自編碼常式 的英文怎麼說
中文拼音 [zìbiānmǎchángshì]
自編碼常式
英文
own coding routine- 自 : Ⅰ代詞(自己) self; oneself; one s own Ⅱ副詞(自然;當然) certainly; of course; naturally; willin...
- 編 : Ⅰ動詞1 (編織) weave; plait; braid 2 (組織; 排列) make a list; arrange in a list; organize; gr...
- 碼 : Ⅰ名詞(表示數目的符號或用具) a sign or object indicating number; code Ⅱ量詞1 (指一件事或一類的...
- 式 : 名詞1 (樣式) type; style 2 (格式) pattern; form 3 (儀式; 典禮) ceremony; ritual 4 (自然科...
- 編碼 : encoded; code; coded; encrypt; codogram; coding編碼表 encode table; 編碼程序 builder; 編碼尺 code...
-
2. practical meteorology : making weather observations ; encoding and decoding of codes in normal use ; manual and computerized plotting of weather charts ; preparation and dissemination of weather bulletins by microcomputers ; principles and exposure requirements of meteorological instruments ; simple fault detection and adjustment of instruments and autographic recorders ; upper - air sounding ; wmo and aftn aeronautical fixed telecommunications network message formats and telecommunications procedures ; handling telephone enquiries
2 .實用氣象學:天氣觀測編制與翻譯常用電碼以人手及電腦繪畫天氣圖使用微型電腦編排及傳送天氣報告氣象儀器原理及安裝條件儀器及自動記錄器的簡單故障檢查與校正高空探測,世界氣象組織及航空專用電信網電報格式及電信程序接聽電話詢問。Adopting the method of top - down, the virtual memory is divided into memory mange related unit ( segment unit and page unit ) and protection mode related unit ( protection test unit, debug test unit and exception detect unit ). data buses and control bused are designed separately for all of the units. vhdl codes are written and simulated
Amex86的虛擬存儲器採用自頂向下的設計方法,把虛擬存儲器劃分為地址管理相關單元(又包括分段單元和分頁單元) 、保護模式相關單元(又包括保護測試單元、調試異常單元利異常檢測單元等) ,分別確立其數據通路和控制通路,完成了vhdl的編碼和模擬工作,通過測試程序模擬驗證了其功能的正確性並測定了基本性能。This thesis analyzed the error performance of mfsk and mpsk modulator in hf with optimal receiver, studied the shortcoming and strongpoint of several typical short - wave data transmission systems and their performance over fading and intersymbol interference channels. the theory and key technical of adaptive modem is discussed. in the last, an efficient modulation scheme - block coded modulation is introduced into hf radio systems to improve the efficiency of hf data transmission, this paper also proposes a hf data transmission system scheme composed of a block coded modulator and a decision feedback type adaptive equalizer
本文在對短波數傳兩種常見調制方式fsk及psk最佳解調性能分析的基礎上,討論了幾種採用典型調制技術的短波數傳系統(如時頻調制、多進制頻移鍵控慢跳頻、 chess系統)原理、優缺點以及抗衰落和抗符號間干擾的性能;分析了自適應串列數傳系統抗短波通道衰落和多徑干擾的原理、關鍵技術;在本文的最後引入一種有望解決短波數傳系統低效率狀況的調制方式bcm -分組編碼調制,給出了一個採用bcm技術與自適應均衡技術相結合的短波數傳系統方案,並通過計算機模擬進行了初部驗證。Aiming at the limitation of basic evolution strategies, a kind of growth mechanism - based evolution strategies and its realization are introduced. chapter three presents the evolution strategies - based optimizing of seaport container logistics system, firstly the structure of chromosome is introduced, then a kind of hybrid mutation operation is used, the detail process of the optimizing method is also described, finally the traveling sequence optimization of the containers is introduced as an example to testify the feasibility of the new optimizing method
在以往的港口物流系統規劃研究中,遺傳演算法和模擬退火法是經常採用的數學方法,第三章首次研究了基於生物進化策略的港口集裝箱物流系統優化方法,提出了一種基於混合變異的自然數編碼進化策略演算法和染色體的構造模式,並以集裝箱運送順序優化問題為例,實現了基於生物進化策略的港口集裝箱物流子系統的優化。The atcm solutions in many references are constructed by first choosing a specified code, such as coset code or multi dimension tcm, then change the information rate by adopting different modulation constellation collection and different way to divide the modulation constellation collection
已有文獻的自適應格形編碼調制通常是先確定編碼方案(如採用coset碼或多維格形編碼調制) ,通過採用不同的調制星座集合,和不同調制星座集合劃方式實現自適應。So the human virus hunters learn to look for pieces of code that are unique to the functioning of a virus - telltale commands that manipulate the computer ' s operations in unusual ways, such as copying themselves into the middle of existing programs
因此,反毒專家要學會以非正常方式尋找操縱計算機運行的顯示病毒存在的命令發生作用的特殊編碼,如將自身復制並插人到已有的文件中去。Fortunately, ipsec provides us security services for ip layer and higher layers, such as access control, connectionless integrity, data origin authentication, rejection of replayed packets ( a form of partial sequence integrity ), confidentiality ( encryption ), limited traffic flow confidentiality, and so on. the thesis gives a type of network security architecture based on ipsec system, it includes the following contents : 1 analyzing the security problem in tcp / ip protocol stack, current main network attack methods and regular defense methods. 2 studing the overall architecture, main security protocols, application environments, and working mechanism of ipsec
本文所提出的新一代網路安全體制就是建立在ipsec體系基礎上的,在本文的撰寫過程中,我主要進行了如下一些工作: 1深入分析了由tcp ip協議棧本身帶來的安全問題、當前主要的網路攻擊方法以及常採用的防範對策; 2研究了ipsec標準的總體結構、主要安全協議、應用場合以及其工作機制; 3研究了當前常用的各種數據加解密機制以及密碼演算法,深入分析了它們各自的特性和具體的使用方式; 4閱讀了大量關于混沌密碼的文獻資料,了解目前混沌密碼的研究動態和成果,研究混沌密碼體制的工作機理,然後利用vc + + 6 . 0作為開發平臺對一類混沌密碼體制進行了實現,並為它編寫測試代碼評估其性能。Custom sources can be coded to implement multiple regular outputs and error outputs
對于自定義源,可以通過編碼方式實現多個常規輸出和錯誤輸出。The nice thing about jython, of course, is that the code can be directly interpreted or it can be translated to java source and automatically compiled to class files
Jython的格式顯然更簡單,通常都是如此。 jython好的方面當然是代碼可以直接解釋,也可以翻譯成java源代碼並自動編譯為類文件。Ashish bansal discusses these tools in sufficient detail for you to write your own language and its compiler ! he covers regular expressions, declarations, matching patterns, variables, yacc grammar, and parser code
Ashish bansal為您詳細的討論了編寫自己的語言和編譯器所用到的這兩種工具,包括常規表達式、聲明、匹配模式、變量、 yacc語法和解析器代碼。分享友人