等長度碼 的英文怎麼說

中文拼音 [děngzhǎng]
等長度碼 英文
equal length code
  • : Ⅰ量詞1 (等級) class; grade; rank 2 (種; 類) kind; sort; type Ⅱ形容詞(程度或數量上相同) equa...
  • : 長Ⅰ形容詞1 (年紀較大) older; elder; senior 2 (排行最大) eldest; oldest Ⅱ名詞(領導人) chief;...
  • : 度動詞[書面語] (推測; 估計) surmise; estimate
  • : Ⅰ名詞(表示數目的符號或用具) a sign or object indicating number; code Ⅱ量詞1 (指一件事或一類的...
  • 長度 : length; longitude; size; extent; footage
  1. Projecting into the second half of the financial year, although the global 3c products market appears to be weak and lacking in prospective drivers with the outlook of the global economy remains uncertain and bleak, the group will continue its own strategy and shift its focus from immediate to medium term sale, research and development on faster moving av products such as dvd players, tft - lcd monitors and television, plasma panel television, digital television, digital still cameras and mp3 players

    展望下半財政年,雖然環球經濟持續不穩,全球3c產品市場依然疲弱,集團仍會維持目前的發展策略,將現時至中期的銷售和研發重心,集中於dvd機、 tft - lcd顯示屏及電視機、離子屏幕電視機、數電視、數相機及mp3機迅速的影視器材。
  2. At last the algorithm of ddmf is achieved by the investigation tool of altera company ? quartus ii and the vhdl language, and its ip core is also achieved which is used not only in the satellite navigation position system, but also in the long pn code dsss system. ddmf investigated in the dissertation gives a good way to design the rapid pn code acquisition in the beidou project, and the technology has the definite theory and practice significance

    此外還應用altera公司的最新的fpga開發工具quartusiiv5 . 1 ,採用了國際標準的硬體描述語言? vhdl語言,對數字差動匹配濾波器和傳統匹配濾波器演算法予以實現,開發了該演算法的軟ip核,可以對所應用的擴頻, a / d采樣后的數據量化階數,所用擴頻可進行隨意改寫。
  3. 27th hkiff was not minimalist enough, kiarostami decides to completely dispense with dialogue, actors or camera movement in his latest. but far from being impenetrably austere, the iranian master has instead created one of his most poetic and humanistic works yet. each of the five zen - like static shots captures nature at its most glorious, from the driftwood washing up against the beach to the thunderous rumbles of rain upon the dark sea

    基阿魯斯達米去年完成的兩部數錄像電影之一,是他海邊寫劇本時妙手偶拾的五個鏡頭,十至二十多分鐘不,分別是:一海灘一截木頭,隨潮來潮往二海邊路上人來人往,偶爾駐足離開,浪濤不停拍岸三冬日天空,大海,海灘大遠鏡,一群狗在遠方走動四鴨子一隻接一隻由左走向右,再聯群回頭向左走五晚上的池塘,偶見月光倒影,時而漆黑一片,只聞蛙聲此起彼落,然後打雷閃電下雨,最終黎明。
  4. Broadband radio access networks bran - hiperlan type 2 ; conformance testing for the data link control protocol - part 1 : basic data transport function ; sub - part 3 : abstract test suite specification endorsement of the english version en

    數字表示法;出版物;出版;數字;文獻摘要本標準規定了出版物在涉及數字表示時間質量面積容積量值和數字代時使用漢字和阿拉伯數字的體例。
  5. We put the emphases on the soft output viterbi algorithm ( sova ), which is one of turbo code ’ s decoding algorithms, and presents the derivation and computation step of the sova decoding algorithm. after presenting sova and map decoding algorithms and analyzing four kinds of decoding algorithms, the paper makes a comparison among the different decoding algorithms by emulation analysis, and analyzes the time complexity of various algorithms, and then contrasts them. in the last part of this paper, according to the criterion recommended by the consultative committee for space data systems ( ccsds ), including code rate,

    根據空間數據系統顧問委員會( ccsds )為turbo應用於深空通信系統推薦的標準,包括率、塊大小、分量類型、約束生成多項式,以及交織器的選擇參數的建議以及sova譯演算法的理論基礎,設計了sova演算法的實現結構,通過模擬驗證了本文所採用的turbo的性能,從而證明turbo確實是一種很好的通道糾錯編方式,它適用於要求功耗低或信噪比低的深空通信系統中。
  6. Shoe sizes ; length grading

    .
  7. Thus, the frequency domain adaptive filter is well suited to a multi - narrowband interference scenario, the paper studied frequency domain adaptive algorithms, carried out analysis and computer simulations. simulation results : for gold codes ds - ss signal of length 63, 4 interferences of signal to interference ratio ( sir ) 40 ub or 4 narrowband interferences of signal to interference ratio ( sir ) 40 db and frequency - spectrum bandwidth 12 percent of the whole bandwidth, the sir improvement is better than 20db

    模擬結果指出,在輸入信號為干擾是4個的多音干擾或4個頻譜帶寬占信號總帶寬12的強窄帶干擾(干信比為40db )的擴頻信號(為63的gold序列)情況下,演算法的干擾抑制比均優於20db 。
  8. Footwear sizes : system for the gradation of lengths for use in the mondopoint system

    鞋號.級系統用於系統
  9. Every class endues a binary code, then a set of svms are used to solve the multiple binary problems. the generalization performance of ecc - svm is analyzed, which is determined by code length, hamming distance, coding sequence and margins of svms

    本文提出了基於糾錯編的svm多類分類演算法( ecc - svm ) ,並分析了ecc - svm的推廣能力與編間漢明距離、編順序以及分類間隙之間的關系,給出了這種關系的數學描述。
  10. The parameters include generator polynomial of component codes, interleave length and the type of interleavers, iterative decoding algorithms and iteration number, code rates and channel models et al

    這些參數主要包括分量、交織和交織器類型、迭代譯演算法和譯迭代次數、編速率以及通道條件
  11. This scheme is based on the elliptic curve discrete logarithm, which is one of the mathematic puzzles. compared with other cipher systems, it has shorter length of secret key and grouping in the same security intensity

    該體制是建立在橢圓曲線離散對數問題這一數學難題之上的,和其它密體制相比較而言在同安全強下具有小得多的秘鑰及分組
  12. People often think about the filter ' s characters of orthogonal, symmetry, regularity, but seldom synthetically think about some factors such as image texture or compression rate. in this paper used the same adaptive arithmetic coder for many filters, analyzed the effect factors synthetically for the best wavelet compression, and give some methods for selecting filter

    本文對多種常見濾波器,採用相同的自適應量化編方法進行實驗,研究並分析了選擇濾波器時應該考慮的圖像紋理、濾波器、壓縮比一些綜合因素,有效解決了在小波圖像壓縮過程中,如何更好的選擇濾波器的問題。
  13. In the alpha - amylase gene, the length of the non - ltr retrotransposon, located in intron ii, is equal in bombyx mori and bombyx mandarina, with a nucleotide sequence similarity of 98 % ; the length of the coded reverse transcriptase is equal in both nucleotide and amino acid sequence with a similarity of 98 % also

    家蠶、野桑蠶-澱粉酶基因intron中的(野桑蠶) non - ltrretrotransposon之間序列,相似性為98 ,其內編reversetranscriptase的基因,序列,核苷酸序列和氨基酸序列相似性達98 。
  14. Text is a kind of very common resource in digital library, and lossless techniques play an important role in compressing text. starting from the shannon ' s entropy theory, we analyze the lossless compression algorithms, and implement arithmetic coding algorithm in c. in the experiments, we compare four different lossless compression algorithms by their performances such as compression rate, compression rate tendency with the length of data, stability, and complexity, using 35 groups data series with 4 different length

    本文從信息論中shannon熵定理出發,對無損壓縮技術進行系統地分析,用c語言實現了其中的算術編演算法,並用它對35組、四種不同數據序列進行了壓縮,給出了實驗結果,然後從壓縮比、壓縮比隨字元串的變換趨勢、演算法穩定性和演算法復雜性四個方面對其與其它三種壓縮演算法lzw 、 lz77 、 rle進行了分析與比較。
  15. Ecc can provide high security. under the same security level, ecc has smaller key and lesser consurne ( computation, memory, bandwith and power needed ), so it is ideal in constrained systems. in this paper, the author primarily introduce elliptic curve cryptosystems

    橢圓曲線密體制不但可以實現高安全性,而且在同安全強下,橢圓曲線密體制具有較短的密鑰和較小的開銷(所需的計算量、存儲量、帶寬、軟體和硬體實現的規模) ,因而,橢圓曲線密體制在受限環境中是理想的選擇。
  16. The lengths, numbers and orthogonality of the pn codes are important technologies. in the thesis we analyze the methods of spread spectrum transmission of wcdma

    ,數量和正交性都是很重要的關鍵技術,同時也必須考慮在通道變化時保證通信質量。
  17. Firstly, we introduced the significance and development, and theory of fingerprinting technology in a whole and analyzed that the lower bound on the fingerprint length needed approximately grows logarithmically in the number of uses and linearly in the number of pirates in theory

    本文首先對數字指紋技術的意義、發展、理論方面作了全面的概述;並從理論上分析了理想情況下所需指紋的下界近似地隨著集可容納用戶數對數增加,隨著抗合謀用戶數線性增加的原理。
  18. A measure of the number of bits in a given key ; note that although increasing the key length gives added security, it s not appropriate to compare the lengths used with one cipher with those in another and, in general, that key lengths in symmetric ciphers do not equate directly with key lengths in asymmetric ciphers

    給定密鑰中位數的量;注:雖然密鑰,安全性越強,但將一個密使用的與另一個的進行比較是不合適的,通常,對稱密中的密鑰與非對稱密中的密鑰不是直接相的。
  19. The highest safety strength of private key per bit in the public - key cryptography systems is the elliptic curve cryptography at present. under similar secure conditions, the ecc has the advantages such as : less computation amounts, shorter length of private key, smaller storing and bandwidth. moreover, it has been declared as standard documents adopted by many international standard institutions and regarded as the most universally used public key system

    橢圓曲線密體制是目前公鑰體制中每比特密鑰安全強最高的一種密體制,在相同安全強條件下,橢圓曲線密體制具有較短的密鑰,較少的計算量、存儲量、帶寬優點,而且橢圓曲線密體制已經被許多國際標準化機構作為標準化文件向全球頒布,被認為是下一代最通用的公鑰密系統。
  20. The maximum power of systems, the maximum logic gates used for hardware and the maximum length of the software code, etc. the functionality of system can be encapsulated in a class using object - oriented technique

    其中,用例圖用來描述系統設計中的設計需求和約束條件,約束條件主要包括最大功率、硬體邏輯門的最大使用數和軟體代的最大
分享友人