖有相對應的英文銘牌,註明閥門號(這個就不太懂,不知道是什麼閥門號
  9. 5 the client may not independently modify software components ( change binary code ) of the client side of the trading platform, to scan ports of the server side of the trading platform, as well as make any malevolent action in order to create overload, failure or incorrect performance of the trading platform

    5顧客無權自己改形商業程序的顧客份的程序成(比如改變二進制編) ,無權掃描商業程序的服務器的份以及無權進行目的是引起商業程序的過載、故障或者非正確的任何惡意性行動。
  10. Wang lung - five thesaurus free version applicable to all operating systems and can be articulated large thesaurus, no hidden weight code, automatically adds the code can not use strokes, quanpin inputs, automatic word and most other functions there, many restrictions

    龍文五筆王小詞庫免費版適用於各種系統,可以掛接大的詞庫,沒有重隱藏、自動添加編,不能使用雙拼、簡拼輸入等,其中自動加詞等大功能都有,限制不多。
  11. Although there have been many application instances in the field of input / output device technology, we need an specific project and technology route aimed at an given application. in this thesis, we combine the introduction and analysis of relative technology to describe the accomplishment of a coordinate collecting device which is based on incremental rotary encoder. this device is an specific device applied to collect the corrdinate displacement of ground image ’ s three - dimensional model created by full digital photogrammetric station. cpld chip and vhdl are applied in this device to carry out the following work : phase control of the electrical pulse created by incremental rotary encoder, counting the number of electrical pulse, controling the state of signal processing circuit, exchanging data between this circuit and pci control

    本文結合相關技術的介紹和析,描述了一個基於增量式旋轉編器的坐標參量採集介面卡的實現,此介面卡是一種用於採集全數字攝影測量系統地面影像模型坐標位移量的專用設備,該設備採用cpld器件和vhdl語言實現增量式旋轉編器的脈沖信號鑒相和計數、信號處理的狀態控制以及和pci總線晶元ch365之間的數據交換和通信功能,同時該設備的驅動程序基於wdm模式,並且配置有結構良好的動態鏈接庫程序為系統軟體和驅動程序之間的數據和控制交互中間介面,能夠方便地運行在windows98 / 2000 / xp系統平臺上,具有實時性強、工穩定、通用性較好和性價比高等特點。
  12. According to the request of this subject, we have developed the system hardware and software for the slave device and the inspection software running on the pc. in this paper all of the followings is illustrated detailedly, such as the research on the principles of measurement and its realization, three means of water - level measurement that are separately based on photo electricity coder, pressure sensor and potentiometer ; selection of the microchip, we choose an advanced integrated soc ( system on chip ) microchip c8051f021 as the main controller ; realization of signal sampling, processing and its conversion in the mcu ; application of high precision 16 bits adc cmos chip - - ad7705 in our system, designing its interface with the microchip and relevant program ; using a trickle charge timekeeping chip ds1302 in the system which can provide time norm and designing of its i / o interface and program ; additionally, a 4 ~ 20ma current output channel to provide system check - up using ad421. in the system, ad421, ad7705 and the microchip compose spi bus ; to communicate with the master pc, here we use two ways which are separately rs232 and rs485 ; moreover, there are alarm unit, keyboard unit, power supply inspection unit and voltage norm providing unit in the system

    針對研製任務的要求,課題期間研製了下位機系統硬體和軟體,開發了上位機監控軟體,其中所的具體工包括:測量原理的研究和在系統中的實現,在本次設計中用三種方法來進行水位測量,別是旋轉編器法、液位壓力傳感器法和可變電阻器法;主控晶元的選擇,我們選用了高集成度的混合信號系統級晶元c8051f021 ;實現了信號的採集和處理,包括信號的轉換和在單片機內的運算;高集成度16位模數轉換晶元ad7705在系統中的應用,我們完成了它與單片機的介面設計及程序編制任務;精確時鐘晶元ds1302在系統中的應用,在此,我們實現了用單片機的i o口與ds1302的連接和在軟體中對時序的模擬,該晶元的應用給整臺儀器提供了時間基準,方便了儀器的使用;另外,針對研製任務的要求,還給系統加上了一路4 20ma模擬信號電流環的輸出電路來提供系統監測,該的實現是通過採用ad421晶元來完成的,本設計中完成了ad421與單片機的spi介面任務,協調了它與ad7705晶元和單片機共同構成的spi總線系統的關系,並完成了程序設計;與上位機的通信介面設計,該通過兩種方法實現: rs232通信方式和rs485通信方式;系統設計方面還包括報警電路設計、鍵盤設計、電源監控電路設計、電壓基準電路的設計。
  13. Comparing three character code architectures and some character display technologies, the author selected the unicode character code architecture and truetype technology to create iob word library. moreover, through analyzing the kernel mechanism of the windows os supporting multilanguage and ime, the author explained the basic principles of ime and developed a model system of ime of iob based on the api provided by os

    本文通過對多種編體系和字元顯示技術的比較析,者選擇了unicode字符集和truetype字體技術來建立金文隸定字庫和金文原篆字庫,並通過剖析windows系統對多語言和輸入法支持的內機制,闡述了輸入法實現的基本原理,基於系統提供的編程介面,開發了金文原篆輸入法的原型系統。
  14. Security - critical code is any code that protects sensitive resources and exposes brokered access to the resource to untrusted or partially trusted code by performing the necessary elevation of privilege operations

    安全性關鍵型代為具有以下性質的任何代:這些代保護著敏感資源,並通過執行必要的特權提升將經過調整的資源訪問權限公開給不受信任或受信任的代
  15. The foxboro dcs is regarded as main reference object, it does n ' t same as the traditional simulator. the logic protect and control are separated from model and the configuration control system be exploited in the paper. and the configuration of logic protect and control is operatised at operation station administration system, not to be added into model, not to build control sound code also

    其邏輯保護和控制的組態在站管理系統進行,不用加入模型,也不用生成控制源代,因此很自然的就實現了在線調整、實時控制等類同於實際現場的模式。在本課題中,控制、邏輯保護和電氣邏輯模擬軟體主要包含熱工控制中一些常用的代數和邏輯運算。
  16. Different from previous document clustering method based on nmf, our methods try to discover both the geometric and discriminating structures of the document space in an unsupervised manner, companied with high accuracy in acceptable computationally expensive

    與基於nmf演算法的文本聚類不同,我們的演算法力求以無監督的方式,在時間復雜度允許的范圍內,找到更適合於的數據向量間的幾何局特徵向量及相應的各文檔的編向量。
  17. A security device ( often part of a terminal ) that reads information ( often from a magnetic strip ) on a badge inserted in a slot. in this way, it can prevent the unauthorized use of a display station before allowing an operator to sign on

    一種安全設備(通常是終端的一) ,它可以讀取插入槽中的標記卡上的信息(這些信息往往以磁條的形式記錄在標記卡上) 。用這種辦法,在允許員進入系統前,可以防止對一個顯示工站的非法使用。參閱badge 。
  18. It consists of two part, the one is hardware : integrating the system of the arc welding robot ' s hardwares and its working principles, separating and extracting the original system ' s control signals, designing the control system openly and its working principles, constructing the structure and principle of the motion card based on dsp, designing the telecontroling teaching box or control panel of touching screen based on usb interface, applying for some software and hardware measures on control system ' s anti - jamming ; the other is software : putting forward the three levels opening software structure model of arc welding, comparing the opening of software structure model between osaca and ours, putting forward the solutions of the pri and communication among the threads of software system ' s modules, using the dll ' s techniques to solve software ' s module design and putting forward the frame codes, bringing forward the path planning software ' s realization by cp + ptp mode, discussing the real time of windows2000 operating system and advancing its solution

    具體包括,硬體:弧焊機器人硬體整體系統集成及其工原理,原系統控制信號的離和提取,控制系統的開放式設計及組成原理,基於dsp的運動控制卡結構和原理,基於usb介面的觸摸屏式遙控示教盒控制面板的設計,系統抗干擾的軟、硬體措施;軟體:提出了弧焊機器人的三層開放式軟體結構模型,軟體結構模型與osaca的模型進行開放性比較,給出軟體系統各模塊線程間優先級和通訊的解決方案,使用動態鏈接庫技術實現軟體模塊化設計並給出了框架代,給出了cp + ptp方式的軌跡規劃軟體實現過程, windows2000系統實時性問題的討論及解決方案。
  19. Some variations of this instruction format use portions of the target and source register operand specifiers as immediate fields or as extended opcodes

    這一指令格式的一些變種使用目的和源寄存器數說明符為立即欄位或為擴展的
  20. Some variations of this instruction format use portions of the target and source operand specifiers as immediate fields or as extended opcodes

    這一指令格式的一些變種使用目的和源寄存器數說明符為立即欄位或為擴展的
分享友人