有效碼 的英文怎麼說

中文拼音 [yǒuxiào]
有效碼 英文
effective code
  • : 有副詞[書面語] (表示整數之外再加零數): 30 有 5 thirty-five; 10 有 5年 fifteen years
  • : Ⅰ名詞(效果; 功用) effect; efficiency; result Ⅱ動詞1 (仿效) imitate; follow the example of 2 ...
  • : Ⅰ名詞(表示數目的符號或用具) a sign or object indicating number; code Ⅱ量詞1 (指一件事或一類的...
  • 有效 : effective; valid; efficacious
  1. In a start - stop teletypewriter system, the significant condition of the signal element that immediately precedes a character signal or block signal and prepares the receiving equipment for the reception of the code elements

    在啟動一個電傳打字機系統中,迅速領先字元信號或閉塞信號,並且準備好接收設備為接收代元件的信號元件的狀態。
  2. The structure of this paper goes like this, the first chapter introduce the development of e - b / l in practice and in laws. and draw a conclution that the electrification of the b / l is a history tide. in the second chapter, on the basic of reseach the security trap in e - b / l running, 1 conclude six security elements of, e - b / l : the liability of the system, the authenticity of dealers ' identity. the integrity and secrecy of electronic data, and the validity and evidence effectiveness of electronic data. from the third chapter to the eighth, 1 reseach these elements one by one. the third chapter introduce the establishment of the e - b / l security system, and some related laws the fourth chapter introduce the certification authority of e - b / l. in the fifth chapter, 1 introduce the encrypt of electronic information and some countries ' control on use / import / export crytography. the sixth chapter introduce the concept and principle of digital signature, and reseach some related legal issues. the seventh chapter reseach the legal demand of validity, then come to a conclution that to establish a independent electronic information system is necessary. in the eighth chapter, 1 reseach some countries " regulation on the evidence effectiveness of electronic data

    第二章在分析電子提單運作中的安全隱患的基礎上,歸納出其六大安全要素,即系統的可靠性、交易者身份的真實性、數據電訊的機密性和完整性、數據電訊的合法性以及交易者行為的不可抵賴性。第三章到第八章分別對這六大要素進行分析:第三章介紹了電子提單網路安全體系的建立以及系統安全保護法規,第四章則介紹了電子提單的安全認證機構,第五章介紹了信息加密技術以及各國立法對密技術的進出口及使用的控制,第六章介紹了數字簽名的概念及原理,並以bolero為例介紹了數字簽名的技術方式,對關法律問題作了論述;第七章首先論述了電子提單對性的法律需求,然後結合國內法和國際規則的規定論證了數據電訊制度產生的必然性;第八章通過對各國立法對電子證據的法律力的規定,論述了對電子交易至關重要的數據電訊的不可抵賴性。
  3. This dissertation brings forward and realizes the multilevel classifiable method which is based on characters coding. above all, this method realizes the first - grade classification by extracting enough effective characters from characters and coding them, to the others which coundn " t be recognized by the first - grade classification, the method will adopt the second - grade classification using template matching to recognize these characters

    本文提出並實現了基於特徵編的多級分類識別方法,通過給字元抽取足夠多的的特徵並給特徵編實現第一級分類,對于第一級分類后仍不能區分的字元,再進入第二級分類用模板匹配的方法最終達到區分的目的,這種方法的重點在第一級分類階段。
  4. The findings of this thesis reflect that the object - oriented method is an effective means used in developing finite element analysis software, compared with traditional method it possesses the advantages of being more structured, easy to be compiled, maintained and extended and the program code can be much more reused. the oop method not only improve the functions of finite element software but also realize the congruity between the computing model and physical model in the real world, and promote the integrity technique of cad / cae

    本文結果表明,面向對象方法是一種強力的工具,採用面向對象方法開發大型限元分析軟體是一種非常的方法,與傳統的限元程序相比,面向對象限元程序更加結構化、更易於編寫、更易於維護和擴充,程序代的可重用成分更大,它不僅能提高限元軟體的功能,而且能實現數據模型與計算機模型以及現實世界物理模型之間的一致性,方便太原理工大學碩士學位論文cad / cae系統的集成。
  5. Cryptogram programming of confidential information is an effective tool for ensuring information security

    機密信息的密化是保證信息安全的一種手段。
  6. The inputs to these functions are very complicated and not easily expressible in a form that is valid c code

    這些函數的輸入都非常復雜,不容易使用一種的c代格式來表示。
  7. The first kind of algorithm is based on s - box controlled by key, the algorithm distinguishes most of other block ciphers, its visible quality is that its s - box is not regular and fixative, but controlled by block cipher ' s key. the second kind of algorithm is based on smn ( d ) array code, it makes full use of the visible quality of smn ( d ) array code possessing big code distance ( d ). the thesis discusses the two algorithms " reversibility, security and their qualities, the

    第一種是基於「 s -盒由密鑰控制」的變結構分組密,該演算法區別于其它大部分分組密最大的特點是它的s -盒不是固定不變的而是由密鑰控制產生;第二種是基於smn ( d )陣列編的變結構分組密,該演算法充分利用了smn ( d )陣列編距大的特點;文中對這兩個演算法的可逆性、安全性及其性能等進行了探討和分析,分析結果認為這兩個變結構演算法正確、且安全。
  8. In all kinds of complicated network, oriented linking and unlinking, communication frequency resource is strained, and bandwith to transmitting audio frequency signal is too restricted, complicated and fluky, while audio frequency data exponential have been increased in the last several years. under the circumstances, based on the research of predecessor, this paper studies wavelet analysis ' s maths gist and practices significance on signal process, and puts forward a optimized wavelet package condensation arithmetic to process audio frequency data, which gives attention to coding efficiency, multirate and compression delay. simulation experiment on the arithmetic has been done by matlab

    針對無連接和面向連接的各種復雜網路環境下,通信頻帶資源緊張,音頻傳輸帶寬限且復雜多變,而各種音頻數據又日益增多的局面,本文研究小波分析在信號處理方面的數學依據和在數據壓縮方面的實際意義,在前人不斷工作的基礎上,提出了一種優化小波包變換編方案用於音頻數據的壓縮演算法,兼考慮了編率、多率和壓縮時延多個方面,並在matlab環境下做了模擬實驗,對各種音頻信號及多種小波函數做了模擬結果比較,實驗結果證明該演算法可以在一定計算復雜度下可以很好地改進壓縮果,達到多率下實現實時編解的過程,在高速dsp晶元等硬體設備支持下,可以應用於實際復雜多變信源編
  9. In the meantime, analogue filterings and digital filterings are used to resist interferences. besides, wrapped product codes and intertexture codes are used to reduce transmission errors

    為了減少傳輸的差錯,本系統採用卷積和交織相結合的方法,可以的進行差錯控制。
  10. Based on the previous research achievements on mdc, this paper does further researches on the effective methods of mdc

    本文在多描述編成果的基礎上,進一步研究的多描述視頻編方法。
  11. As a combination of ofdm with space - time coding technique, mimo - ofdm becomes more and more important in the future wireless communication systems, the mimo - ofdm system can not only effectively enhance the transmission rate and capacity of the wireless communication system but also greatly mitigate the effections of mufti - path fading and interfere

    Mimo - ofdm技術將ofdm與空時編技術機的結合在一起,能夠大幅度的提高無線通信系統的通道容量和傳輸率,並能的抵抗多徑衰落、抑制干擾和噪聲。
  12. Fractal coding has been proved useful for image compression. it is also proved effective for content - based image retrieval. in the paper, we present a block - constrained fractal coding scheme and a matching strategy for content - based image retrieval. in this coding scheme, an image is partitioned into non - overlap blocks of a size close to that of a query iconic image. fractal codes are generated for each block independently. in the similarity measure of fractal codes, an improved nona - tree decomposition scheme is adopted to avoid matching the fractal codes globally in order to reduce computational complexity. our experimental results show that our coding scheme and the matching strategy we adopted is useful for image retrieval, and is compared favorably with other two methods tested in terms of storage usage and computing time

    分形編在圖像壓縮方面取得了很好的果,同時,分形編也能夠用於基於內容的圖像檢索.本文提出了一種基於塊限制的分形編演算法和匹配策略,並將它們用於圖像檢索.在我們編演算法中,圖像會被預先分成互相不重疊的子圖像塊,然後對這些子圖像進行獨立地分形編,從而獲得整幅圖像的分形.該編演算法能夠在很大程度上減少編時間.在進行圖像間相似性的匹配時,我們採用改進的基於九叉樹的分配策略,從而避免全局地進行分形的匹配,減少了計算量.實驗結果說明,我們的編演算法和匹配策略能夠比較地應用於基於內容的圖像檢索,在計算時間和存儲時間上都優于實驗中其它兩種方法
  13. Input the user name, the system will send the password in your effective postbox automatically

    並輸入用戶名,系統將自動發送密到您的郵箱中。
  14. The system took the wireless lan, bar - code and remotion calculating, and winsock technologies to build server and client programs to realize data transfer between three subsystems, also took these three subsystems closely combine to work availably and rapidly

    系統採用了條技術、移動計算技術和winsock技術,分別建立了服務端和客戶端程序,實現了各個子系統之間的數據傳遞,並將這三大子系統緊密地結合起來進行而快捷的工作。
  15. According to research of redundant signed digit ( rsd ) calibration theory of pipelined adc, a novel out of range detection rsd technique is provided. when input signal is out of the adc ’ s range, the technique can detect this situation and the wrong output word is avoided

    然後,在深入分析冗餘位演算法的基礎上,提出了新型的校正演算法,針對傳統演算法不能判斷信號超出adc處理范圍的不足,增加了溢出判斷功能,既能校正比較器的失調,又防止了信號溢出時的誤輸出,保證了系統的性能。
  16. The first facet is to put forward four - step block matching algorithm which can deduce the time of motion estimation and improve the coding efficiency, based on the traditional motion estimation algorithms. the second facet is to propose a new rate control algorithm, that is average - reaction rate control algorithm, based on the rate control of mpeg2. the new rate control algorithm can achieve rapid and efficient adaptive coding

    首先在對傳統的運動估計演算法進行研究和改進的基礎上,提出了四步搜索塊匹配的運動估計演算法,減少了運動估計的時間,提高了編率;其次在分析mpeg2比特率控制的基礎上,提出了一種新的比特率控制演算法? ?平均響應比特率控制演算法,該演算法能夠快速的實現自適應編
  17. In order to combine the study of the ds - ss communication system ’ s availably jamming, the whole ds - ss communication system is modeled and simulated, including the modulation of the ds - ss signal, channel transmission, synchronal demodulation of signal and statistic of the bit error rate ( ber )

    為結合直擴通信系統的干擾研究工作,建立了直擴系統從信號的調制產生,通道傳輸、信號同步解擴解調和誤率統計的全過程模擬系統。
  18. Valid only for web tests and coded web test types

    僅對web測試和編的web測試類型
  19. By using ofdm technology, we can redu ce the baud rate with a high frequency spectrum utility factor. another advantage of this technology is that the transmission can combat the intersymbol interference ( isi ) at the receiver without complex adaptive equalizer

    Ofdm既較高的頻譜利用率,也地降低了速率,在不使用復雜的通道均衡技術的條件下仍然可以較好地克服接收時由多徑應帶來的間串擾( isi ) 。
  20. This is achieved by ensuring thatany sequence of symbols formed by portions of two adjacent code words differs in at least one symbol from any valid word

    這可通過下述方法做到:保證兩個相鄰字的部分組成的任意符號序列與任一有效碼字至少一個符號不同。
分享友人