編碼信息源 的英文怎麼說

中文拼音 [biānxìnyuán]
編碼信息源 英文
sources of encoded information
  • : Ⅰ動詞1 (編織) weave; plait; braid 2 (組織; 排列) make a list; arrange in a list; organize; gr...
  • : Ⅰ名詞(表示數目的符號或用具) a sign or object indicating number; code Ⅱ量詞1 (指一件事或一類的...
  • : Ⅰ名詞1 (呼吸時進出的氣) breath 2 (消息) news 3 (利錢; 利息) interest 4 [書面語] (子女) on...
  • : 名詞1. (水流起頭的地方) source (of a river); fountainhead 2. (來源) source; cause 3. (姓氏) a surname
  • 編碼 : encoded; code; coded; encrypt; codogram; coding編碼表 encode table; 編碼程序 builder; 編碼尺 code...
  1. For more on installing and deleting packages - and even on compiling programs from source code - see

    要了解更多有關軟體包的安裝和?載甚至有關自譯應用程序的,請參閱本系列文章的
  2. Recognized management systems such as iso 14001, the eco management andaudit system ( emas ) were used as references in preparing the code andmay be a useful source of additional information

    在代準備( /制代)過程中參考了公認的管理系統,如國際標準化組織14001 ,生態管理及審核系統( emas ) ,而且它們還可能作為有用的附加
  3. The coding of forest resource information included entity type code, entity code and entity attributes code

    森林資包括實體分類、實體和實體特徵三部分。
  4. Shanghai, china, sept 2005, n1208. 16 dong j, wang j, yu l. entropy coding scheme for 4tm 4 residues and improvement for cbp

    效率的提高來於多表匹配了局部概率分佈的變化,並且表的自動切換省去了side information的額外開銷。
  5. This research started with establishing diagnosed cases database. after discussing with medical experts, 100 cases were selected from 120 cases inpatients in institute of bone tumors of chinese pla, the second teaching hospital, the fourth military medical university as the resource of knowledge database ; clinical checkup knowledge database including image information was set up according to the case content ; coding all information of clinical diagnoses, using sql server 2000 to storage database

    本研究從建立確診病例數據庫入手,首先從第四軍醫大學第二附屬醫院全軍骨腫瘤研究所獲得120例住院患者的病例,再將這120例病例與臨床專家一起協商,初步篩選出100例,作為建立確診病例數據庫數據的來,然後根據病例的內容建立包括圖像在內的患者臨床檢查數據庫,對各種臨床診斷統一,使用sqlserver2000作為數據庫存儲后臺。
  6. Class with specific information about the source code being compiled and the line number on which the exception occurred

    使用關于正在譯的的特定和發生異常的行號初始化
  7. 2 ) appling the theory of information and code. this paper gives the code rule, detail code methods and decode principle of bit code and frame data code. also this paper researches and designs the lower power consumption and anti - jamming code at the signal source point

    2 )將論和理論應用於無線家庭安防系統中,給出了位、幀數據準則、具體方法及解原理。研究並設計了端具有低功耗和抗干擾性能的最佳方法。
  8. It " s the first cdna code ( 6 - 4 ) photolyase found in low orgnism ( alga ), and this study is important for the reseach of 6 - 4 photolyase. the methods and analysis as bellows : 1. this est was analyzed by method of blast, and the conclusion suggests that the sequence probably be a partial cdna that can code one of protein family of photolyase / blue light photoreceptor

    利用3 』 race法擴增此cdna序列的3 』端部分,所得片段長度為2575bp ,含一個完整的開放讀框,長1800bp ,可600個氨基酸;利用生物學法對此擴增序列進行分析,包括同性分析、序列的讀框分析、蛋白質的保守性分析以及該蛋白的進化關系分析,預測出此序列了d . salina的( 6 - 4 )光裂合酶。
  9. Based on analysis of the enterprise in detailed, data model, function model and database is offered for implementation, in which encode the information resources by the method of tier - cluster and surface - cluster and provided data basis for the implementation of application

    3 、基於對企業工作流程的詳細分析,建立了系統實現的功能模型和e / r模型,並實現了系統數據庫的設計。在這一過程中利用層群法和面群法實現了企業的統一,從而為企業的規范化處理提供了數據依據。
  10. Fiber gratings have several distinguished advantages, such as compare with fiber, low loss and high responsibility. as sensing element, they encode the sensing information in a wavelength form, which are their distinguished advantages over other transducers. that not only make the sensing information does not depend on loss of the system or fluctuation of then source power but also decrease the cost of sensing system and realize multipoint and distributed sensing

    光纖光柵與光纖之間存在天然的兼容性,它不僅具有易與光纖連接、低損耗、光譜特性好、可靠性高等特點,而且作為傳感元件,它具有其它傳感器無可比擬的優點,即感應的用波長,而波長這個絕對參量不受光功率的波動、連接或耦合損耗的影響。
  11. It reframes the traceback problem as a polynomial reconstruction problem, and uses techniques from algebraic coding theory to provide robust methods of transmission and restriction. the scheme is a new solution to the traceback problem during a dos attack ; the honeypot for ddos, which is a tool of traceback, lures the attacker to believe that he successfully compromised a slave for his needs, convincingly simulating the architecture of a potential ddos attack ; the source - based approach to ddos defense, which is a useful adjunt to traceback systems, deploys a ddos defense system at source - end networks. attacks are detected by monitoring two - way traffic flows, and the attacks originating from source networks are stopped by rate - limiting ; the routing mechanism based on pushback treats ddos attacks as a congestion - control problem

    最後,就有關ddos攻擊反向追蹤問題,從四個方面對其解決方案進行了研究:在分析比較幾種反向追蹤演算法的基礎上,著重研究了代數方法反向追蹤的方案,該方案把追蹤重構問題當作多項式重構問題,使用代數理論技術提供魯棒的傳送和重構方法,是dos攻擊過程中的反向追蹤問題的一種新的解決方法; ddos陷阱作為反向追蹤的工具,引誘攻擊者相自己成功與所需的傀儡主機通話,令人服地模擬出潛在ddos攻擊體系結構;基於的ddos防禦方法作為反向追蹤有用的補充,將防禦系統部署在網路,通過監控雙向流量檢測攻擊和限制速率終止來自的攻擊;基於向後倒推的防禦ddos的路由機制把ddos攻擊看作擁塞控制問題,添加功能到每個路由器來檢測並優先丟棄可能屬于攻擊的包,通過向後倒推上級路由器也得到通知而把這樣的包丟棄。
  12. Your ability to debug may be limited by whether the code was built with debug information, whether the debugger has access to the source code, and whether the common language runtime jit compiler is tracking debug information

    調試能力可能受到限制,限制因素包括:生成代時是否包含調試、調試器是否有權訪問,以及公共語言運行庫jit譯器是否正在跟蹤調試
  13. Your ability to inspect the program may be limited by whether the program was built with debug information, whether the debugger has access to the source code, and whether the common language runtime just - in - time compiler is tracking debug information

    檢查程序的能力可能會受以下幾種情況的限制:是否使用調試生成程序、調試器是否有權訪問以及公共語言運行庫just - in - time ( jit )譯器是否正在跟蹤調試
  14. Your ability to inspect the program may be limited, of course, depending on whether the program was built with debug information and whether you have access to the program s source code, and whether the common language runtime jit compiler is tracking debug information

    當然,檢查程序的能力可能會受到某些限制,這取決于程序是否用調試生成,是否可以訪問程序,以及公共語言運行庫jit譯器是否在跟蹤調試
  15. As a sensor, fbg can be immune from light source disturbance and system loss by transforming sensing information into its reflecting wavelength shift

    作為傳感元件,光纖光柵將被感測轉化為其反射波長的移動,即波長,因而不受光功率波動和系統損耗的影響。
  16. Fbg can be immune from light source disturbance and system loss by transforming sensing information into its reflecting wavelength shift, which has the characteristic of wavelength coding

    由於它能將被感測轉化為其反射波長的偏移,即具有波長的特性,因而不受光功率波動和系統損耗的影響。
  17. Programmer who accord to the structure composed of n - layers, which applies to dbms, can design code model including entity class, operating class and several web pages. then the xml document in terms structure of the database can be build. then the xsl conversion document based upon the code model and xml document can be designed

    根據數據庫應用程序開發中的n層架構,可設計架構中的實體類、操作類及多個數據庫操作頁面等模型,並按照數據庫及其表結構來生成xml文檔,再根據模型的要求和xml文檔原型制定xsl轉換文件,最後通過寫特定的程序控制轉換操作,即可以自動生成所需要的文件。
  18. You are not required to include subscriber locale information in the subscription record, because you can collect it from other sources or hard - code it into your notification generation rules

    您無需在訂閱記錄中包括訂閱方區域設置,因為您可以從其他來收集該或將該到通知生成規則中。
  19. Firstly, the significance of information classifying & coding for mc is explained. then, the rationale and methods of information classifying & coding are discussed and the classifying & coding system for mc ( cfmc ) is designed according to the linear classifying method. at last, the application and realization of cfmc system are studied in the two fields of parts classifying & coding and resource classifying & coding

    首先討論了分類對于mc的重要意義,隨后探討了分類的基本原理與方法,並進一步遵循線分類法設計了面向mc的分類( cfmc )系統,最後具體研究了cfmc系統在零件分類和資分類兩個方面的應用及實現。
  20. However, in the part of the software, the schemes to programme coder and decoder are expatiated separately and the final flow charts are drawn after that. during the design of the coder, the selection of the information source and the modulation is discussed. according to the characteristic of the multi - phase modulation ml

    在軟體實現部分,分別詳述了器和譯器的程方案並給出了最終實現的流程圖:器的設計中論述了和調制方式的選擇方法;而對譯器的最大似然演算法則根據多相調制的特點進行了演算法簡化和實現。
分享友人