計算機碼 的英文怎麼說

中文拼音 [suàn]
計算機碼 英文
computer code
  • : Ⅰ動詞1 (計算) count; compute; calculate; number 2 (設想; 打算) plan; plot Ⅱ名詞1 (測量或計算...
  • : Ⅰ動詞1 (計算數目) calculate; reckon; compute; figure 2 (計算進去) include; count 3 (謀劃;計...
  • : machineengine
  • : Ⅰ名詞(表示數目的符號或用具) a sign or object indicating number; code Ⅱ量詞1 (指一件事或一類的...
  • 計算機 : computer; calculator; calculating machine; computing machinery; electronic wizard; processor; pro...
  • 計算 : 1 (求得未知數) count; compute; calculate; reckon; enumerate 2 (考慮; 籌劃) consideration; pla...
  1. Bcd and ascii are popular computer codes

    Bcd和ascii都是流行的
  2. Provides code to play the computer s beep sound

    提供用於播放警告聲的代
  3. Extract the source code to the build machine

    將源代提取到用於構建的上。
  4. Can distinguish clearly and identify red, yellow, green, blue, violet each sheet is planted color is to be not affected pursue money meeting, management kind, machinery of sports, computer makes those who wait for major, that is to say machine tool go up or the any pushbutton on machinery won ' t mark with 5 color, the any number on meeting items of an account won ' t use money 5 color are written, the every number letter that shows on the clavier letter on the computer or screen won ' t be form by 5 color, if use only color, distinguish all sorts of index, operation, discriminative job only, it is normal that only color identifies ability person all can foster into this respect useful talent or this professional expert

    能夠明確區分和識別紅、黃、綠、藍、紫各單種顏色是不影響從事財會、治理類、體育、械製造等專業的,也就是說床上或械上的任何一個按鈕不會用五個顏色標識,財會賬目上的任何一個數不會用五個顏色書寫,上的鍵盤字母或屏幕上顯示出的每個數字母不會是由五個顏色構成,只要是用單顏色區別各種指標、操作、演示的工作,單顏色識別能力正常者均可培養成這方面有用人才或這個專業的專家。
  5. The whole system is made up with industry pc, ccd camera, video compress card, de - code machine

    系統為利用工控、 ccd攝像、視頻壓縮卡、解器構成的以為核心的數字監控系統。
  6. Because of the huge memory space and rapd calculation speed that compuer possesses, we can manage the ekisted drawings central1y and search them rapidiy in conclusion, the high quality and low price product wtth the help of applytng the cad technology will not only satisfy the requiremen of the market but also help factory amer apply the compeer technology in the process of production ( for example, haher production managemen0 we has applied thes systetn in extuion embranchmen factory and obtained favorable effect wich reveds tha thes system has widely applytng prospect and uti1ity value

    該系統將成組技術的分類編原理和輔助設技術應用於擠壓鋁型材的產品開發設和產品圖紙的管理中,不僅可以極大地提高產品設質量、縮短產品開發周期,還可以減少重復繪圖工作及規范制圖方法;同時,利用存儲空間大、運行速度快的優點,可實現對已有產品圖紙的集中管理和快速檢索。利用輔助產品開發,不僅能以高質量、低成本的產品迅速滿足市場需求,還可為工廠進一步實施應用工程(如后續生產管理等)奠定良好的基礎。
  7. The findings of this thesis reflect that the object - oriented method is an effective means used in developing finite element analysis software, compared with traditional method it possesses the advantages of being more structured, easy to be compiled, maintained and extended and the program code can be much more reused. the oop method not only improve the functions of finite element software but also realize the congruity between the computing model and physical model in the real world, and promote the integrity technique of cad / cae

    本文結果表明,面向對象方法是一種強有力的工具,採用面向對象方法開發大型有限元分析軟體是一種非常有效的方法,與傳統的有限元程序相比,面向對象有限元程序更加結構化、更易於編寫、更易於維護和擴充,程序代的可重用成分更大,它不僅能提高有限元軟體的功能,而且能實現數據模型與模型以及現實世界物理模型之間的一致性,方便太原理工大學碩士學位論文cad / cae系統的集成。
  8. Also we manufacture various of series excitation, direct current, induction and consequent pole motor

    適用於手家電等產品上的標識片。
  9. A while ago, an ad hoc group of computer scientists and cryptographers contributed to a paper that recommended a key of at least 90 bits for symmetric algorithms used in commercial security

    不久前,科學家和密學家專門小組發表了一篇論文,建議用於商業安全的對稱演法至少要用90位的鑰匙。
  10. " the apparent paradox that openness about your methods leads to better security is not unique to computer software - military and diplomatic cryptographers have known for a century that it is folly to depend on the secrecy of your encoding method rather than the secrecy of your keys, " says raymond

    Raymond說: 「公開您的方法將導致更好的安全性這個明顯矛盾的觀點並非軟體所獨有,軍事和外交上的解密者知道這個觀點已有一百年了:依賴編方法的保密性而不依賴密鑰的保密性是非常愚蠢的。 」
  11. The control unit decodes the eighteen bits, so that the computer knows what we want it to do next.

    控制器對這18位字進行譯,於是就知道我們要它下一步做什麼。
  12. 1666 - 1666j preserves the customer s right to make arguments with an issuing bank about the correctness of a bill including amount, computation, timing, and delivery receipt of goods services

    竊賊可能要花幾分鐘來嘗試50把不同的汽車鑰匙,而只需一秒的一小部分(兩億萬分之一)即可嘗試50個密密鑰。
  13. Ajl those drictions supp1ied by thes system help us resolve the problern of managing aluxninuin type materials drawings. at the sazne hme, it makes the exploitation and design ofproduc has better inherit by utilising the functions of coding based on the software. as thes systern app1ied the classiforg and coding prinop1e based on gt and cad tedm1ogy in design and managernen of drawings which not only enhance the design quality of product, shorten the development pedod but also decrease the ropeaed drawing work and hanme the method of protract drwings

    該系統規范了型材圖紙的設,提高了型材圖紙的檢索效率,對型材的相關信息進行了的效的管理,良好地解決了鋁型材圖紙檢索和管理的問題;同時,作為一個輔助產品設系統,利用該系統的分類檢索功能和圖紙支撐軟體的圖形編功能,使產品的開發設具有良好的繼承性。
  14. For the anticounterfeiting of printings ( such as certificate ), the existent many ways ( such as rainbow holograms ) are not available as the need for special use : anti - distortion and anti - copy. basing in the double - random - phase transform, this article puts forward a new way that two - dimensional bar code is used as anticounterfeiting label with anti - printing ? scanning and anti - damage properties. the major job are : ( 1 ). basing in the ascii codes, numerals and alphabets are encoded and subsequently transformed into two - value bar code matrix figure. later, using amplitude - based double - random - phase transform, the enciphered gray scale figure is formed. by computer simulation ( 4f system ) and printing as well as scanning ( 20 times ), we get the result that the gray scale figure with little miscoding rate ( 0. 0026 ) by “ matrix expanding way ”

    本文主要開展了以下三項研究工作: ( 1 ) .用自定義編方案,將數字和字母( ascii)轉換成二值條圖;對該圖形進行振幅型雙隨相位加密變換,得到原信息的加密灰度圖;通過4f光學系統模擬和列印-掃描實驗,證明本文提出的「矩陣擴展法」灰度圖具有較小的誤率,對於20次列印-掃描實驗,誤率不大於0 . 0026 。
  15. There are many problems happened when international phonetic alphabet symbols are used in word - processing like nonstandard application, nonstandard encoding which cause a limitation on sharing and communication of datain teaching and research, for instance ; international phonetic alphabet and symbols contained in ones document cannot be accurately displayed when they are removed to another computer. there appears many nonstandard usage, unnecessary characters, symbols, rules, as well as some wrongly written letters which often delay publication of the papers

    不僅應用上不規范,也不符合相關編標準,因而語言文字應用教學和研究相關數據的共享與交流等受到極大的限制。例如:某人采寫的文檔離開了作者的就不能正確顯示或不能顯示國際音標字母和符號。還有以先定義后使用的形式出現了很多不規范的用例,甚至還「誕生」了一些不必要的字元和規則。
  16. The article points out the importance and necessity of the information - security from its actuality in our country. the resources in the information system, for instance, hardware, software, data, document, operator, meterial and so on, are evaluated and gived safety grade firstly. and then, it analyses the menace including the nonauthorized access, the information leak, the refused sevice, the internal objection which the system will take. the following are the corresponding control police : confirm the users " rights and duties, including the mode of using account, the limit of accessing resource, the application of password, the building of backup ; confirm the administrators " right and duties, including physical safety, system configuration, account configuration and usufruct, password management, audit and control, backup and individual intimity ; run - of - mill measure of security defence, including access control, symbol and identification, integrality control, password technique, firewall system, audit and resumption, safety of operating system, safety of database system, defence of computers " virus and resisting - deny protocol. in the end, the article offers the strategies of disposing the safety - accident and analyse after ithow. to report it, how to solve it in phase, and how to avoid it happening again. in a word, the article presents a holistic resolvent about keeping away the information system ' s security, and supplies a essential frame for its configuration, management and application

    然後,對系統可能受到的威脅,包括非授權訪問、信息泄漏、拒絕服務和內部缺陷等進行分析,並提出了相應的控制策略:確定用戶的權力和責任,包括帳戶使用方式、資源訪問權限、口令應用以及建立備份等;確定系統管理員的權力和責任,包括物理安全、系統配置、帳戶設置及使用權限、口令管理、審和監控、備份以及個人隱私等方面;一般性的安全防護措施:存取控制、標識和認證、完整性控制、密技術、防火墻系統、審和恢復、操作系統安全、數據庫系統安全、病毒防護和抗抵賴協議等。最後,對事故處理和事後分析提供策略,如何報告安全事故,如何協調解決安全事故,如何避免安全事故再次發生。總之,本文對信息系統安全防範工作給出一個整體的解決方案,為其在配置、管理和應用方面提供了基本的框架。
  17. Facial representation and recognition is one of the key issues in pattern recognition, computer vision, and image understanding fields. it is widely applied to numerous commercial and law areas, such as mug shots retrieval, real - time video surveillance, security system and so on

    人臉的表示和識別技術是模式識別、視覺和圖像理解系統的研究熱點之一,在公安和安全部門有著廣泛的應用,例如搜索罪犯、動態監視、銀行密系統等。
  18. Ternary optical coder, decoder and ternary logical calculus belong to key components of ternary optical computer, and they are the base of implementing other components of the optical computer

    三值光編、解器和三值邏輯運器是三值光關鍵部件,是實現三值光其它部件的基礎。
  19. Processing video on high performance parallel computers has good potential and wide foregrounds

    在高性能并行上進行視頻壓縮編具有很大的發展潛力,應用前景很廣。
  20. When prompted, type a temporary passkey, and then quickly type the same passkey on the development computer

    提示時,請鍵入一個臨時配對,然後立即在開發上鍵入同一配對
分享友人