編碼雙相 的英文怎麼說

中文拼音 [biānshuāngxiāng]
編碼雙相 英文
coded biphase
  • : Ⅰ動詞1 (編織) weave; plait; braid 2 (組織; 排列) make a list; arrange in a list; organize; gr...
  • : Ⅰ名詞(表示數目的符號或用具) a sign or object indicating number; code Ⅱ量詞1 (指一件事或一類的...
  • : Ⅰ形容詞1 (兩個) two; twin; both; dual 2 (偶數的) even 3 (加倍的) double; twofold Ⅱ量詞(用...
  • : 相Ⅰ名詞1 (相貌; 外貌) looks; appearance 2 (坐、立等的姿態) bearing; posture 3 [物理學] (相位...
  • 編碼 : encoded; code; coded; encrypt; codogram; coding編碼表 encode table; 編碼程序 builder; 編碼尺 code...
  1. For the anticounterfeiting of printings ( such as certificate ), the existent many ways ( such as rainbow holograms ) are not available as the need for special use : anti - distortion and anti - copy. basing in the double - random - phase transform, this article puts forward a new way that two - dimensional bar code is used as anticounterfeiting label with anti - printing ? scanning and anti - damage properties. the major job are : ( 1 ). basing in the ascii codes, numerals and alphabets are encoded and subsequently transformed into two - value bar code matrix figure. later, using amplitude - based double - random - phase transform, the enciphered gray scale figure is formed. by computer simulation ( 4f system ) and printing as well as scanning ( 20 times ), we get the result that the gray scale figure with little miscoding rate ( 0. 0026 ) by “ matrix expanding way ”

    本文主要開展了以下三項研究工作: ( 1 ) .用自定義方案,將數字和字母( ascii)轉換成二值條圖;對該圖形進行振幅型隨機位加密變換,得到原信息的加密灰度圖;通過4f光學系統計算機模擬和列印-掃描實驗,證明本文提出的「矩陣擴展法」灰度圖具有較小的誤率,對於20次列印-掃描實驗,誤率不大於0 . 0026 。
  2. The channel capacity achieved in our experiments was better than that of the dual homodyne coherent state, homodyne coherent state and squeezed state communication when the average photon number exceed 0. 99, 1. 11 and 2. 06 respectively. it is more interesting that we found in the experiment, that the maximum channel capacity for a single mode - fock state communication can be surpassed with our system when the average photon number exceed 11. 302

    我們實驗所得密集的通道容量在光子數大於0 . 99 、 1 . 11及2 . 06時將分別超過干態零差通訊通道容量、干態零差通訊的通道容量以及壓縮態零差通訊的通道容量;最重要的是,當平均光子數(
  3. At first, double random phase encoding techniques are looked back and its improved methods are introduced in detail. in connection with characteristics of spherical wave gene and function of phase mask, one random phase encoding techniques are proposed with spherical wave based on 4f system

    本文首先對隨機位加密技術進行了回顧,並對它的一些改進方案的特點作了詳細介紹,並在此基礎上,根據球面波位因子的特點和位掩模在加解密中作用,提出了一種利用球面波照射4f系統的單隨機加密的新方法。
  4. Further we cloned full - length cdna of the ked like protein coding region via pcr amplification and confirmed its interaction with acam2 in yeast two - hybrid system

    進一步通過rt . pcr克隆了ked樣蛋白區全長cdna ,通過雜交驗證了全長ked樣蛋白與acamz的互作用,結果為陽性。
  5. In this paper we apply the bar code technology of commodity circulation management in milch cow individual distinction, transform " equal wide two colousrs bar code " on its hack to system number through digital image analysis, form the relation of the database code and model of management to realize information management of cattle farm

    摘要本研究內容是把物流管理中的條形技術應用到奶牛的個體識別上,通過圖像識別技術把塗制在奶牛背部的「等寬色條」轉換為系統的內部號,再通過數據庫與奶牛的實際關聯,結合其它的管理模塊來實現奶牛場的信息化管理。
  6. We cloned full - length cdna of ca coding region via pcr amplification, but a negative result was obtained when the interaction of full - length ca and ga was tested in yeast two - hybrid system

    通過rt - pcr克隆了ca區全長cdna ,但是在雜交系統檢測全長ca與g蛋白的互作用時,結果為陰性。
  7. The using of correlations in fitness function, the floating - point - number coding function and the two - level evolving process are talked about

    就這個內容,論文討論了遺傳演算法的適應度函數中關性的引入、浮點數方式以及層進化過程的採用。
  8. It reframes the traceback problem as a polynomial reconstruction problem, and uses techniques from algebraic coding theory to provide robust methods of transmission and restriction. the scheme is a new solution to the traceback problem during a dos attack ; the honeypot for ddos, which is a tool of traceback, lures the attacker to believe that he successfully compromised a slave for his needs, convincingly simulating the architecture of a potential ddos attack ; the source - based approach to ddos defense, which is a useful adjunt to traceback systems, deploys a ddos defense system at source - end networks. attacks are detected by monitoring two - way traffic flows, and the attacks originating from source networks are stopped by rate - limiting ; the routing mechanism based on pushback treats ddos attacks as a congestion - control problem

    最後,就有關ddos攻擊反向追蹤問題,從四個方面對其解決方案進行了研究:在分析比較幾種反向追蹤演算法的基礎上,著重研究了代數方法反向追蹤信息的方案,該方案把追蹤重構問題當作多項式重構問題,使用代數理論技術提供魯棒的傳送和重構方法,是dos攻擊過程中的反向追蹤問題的一種新的解決方法; ddos陷阱作為反向追蹤的工具,引誘攻擊者信自己成功與所需的傀儡主機通話,令人信服地模擬出潛在ddos攻擊體系結構;基於源的ddos防禦方法作為反向追蹤有用的補充,將防禦系統部署在源網路,通過監控向流量檢測攻擊和限制速率終止來自源的攻擊;基於向後倒推的防禦ddos的路由機制把ddos攻擊看作擁塞控制問題,添加功能到每個路由器來檢測並優先丟棄可能屬于攻擊的包,通過向後倒推上級路由器也得到通知而把這樣的包丟棄。
  9. For the positive real function image encoded by double random - phase, the first random - phase mask placed in the blank can not serve as the key when the decrypted image is detected by intensity detector in the decrypting process

    摘要正的實函數圖像通過隨機加密以後,在解密過程中,用光強探測器接收解密圖像時,位於空域的第1塊位掩模不起密匙作用。
  10. To reduce the makespan of variety and small batch job shop scheduling problem, a new approach using double genetic algorithms is proposed, and based on processing sequence of sub - lots, a novel encoding scheme for the variable chromosome length of lot splitting scheduling is presented. theoretically, the best optimization solution of overall situation can be achieved from the proposed algorithms

    對在本文中所採用的遺傳演算法的關運算元進行了闡述;針對中小批量的多工藝加工計劃調度問題,以優化生產周期為目標,提出了基於遺傳演算法的多工藝加工計劃調度演算法,同時提出了一種基於工件批次加工順序的變染色體長度的方法。
  11. This chapter introduces one technique which based on encrypting the access of storage data, this can be done by coding the phase of reference beams by use of orthogonal - phase - code

    介紹了一種基於對接入加密數據通道進行加密的方法,即對參考光的位進行正交; 4 .隨機加密光存儲。
  12. Then we cloned the mature ca fragment and the same region of the selected ca fragment from library plasmid to vector pgadt7, but neither did they interact with ga in the assay of two - hybrid system. then we used arabidopsis cam2 isoform as bait to screen the two - hybrid library

    之後將成熟ca和文庫中篩到的ca部分的基因分別亞克隆至雜交激活域載體pgadt7 ,進行雜交檢測它們與g蛋白的互作用,結果仍為陰性。
  13. The essence of efmam is that, without destroying the original am ’ s structure and encoding strategies, the patterns in the original space is mapped into the similarity space, which is spanned by the training patterns, by means of empirical kernel map. thus the double noise tolerance is achieved. one is due to the empirical kernel map and the other due to the auto - fmams

    Efmam的實質是在不改變原始fmam結構和策略的前提下,藉助經驗核映射,將原始輸入空間中的模式映射到由訓練模式張成的似度空間中,從而達到重抗噪性(一是由於經驗核映射的引入,二是自聯想fmam本身的抗噪性)的目的。
  14. We obtained two positive clones after screening. sequencing and blasting results showed that the two clones had the same sequences and encoded part of ked like protein in arabidopsis. the coding region was from n terminal amino acid 240 to c terminus

    測序及序列比對結果表明二者序列同,為ked樣蛋白的部分序列,部分從n端第240位氨宋林夜:利用酵母雜交系統篩選與g蛋白及cam互作用的新型蛋白基酸至c末端,共207個氨基酸。
  15. The genetic material of the new virus is arranged in a similar fashion, encoded in circular, double - stranded dna, and the virus ' s five proteins have similarities to the proteins of other polyoma viruses

    新病毒的遺傳物質排列方式與多瘤病毒類似,為環狀的鏈dna ,新病毒的五個蛋白質與其他多瘤病毒有似之處。
  16. Thus in this paper, a novel double encryption technology is presented. it can not only encrypt data with double phase codes, but also do it with wavelength

    因此,本文提出了一種新的重加密光全息存儲技術,它不僅能對信息進行位加密,而且還能對信息進行波長隨機
  17. 5. encrypted opticalstorage with wavelength - key and random phase codes. this paragraph presents a novel encrypted holographic storage system in combination of wavelength based on double phase codes. lt is not only inquired into in theory in detail, but also proved to be validate by computer simulation

    本節介紹了在隨機加密光存儲方法基礎上結合波長加密的一種新的重加密光存儲系統,不僅在理論上給予了詳細的推導,而且通過模擬證明了該方法的可行性。
  18. Although encrypted optical holographic storage such as double random phase encoding and encrypted orthogonal phase encoding have been validated to be correct, but they can apply only one pace of encryption, which can not meet the need of encrypting the very inportant informations

    雖然光全息加密技術如隨機和正交技術在理論和實驗上都已得到驗證,但它們都有一個缺點就是只能對數據進行一重加密。這對于保密一些非常重要的信息是不能滿足需求的。
分享友人