終端控制機 的英文怎麼說

中文拼音 [zhōngduānkòngzhì]
終端控制機 英文
terminal machine
  • : Ⅰ名詞1 (最後; 末了) end; ending; finish 2 (指人死) death; end 3 (姓氏) a surname Ⅱ形容詞(...
  • : Ⅰ名詞1 (東西的頭) end; extremity 2 (事情的開頭) beginning 3 (門類; 方面) item; point 4 (原...
  • : 動詞1 (告發;控告) accuse; charge 2 (控制) control; dominate 3 (使容器口兒朝下 讓裏面的液體慢...
  • : Ⅰ動詞1 (製造) make; manufacture 2 (擬訂; 規定) draw up; establish 3 (用強力約束; 限定; 管束...
  • : machineengine
  • 終端 : terminal; terminus; terminator; tag end; end; termination; trailing end; end point; terminating終...
  • 控制 : control; dominate; regulate; govern; manage; check; cybernate; manipulate; encraty; rule; rein; c...
  1. If given some access rights, wherever the users are, legal users can access or control the remote industrial workstation so as to do something like remote scheduling, remote diagnosing, remote maintenance, etc. this is one way to break the communication gap between management network and control network

    進行適當網路配置后,授權用戶就可以在任一internet實現對監的訪問和,以進行調度優化,遠程診斷與維護。目前,這套工業遠程信息監系統已在省計算重點實驗室進行了運行測試,系統工作正常,達到了預期要求。
  2. Making use of the packet data service and short data service of tetra, the mcs system enables front - line officers to use their portable radios and in - vehicle mobile data terminals mdts to exchange data messages with rcccs

    流動電腦信息系統利用地面集群無線電的封包數據服務和簡短數據服務,令前線警務人員可以使用手提無線電通訊和車上的流動數據與總區指揮及中心交換數據信息。
  3. Using the analytical result oflink 16 as reference, utilizing the idea of object - oriented modeling and based on hla, thetotal frame of data link, communication model and partition of terminal software module, whichareappliedinuavmissioncontrol, aredesigned. further, thecommunicationprotocol ofthemaclayerofthedata linkisanalyzed, theindependenttimeslot reservationselectionalgorithmisbroughtforwardanditsperformanceistested ; theterminalworkingsoftwareisrealizedusingthetechniqueofmultithreading, thekey techniques like timing and synchronization, multithreading murex and synchronizationandveracityofthemessage aresolved

    然後深入研究了模擬的技術和方法,借鑒link16的分析結果,利用面向對象建模的思想,基於hla開發平臺,設計了應用於無人任務的數據鏈總體構架、通信分層模型以及軟體模塊劃分。
  4. Giving the goal and conceptual design, this paper pays attention to expatiate how to practically use the techniques of image - processing, communication and recognition in remote image monitoring system, and discusses how to realize the key techiques such as terminal connection and frame design, platform decoding control and alarm, image communication and track, etc. in order to overcome most existing image monitoring systems " shortages - those systems are at low intelligent level, need overfull manual work and ca n ' t work all day, this paper has adopted the advanced image code / decode technology and digital image transmission technology, and has applied the intelligent image processing and recognition technique to the display, adjust and track of images

    本論文在設計圖像監系統的建設目標和總體方案的同時,重點闡述了圖像處理、通信與識別技術在遠程圖像監系統中的應用實現,給出了圖像監系統中的接入和框架設計、雲臺解碼與報警、圖像通信和圖像跟蹤等關鍵技術的實現。針對現有的圖像監系統大部分採用人工為主,器為輔,智能化程度低,不能全天候工作的現狀,本文採用先進的數字圖像壓縮編解碼技術、數字圖像傳輸技術,將智能圖像處理與識別技術應用於圖像的顯示、調整、跟蹤,克服了一般監系統要求監人員過多地干預、智能化程度低的缺陷,並總結了其特點和優勢。
  5. The catv charge and control system is mainly composed of the management software 、 the header data modulator and the terminal charge and control equipment. i am responsible for design catv charge and control equipment and test system. the header data modulator is used to encrypt the control single from computer and transmit it into the appointed frequency. the terminal charge and control equipment demodulate out the control single from data modulator and transmit it to the addressing control part, where the demodulated fsk single is received and well - handled by the cpu unit, decode the unauthorized signals and deliver it to the shut point, shut point make use of capability of wideband anf characteristic of shut, then the signal of illegal customer will be turn off and vice versa, the legal customer can receive the normal signal

    數據調器完成對計算輸出的信號加密處理,將指令碼載送到一指定頻率點。收費器解調出信號,送至單片尋址部分。單片尋址部分接收經fsk數據解調器送來的信號,送入cpu單元后,解出不授權信號,然後向關斷部分送入信號,關斷部分利用pin二極體的寬帶工作能力以及關斷特性,實現對非授權用戶或者非法用戶的信號關斷,使之不能正常收視,繳費用戶進行開通正常收視,達到用戶通道的管理。
  6. Vdt ergonomic principles for the design of control centres. part 12 : visual display terminal workstations

    中心人工程設計導則.第12部分:視覺顯示
  7. Cmts - cable modem termination system. hardware that controls the downstream and upstream path to and from cable modems. also provides the network interface that ties into the internet

    有線數據系統-通過有線電視數據下行和上行通道的設備,也是提供和因特網連接的網路界面。
  8. In the process of the software and hardware design of the protection system, manifold self - checked error ways and anti - jamming measures are adopted to enhance reliability and stability of the control network system running at the spot

    使之從傳統意義上的單一的保護系統,發展成為集測量、、診斷、通訊多功能於一體的新型電單元。
  9. The management software of the epigyny computer was developed by visual basic 6. 0, and hyponygy computer is an end controller based on at89c2051 and 89c51 single chip, which are very cheap and applied

    尤其是利用visualbasic6 . 0開發了上位管理軟體,下位開發了一種基於atmel公司的at89c2051單片和89c51單片作為微處理器的廉價實用的器。
  10. The system also provides the dynamic interface of setting the automobile type displaying terminals in the mode of parameterization so as to add and delete monitors on line. it uses update mechanism of dynamic database to monitor system running. it applies message maps mechanism of vc which enables workers interact with system by keyboard

    系統採用了與多用戶windows2000系統應運而生的瘦客戶/服務器體系架構,極大地增強了系統的集成性和可維護性;通過命令行參數提供設置車型顯示的動態介面,實現的在線添加和刪除;利用動態數據庫更新,實現對系統運行過程的動態監;利用vc的消息映射,使操作者能夠通過鍵盤同系統進行交互。
  11. The heat - setting computer control system is a advanced distributed scada system which involves temperature control, tension control, frequency speed control, serial communications, computer and touch terminal

    聚酯網熱定型計算系統是一套集溫度、張力、變頻調速、通訊鏈路、上位和觸摸為一體的先進的分散型scada系統。
  12. The passive infrared detectors used for automatic switching could not be adjusted finely enough for the level of control desired, and may be incompatible with the light sources

    用於接通自動地面接收的被動紅外線探測器不能被調整足夠好對于預期的的水平來說,並且可能與光源不能協調。
  13. Operation of disc aerators no. 1 - 8 is controlled by the computer inside central control room or by plc under automatic mode

    由中室內的轉碟1 ? 8號連續運行或由plc自動運行。
  14. It ' s design and implement are excellent illustration of part i. our design is based on 8051 - like mcu, using veridicom fps110 as fingerprint sensor, adding lcd and keyboard as hmi, and an isa adapter to communicate with host

    該系統以8051mcu為核心,以fps110為指紋傳感器,配置lcd顯示器、鍵盤、實時時鐘。通過isa總線擴展卡與pc通信,接收pc的命令。
  15. With the characteristics of the underwater acoustic channel, media access control protocols at data link layer adopt the maca protocol which uses rts - cts exchange to solve the hidden and exposed situation and automatically control power

    在數據鏈路層的設計中針對水下聲通道的特點,對于介質訪問協議採用了maca協議,它使用rts - cts報文握手來解決uan中的隱蔽、暴露以及功率問題。
  16. Operation of excess sludge pump is controlled by the computer inside central control room or by plc under automatic mode

    由中室內的剩餘污泥泵連續運行或由plc自動運行。
  17. Based on the study of hfc mac protocol over contention / reservation scheme, an efficient method, which worked on random contention and polling model has been proposed in this article to meet the needs of a multi - priority service access control system

    摘要研究了基於爭用預約的混合光纖同軸寬帶接入網媒體接入協議原理,提出了隨爭用與周期查詢排隊系統相結合的申請接入方式,使不同優先級的申請能以不同的實現接入。
  18. The terminal node is consisted of a smart terminal controller, tv and ccd camera, which are responsible for the receiving and returning of teaching information respectively

    教學節點上安裝智能器、電視和ccd攝像等,實現接收和返回教學信息。
  19. The common method of operating an unintelligent crt terminal on a full duplex link ; each character that is keyed in is returned from the destination ( usually a local computer or a terminal control unit ) before it is displayed on the screen

    在全雙工鏈路上操作非智能crt的一種通常方式,在該方式下,每個鍵入的字元都是先從目的地(通常為一本地的計算器)被返回來,然後才顯示到屏幕上。
  20. This paper analyzes the architecture of distributed firewalls based on comparing with the traditional firewalls : network firewalls and personal firewalls. it brings forward a new design about the distributed firewalls in which some host firewalls and a control center constitute the whole distributed firewalls with reserving the old network firewalls. a host firewall is a packet - filtering firewall that filters the network packets come from inside the network based on the information of network application program, ip address, tcp or udp port and so on

    本文在與傳統的網路防火墻、個人防火墻技術對比的基礎之上,結合計算網路安全的本質與要求,對分散式防火墻這一全新的防火墻體系結構進行了分析,提出一種充分利用現有技術和投資的分散式防火墻系統的設計方案,即在保留傳統網路邊界防火墻的同時,設計一種駐留在內部網路的主防火墻及其中心,將防火墻延伸到內部網路的,從而有效防範來自網路內部的非法訪問與惡意破壞。
分享友人