方式控制碼 的英文怎麼說

中文拼音 [fāngshìkòngzhì]
方式控制碼 英文
mode control code
  • : Ⅰ名詞1 (方形; 方體) square 2 [數學] (乘方) involution; power 3 (方向) direction 4 (方面) ...
  • : 名詞1 (樣式) type; style 2 (格式) pattern; form 3 (儀式; 典禮) ceremony; ritual 4 (自然科...
  • : 動詞1 (告發;控告) accuse; charge 2 (控制) control; dominate 3 (使容器口兒朝下 讓裏面的液體慢...
  • : Ⅰ動詞1 (製造) make; manufacture 2 (擬訂; 規定) draw up; establish 3 (用強力約束; 限定; 管束...
  • : Ⅰ名詞(表示數目的符號或用具) a sign or object indicating number; code Ⅱ量詞1 (指一件事或一類的...
  • 方式 : way; fashion; pattern
  • 控制 : control; dominate; regulate; govern; manage; check; cybernate; manipulate; encraty; rule; rein; c...
  1. The structure of this paper goes like this, the first chapter introduce the development of e - b / l in practice and in laws. and draw a conclution that the electrification of the b / l is a history tide. in the second chapter, on the basic of reseach the security trap in e - b / l running, 1 conclude six security elements of, e - b / l : the liability of the system, the authenticity of dealers ' identity. the integrity and secrecy of electronic data, and the validity and evidence effectiveness of electronic data. from the third chapter to the eighth, 1 reseach these elements one by one. the third chapter introduce the establishment of the e - b / l security system, and some related laws the fourth chapter introduce the certification authority of e - b / l. in the fifth chapter, 1 introduce the encrypt of electronic information and some countries ' control on use / import / export crytography. the sixth chapter introduce the concept and principle of digital signature, and reseach some related legal issues. the seventh chapter reseach the legal demand of validity, then come to a conclution that to establish a independent electronic information system is necessary. in the eighth chapter, 1 reseach some countries " regulation on the evidence effectiveness of electronic data

    第二章在分析電子提單運作中的安全隱患的基礎上,歸納出其六大安全要素,即系統的可靠性、交易者身份的真實性、數據電訊的機密性和完整性、數據電訊的合法有效性以及交易者行為的不可抵賴性。第三章到第八章分別對這六大要素進行分析:第三章介紹了電子提單網路安全體系的建立以及系統安全保護法規,第四章則介紹了電子提單的安全認證機構,第五章介紹了信息加密技術以及各國立法對密技術的進出口及使用的,第六章介紹了數字簽名的概念及原理,並以bolero為例介紹了數字簽名的技術,對有關法律問題作了論述;第七章首先論述了電子提單對有效性的法律需求,然後結合國內法和國際規則的規定論證了數據電訊度產生的必然性;第八章通過對各國立法對電子證據的法律效力的規定,論述了對電子交易至關重要的數據電訊的不可抵賴性。
  2. Wl - fa2000 double units laminator is the newest and highest intellective full automatic laminator, use intellective numbers meter control the temperature, you needn ' t do any other operations during it ' s working, import the hydraulic pressure mode, excellent calefaction 、 refrigeration elements, two - double designing, use water and air cooling mode, so that effective improve the working efficiency and better effect, it ' s diploid more quickly than wl - fa1000 laminator

    Fa2000型雙塔層壓機是最新研製出的高效率智能型全自動層壓機,溫度採用智能化數儀,工作時不需要進行任何操作,壓力採用用進口液壓加壓,優質的加熱、散熱元件。
  3. Information access security is studied from several ways : information security storage, information access control, user identity authentication, cipher key management and log management etc. the main which information transmission studied is the selection and deployment of information encryption transmission plan

    其中平臺信息訪問涉及信息存儲、信息訪問權限、用戶身份驗證、密和日誌管理等諸多問題;信息傳輸安全主要研究信息加密傳輸案的選擇和實施。
  4. The article points out the importance and necessity of the information - security from its actuality in our country. the resources in the information system, for instance, hardware, software, data, document, operator, meterial and so on, are evaluated and gived safety grade firstly. and then, it analyses the menace including the nonauthorized access, the information leak, the refused sevice, the internal objection which the system will take. the following are the corresponding control police : confirm the users " rights and duties, including the mode of using account, the limit of accessing resource, the application of password, the building of backup ; confirm the administrators " right and duties, including physical safety, system configuration, account configuration and usufruct, password management, audit and control, backup and individual intimity ; run - of - mill measure of security defence, including access control, symbol and identification, integrality control, password technique, firewall system, audit and resumption, safety of operating system, safety of database system, defence of computers " virus and resisting - deny protocol. in the end, the article offers the strategies of disposing the safety - accident and analyse after ithow. to report it, how to solve it in phase, and how to avoid it happening again. in a word, the article presents a holistic resolvent about keeping away the information system ' s security, and supplies a essential frame for its configuration, management and application

    然後,對系統可能受到的威脅,包括非授權訪問、信息泄漏、拒絕服務和內部缺陷等進行分析,並提出了相應的策略:確定用戶的權力和責任,包括帳戶使用、資源訪問權限、口令應用以及建立備份等;確定系統管理員的權力和責任,包括物理安全、系統配置、帳戶設置及使用權限、口令管理、審計和監、備份以及個人隱私等面;一般性的安全防護措施:存取、標識和認證、完整性、密技術、防火墻系統、審計和恢復、操作系統安全、數據庫系統安全、計算機病毒防護和抗抵賴協議等。最後,對事故處理和事後分析提供策略,如何報告安全事故,如何協調解決安全事故,如何避免安全事故再次發生。總之,本文對信息系統安全防範工作給出一個整體的解決案,為其在配置、管理和應用面提供了基本的框架。
  5. Audio - visual, video and television equipment and systems - control, synchronization and address codes - method of operation for pulsed cue tone control systems for two still projectors

    視聽視頻電視設備及系統.第5部分:同步和地址.第2節:雙片投影儀脈沖音調設備操作
  6. If you add a host control to a document at design time, you should not remove it programmatically at run time because the next time you try to use the control in code, an exception is thrown

    如果在設計時向文檔添加宿主項,則不應在運行時以編程移除該項,因為下次嘗試在代中使用此項時會引發異常。宿主項的
  7. Buffering code assumes that it exclusively controls the handle

    緩沖代假定它以獨占該句柄。
  8. Abstract : the paper introduces various identification methods for tracing the malicious call and calling identification services in spc telephone exchanges, especially describes the malicious call trace methods by using switch boards and " r " key tandem function and telephone set which can display calling subscriber ' s numbers

    文摘:介紹了程電話交換機追查惡意呼叫和主叫用戶信息識別業務的各種識別法,特別是詳細介紹了利用話務臺和話機上的" r "鍵轉接的功能,以及利用能顯示主叫信息的話機來顯示主叫電話號和追查惡意呼叫電話的法。
  9. The paper introduces various identification methods for tracing the malicious call and calling identification services in spc telephone exchanges, especially describes the malicious call trace methods by using switch boards and " r " key tandem function and telephone set which can display calling subscriber ' s numbers

    介紹了程電話交換機追查惡意呼叫和主叫用戶信息識別業務的各種識別法,特別是詳細介紹了利用話務臺和話機上的" r "鍵轉接的功能,以及利用能顯示主叫信息的話機來顯示主叫電話號和追查惡意呼叫電話的法。
  10. Because of the unique issues in the networks, including mobility - induced disconnection, network partition, high out - of - order delivery ratios and channel errors, the congestion control and the error recovery in the network is challenging. in this environment, the interaction between tcp and mac layer protocols, the affection of route protocols on the performance of tcp and the particular congestion control and error recovery mechanism are first discussed. then a particular transport layer protocol scheme based on the non - feedback mechanism is presented, with emphasis on the analysis and simulation of the key parameter

    文中主要討論了兩種不同網路結構中的無線tcp協議改進案,其一在最後一跳為無線鏈路的網路環境中,針對基本tcp擁塞存在的缺陷,文中在現有解決案的基礎上提出一綜合性的案,其中包括無線鏈路的高誤率和連接斷開問題的解決,並重點對案中出現的交叉層問題進行分析和模擬;其二,考慮的是分散網路( adhoc ) ,在文中較為詳細的分析了tcp和mac層機間的相互作用、路由協議中造成tcp性能降低的因素、 adhoc網路中應採取的特殊擁塞和差錯恢復機,在此基礎上提出了一種採用非反饋機的解決案,重點對案中的關鍵參數進行分析和模擬,分析和模擬結果表明此機可在很大程度上提高adhoc網路中tcp的性能。
  11. Adopting the method of top - down, the virtual memory is divided into memory mange related unit ( segment unit and page unit ) and protection mode related unit ( protection test unit, debug test unit and exception detect unit ). data buses and control bused are designed separately for all of the units. vhdl codes are written and simulated

    Amex86的虛擬存儲器採用自頂向下的設計法,把虛擬存儲器劃分為地址管理相關單元(又包括分段單元和分頁單元) 、保護模相關單元(又包括保護測試單元、調試異常單元利異常檢測單元等) ,分別確立其數據通路和通路,完成了vhdl的編和模擬工作,通過測試程序模擬驗證了其功能的正確性並測定了基本性能。
  12. To control the process of adding all the methods and classes described in the last section, the jibx binding compiler first creates an internal representation of each binding in the form of a code generation tree structure

    為了上一節中描述的所有法和類的添加過程, jibx綁定編譯器首先用代生成樹結構的形,創建了每個綁定的內部表示形
  13. The supporting languages were simple to learn, and the tools themselves provided accelerators such as gui designers that allowed the user to " draw " the user interface by dragging and dropping controls onto a virtual canvas and then attaching actions in the form of code functions to the controls

    支持的語言也是非常簡單易學的,並且工具本身提供了象gui設計者這樣的允許用戶通過拖放項到一個虛擬的面板上然後在項上附加代功能的加速應用開發的手段。
  14. Comparing and analyzing the synchronous control strategy, which brings up the new method to control the double un - symmetry jars proceed synchronously with the combination of proportional valve and servo valve, which forms closed loop control ; basing on the above methods, models are made to get mathematics models of position control system and to analyze system model theoretically by using pid controller, we can realize regulating parameters, minimizing synchronous errors and enhancing the dynamic performances ; the simulink tool box in matlab software is used to imitate the system according to the model, which not only makes the result visual and easy to adjust the parameters in interactive way but also lets us understand the effects of different parameters and optimizes the dynamic properties. the theory of plc control in dshp is discussed after advanced understanding of the system movements. hardware design and general regulation are given on the base of siemens company products s7 - 200 plc

    本文根據大量的國內外文獻,對研配液壓機的工作原理及設計結構進行了簡介;對位置同步的法進行了比較分析,提出比例閥和伺服閥復合的閉環結構來對非對稱雙缸進行同步電液比例同步案;在此基礎上著重對比例閥非對稱缸建模,最後得到位置系統的總體數學模型,從理論上對同步系統動態特性進行了分析,並用pid器進行參數整定,減小雙缸同步誤差、提高系統的動態響應性能;其中性能的分析藉助于matlab軟體中的simulink工具箱,由已建立的數學模型形成模擬模型,得到可視化的模擬結果,從而利於交互下調整參數,了解不同的參數對系統的影響,優化同步系統的動態性能;在深入了解系統的動作特性后,對plc研配液壓機的原理進行了探討,針對siemens公司s7 ? 200型plc給出了硬體設計的總體規劃,編出研配液壓機動作製程序,在編程中著重研究位移傳感器與plc的通訊、雙缸同步運行的pid在plc上的實現及bcd撥盤輸入程序的植入問題。
  15. The main content is design of digital man - machine interface system, a speed regulating system of good stabilization and dynamic performance ; software for appraising the performance of wire feeder. the first, a digital man - machine interface system using at89s8252 singlechip is designed. the system uses sd7218a keyboard / display chip with serial bus interface

    首先,人機交互系統選用at89s8252為核心晶元,選用具有串列總線介面的sd7218a鍵盤/顯示晶元完成了數字化人機交互系統軟、硬體設計;採用rs - 485總線實現主系統和人機交互系統的數據交互;系統採用數字編器和鍵盤配合的實現焊接參數的選擇和設定,同時還具有最優參數存儲、調用等功能。
  16. A display on a phone or console showing calling phone number, called number, trunk number, type of call, class of service and perhaps, some other characteristics of the call

    電話或臺的一種顯示,顯示主叫電話號、被叫電話號、中繼號、呼叫類型、服務等級以及呼叫的其他一些特性。
  17. In the curve and surface modules of this system b - splines curves and bezier surfaces are manipulated by moving their control points to new user defined locations. and for nurbs curves, the extra degree of freedom called weights is used to manipulate the shape of curves or surfaces. in the thesis, the preliminary research and development are made in the generation of nc codes for outline machining and output of nc codes text file

    採用互動dof對nurbs曲線、曲面的設計與修型和通過移動曲線曲面上的點對b樣條曲線和貝塞爾曲面的互動直接修型兩種法,開發了曲線、曲面cad模塊;本文還對數編程軟體開發中外輪廓加工的數生成和代文本文件輸出進行了初步的研究與開發。
  18. It adapts to the cdma system and achieves multi - rate speech coding and decoding. source and mode control are combines in smv for rate selection, so it improves the flexibility of cdma system, it will allow cdma subscribers to enjoy superior quality while allowing service providers to increase capacity as needed. smv is regarded as a breakthrough technology that provides significant capacity and quality gains on cdma systems, so the researching of smv is of great practical value

    可選模器( smv ? selectablemodevocoder )是3gpp2最新的用於寬帶擴頻cdma通信系統的變速率語音編標準,它實現了語音的多種低速編和解,在速率選擇上將源和模相結合,提高了cdma系統的靈活性,可以在保證高質量語音的同時盡可能增加系統的容量,被認為是變速率語音編在cdma系統中應用的「突破性」技術,代表了當前語音編發展的向和潮流,因此smv的研究具有很大的價值。
  19. To programmatically control data collection, use methods and property of the datacollection class in your managed code

    要通過編程數據收集,請在託管代中使用datacollection類的法和屬性。
  20. This code - free approach has the convenience of off - the - shelf modules, with the flexibility of a code - intensive embedded controller

    這種無代法不僅具有現成模塊的便利性,而且具有代密集型嵌入器的靈活性。
分享友人