自檢代碼 的英文怎麼說

中文拼音 [jiǎndài]
自檢代碼 英文
self-checking code
  • : Ⅰ代詞(自己) self; oneself; one s own Ⅱ副詞(自然;當然) certainly; of course; naturally; willin...
  • : Ⅰ動詞1 (查) check up; inspect; examine 2 (約束; 檢點) restrain oneself; be careful in one s c...
  • : Ⅰ動詞1 (代替) take the place of; be in place of 2 (代理) act on behalf of; acting Ⅱ名詞1 (歷...
  • : Ⅰ名詞(表示數目的符號或用具) a sign or object indicating number; code Ⅱ量詞1 (指一件事或一類的...
  1. Section ii describes the design approach and implementation of speech module on mcf5249 coldfire core. the speech codec optimizes g. 729a codes and added voice activity detection of g. 729b to save bandwidth ; the implementation of acoustic echo cancellation uses nlms algorithm and it can reduce echo though designing adaptive fir filter and speech detector ; the dtmf and cpt generate signal using two second order digital sinusoidal oscillators and detect signal by picking up the frequency information. but only get the frequency information is not enough in cpt detector, this thesis introduces a method

    其中對語音編解器的設計採用優化g . 729a達到設計要求,並在此基礎上加入g . 729b的靜音測模塊,以進一步降低網路傳輸帶寬;對回聲消除器的設計採用nlms演算法,通過設計適應fir濾波器和語音測器達到回聲消除目的;對雙音多頻設計,信號發生端採用構造靜態參數表並通過二階正弦振蕩器產生信號,信號測端提取頻率信息以測信號;對呼叫進程音設計,除了類似雙音多頻的信號發生及頻率測設計外,還需要測信號持續時間,作者設計了一種基於匹配狀態表的方法以測信號持續時間。
  2. Property to retrieve the input block size of the current transform

    屬性以索當前轉換的輸入塊大小。此示例摘一個為
  3. A codebook - based event correlation approach is introduced. by considering detection and identification of abnormal events as coding problems, fault localization can be done efficiently and noises in event streams can be detected. at present, demands for fault management automation are very wide

    本文引入書( codebook )技術實現事件關聯,其基本思想是將測和標識系統中的異常事件看作編問題,具有運行速度快、能動識別事件流中的噪音等優點。
  4. ? to make the solid have realistic surface, we adopt advanced solid modeling method - constructive solid geometry. ? to free end - user from overwork, we presents and realizes many auto - processing algorithms, such as searching of inner - point, definition of polygon ' s counter - clockwise direction, as well as generation of numeric control codes. ? to checkout the collision and interference between cutter and part, we accomplish numeric control machining simulation, which can help end - user validate the correctness and rationality of numeric control codes, so it is needless that do repetitive test - cut before normal manufacture

    正如將在後續章節中所講述的那樣,我們在系統中採用了許多先進的技術,其中主要包括以下幾點:採用分層設計思想,使三維物體的設計得到了簡化;採用先進的實體造型方法,使所建立的實體真實感強;實現了內點動查找、多邊形方向動定義等演算法,提高了系統的動化水平;實現了刀具軌跡的動生成、優化;實現了數控動編寫,克服了手動編寫的缺點;實現了數控加工模擬,能驗數控的正確性和合理性,並能測刀具與工件之間的干涉。
  5. The runtime examines identifiable characteristics of the code, such as the web site or zone where the code originates, to determine the access that code can have to resources

    運行庫的可識別特徵(如的網站或區域) ,以確定可以擁有的對資源的訪問權。
  6. Property to retrieve an xml representation of the parameters

    屬性來索參數的xml表示形式。此示例摘一個為
  7. Feather linux does a bit less auto - detection of hardware than most live distributions ; i m not sure if that is because the code has been trimmed out, or to allow more control of configuration by experienced linux users

    相對于大部分直接可用的發行版本, feather linux在測硬體方面做得稍顯不足;這是因為已經被精減了,還是為了讓經驗豐富的linux用戶獲得對配置的更多的控制,我無法確定。
  8. Although it is not always feasible to have a variety of disciplines, other than development, review your designs and code, representatives from various disciplines can help discover hard - to - spot issues

    雖然讓包括開發部門在內的各個部門都來查您的設計和並非始終切實可行,但來不同部門的表有助於發現難以察覺的問題。
  9. Property to retrieve the valid output types for the current transform

    屬性以索當前轉換的有效輸出類型。此示例摘一個為
  10. With the introduction of java - based preprocessors such as icontract, it is possible to place assertions into your source code and have them automatically converted into java code that checks to ensure that the assertions are never violated

    引入了基於java的預處理器,如icontract之後,就有可能將斷言放入源中並使它們動轉換為進行查以確保斷言永遠有效的java
  11. The project of developing the core comes from a national key program in science and technologies, study on mcu high level language description and embeded system technology. the project is followed the top - down design way

    這個項目遵循了上而下的設計流程,從系統劃分、編寫、 rtl模擬、綜合、門級模擬,到布局布線、電氣規則查、設計規則查,網表比較等。
  12. In this thesis an automatic method which is used to detect the dis - contiguous parameterized duplication code is introduced

    本文介紹了一個動的測程序中非連續參數化重復的方法。
  13. I m happy to say that the state of automated code - inspection and auditing tools has gotten significantly better recently with the introduction of findbugs

    我很高興地說,隨著findbugs的引入,在測和審核工具方面已經取得重大進步。
  14. We encourage the community to regulate itself, and to provide the checks and balances needed to ensure that its members follow mutually accepted codes of conduct and editorial standards

    我們鼓勵社區調整己,並且提供需要保證它的成員跟隨行為和編輯標準的互相接受的查和平衡。
  15. Property to retrieve the valid input types for the current transform

    屬性以索當前轉換的有效輸入類型。此示例摘一個為
  16. When you attach to the server with eclipse in debug mode, it should automatically break and then let you inspect the variables, set other breakpoints, and perform all the other debugging tasks that you need to use

    當在調試模式下使用eclipse將附加到服務器時,它應該會動斷開,並允許您查變量,設置其他斷點,執行需要使用的其他所有調試任務。
  17. Error - prone module detection and code reviews are automated to make your software development faster and less expensive

    錯誤傾向模塊測及動實現,使得軟體開發更快、更經濟。
  18. Note that with enough custom code in the web services layer and or in a custom userregistry which includes a callout for checking a certificate, you can custom build your own crl checking

    請注意,在web服務層和/或定義userregistry (其中包括一個查證書的調用)包含了足夠的,就可以採用定義方式構建您己的crl查功能。
  19. The automated gate - out management system helps to detect containers, recognize and records container numbers, iso codes and container types at gate - out for record and security assurance, enhancing efficiency and lowering operating cost of gate - out processing

    動化集裝箱出口閘口管理系統測識別及記錄集裝箱號箱形集裝箱類型,有助加強保安提升頭運作效率,與及減低頭出口閘口運作成本。
  20. One of the most significant aspects is that the combination of strict type checks, array bounds checking, and automatic garbage collection thoroughly blocks the most destructive forms of server code vulnerabilities : buffer overruns, double - release errors, and rogue pointers

    最顯著的方面之一是嚴格的類型查、數組邊界查和動垃圾收集的組合徹底防止了最具破壞性形式的服務器攻擊:緩沖區溢出、重復釋放的錯誤和游離的指針。
分享友人