自編碼常式 的英文怎麼說

中文拼音 [biānchángshì]
自編碼常式 英文
own coding routine
  • : Ⅰ代詞(自己) self; oneself; one s own Ⅱ副詞(自然;當然) certainly; of course; naturally; willin...
  • : Ⅰ動詞1 (編織) weave; plait; braid 2 (組織; 排列) make a list; arrange in a list; organize; gr...
  • : Ⅰ名詞(表示數目的符號或用具) a sign or object indicating number; code Ⅱ量詞1 (指一件事或一類的...
  • : 名詞1 (樣式) type; style 2 (格式) pattern; form 3 (儀式; 典禮) ceremony; ritual 4 (自然科...
  • 編碼 : encoded; code; coded; encrypt; codogram; coding編碼表 encode table; 編碼程序 builder; 編碼尺 code...
  1. 2. practical meteorology : making weather observations ; encoding and decoding of codes in normal use ; manual and computerized plotting of weather charts ; preparation and dissemination of weather bulletins by microcomputers ; principles and exposure requirements of meteorological instruments ; simple fault detection and adjustment of instruments and autographic recorders ; upper - air sounding ; wmo and aftn aeronautical fixed telecommunications network message formats and telecommunications procedures ; handling telephone enquiries

    2 .實用氣象學:天氣觀測制與翻譯用電以人手及電腦繪畫天氣圖使用微型電腦排及傳送天氣報告氣象儀器原理及安裝條件儀器及動記錄器的簡單故障檢查與校正高空探測,世界氣象組織及航空專用電信網電報格及電信程序接聽電話詢問。
  2. Adopting the method of top - down, the virtual memory is divided into memory mange related unit ( segment unit and page unit ) and protection mode related unit ( protection test unit, debug test unit and exception detect unit ). data buses and control bused are designed separately for all of the units. vhdl codes are written and simulated

    Amex86的虛擬存儲器採用頂向下的設計方法,把虛擬存儲器劃分為地址管理相關單元(又包括分段單元和分頁單元) 、保護模相關單元(又包括保護測試單元、調試異單元利異檢測單元等) ,分別確立其數據通路和控制通路,完成了vhdl的和模擬工作,通過測試程序模擬驗證了其功能的正確性並測定了基本性能。
  3. This thesis analyzed the error performance of mfsk and mpsk modulator in hf with optimal receiver, studied the shortcoming and strongpoint of several typical short - wave data transmission systems and their performance over fading and intersymbol interference channels. the theory and key technical of adaptive modem is discussed. in the last, an efficient modulation scheme - block coded modulation is introduced into hf radio systems to improve the efficiency of hf data transmission, this paper also proposes a hf data transmission system scheme composed of a block coded modulator and a decision feedback type adaptive equalizer

    本文在對短波數傳兩種見調制方fsk及psk最佳解調性能分析的基礎上,討論了幾種採用典型調制技術的短波數傳系統(如時頻調制、多進制頻移鍵控慢跳頻、 chess系統)原理、優缺點以及抗衰落和抗符號間干擾的性能;分析了適應串列數傳系統抗短波通道衰落和多徑干擾的原理、關鍵技術;在本文的最後引入一種有望解決短波數傳系統低效率狀況的調制方bcm -分組調制,給出了一個採用bcm技術與適應均衡技術相結合的短波數傳系統方案,並通過計算機模擬進行了初部驗證。
  4. Aiming at the limitation of basic evolution strategies, a kind of growth mechanism - based evolution strategies and its realization are introduced. chapter three presents the evolution strategies - based optimizing of seaport container logistics system, firstly the structure of chromosome is introduced, then a kind of hybrid mutation operation is used, the detail process of the optimizing method is also described, finally the traveling sequence optimization of the containers is introduced as an example to testify the feasibility of the new optimizing method

    在以往的港口物流系統規劃研究中,遺傳演算法和模擬退火法是經採用的數學方法,第三章首次研究了基於生物進化策略的港口集裝箱物流系統優化方法,提出了一種基於混合變異的然數進化策略演算法和染色體的構造模,並以集裝箱運送順序優化問題為例,實現了基於生物進化策略的港口集裝箱物流子系統的優化。
  5. The atcm solutions in many references are constructed by first choosing a specified code, such as coset code or multi dimension tcm, then change the information rate by adopting different modulation constellation collection and different way to divide the modulation constellation collection

    已有文獻的適應格形調制通是先確定方案(如採用coset或多維格形調制) ,通過採用不同的調制星座集合,和不同調制星座集合劃方實現適應。
  6. So the human virus hunters learn to look for pieces of code that are unique to the functioning of a virus - telltale commands that manipulate the computer ' s operations in unusual ways, such as copying themselves into the middle of existing programs

    因此,反毒專家要學會以非正尋找操縱計算機運行的顯示病毒存在的命令發生作用的特殊,如將身復制並插人到已有的文件中去。
  7. Fortunately, ipsec provides us security services for ip layer and higher layers, such as access control, connectionless integrity, data origin authentication, rejection of replayed packets ( a form of partial sequence integrity ), confidentiality ( encryption ), limited traffic flow confidentiality, and so on. the thesis gives a type of network security architecture based on ipsec system, it includes the following contents : 1 analyzing the security problem in tcp / ip protocol stack, current main network attack methods and regular defense methods. 2 studing the overall architecture, main security protocols, application environments, and working mechanism of ipsec

    本文所提出的新一代網路安全體制就是建立在ipsec體系基礎上的,在本文的撰寫過程中,我主要進行了如下一些工作: 1深入分析了由tcp ip協議棧本身帶來的安全問題、當前主要的網路攻擊方法以及採用的防範對策; 2研究了ipsec標準的總體結構、主要安全協議、應用場合以及其工作機制; 3研究了當前用的各種數據加解密機制以及密演算法,深入分析了它們各的特性和具體的使用方; 4閱讀了大量關于混沌密的文獻資料,了解目前混沌密的研究動態和成果,研究混沌密體制的工作機理,然後利用vc + + 6 . 0作為開發平臺對一類混沌密體制進行了實現,並為它寫測試代評估其性能。
  8. Custom sources can be coded to implement multiple regular outputs and error outputs

    對于定義源,可以通過實現多個規輸出和錯誤輸出。
  9. The nice thing about jython, of course, is that the code can be directly interpreted or it can be translated to java source and automatically compiled to class files

    Jython的格顯然更簡單,通都是如此。 jython好的方面當然是代可以直接解釋,也可以翻譯成java源代譯為類文件。
  10. Ashish bansal discusses these tools in sufficient detail for you to write your own language and its compiler ! he covers regular expressions, declarations, matching patterns, variables, yacc grammar, and parser code

    Ashish bansal為您詳細的討論了己的語言和譯器所用到的這兩種工具,包括規表達、聲明、匹配模、變量、 yacc語法和解析器代
分享友人