誤碼檢測 的英文怎麼說

中文拼音 [jiǎn]
誤碼檢測 英文
ced code error detection
  • : Ⅰ名詞(錯誤) mistake; error Ⅱ動詞1 (弄錯) mistake; misunderstand 2 (耽誤) miss 3 (使受損害...
  • : Ⅰ名詞(表示數目的符號或用具) a sign or object indicating number; code Ⅱ量詞1 (指一件事或一類的...
  • : Ⅰ動詞1 (查) check up; inspect; examine 2 (約束; 檢點) restrain oneself; be careful in one s c...
  • : 動詞1. (測量) survey; fathom; measure 2. (測度; 推測) conjecture; infer
  • 檢測 : check; detection; test; gauging; detecting; sensing; [工業] checkout; measuring
  1. On the demand of application and according to the soluhons menhoned above, a method of displacement waiting auto - sy ' nchronizing is put forward, which is based on match filters. at the end a complete and speeflc set of hardware circuits and software programs which haplements the scheme, is also presented in the ancle. the synchronization system was tested in the pool and in the shallow wate near m port, the result of the test shows that its performance is satisfactory

    論文著重介紹實現了跳頻通信系統同步的一般方法,並詳細分析和對比跳頻同步系統的捕獲方案,在此基礎上,提出了一個基於匹配濾波器的位移等待式自同步方案,設計、完成並給出了詳細硬體連線電路圖、軟體程序流程圖和部分程序清單,該自同步方法在實驗室水池實驗取得良好的效果,並在廈門港海域進行了現場實驗試,具有較低的率和一定的概率,結果令人滿意。
  2. In this installment of diagnosing java code, full - time java developer and part - time exterminator eric allen discusses detecting, fixing, and avoiding this bug pattern

    在診斷java代的這一部分中,專職java開發者兼兼職捉蟲者eric allen討論、修復和避免這一錯模式。
  3. The main computer is programmed under windows, while the assistant computer is programmed under dos. the last, based on the idea of module - structure, the software of the testing system are designed, thus this software system is compatible and transplantable to design again. the experiment of measuring principle is taken : take the xy flat of lathe as the parallel - pole device and adjust the angle of sensor, the rotating - probe can test the felloe mould in scanning way

    藉助虛擬儀器的思想,對控系統進行了設計:採用光柵尺、光電編量可動部件的運動量,解析度高、差小;採用細分驅動的步進電機裝置,控制性能好;系統實施環境溫度的、補償,提高了精度;基於兩級微機組建控系統:主機為人機界面,採用windows編程,從機用dos編程,實時性好;軟體設計採用兼容性和移植性好的模塊式結構,便於二次開發。
  4. Chapter 3 discusses the modules used in the fh - mpsk and fh - / 4dqpsk systems. these modules include : duc / ddc ( digital up converter / digital down converter ), nyquist flitter, burst start detection, interpolation module, pll ( phase locked loop ), pll error extraction, initial phase correction and the coding and decoding for tcm

    第三章主要討論了跳頻模式下fh - mpsk和fh - 4dqpsk系統中各個模塊的設計,這些模塊包括:上下變頻器、奈奎斯特濾波器、信號到達、插值模塊、通用環路、各環路差提取方法、初始相位校正和tcm編譯
  5. Based on the one and a half year " s lucubration, the author gets one new error concealment way with better combination between efficiency and running time in processing the errors in video communication. according to the experiment results and relative data analysis, we can get a certain conclusion, which is that the algorithms are correct and useful

    課題在開放的h . 263試模型tmn8中實現了該演算法,實現過程包括,定位和部分數據的恢復等工作,並與標準h . 263的結果進行了比較,模擬結果表明,經錯和掩蓋之後,解圖像質量有了顯著的改善,證明了演算法的正確性和實用性。
  6. Though maximum likelihood detection ( mld ) can obtain optimum detection performance in mimo communication systems, the ergodic search increases the complexity exponentially with the number of the antennas, which lead to implemental difficulty

    在mimo通信系統信號中,最大似然( mld )可以獲得最佳的性能,然而遍歷式搜索方式使得mld的計算復雜度隨天線數呈指數形式遞增,在實際系統中,往往難以實時實現或者不能實現。
  7. Diagnosing java code : the saboteur data bug pattern

    java代:破壞者數據錯模式
  8. In this thesis, the research focuses on pitch detection techniques of the low - rate wi speech coding. aimed at the problems of voiced - unvoiced error, pitch doubling and halving, accuracy of pitch detection and pitch quantization, a series of pitch detection techniques including pre - processing, pitch detection and pitch quantization were proposed

    本文就低速率wi語音編中的基音技術進行了深入研究,針對基音中的清濁判、基音加倍減半、基音精度及基音量化問題,提出了包括基音前端處理、基音演算法及基音量化的一整套基音技術。
  9. 8b / 10b encoding adapt the characteristic of fiber channel very well, it has been used in high - speed fiber transmission broadly. it avoids the appearance of continuous “ 1 ”, “ 0 ”, offers plenty of bit synchronization time information, enhances the stability of output light signal, reduces interference between signals and offers proper redundancy to check error through transmission

    它避免了連「 1 」 、連「 0 」的出現,提供了豐富的位同步定時信息,減少了直流基線漂移,提高了光輸出功率的穩定性,減少了高低頻分量,改善了信號間的串擾,提供了適當的冗餘,便於系統傳輸中帶來的錯
  10. The extensive use of prediction and variable - length coding in video coding renders compressed bitstreams especially vulnerable to transmission errors and data losses. based on detailed analyses of mc - dpcm / dct mechanism, several error detection, resilience, concealment methods are discussed in this paper

    本文在分析mc - dpcm dct壓縮視頻特點的基礎上研究了各種誤碼檢測方法,並詳細討論了編端的容錯、傳輸層差錯控制、解端的失真屏蔽以及編器和解器交互的差錯控制方法。
  11. 2. applying manchester coding theory to meet the end of collision detection and codes judgment effectively. 3. using pulse position modulation ( ppm ) coding theory that is invented especially for optical communication in the air to ameliorate the system ' s performance by improving the system ' s character of pe. 4. taking good advantages of the fledged lan communication protocols and technologies to achieve a new method that has a high rate of capability to cost in building a wireless lan

    論文研究中主要的創新性工作如下: 1 、提出利用光散射通信技術組建無線局域網,方便地實現了廉價而高速的局域網內微機的光互連; 2 、採用曼徹斯特編技術解決了光無線通信中代判決和碰撞的技術難題; 3 、針對空氣通道的特點,利用ppm編技術降低通道率、改善系統性能; 4 、在光無線局域網中利用現有的成熟有線局域網協議和技術,從而保證了系統的實用性及改善了系統的性價比。
  12. Enter the sample identification with a keyboard or bar code reader. the sample position is detected by a sensor at the magazine, simplifying documentation and preventing errors

    使用鍵盤或條形掃描器輸入樣品識別符。樣品盤上的傳感器樣品的位置,從而防止因復雜的記錄而造成的錯
  13. This is true simply because the key scan code sequences will be different in the two cases, permitting the possibility that an input error is not detected on a non - native keyboard

    情況確實如此,因為鍵掃描序列在兩種情況下將會不同,從而在非本地鍵盤上可能不到輸入錯
  14. Traditional delay estimation based on ica requires the trail sequences to initialize the receiver, but the new algorithm based on ica does not need the trail sequences. it is based on the channel character of downlink, using the ica algorithm to estimate the multi - path mixture matrix, then, find the delay information which is embodied by the column vector of the mixture matrix. the simulation results show that it does enhance the performance of traditional detector without wasting the invaluable frequency resource

    傳統的通道估計演算法需要訓練序列使接收端的參數調整到理想狀態,而本文提出的基於ica的通道估計的多用戶演算法不需要訓練序列,它是利用下行通道的固有特點,用ica的盲源分離法估計出多徑通道的卷積矩陣,從而從中提取出通道的延遲信息,模擬實驗結果證明這種方法在節省了頻譜資源的同時取得較好的估計效果,使得傳統的接收機的性能得到了很大的提高。
  15. In this section, i ' ll describe three aspects of error handling : status codes, structured exception handling, and bug checks

    在這種情況下,我要討論錯處理的三個方面:狀態,結構異常處理和錯
  16. The main contributions of this dissertation are : a novel detection strategy in blind image watermarking algorithm generally, the traditional detection strategy corresponding to embedment model i = i + aw has its limitation. first, we treat the watermark information as noise for an image and expand the noise before detection. then, we find the corresponding data in the frequency - domain and adjust them according to our relative minmum principle

    為了解決這一問題,我們將嵌入水印圖像中的水印信息看作一種噪聲,在提取水印前,利用降噪方法得到原始圖像的一個逼近,通過和待圖像的比較,得到含有水印信息的噪聲,再將這種噪聲信息進行放大,最後利用局部最大的編原則將水印恢復出來;將改進的水印提取模型應用於基於fourier - mellin變換的盲水印演算法,解決了由於插值和多變換造成差積累而造成很難提取水印這一問題。
  17. High speed bert which has been used in bit error rate test in the synthe - sizing and processing terminal system of the earth station has acquired a good effect

    高速試儀已經用於地面站綜合處理終端系統的誤碼檢測中,並已取得良好效果。
  18. The fifth chapter expatiate the resolve method of false code during the video processing. the emphasis is put on the false code resolve method in video post - processing. these methods are adopted in many video processing chips include sti5518

    闡述了對于視頻處理過程中的解決方法,著重對于視頻后處理過程的誤碼檢測和掩蓋方法進行了說明,這些方法也是現行解晶元普遍使用的解決方案。
  19. Bert is used in detecting for reliability of a communication system. it is an im - portant instrument which can verify the data transfer quality

    試儀用於對通信系統的可靠性中,是驗數據傳輸質量的重要手段。
  20. The thesis describes the common network attack types as well as research condition of network intruding inspection system, and analyses the basic theory of network data packets transfer on account of protocol tcp / ip, and finally discusses network safe system framework on account of p2drr, which takes linux operating system as the development platform, has c as the development tool, uses libpcap as a tool to capture network data packets, and decode according to various protocols, along with the preprocess function on account of such inspection as i / o port scanning, and analyses the misuse inspecting technology deeply on account of key word mode matching, and studies theory abnormal inspecting system on account of data mining. the inspecting and output function of the whole system is designed as mold in plug - mechanism, so as to transplant and extend the system

    論文介紹了網路常見的攻擊模式及網路入侵系統的研究現狀,分析了基於tcp ip協議的網路數據包傳輸的基本原理,討論了基於p2drr模型的網路安全系統架構,本系統以linux操作系統為開發平臺,採用c作為開發工具,利用1ibpcap庫為工具捕獲網路數據包,並根據不同協議實現報文的解,實現了基於埠掃描等的預處理功能,對基於關鍵字模式匹配的技術作了深入地分析,並對基於數據挖掘的異常系統進行了探討,整個系統的與輸出功能均以插件機制設計成模塊,以便系統的移植和擴展。
分享友人