編碼雙相 的英文怎麼說
中文拼音 [biānmǎshuāngxiāng]
編碼雙相
英文
coded biphase- 編 : Ⅰ動詞1 (編織) weave; plait; braid 2 (組織; 排列) make a list; arrange in a list; organize; gr...
- 碼 : Ⅰ名詞(表示數目的符號或用具) a sign or object indicating number; code Ⅱ量詞1 (指一件事或一類的...
- 雙 : Ⅰ形容詞1 (兩個) two; twin; both; dual 2 (偶數的) even 3 (加倍的) double; twofold Ⅱ量詞(用...
- 相 : 相Ⅰ名詞1 (相貌; 外貌) looks; appearance 2 (坐、立等的姿態) bearing; posture 3 [物理學] (相位...
- 編碼 : encoded; code; coded; encrypt; codogram; coding編碼表 encode table; 編碼程序 builder; 編碼尺 code...
-
For the anticounterfeiting of printings ( such as certificate ), the existent many ways ( such as rainbow holograms ) are not available as the need for special use : anti - distortion and anti - copy. basing in the double - random - phase transform, this article puts forward a new way that two - dimensional bar code is used as anticounterfeiting label with anti - printing ? scanning and anti - damage properties. the major job are : ( 1 ). basing in the ascii codes, numerals and alphabets are encoded and subsequently transformed into two - value bar code matrix figure. later, using amplitude - based double - random - phase transform, the enciphered gray scale figure is formed. by computer simulation ( 4f system ) and printing as well as scanning ( 20 times ), we get the result that the gray scale figure with little miscoding rate ( 0. 0026 ) by “ matrix expanding way ”
本文主要開展了以下三項研究工作: ( 1 ) .用自定義編碼方案,將數字和字母( ascii碼)轉換成二值條碼圖;對該圖形進行振幅型雙隨機相位加密變換,得到原信息的加密灰度圖;通過4f光學系統計算機模擬和列印-掃描實驗,證明本文提出的「矩陣擴展法」灰度圖具有較小的誤碼率,對於20次列印-掃描實驗,誤碼率不大於0 . 0026 。The channel capacity achieved in our experiments was better than that of the dual homodyne coherent state, homodyne coherent state and squeezed state communication when the average photon number exceed 0. 99, 1. 11 and 2. 06 respectively. it is more interesting that we found in the experiment, that the maximum channel capacity for a single mode - fock state communication can be surpassed with our system when the average photon number exceed 11. 302
我們實驗所得密集編碼的通道容量在光子數大於0 . 99 、 1 . 11及2 . 06時將分別超過相干態雙零差通訊通道容量、相干態零差通訊的通道容量以及壓縮態零差通訊的通道容量;最重要的是,當平均光子數(At first, double random phase encoding techniques are looked back and its improved methods are introduced in detail. in connection with characteristics of spherical wave gene and function of phase mask, one random phase encoding techniques are proposed with spherical wave based on 4f system
本文首先對雙隨機相位加密技術進行了回顧,並對它的一些改進方案的特點作了詳細介紹,並在此基礎上,根據球面波相位因子的特點和相位掩模在加解密中作用,提出了一種利用球面波照射4f系統的單隨機相位編碼加密的新方法。Further we cloned full - length cdna of the ked like protein coding region via pcr amplification and confirmed its interaction with acam2 in yeast two - hybrid system
進一步通過rt . pcr克隆了ked樣蛋白編碼區全長cdna ,通過雙雜交驗證了全長ked樣蛋白與acamz的相互作用,結果為陽性。In this paper we apply the bar code technology of commodity circulation management in milch cow individual distinction, transform " equal wide two colousrs bar code " on its hack to system number through digital image analysis, form the relation of the database code and model of management to realize information management of cattle farm
摘要本研究內容是把物流管理中的條形碼技術應用到奶牛的個體識別上,通過圖像識別技術把塗制在奶牛背部的「等寬雙色條碼」轉換為系統的內部編號,再通過數據庫與奶牛的實際編號相關聯,結合其它的管理模塊來實現奶牛場的信息化管理。We cloned full - length cdna of ca coding region via pcr amplification, but a negative result was obtained when the interaction of full - length ca and ga was tested in yeast two - hybrid system
通過rt - pcr克隆了ca編碼區全長cdna ,但是在雙雜交系統檢測全長ca與g蛋白的相互作用時,結果為陰性。The using of correlations in fitness function, the floating - point - number coding function and the two - level evolving process are talked about
就這個內容,論文討論了遺傳演算法的適應度函數中相關性的引入、浮點數編碼方式以及雙層進化過程的採用。It reframes the traceback problem as a polynomial reconstruction problem, and uses techniques from algebraic coding theory to provide robust methods of transmission and restriction. the scheme is a new solution to the traceback problem during a dos attack ; the honeypot for ddos, which is a tool of traceback, lures the attacker to believe that he successfully compromised a slave for his needs, convincingly simulating the architecture of a potential ddos attack ; the source - based approach to ddos defense, which is a useful adjunt to traceback systems, deploys a ddos defense system at source - end networks. attacks are detected by monitoring two - way traffic flows, and the attacks originating from source networks are stopped by rate - limiting ; the routing mechanism based on pushback treats ddos attacks as a congestion - control problem
最後,就有關ddos攻擊反向追蹤問題,從四個方面對其解決方案進行了研究:在分析比較幾種反向追蹤演算法的基礎上,著重研究了代數方法編碼反向追蹤信息的方案,該方案把追蹤重構問題當作多項式重構問題,使用代數編碼理論技術提供魯棒的傳送和重構方法,是dos攻擊過程中的反向追蹤問題的一種新的解決方法; ddos陷阱作為反向追蹤的工具,引誘攻擊者相信自己成功與所需的傀儡主機通話,令人信服地模擬出潛在ddos攻擊體系結構;基於源的ddos防禦方法作為反向追蹤有用的補充,將防禦系統部署在源網路,通過監控雙向流量檢測攻擊和限制速率終止來自源的攻擊;基於向後倒推的防禦ddos的路由機制把ddos攻擊看作擁塞控制問題,添加功能到每個路由器來檢測並優先丟棄可能屬于攻擊的包,通過向後倒推上級路由器也得到通知而把這樣的包丟棄。For the positive real function image encoded by double random - phase, the first random - phase mask placed in the blank can not serve as the key when the decrypted image is detected by intensity detector in the decrypting process
摘要正的實函數圖像通過雙隨機相位編碼加密以後,在解密過程中,用光強探測器接收解密圖像時,位於空域的第1塊相位掩模不起密匙作用。To reduce the makespan of variety and small batch job shop scheduling problem, a new approach using double genetic algorithms is proposed, and based on processing sequence of sub - lots, a novel encoding scheme for the variable chromosome length of lot splitting scheduling is presented. theoretically, the best optimization solution of overall situation can be achieved from the proposed algorithms
對在本文中所採用的遺傳演算法的相關運算元進行了闡述;針對中小批量的多工藝加工計劃調度問題,以優化生產周期為目標,提出了基於雙遺傳演算法的多工藝加工計劃調度演算法,同時提出了一種基於工件批次加工順序的變染色體長度的編碼方法。This chapter introduces one technique which based on encrypting the access of storage data, this can be done by coding the phase of reference beams by use of orthogonal - phase - code
介紹了一種基於對接入加密數據通道進行加密的方法,即對參考光的相位進行正交相位編碼; 4 .雙隨機相位編碼加密光存儲。Then we cloned the mature ca fragment and the same region of the selected ca fragment from library plasmid to vector pgadt7, but neither did they interact with ga in the assay of two - hybrid system. then we used arabidopsis cam2 isoform as bait to screen the two - hybrid library
之後將成熟ca和文庫中篩到的ca編碼部分的基因分別亞克隆至雙雜交激活域載體pgadt7 ,進行雙雜交檢測它們與g蛋白的相互作用,結果仍為陰性。The essence of efmam is that, without destroying the original am ’ s structure and encoding strategies, the patterns in the original space is mapped into the similarity space, which is spanned by the training patterns, by means of empirical kernel map. thus the double noise tolerance is achieved. one is due to the empirical kernel map and the other due to the auto - fmams
Efmam的實質是在不改變原始fmam結構和編碼策略的前提下,藉助經驗核映射,將原始輸入空間中的模式映射到由訓練模式張成的相似度空間中,從而達到雙重抗噪性(一是由於經驗核映射的引入,二是自聯想fmam本身的抗噪性)的目的。We obtained two positive clones after screening. sequencing and blasting results showed that the two clones had the same sequences and encoded part of ked like protein in arabidopsis. the coding region was from n terminal amino acid 240 to c terminus
測序及序列比對結果表明二者序列相同,為ked樣蛋白的部分編碼序列,編碼部分從n端第240位氨宋林夜:利用酵母雙雜交系統篩選與g蛋白及cam相互作用的新型蛋白基酸至c末端,共207個氨基酸。The genetic material of the new virus is arranged in a similar fashion, encoded in circular, double - stranded dna, and the virus ' s five proteins have similarities to the proteins of other polyoma viruses
新病毒的遺傳物質排列方式與多瘤病毒類似,編碼為環狀的雙鏈dna ,新病毒的五個蛋白質與其他多瘤病毒有相似之處。Thus in this paper, a novel double encryption technology is presented. it can not only encrypt data with double phase codes, but also do it with wavelength
因此,本文提出了一種新的雙重加密光全息存儲技術,它不僅能對信息進行相位加密,而且還能對信息進行波長雙隨機相位編碼。5. encrypted opticalstorage with wavelength - key and random phase codes. this paragraph presents a novel encrypted holographic storage system in combination of wavelength based on double phase codes. lt is not only inquired into in theory in detail, but also proved to be validate by computer simulation
本節介紹了在雙隨機相位編碼加密光存儲方法基礎上結合波長加密的一種新的雙重加密光存儲系統,不僅在理論上給予了詳細的推導,而且通過模擬證明了該方法的可行性。Although encrypted optical holographic storage such as double random phase encoding and encrypted orthogonal phase encoding have been validated to be correct, but they can apply only one pace of encryption, which can not meet the need of encrypting the very inportant informations
雖然光全息加密技術如雙隨機相位編碼和正交相位編碼技術在理論和實驗上都已得到驗證,但它們都有一個缺點就是只能對數據進行一重加密。這對于保密一些非常重要的信息是不能滿足需求的。分享友人