碼表計時法 的英文怎麼說

中文拼音 [biǎoshí]
碼表計時法 英文
stopwatch time method
  • : Ⅰ名詞(表示數目的符號或用具) a sign or object indicating number; code Ⅱ量詞1 (指一件事或一類的...
  • : Ⅰ名詞1 (外面;外表) outside; surface; external 2 (中表親戚) the relationship between the child...
  • : Ⅰ動詞1 (計算) count; compute; calculate; number 2 (設想; 打算) plan; plot Ⅱ名詞1 (測量或計算...
  • : shí]Ⅰ名1 (比較長的一段時間)time; times; days:當時at that time; in those days; 古時 ancient tim...
  • : Ⅰ名詞1 (由國家制定或認可的行為規則的總稱) law 2 (方法; 方式) way; method; mode; means 3 (標...
  • 碼表 : stop watch
  • 計時 : reckon by time; timing; chronography
  1. This thesis tries to update the cmdsr system to achieve the characters below : real - time, better robust, higher recognition rate, non - special - man. considering the disadvantages of traditional improved spectrum subtraction speech enhancement, this thesis proposes the theory of fuzzy spectrum subtraction based on the fuzzy theory and improved spectrum subtraction speech enhancement ; as for the difficulties of detecting the endpoint of speech signal, the thesis gives the table of initial and the improved parameters, with which we can confirm the endpoints of mandarin digit speech ; the thesis puts forward two - level digit real - time speech recognition system, the first level is based on discrete hidden markov model which is linear predictive coding cepstrum ( lpcc ) and difference linear predictive coding cepstrum ( dlpcc ), the second level is based on formant parameters ; as for the realization of hardware, the thesis depicts the realization of every part of cmdsr based on the tms320vc5402 in detail ; as for the development of software, the thesis gives the software design flow chart of cmdsr, simulates the basic theory with matlab language and gives the simulation results

    針對傳統的「改進譜相減語音增強」參數設定單一、環境適應能力差的缺點,提出了一種利用模糊理論和「改進的譜相減」結合的「模糊譜相減語音增強」 ;針對語音信號端點檢測困難的特點,通過matlab模擬試驗,給出了能夠準確確定數語音端點的初始和改進參數;提出了利用基於線性預測編倒譜參數和差分線性預測編倒譜參數相結合的離散隱含馬爾可夫模型進行第一級識別、利用共振峰參數進行第二級識別的兩級漢語數語音識別系統,在保證系統實性的同,實現連接漢語數語音識別系統識別率的提高;在硬體實現上,詳細闡述了基於tms320vc5402的連接漢語數語音識別系統各部分硬體設;在軟體開發上,給出了連接漢語數語音識別的軟體設各部分的流程圖,並對各部分進行了matlab模擬,並給出了模擬結果。
  2. Experimental results show that the proposed method can reduce the computational complexity significantly compared with the full search method, and maintain similar decode visual quality and coding bit rate, then improve the ray - space data coding efficiency

    實驗結果明,與全搜索方相比,該方算復雜度明顯降低,同保持了近似的解圖像質量和編率,進一步提高光線空間數據的編效率。
  3. Section ii describes the design approach and implementation of speech module on mcf5249 coldfire core. the speech codec optimizes g. 729a codes and added voice activity detection of g. 729b to save bandwidth ; the implementation of acoustic echo cancellation uses nlms algorithm and it can reduce echo though designing adaptive fir filter and speech detector ; the dtmf and cpt generate signal using two second order digital sinusoidal oscillators and detect signal by picking up the frequency information. but only get the frequency information is not enough in cpt detector, this thesis introduces a method

    其中對語音編解器的設採用優化g . 729a代達到設要求,並在此基礎上加入g . 729b的靜音檢測模塊,以進一步降低網路傳輸帶寬;對回聲消除器的設採用nlms演算,通過設自適應fir濾波器和語音檢測器達到回聲消除目的;對雙音多頻設,信號發生端採用構造靜態參數並通過二階正弦振蕩器產生信號,信號檢測端提取頻率信息以檢測信號;對呼叫進程音設,除了類似雙音多頻的信號發生及頻率檢測設外,還需要檢測信號持續間,作者設了一種基於匹配狀態的方以檢測信號持續間。
  4. Firstly, we generalize and analyze the advantages and present research of elliptic curve cryptography ; secondly, we study the basic theory of the ecc ; thirdly, we illustrate the safety of the ecc and discuss the elliptic curve key agreement scheme, elliptic curve encryption scheme and elliptic curve digital signature algorithm ; fourthly, we study fast algorithms of the multiplication and inversion multiplication of the element of in the underlying finite field f2m whose characteristic is two represented by the two basis of optimal normal basis and polynomial basis. we make improvements to the fast algorithm of the polynomial basis multiplication by hankerson and base on the experiments, we describe the properties and compare the advantages of the multiplication and inversion multiplication of the elements in f2m field under optimal normal bases and polynomial basis. results concluding from the study car be used as references in the realization of the elliptic curve cryptosystem ; fifthly, we overview the current fast algorithm of point multiplication, improve the fix base point comb algorithm, advance the speed of the whole system and remark the advantages and disadvantages of the popular algorithms based upon the experimental datas ; sixthly we realize the algorithm library of elliptic curve cryptography based on the f2m. only change slightly in our algorithm library can we realize the ecdh, eces, ecdsa based onf2m of anysize ; seventhly, we realize the ecc on two secure elliptic curves, including ecdh, eces, ecdsa

    本文首先介紹並分析了橢圓曲線密體制的優點及研究現狀;其次研究了橢圓曲線密體制的基本理論;第三,分析了橢圓曲線密的安全性並介紹了密鑰共享,加密,數字簽名等橢圓曲線密體制;第四,深入研究了特徵為2的有限域f _ 2m中的元素在多項式基和最優正規基示下的乘運算和乘逆運算的快速演算,並對hankerson等人提出的多項式基下的乘運算的快速演算作了改進,而且在實驗的基礎上不僅分析研究了f _ 2m域中元素在多項式基和最優正規基示下的乘和乘逆運算的性能,還對這兩種基示下的f _ 2m域中元素運算效率的優劣作了比較和研究,所得的結論可供在實現橢圓曲線密體制參考;第五,研究了目前流行的算橢圓曲線標量乘的快速演算,同改進了固定基點梳形,提高了整個系統的速度,並在實驗的基礎上分析研究了流行演算的優劣;第六,實現了基於f _ 2m的橢圓曲線密體制的演算庫,在我們的演算庫中只需稍微改變便能實現基於任意尺寸的f _ 2m上的ecdh , eces , ecdsa等橢圓曲線密體制;第七,實現了兩條安全橢圓曲線上的橢圓曲線密體制,包括ecdh , eces , ecdsa 。
  5. But once you ve designed the application in this way, you can easily add new forms as you ll certainly have to do come next fiscal year without modifying or even viewing the source code

    但是,一旦用黑盒可擴展性這一方了應用程序,則不必修改,甚至不用查看源代,就能夠方便地添加新的單(當下一財政年度必須這樣做) 。
  6. One special feature of this paper is that it provides fast implementation means for the all kinds of modular exponentiation algorithms, which facilitate the implementation of the rsa public key algorithms. the paper improved the sliding window algorithm by largely reducing the space complexity. meanwhile this paper represents an efficient combined algorithm to improve the processing of encryption and decryption

    大數模冪乘運算是實現rsa等公鑰密的基本運算,其運行效率決定了rsa公鑰密的性能,文章主要研究了各種模冪演算的快速實現方,提出運用組合演算的思想來減少演算運行間;並對滑動窗口取冪演算進行了部分改進,用線性來存儲預算數據,從而減少了演算的復雜度,進一步提高了rsa加/解密的效率,並在試驗測試中得到較為滿意的結果。
  7. The detail is clarified as follows : l ) based on the chaotic technology and contemporary encryption approach the paper put forward a new chaotic sequence, which introduced the m - sequence and the method of shrink key - the stream generator. the complexity of the sequence was promoted as the random alteration of the parameters of chaotic mapping, and at the same time, the shrinking key was used to enhance the security further more ; 2 ) the performance of one - way hash function was improved and new hash function construction methods are proposed through a novel hash method based on chaotic mapping and the aes - the rijndael algorithm. the algorithm of hashing messages of arbitrary length into 256 bits hash values was designed

    按照這種方,輸出序列的周期性得以大大提高,理論分析和算機模擬結果明,該方可以產生具有良好統特性的密鑰流,而且易於軟硬體實現: 2 )實現了一種基於混沌映射和分組密rijndael演算的單向hash函數的構造方,即使用logistic混沌映射產生混沌二值序列,序列的分組與明文序列分組進行按位異或后,進入rijndael加密模塊,所得的結果再加入到反饋端,參與下一分組輸入的異或運算,迭代結束的rijndael加密結果即為所求的hash函數值。
  8. Directly painting textures on top of 3d objects in 3d perspective viewport is a new issue of human - computer interface ( hci ). this paper presents a method to solve this issue. it converts the position information of the texture pixels of texture map into color information , and then transfers both the coordinates and the color of texture pixels into screen through texture mapping at the same time. only is the color information of texture pixels converted into illumination by calculating the normal and the angle of ray incidence of the screen pixel in the method. the texture coordinates are firstly converted into the color information by generating another texture map , which is called information map whose pixels ' color represents the coordinates information. and then the corresponding texture coordinates are mapped into screen reference frame by texture mapping and stored into information buffer for later use. so we can obtain the texture coordinates of screen pixels correspondingly by decoding from information buffer. after optimizing , we can paint textures on top of 3d objects in 3d perspective viewport in real time. the paper also gives some examples and related definitions of using additional information of 2d texture map for 3d graph generating

    針對三維逶視投影視圖中對三維物體面紋理直接進行噴繪,以獲得復雜紋理圖這一算機圖形交互技術這一新問題,研究了一種將紋理圖的象素位置信息轉換成彩色信息,然後利用紋理映射將紋理坐標連同該點上的顏色值一起傳遞到與屏幕象素對應的可見點上的方,其中顏色值依該點處的入射光線方向和向被進一步轉換為光強值,而紋理坐標則被解后還原成與該可見點對應的紋理坐標,被存入信息緩沖器中,供以後使用,通過解,可根據屏幕點直接得到對應紋理象素點的坐標,經過演算優化,實現了對三維物體面紋理的實噴繪;同闡述了在三維圖象生成技術中使用附加紋理信息的應用實例以及相關定義
  9. It is not many scholars to clearly prove the opinion of shifting the burden of proof, on the contrary the contradictory scholars are more prominent, for example the vice professor of southwest politics and law university, chengang, wuyue who translates and introduces the burden of proof of germany, because them there are more and more people support the opposite opinion, while in the draft of " civil evidence code ", the traditional idea win, in this draft the legislator abides by the present justice and our country ' s native circumstance, they made an scientific choice, of course, the burden of proof will directly influence the party " s possibility of losing the lawsuit, while the regulation of shifting the burden of proof increases the plaintiff ' s opportunity to win a lawsuit. to explain what is the shifting of burden of proof, the paper use the civil law as the example to point out the " reverse " is not entirly relieve the plaintiff s obligation of producing evidence, but in certain extent and in certain range make the defendant bear the burden of producing those proofs from the reverse way, which are originally beard by the plaintiff. in the three proceeding law, shifting the burden of proof have some differences, but the interior spirits are coincident - for the values of social justice and the legal reason

    論證舉證責任倒置的學者觀點明確並且論證十分充分的不多,相反卻是對此著書立說予以反駁的學者較為突出,如西南政大學的副教授陳則博士,翻譯並介紹德國證明責任學說的吳越先生均是目前國內對舉證責任倒置持否定態度的代人物,由於他們的推動使得國內持此說的人越來越多,但在《民事證據(草案) 》的擬定過程中,並未采責任倒置的地位,這樣的立選擇是建立在對我國律實現的本土環境客觀認識的基礎上的科學選擇,誠然,舉證責任的分配直接影響到當事人在訴訟中的敗訴風險,而「倒置」規則的設,則在此問題上增加了原告勝訴的籌,在理解何為舉證責任倒置,本文著重以民事為主線,指出這種「倒置」並非全部免除原告的證明責任,而是在一定范圍與一定程度上將通常應由原告負擔的舉證責任轉由被告從反方面承擔,舉證責任倒置在三大訴訟中所體現的具體情形有所差異,但它們的內在精神是一致的?律的理性與社會公平價值,在民事訴訟中舉證責任倒置的情形,一般總是將其局限於特殊侵權情形,而忽略了民事合同違約責任的訴訟中的原告也無須對被告應承擔違約責任的所有要件,對被告主觀上的過錯實行推定,若被告予以否定則應對其無過錯的證據舉證,在設置舉證責任倒置的規則,從各國的立經驗與的內在價值要求可以總結出以下幾個原則:程序與實體結合原則,公平原則,訴訟經濟原則,保護弱者原則等,基於此完善舉證責任倒置的規則首先應肯定舉證責任倒置的概念,其次立應避免求大求全,再次要配合實體的發展,最後還可以在司領域嘗試判例的指導意義。
  10. Experimental results show that this formula improves the speed of video coder at the same psnr without damaging the image quality

    實驗明,本文的改進演算非常有效,避免了大量冗餘算,在保證圖像質量的同提高了編效率,提高了壓縮比。
  11. If capp and cam system want to use of these information about a part in cad, they have to transfer these information to proper style, and then they can recognize and use them. these years, there are many researches about how to make full use of the information in cad system and how to describe a part in other systems. during these researches, many methods about part information description have been developed, such as gt code method, language description method, knowledge description method, feature description method, and so on

    多年來,為了使capp 、 cam等后續系統能夠有效地利用cad系統中相關的零件信息,亦即對零件信息進行合理的描述,人們進行了大量的研究,提出了分類編、語言描述、知識示描述、基於形狀特徵或面元素的描述等各種方對零件信息進行描述,但是,這些方都需要人來對零件圖紙進行識別和分析,即需要人工來對已設好的零件圖進行二次輸入,由於輸入過程繁瑣、費、易出錯,因此這些信息描述方滿足信息集成的要求,也不能適應集成環境下capp系統的需要。
  12. Later, we will start a pilot to examine the feasibility of providing personal digital assistants pdas and portable printers to our colleagues to record offender information and to print penalty notices

    在稍後間,我們會開展試驗劃,研究為本署執人員提供個人數助理和便攜式印機的可行性,使他們可即場記錄違例人士的資料及列印罰款通知書。
  13. Secondly, we apply tk operator to the cross - correlation of received signal code and pn code to separate the multi - paths. it comes to a conclusion that tk operator can separate the multi - paths within less than the chip period accurately of spread - spectrum system with space - modulation by simulation. at last, we apply this algorithm to the practical signal collected by gps tap, and from the result we can drop a conclusion the tk algorithm is practical

    本文首先闡述了空調制擴頻信號原理以及在多徑干擾下空調制接收機的性能和teager - kaiser接收機的原理;接著對空調制擴頻系統的解調信號與偽的互相關函數採用tk接收機進行多徑分離,模擬結果明, tk接收機對延在一個片內的空調制擴頻通信多徑信號有很好的分離效果;最後用數據採集器對一個gps信號進行接收和多徑的估,驗證了該演算在實際的運用中對多徑的擴頻信號有很好的分離效果。
  14. Simulation results indicate that the algorithm can reduce the delay ' s uncertainty range greatly, even with great position errors the uncertainty range still can be reduced to the half, and is effective for the fast acquisition of long cycle code

    數值明,演算能夠大大壓縮不同導航星和不同場景用戶之間傳播延的不確定范圍,即使在用戶與衛星位置誤差較大的惡劣應用背景下也能將不確定范圍壓縮一半,從而有效地輔助長快捕的實現。
  15. The correlation detection using the periodicity of the direct sequence autocorrelation function can estimate the symbol period at intermediate frequency or at baseband. simulation results indicate that the former is superior to the latter when the demodulated frequency is unequal to the carrier frequency

    域相關檢測方利用擴頻信號的周期自相關特性,能在中頻和基帶對擴頻周期進行估,模擬結果明中頻檢測性能較好。
  16. Aiming at low expression of exogenous gene, t - pa gene was designed. the designed t - pa gene was used to transform cucumber and the transgenic plants was obtained. at the same time, codon usage of potato, cucuber and strawberry was analyzed and forecasted the expression of t - pa gene in 3 organisms and designed codon of t - pa gene to fit for expression in plants

    針對外源基因達量低的問題,對t - pa基因進行了重新設,並將新設的t - pa基因轉化黃瓜,獲得了轉基因pcr陽性植株;同對馬鈴薯、黃瓜和草莓的密子用進行分析,預測了t - pa基因在3種生物體中的達情況,進行了適于植物中達的t - pa基因密子改造。
  17. Simulation results demonstrate that at isr ( interference - to - signal ratio ) = 50db, the performance of the proposed receiver is almost the same as the receiver without interference

    算機模擬明,當干信比為50db,採用該方的誤率性能與無干擾的誤率性能基本吻合。
  18. Based on the analysis of the learning theory and instructionual design, we understand the procedure and regulation of learning, recognizing how to improve the learning environments and instructional procedure, so our its could implement on a better pedagogy theory ; presented in xml, the subject knowledge could be more suitable to be manipulated by computer tutor, to develop an individual learning environments. auto - generating paper is a constrained multi - object optimization problem, this paper presents a way based on genetic algorithm ( ga ) to solve the problem, and discuss how to choose an individual coding to improve the efficiency of ga according the problem ; when establishing the student model, we consider the mental factor as well as the cognitive factor

    基於對學習理論和教學設的分析、總結,了解了人類學習活動的過程和內在規律,以及如何優化學習環境和教學過程,從而使智能教學系統建立在先進的教育理論基礎上;基於xml技術的學科知識示,使它更便於算機導師進行加工,形成個性化的學習環境;自動組卷是一個帶約束的多目標優化問題,本文提出通過遺傳演算來解決,並分析了如何根據實際問題選擇個性化的編方案,提高遺傳演算的效率;在建立學生模型,除了考廣西大學碩士論文基於web的智能教學系統的研究慮認知因素還考慮了心理因素。
  19. The reseach work focused on the time delay estimation of the common practical radar singnals, including harmonics signal, chirp signal, polynomial phase signal, and phase - shift keying signal. the new algorithm for different radar signals are deduced in detail respectively, and simulation results are presented. the results proved that the new method is efficient for time delay and some other parameters estimation

    正弦信號、線性調頻信號、多項式相位信號、相位編信號是雷達信號中常用的幾種信號,對這幾種信號的研究是雷達信號處理中非常重要的內容,也是實際工程的需要。因此,本文選擇上述幾種信號作為研究對象,對這幾種信號的延估演算進行了建模和理論推導,給出了延估演算的具體達式,並進行了算機模擬。
  20. This paper first research on main technologies used by avs standard, which include prediction, transform, quantization, in - loop filter, and entropy encoding, and then focus on the 2d - vlc entropy coder of avs, which is context - based adaptive coder. this encoder operates on run - level pair, and it uses the type of current block and value of current coefficients to switch vlc code - table. these tables are designed according to the distribution of transformed coefficients, and this way is much better than using only one table to code all residual coefficients in one 8x8 block

    本文首先詳細研究了avs標準的核心技術,包括預測編、變換量化、環路濾波器以及掃描和熵編等,之後重點研究了avs標準中使用的基於上下文的2d - vlc變長編,這種方的是( run , level )數對,同根據當前編塊的類型和殘差系數這兩種上下文信息來切換,這些是預先根據變換系數在不同位置的分佈信息設好的,這樣要比只使用一個變長來編塊內所有位置上的殘差系數的壓縮效果要好得多。
分享友人