嵌入準 的英文怎麼說

中文拼音 [qiànzhǔn]
嵌入準 英文
loose tongue
  • : 嵌名詞(用於地名) a word used in place name
  • : Ⅰ動詞1 (進來或進去) enter 2 (參加) join; be admitted into; become a member of 3 (合乎) conf...
  • : Ⅰ名詞1 (標準) standard; guideline; criterion; norm 2 (目標) aim; target Ⅱ動詞1 (依據; 依照)...
  1. We now specialize in the design and manufacture of motherboards, panel pcs, barebones, ( ia ) accessories and embedded systems, and our product portfolio is focused on embedded system which could be applied to the uses of internet appliance ( ia ), digital video recorder ( dvr ), network application storage ( nas ), network application devices ( nad ), kiosk, and point of sale ( pos )

    本公司致力於主機板,平板電腦及各類系統產品的設計及製造,主打式系統的各項應用,以滿足客戶在網路,數字監控,網路存儲設備,網路應用,多媒體查詢終端, pos機和精簡型電腦等方面應用需求。
  2. Standard specification for manhole cover assembly bolted, semi - flush, oiltight and watertight

    防油防水半螺栓連接檢查孔蓋組件標規范
  3. ( 1 ) modeling of numerical analysis of frozen soil ventiduct roadbed by ann ( 2 ) developing the ann optimization design system for ventiduct roadbed in permafrost area ( 3 ) defining of the sequel learning tactic of three layer bp network ( 4 ) improvement on bp arithmetic in ann module

    ( 2 )開發了凍土通風管路基優化設計神經網路分析軟體系統具有完整的前後處理、溫度場分析、設計方案優化等功能,能滿足工程應用的基本需要。還能夠作為數值分析子模塊,以標com組件形式「青藏鐵路數字路基」 gis系統。
  4. Blackfin533 is the new multimedia chip of ad incorporation. the study on h. 264 standard and its implementation on blackfin533 is important to the application of video techniques on embedded system

    Ad公司推出的blackfin系列dsp晶元是針對視頻技術而開發的專門晶元,因此,研究h . 264視頻標並研究其在blackfindsp上的應用對視頻技術在式領域的應用研究有重大意義。
  5. Standard for safety for cover plates for flush - mounted wiring devices

    安裝式布線裝置蓋板的性安全標
  6. Thispaperhasstudiedonthedatalinkinterfacetechniqueoftacticalcontrolsystem. firstof all, functional requirement and the important role of data link interface in tactical controlsystem is introduced ; secondly, with object oriented method, the characteristic of uav taskcontrol process is analysed, and then uav task control information model is established, anddata link interface standard of tactical control system is designed based on this model, including message format and transmission mechanism ; thirdly, data link control module isdesigned based on embedded linux operating system and has realized conversion betweendata link standard interface and the private interface of uav data link ; and then, combinationreal time corba middleware and its event channel, data link control modular componenttechnology is studied, and realization scheme is put forward ; finally, demostration is madebased on prototype of tactical controlsystem, which verify the validaty of data link interfacestandardandembeddeddatalinkcontrolmodules

    本文對戰術控制系統中的數據鏈介面技術進行研究:分析了數據鏈介面在戰術控制系統中的功能需求;採用面向對象的方法,分析無人機任務控制問題,建立了無人機任務控制信息模型,並基於該模型設計了數據鏈介面通信協議,包括報文格式和傳輸機制;基於式linux系統設計了數據鏈介面控制模塊,實現了數據鏈標介面與無人機數據鏈私有介面之間的相互轉換;結合實時corba中間件及其事件通道,研究了數據鏈介面控制模塊組件技術,並給出了實現方案;通過戰術控制原理實驗系統的演示實驗,驗證了數據鏈介面通信協議和式數據鏈介面控制模塊的有效性。
  7. This topic comes from the combination of ejavapos and fiscal cash register, mainly studying embedded development and testing under platform of ejavapos. ejavapos is an open and general platform facing to embedded pos and suitable to the specification of javapos, the standard of tax controlling and the financial standards of state

    本課題來源javapos與稅控收款機的生產結合,主要研究javapos下的式開發與測試。 ejavapos是面向式pos的、符合javapos規范和國家稅控、金融標的、開放的通用軟體平臺。
  8. The fourthly part of this paper introduces hardware circuit of embedded web server, analyses some standard internet protocols like ethernet 、 arp 、 ip 、 icmp 、 udp 、 and tcp, describe the hypertext transport protocols http in detail and realize a embedded web servers at same time

    第四部分介紹式web服務器的硬體電路,分析了internet協議標中的以太網、 arp 、 ip 、 icmp 、 udp和tcp協議,詳細的描述了超文本傳輸協議http ,實現了式web服務器。
  9. Mapping a small topology into a large one is an important problem for designing efficient networks. in [ 681. ibe authors have shown how to map abstract rings of even lengths and meshes into

    網路的可性是衡量網路注能好壞的一個重要標,因此如何將一個較小的網路到大的網路中去成為網路設計中需要考慮的一個重要問題
  10. In semi - fragile image watermarking algorithm, a robust watermark and a fragile watermark are extracted from the third approximation coefficient of wavelet transform of the original image. the two watermarks are embedded into the third vertical and horizontal detail coefficients. when authenticating image, image can be authenticated correctly and attacked parts can be localized through comparing the original watermarks and extracted watermarks

    其中,完全認證方法,利用qr分解的特性把圖像的邊緣信息到載體圖像中,演算法對各種攻擊都具有很好的敏感性;內容認證方法,從載體圖像中提取出一個脆弱水印和一個魯棒水印,並把它們重新到載體圖像中,認證時,通過兩個水印在圖像傳輸前後的變化情況來對圖像的保留價值進行評估,並確定位受攻擊部位。
  11. Dstmedia ceo and founder xiong sheng feng will become a vice president of polycom and general manager of dst, a wholly owned subsidiary of polycom, reporting to hans schwarz, executive director of china, senior vice president, technology and cto of polycom. morgan stanley acted as financial advisor to polycom in the transaction. " dstmedia is an impressive early - stage company that has already gained a leadership video network position in china and japan and has crossed the threshold of over one million dollars in quarterly revenues, said bob hagerty, chairman and ceo of polycom

    最初的tvs1 . 0是單點模塊式結構,功能單一,是標4u機架式設備tvs2 . 0為式結構,設備分為兩款產品,分別是4埠和8埠,增加了分屏模式和可調中文字幕,設備改為2u機架式設備tvs3 . 0設備起,分為「神鼎」和「視鼎」兩個系列共4款產品, 「神鼎」添加單獨的交換設備后可以全面兼容市場中所有視頻廠家的mcu設備tvs4 . 0設備對外觀進行了改進,所有硬體設備都集成在2u機箱中,操作軟體更加簡潔實用美觀。
  12. Efforts to tower : attached to the output shaft, and embedded radial roller efforts turret. the accuracy of production slips seiki segmentation is the most important factor

    出力轉塔:附在出力軸上,而滾子徑向出力轉塔。其確度是生產潭子精機分割器最重要的因素。
  13. In this thesis, a hardware / software coverification environment icos is proposed. by embedding virtual mornitor and control unit ( vmcu ) into the system prototype, rtos, ipc, and external tools and console implemented using java, icos provide good observability and control. and the application of rtos make icos highly portable

    Icos在保證驗證確性的同時,通過在系統原型中虛擬監視控制單元( vmcu ) ,同時結合實時操作系統、進程間通信和java實現的外部工具與數據庫, icos提供了良好的可觀測性和可控制性並且可以在icos中方便地進行系統地性能評估。
  14. Product disqualification rate caused by machine itself shall be no more than1 ( phenomenon of disqualification are as follows : incorrect winding circle number 、 inter - circle short circuit 、 wire fail to embed into the slot , enameled wire not hitched the commutator ' s hook , or thrum and wire ends loosens after being pulled )

    因機器本身導致的產品不合格率1 (不合格現象為繞線匝數不、匝間短路、線未槽內,漆包線未掛換向器掛鉤上,線頭或線尾拉斷后松脫) 。
  15. The minimum embedding dimension can be determined by the false nearest neighbors method, and embedding dimension of determination component in noise condition can be determined precisely by this method which can avoid the phase space disturbance because of the higher embedding dimensions

    採用偽最鄰近點法確定最小維數,這種方法可以確地確定含噪信號中確定性成分的最小維數,避免維數過高導致相空間的混亂。
  16. In this thesis, we subsequently introduce the basic concepts of wavelet transform, especially the pyramidal algorithm and its fast realization - lifting scheme ; this scheme can decrease the time and space complexity of wavelet transform greatly. wavelet transform, the most perfect mathematical tool of signal processing theory, makes great success in the field of data compression. ezw and spiht are the milestones of wavelet image coding on the noiseless channels, and jpeg2000 adopts the ebcot algorithm

    式零樹小波編碼( embeddedzerotreewavelets )和多級樹集合分裂演算法( setpartitioninginhierarchicaltrees )都是迄今為止最為優秀的理想通道情形下的小波編碼方案:而jpeg2000靜態圖像壓縮國際標採用的是式碼流優化截斷塊式編碼演算法( embeddedblockcodingwithoptimizedtruncationoftheembeddedbit - streams ) 。
  17. The second one explains how to get excellent capability of ssl protocol by discussing of the spent on encryption, the selection of arithmetic and the size of record. finally the embedded ssl protocol is established according to the characteristic of embedded internet web system, the standard for security and demand for performance, and message format during handshake is designed, then the embedded ssl protocol is implemented in embedded internet web system

    然後根據式web系統的特點、安全標及性能要求等,制定了式ssl協議;設計了實現式ssl協議的策略,並以模塊化的方法提出了實現的系統結構,設計了式ssl協議的握手報文格式;並在式web服務器客戶端上分別實現了式ssl協議。
  18. Through chaos optimization method embedded into the genetic algorithm. the algorithm with the combination the advantages of the genetic algorithm and chaos optimization method which need not the optimal problem function ' s differential and promote the ability of the genetic algorithm ' s locally meticulous search can be obtained with the faster convergence and the greater probability for the global solution. a chaotic sequence is inserted into the search procedure of genetic algorithm, which can overcome premature of the search by genetic algorithm and the speed of convergence is faster than standard genetic algorithm

    對遺傳演算法進行了理論分析,並且研究了遺傳演算法的設計與實現;利用混沌優化方法不依賴于梯度信息的性質,將其與遺傳演算法相結合,提出了一種求解連續不可微函數優化問題的混合遺傳演算法;基於對于符號動力系統的研究,利用混沌序列的遍歷性,將混沌序列引遺傳演算法中,提出一種哈爾濱工程大學博土學位論文一混飩序列的遺傳演算法,該演算法有效地克服了標遺傳演算法中的早熟現象,並且具有更快的收斂速度。 」
  19. Familiar with mpeg and experience in embedded audio / video product development is preferred

    熟悉mpeg標,有式音視頻產品開發經驗者優先。
  20. Two data bits are hidden by at most modifying two pixels in an embeddable image block according to the proposed embedding criteria

    根據我們所提出的資料嵌入準則,每一個可藏區塊至多修改兩個像素就能藏兩個位元的資料量。
分享友人