正指令 的英文怎麼說

中文拼音 [zhēngzhǐlìng]
正指令 英文
positive order
  • : 正名詞(正月) the first month of the lunar year; the first moon
  • : 指構詞成分。
  • 指令 : 1 (指示; 命令) instruct; order; direct2 (上級機關對下級機關的指示) instructions; order; direc...
  1. In order to make the airborne radar instruction control antenna pointing correctly overcome the influence caused by maneuvering of carrier aircraft, and airspace stabilization algorithm is adopted in the airborne radar control circuit

    摘要為使機載雷達克服載機機動而確控制天線向,在機載雷達控制迴路中加入了空域穩定計算。
  2. The paper mainly discusses the realization of simulation modules, which include robot and environment building module, robot command module, trajectory planning module, kinematics module and collision check module

    摘要討論了圖形模擬系統中機器人及環境圖形建模,機器人,軌跡規劃,運動學解逆解,碰撞檢測,系統幫助等模塊的實現方法。
  3. In an image made from nasa television, international space station commander peggy whitson and flight engineer dan tani begin their space walk to inspect the beta gimbal assembly that pivots the solar array so it follows the sun tuesday dec. 18, 2007

    美國宇航局12月18日公布的這幅電視畫面顯示國際空間站第16長期考察組女長佩吉?惠特森(右)和飛行工程師丹尼爾?塔尼在進行太空行走。
  4. I. . i failed to carry out my last assignment, the execution of a young noble - a girl really, only eight years of age - who was in - line to inherit a large estate that we needed as a staging base for expanded operations

    我… …我沒能完成那最後一次,殺死一名年輕的貴族? ?一個女孩,才只有八歲大? ?她繼承了一座大宅,而我們需要它作為基地來擴展我們的勢力。
  5. The catv charge and control system is mainly composed of the management software 、 the header data modulator and the terminal charge and control equipment. i am responsible for design catv charge and control equipment and test system. the header data modulator is used to encrypt the control single from computer and transmit it into the appointed frequency. the terminal charge and control equipment demodulate out the control single from data modulator and transmit it to the addressing control part, where the demodulated fsk single is received and well - handled by the cpu unit, decode the unauthorized signals and deliver it to the shut point, shut point make use of capability of wideband anf characteristic of shut, then the signal of illegal customer will be turn off and vice versa, the legal customer can receive the normal signal

    前端數據調制器完成對計算機輸出的控制信號加密處理,將碼載送到一定頻率點。終端收費控制器解調出控制信號,送至單片機尋址控制部分。單片機尋址控制部分接收經fsk數據解調器送來的信號,送入cpu單元后,解出不授權信號,然後向關斷部分送入信號,關斷部分利用pin二極體的寬帶工作能力以及關斷特性,實現對非授權用戶或者非法用戶的信號關斷,使之不能常收視,繳費用戶進行開通常收視,達到控制用戶通道的管理。
  6. Windows nt4 security patch : superfluous decoding operation could allow command execution via iis brief description

    Windows nt4安全性修程式:不必要的解碼作業允許經由iis執行
  7. With the experiment part, the errors of sk - 21 nc machine tool have been measured, and a serial of data is gotten which lead to the error discrimination. ( 3 ) based on the kinematical theory of mbs, the calculation methods for the ideal center envelop curve of grinding wheel on cam grinding, the practical cutter track, inverse contour of cam, ideal nc instructions, precision nc instructions, the inner / outer normal and the fitting criterion of curve have been all discussed in detail in this paper

    ( 3 )通過精密加工的約束條件方程,探討理想刀具路線、逆變數控與實際刀具軌跡之間的映射關系,解決誤差補償技術提高加工精度的核心問題? ?當要求數控磨床的砂輪中心準確到達給定的理想點時,精密數控值究竟該是多少,如何能夠通過計算,獲得這樣的數控值,給出經修的數控計算方法。
  8. System calls. when an emulator ordinarily encounters a powerpc system call instruction, it emulates the exception by storing the instruction address into the srr0 register, setting some architecture - defined bits in srr1, and transferring control to physical address 0xc00. some powerpc variants allow more control over this behavior, but this is the traditional powerpc model

    當模擬器常地碰到一個powerpc系統調用時,它便將地址存入到srr0寄存器,設置srr1中某些體系結構定義的位,並將控制權轉交給物理地址0xc00 ,從而模擬這個異常(有些powerpc的變種允許對這種行為有更多的控制,但是這里的這種是傳統的powerpc模型) 。
  9. Anti dumping procedures on the one hand are a way of trade protection, at the same time they also are the expanding of their domestic political disputes into the arena of international trade. in a considerable number of cases, foreigners allege that china is not a market economy, they claim that the government grants chinese companies subsidies and that for this reason the prices of chinese export do not properly reflect their market value. therefore, they turn to the prices of third countries as a measure to determine whether chinese products are dumped onto their markets

    在不少的立案中,國外對我國的經濟制度均採取了錯誤地理解,仍將我國視為非市場經濟國家,認為政府過度的給予企業的資助和補貼致使我國出口價格不能真實地反映產品的市場價值,因而參照「替代國」的價格確定我國的常值並以此為據裁定傾銷;事實上,改革開放以來中國一直在向市場經濟轉型,經過十幾年的發展,我國大部分企業已經成功地進行了體制上的改革,實現了產權明晰,政企分開,企業作為市場經濟的主體獨立地在市場上自主經營、自負盈虧,企業在向市場化邁進,我國已經努力實現了取消全部的性計劃,讓市場按市場規律發展。
  10. If you are debugging managed code, these assembly instructions correspond to the native code created by the just - in - time compiler, not the microsoft intermediate language msil generated by the visual studio compiler

    如果在調試託管代碼,則這些匯編對應于由實時( jit )編譯器創建的本機代碼,而不是由visual studio編譯器生成的microsoft中間語言( msil ) 。
  11. Once these changes ( dual mode, privileged instructions, memory protection, timer interrupt ) have been made to the basic computer architecture, it is possible to write a correct operating system

    一旦對一個基本的計算機體系結構完成了以上修改(雙模式、特許、內存保護、定時器中斷) ,就有可能寫出確的操作系統。
  12. The rate gyro feedback provides positive dynamic stability and well-damped transient response to commands or disturbances.

    速度陀螺反饋提供向動力學穩定性和對于式擾動的很好阻尼的瞬時響應。
  13. To testify the correctness of the system ' s design, three routines are designed in this thesis : 1. clock tick test ; 2. task management directives test ; 3. cpu usage test

    為了驗證系統設計的確性,論文設計了3個驗證常式,它們是:一、時鐘滴答測試;二、基於單處理器的任務管理測試;三、 cpu利用率測試。
  14. An abnormal condition detected by the hardware. examples are : attempts to execute a privileged instruction and arithmetic traps such as overflow, underflow, and divide by zero

    一種由硬體檢測到的非常狀態。例如:企圖執行一條特權和諸如上溢出、下溢出與除0等的算術運算陷井。
  15. Every instruction can be broken down as a set of sequenced operations that manipulate the components of the microprocessor in the proper order

    每個可以分解為這樣一組順序操作,按確順序操縱微處理器的組件。
  16. A sequence of instructions that cannot be executed during normal processing

    常處理過程中不執行的序列。
  17. Design the data path of the risc 51 ip core. emphasis on the arithmetic logical unit ; 3. design the control path of the risc 51 ip core to make the risc 51 ip core ' s instruction set compatible with mcs51 microcontroller ; 4

    ( 3 )設計risc51ipcore控制通路,實現risc51ipcore內部與原mcs51系統的完全兼容,具體設計原mcs51與risc結構51核的轉換過程,及確的時序。
  18. Before the connectting between moden and other equipments, it works at the cammand mode, the cammand that is send to moden is used to set or manipulate the mode, after the connectting between moden and other equipments, it works at connectting mode, at that time, the cammand send from the computer is send to another computer which will pass the moden and telephone line. the moden control cammand is called " at " cammand, all the control manipulation is realized by sending the ascii character to moden, after the moden received the " at " cammand, it firstly judges the cammand, secondly, it analyses and executes the cammand, finnally, it executes a response by sending back a ascii character, during the deseign of below - computer, we introduce in detail the deseign of system hardware and system software, below - computer system hardware and system software, below - computer is made up of microchip collecting and controlling system, which finish the strobe and water level data collection, display and disposal, deal with the communication with the above - computer, the microchip is the centre of data dealing with, the peripheral equipments are made up of data collecttion module, control cammand input module, display module, execute output module, and long - distance communication module

    在moden控制軟體的設計中,詳細敘述了moden常工作時的幾個重要函數:初始化函數、撥號處理函數、應答處理函數、掛機處理函數,設計並調試了四個函數的通信程序,數據機工作時存在兩種模式,命模式與連線模式,命模式是針對功能設置的模式,連線模式是數據傳輸的模式。當數據機未與其他設備連接時,其處于命模式,這時候下達給數據機的是作為數據機本身設置或操作用的;當數據機已經與其他設備連接時,其處于連線模式,所有在此時由計算機送至數據機的信息都將經由電話線傳送到另一部計算機上。專門使用於控制數據機的集被稱為「 at集」 ,對moden的所有操作(如撥號、應答、掛機等)都可以通過給moden發送ascii字元串來實現, moden在收到at命后,先對命進行判斷,接著分析和執行命緩沖區中的命,最後以自身的ascii字元對命作出響應。
  19. How do we know that some scientist or computer hacker won ' t design one that is truly autonomous, carrying a complete set of instructions for itself

    我們怎麼有把握不會有某些科學家或電腦駭客,設計出真自主、自己攜帶整套的機器人?
  20. Corrective guidance command

    正指令信號
分享友人