行式二進制碼 的英文怎麼說

中文拼音 [hángshìèrjìnzhì]
行式二進制碼 英文
row binary code
  • : 行Ⅰ名詞1 (行列) line; row 2 (排行) seniority among brothers and sisters:你行幾? 我行三。where...
  • : 名詞1 (樣式) type; style 2 (格式) pattern; form 3 (儀式; 典禮) ceremony; ritual 4 (自然科...
  • : Ⅰ數詞(一加一后所得) two Ⅱ形容詞(兩樣) different
  • : 進構詞成分。
  • : Ⅰ動詞1 (製造) make; manufacture 2 (擬訂; 規定) draw up; establish 3 (用強力約束; 限定; 管束...
  • : Ⅰ名詞(表示數目的符號或用具) a sign or object indicating number; code Ⅱ量詞1 (指一件事或一類的...
  1. The structure of this paper goes like this, the first chapter introduce the development of e - b / l in practice and in laws. and draw a conclution that the electrification of the b / l is a history tide. in the second chapter, on the basic of reseach the security trap in e - b / l running, 1 conclude six security elements of, e - b / l : the liability of the system, the authenticity of dealers ' identity. the integrity and secrecy of electronic data, and the validity and evidence effectiveness of electronic data. from the third chapter to the eighth, 1 reseach these elements one by one. the third chapter introduce the establishment of the e - b / l security system, and some related laws the fourth chapter introduce the certification authority of e - b / l. in the fifth chapter, 1 introduce the encrypt of electronic information and some countries ' control on use / import / export crytography. the sixth chapter introduce the concept and principle of digital signature, and reseach some related legal issues. the seventh chapter reseach the legal demand of validity, then come to a conclution that to establish a independent electronic information system is necessary. in the eighth chapter, 1 reseach some countries " regulation on the evidence effectiveness of electronic data

    章在分析電子提單運作中的安全隱患的基礎上,歸納出其六大安全要素,即系統的可靠性、交易者身份的真實性、數據電訊的機密性和完整性、數據電訊的合法有效性以及交易者為的不可抵賴性。第三章到第八章分別對這六大要素分析:第三章介紹了電子提單網路安全體系的建立以及系統安全保護法規,第四章則介紹了電子提單的安全認證機構,第五章介紹了信息加密技術以及各國立法對密技術的出口及使用的控,第六章介紹了數字簽名的概念及原理,並以bolero為例介紹了數字簽名的技術方,對有關法律問題作了論述;第七章首先論述了電子提單對有效性的法律需求,然後結合國內法和國際規則的規定論證了數據電訊度產生的必然性;第八章通過對各國立法對電子證據的法律效力的規定,論述了對電子交易至關重要的數據電訊的不可抵賴性。
  2. The main computer is programmed under windows, while the assistant computer is programmed under dos. the last, based on the idea of module - structure, the software of the testing system are designed, thus this software system is compatible and transplantable to design again. the experiment of measuring principle is taken : take the xy flat of lathe as the parallel - pole device and adjust the angle of sensor, the rotating - probe can test the felloe mould in scanning way

    藉助虛擬儀器的思想,對測控系統了設計:採用光柵尺、光電編器測量可動部件的運動量,解析度高、誤差小;採用細分驅動的步電機裝置,控性能好;系統實施環境溫度的檢測、補償,提高了檢測精度;基於兩級微機組建測控系統:主機為人機界面,採用windows編程,從機用dos編程,實時性好;軟體設計採用兼容性和移植性好的模塊結構,便於次開發。
  3. In that mainly including communication work mode, project argumentation of system, performance analyses and type choosing of communication transmitter - receiver and the design of antenna system, etc. in chapter 3, coding mode of msk and gmsk and the hardware circulation realization of modem are discussed in detail

    在第章里,介紹無線電通信系統總體設計,按通信系統組成,逐項計算,主要包括通訊工作方和體的方案論證,通訊電臺性能分析、選型、參數,以及天線系統的論證等。在第三章里,詳細論述msk和gmsk編,以及用fx909實現數據機的硬體電路。
  4. Because of the unique issues in the networks, including mobility - induced disconnection, network partition, high out - of - order delivery ratios and channel errors, the congestion control and the error recovery in the network is challenging. in this environment, the interaction between tcp and mac layer protocols, the affection of route protocols on the performance of tcp and the particular congestion control and error recovery mechanism are first discussed. then a particular transport layer protocol scheme based on the non - feedback mechanism is presented, with emphasis on the analysis and simulation of the key parameter

    文中主要討論了兩種不同網路結構中的無線tcp協議改方案,其一在最後一跳為無線鏈路的網路環境中,針對基本tcp擁塞控存在的缺陷,文中在現有解決方案的基礎上提出一綜合性的方案,其中包括無線鏈路的高誤率和連接斷開問題的解決,並重點對方案中出現的交叉層問題分析和模擬;其,考慮的是分散網路( adhoc ) ,在文中較為詳細的分析了tcp和mac層機間的相互作用、路由協議中造成tcp性能降低的因素、 adhoc網路中應採取的特殊擁塞控和差錯恢復機,在此基礎上提出了一種採用非反饋機的解決方案,重點對方案中的關鍵參數分析和模擬,分析和模擬結果表明此機可在很大程度上提高adhoc網路中tcp的性能。
  5. The content of this paper is arranged as foll owing : chapter 1 introduces the concept of credit, credit risk and credit assessment, as well as the history and development of credit assessment ; chapter 2 introduces the history of ai technology, and the background of expert system and neural network. characters and disadvantages of expert system and neural network are presented respectively and the necessity of combining expert system and neural network is lightened ; chapter 3 shows the process of dealing with sample data, including the treatment of exceptional data and factor analysis, and puts forward the concrete framework of the mixed - expert credit assessment system ; chapter 4 introduces concept of object - oriented technology, and constructs object model and functional model after analyzing the whole system. it also illustrates the implementation of concrete classes by an example of rule class and the inference algorithm in the form of pseudocode ; chapter 5 introduces the structure of the whole system, the major functional models and their interfaces, and the characteristic of the system is also generalized ; chapter 6 summarizes the whole work, and points out the remaining deficiencies as well as the prospective of this method

    本文具體內容安排如下:第一章介紹了信用、信用風險、信用評價的概念,回顧了信用評價的歷史、發展和現狀,並綜合各種信用評價模型,指出這些模型各自的優缺點:第章簡單描述了人工智慧技術,著重介紹有關專家系統與神經網路的基礎知識,通過總結它們的優缺點,指出結合專家系統與神經網路構造混合型專家系統的必要性;本章還介紹了神經網路子模塊的概念,提出了混合型專家系統的一般框架與設計步驟:第三章對樣本數據處理,包括異常數據的剔除、因子分析等,提出了信用評價混合型專家系統的具體框架結構,介紹了系統知識庫的主要部分、基於優先級的正向推理機的流程、以及基於事實的自動解釋機的具體實現方法;第四章介紹了面向對象技術,而採用面向對象對信用評價系統分析,建立了對象模型和功能模型,並在此基礎上,採用c + +語言以規則類為例說明系統中具體類的實現,用偽代的形描述了推理的演算法;第五章描述了整個系統的結構,對系統主要功能模塊和界面了介紹,並總結系統的特點;第六章總結了全文,指出本文所構造系統存在的不足以及對將來的展望。
  6. Nacpro apparel pattern making system has great progress in the intellectualized and humanized operation. original database management mode, intellectualized automatic pattern - making, auto - grading and customized system, entirely opening unlimited basic block library, linkage operation of pattern modifying, substantial mark lib and line lib in the system or setting, point parallel line - cutting grading and 3d re - grading or more - times grading, marker making for traditional textile irregular textile knitted textile, etc., auto - matching plaid marker making, beds marker making and double - deck bed marker making, automatic marker making which can be modified by hands any time. we do everything to help the users operating conveniently, quickly and economically

    隨著計算機技術不斷發展,在我公司全體員工的努力下, nacpro服裝板排板系統在智能化操作和人性化操作方面的綜合能力大大提高,新穎的數據庫管理模智能化的自動打板自動放及度身定做全開放的無限量原型板庫打樣后修改紙樣的關聯聯動操作大量系統和自定義的記號庫及線型庫點平線-切開線多種放相結合併可次多次立體放傳統面料不規則面料針織面料等不同面料的排料方自動對格排料分床及高低床排料自動排料並可隨時與手動相結合的人工可干預智能排料我們所做的一切,都是為了讓用戶操作得更加方便快捷節約時間節約面料,我們可以肯定地說, nacpro將以其嶄新的面貌,無愧成為當今同業的勝出者。
  7. Comparing the numerical solutions of binary coding and mixed coding, better solutions are obtained with the mixed coding, and the numerical solutions in most examples with integer and floating coding are best

    通過算例,對和兩種混合編方法了比較,說明混合編得到的結果比好,其中整數和實數編得到最優解是最好的。
  8. Based on a mathematical model which conforms to constraints, and has minimum discounted value of the sum investment and loss - cost in whole planning period, a new binary coding genetic algorithm is presented to solve multi - stage planning problem in this thesis. the method is proved to be efficient by test example

    本文分析了多階段電網規劃的思路,基於一個滿足約束條件,並在整個規劃期內所需要的投資費用和運費用總和的貼現值為最小的數學模型,用遺傳演算法對算例了計算,計算中染色體編採用了涵括多個時間段的,有效地解決了各階段之間的協調問題。
  9. Based upon the above analysis, the author made a historical analysis of manufactory code supply, described the institution evolution of the bar code and reached the conclusion that there exists market failure for the bar code - there being no stimulation, based on the practice of article numbering center of china and the view of public goods supply and public department, this thesis put forward some approaches in supply efficiency enhancing of our country ' s article numbering organization on the point of promoting internationalization level in goods code in our country

    以公共品供給理論和公共部門理論為指導,結合我國編組織的工作實踐,從促我國商品標識國際化水平的角度提出改我國商品編組織供給效率的有效途徑,指出將成本分擔與年產值關聯起來實以年產值為基礎的部收費法在一定程度上能夠解決商品條系統成員之間搭便車的現象,因而具有帕雷托改的性質。最後分析了商業模演變、產業結構和體環境對我國編組織的影響。
  10. In this solution, ga used particular gene representation composed of binary code and real code, which expressed feasible structure of logistics network

    在遺傳演算法中採用和自然組合的編,使得每個合法染色體都代表一種可物流網路結構。
  11. There are many results on sr with binary digital input. as an extension of our previous works, a dynamic bit error rate ( dber ) is obtained in this thesis. the dber is a more accuracy measure to be used in sr with binary input, because the evaluation of system output is considered more detailedly with the concept of system response speed

    對於數字信號輸入的情況,已有頗多研究結果,本文是在引入了系統響應速度的基礎上,具體結合信號的檢測形,對上述情況下的系統輸出的統計性態了詳細的研究,並最終得到了一個優于以前結果的系統輸出誤率公,給系統參數的選取提供了更好的依據。
  12. Firstly, the current testing localization in the detection of electric bow is analyzed and the new system ' s whole construction developed in this thesis is introduced ; in the 2rd chapter, the embedded 110v dc power supply is analyzed and constructed, and with experiments, some dissonant results such as the fluctuation of output pwm ( pulse width modulation ) pulses, the power noise added to output voltage, and the drop of output voltage have been analyzed and the problems have been broken down one by one ; in chapter 3, stepping motor ' s drive has been systematically dissertated, and combing stepping motor ' s subdivided drive technology, the author develops an intelligent mini - step driving circuit using a main - sub microprocessor structure, which is validated in the hybrid stepper based system ; in the 4th chapter, liquid crystal driving and displaying technology is specified in detail, with one sort of lcd modules ( tlm12864h ), the author develops an feasible circuit for the new testing system, designs a menu mode based program struc ture and brings here some programming codes using franklin c51 programming language ; in chapter 5, the above built system is used in the electric bow ' s practical detection, and the differentiating rate of this system is analyzed

    論文首先分析了目前機車受電弓檢修方存在的局限並概述了本論文研製的受電弓測試系統的體系架構;第章對系統內置110v直流控電源了分析和設計,結合試驗對輸出pwm振蕩、輸出電源噪聲大、輸出電壓下跌等現象了分析並提出解決措施;第三章論述了步電機的驅動,結合步電機微步驅動技術研製了基於上下位單片機組的混合電機智能驅動電路,並在試驗中得以驗證;第四章詳述了液晶驅動及顯示技術,利用一款液晶顯示模塊tlm12864h研製出本系統用液晶顯示電路,設計了菜單的程序結構並以franklinc51編程方給出部分子程序代;第五章則將以上構建的整個系統應用在機車受電弓的實測中,並對測試解析度了分析。
  13. A two - stage hybrid scheme is proposedbased on the criteria that decreasing mode nuinber reasonably and different attention shouldbe given to different class control variables, i. e., at the begirming stage, a larger granu1arity isused to make ga searching the area contaning optimal sollltion with less generation. thehybrid scheme of binary and integer code distinguished by voltage level is of clear levelconception thus can search the high voltage control variables more carefully. crossover andmutation of ga are also refined on the basis of above scheme

    並從合理減少模數以及對不同變量給予不同程度關注的原則出發,提出了兩階段分層混合編方案:在遺傳演算法的開始階段,用較粗的粒度編,使遺傳演算法能夠用較少的迭代次數快速搜索到最優解所在的區域;按電壓等級分層的和十混合編,具有清晰的層次概念,對那些影響較大的高壓網控變量能夠有針對性地以更高的精度搜索。
  14. We discussed detailedly the application of parameter - induced stochastic resonance in binary baseband pulse amplitude modulated ( pam ) signal transmission. the system ' s measurements : bit error rate and channel capacity were deduced. the numerical simulation demonstrated our theoretical analyses

    我們著重討論了參數誘導的隨機共振在基帶脈沖幅值調( pam )信號傳輸中的應用,詳細推導出了衡量系統傳輸性能的誤率和通道容量公,並利用模擬模型了數值模擬,理論分析和模擬結果非常符合。
  15. The authors argue that the fruits can be diagnosed online and exactly located by cycle shift of pattern vectors ' binary code

    通過對模向量牡循環移位實現對故障的在線診斷和精確定位。
  16. The major tasks include : ( 1 ) expand the schema theorem for ga. the schema theorem with binary coding advanced by professor holland is expanded to limited integer, letter, floating point numbers the number of which value is limited, and their hybrid coding. ( 2 ) put forward replacing by the excellent chromosome ga ( recga ), superiority colony first ga ( scfga ) and improve the ga ; ( 3 ) make probability convergence analysis of recga using the theory of markov chain, random process ; ( 4 ) make convergence analysis of scfga using the principle of contractive mapping in functional analysis theory ; ( 5 ) design the test programs ( cap ) to resolve np problems ( course arrangement ) with gas ; based on recga, modify the arithmetic and then conduct tests

    主要有以下幾方面工作: ( 1 )將遺傳演算法的模定理擴展到由有限整數、字母或取值個數有限的浮點數編,或它們混合編的遺傳演算法范圍; ( 2 )提出最佳個體替換策略遺傳演算法( recga ) 、優勢群體優先策略遺傳演算法( scfga ) ,對遺傳演算法; ( 3 )使用隨機過程理論markov鏈對recga了收斂性分析; ( 4 )使用泛函分析理論壓縮映射原理對scfga了收斂性分析; ( 5 )使用遺傳演算法設計了解決np類問題(排課問題)的測試程序( cap ) ,並根據recga對演算法測試。
  17. A programmer will type c source code source code in a text editor and then compile it into a binary executable form

    程序員可以在文本編輯器中編寫c源代,然後把它編譯成可執
  18. The digital tv broadcasting samples, measures and encodes traditional analog signals. then it converts them into binary digital signals. after that the digital tv broadcasting processes various functions management, compressing, transmission, storage and record

    數字電視是將傳統的模擬信號經過抽樣,量化和編轉換成數代表的數字信號,然後各種功能的處理,壓縮,傳輸,存儲和記錄,也可以用計算機處理,監測和控
  19. The main works of this paper are presented as follows : ( 1 ) analyzed the research condition and the difficulty of multi - agent security research at present, and we gave the definition of security in a multi - agent system ; ( 2 ) analyzed and sampled involved immune mechanism, we constructed a immune agent and described its mental attribute by dfl ; ( 3 ) gave a communication form based on mental attribute ; ( 4 ) based on dfl, we proposed a diseriminating model among tias by taking into account the theories of dynamic immune network ; ( 5 ) based on the principle of clone selection, we gave a tia ’ s immune algorithm, and put forward single tia ’ s distinghuishing model and multi - tia ’ s distinghuishing model by taking this algorithm as foundation ; ( 6 ) the security model carried on an application in the detection of computer virus, for this purpose, we also developed a simple simulation program based on binary coding

    主要包括如下工作: ( 1 )分析了當前多agent安全的研究現狀及其面臨的困難,給出了多agent安全的需求和定義; ( 2 )分析和抽取了相關的免疫機,構造了一種免疫agent ,並利用動態模糊邏輯對其非空心智狀態了描述; ( 3 )給出了agent之間基於心智屬性的通信方; ( 4 )以動態免疫網路理論為基礎,結合動態模糊邏輯,給出了tia的狀態鑒別模型; ( 5 )給出了基於克隆選擇原理的tia免疫演算法,並在該演算法的基礎上提出了單tia非自體識別模型和多tia協商非自體識別模型; ( 6 )將該安全模在計算機病毒檢測中了應用,實現了一個簡單的基於的計算機病毒檢測模擬系統。
  20. To achieve these goals, first of all, the national coding standards of various bar code systems have been learned. for the variety of bar codes, some commonly used id bar codes and 2d pdf417 bar code have been especially selected and their coding forms have been comprehended by consulting the national standard. secondly, computer algorithms for various bar code systems have been designed by combining the coding principles of various bar codes with the corresponding mathematic methods

    首先,了解各種條的編國家標準,因條種類眾多,本課題特選取其中常用的幾種一維條維pdf417,查閱了相應的國家標準了解其相應的編;其次,結合各種條的編原理和相應的數學基礎知識,對各種條了計算機演算法的設計。
分享友人