數字有效行 的英文怎麼說

中文拼音 [shǔyǒuxiàoháng]
數字有效行 英文
digital active line
  • : 數副詞(屢次) frequently; repeatedly
  • : Ⅰ名詞1 (文字) character; word 2 (字音) pronunciation 3 (字體) form of a written or printed ...
  • : 有副詞[書面語] (表示整數之外再加零數): 30 有 5 thirty-five; 10 有 5年 fifteen years
  • : Ⅰ名詞(效果; 功用) effect; efficiency; result Ⅱ動詞1 (仿效) imitate; follow the example of 2 ...
  • : 行Ⅰ名詞1 (行列) line; row 2 (排行) seniority among brothers and sisters:你行幾? 我行三。where...
  • 數字 : 1. (表示數目的文字; 表示數目的符號) figure; digit; numeral; character; numeric character 2. (數量) quantity; amount
  • 有效 : effective; valid; efficacious
  1. The procedure functions in the compare between partial image of dynamic collection and corresponding image of the airscape. in chapter 5, basing on the analysis of correlative theory of digital image, we introduce the improved fasted - down algorithm and simulative anneal algorithm, which applies to nn calculation, an d bring forward the unique and effective means, correlative original value evaluation. basing on the combination of correlative arithmetic, a stable, high - speed and exact correlative arithmetic is formed, which makes it possible to apply computer vision detection of single - needle quilting in industrial production

    本文展開研究並取得一定成:構建了基於pci總線的微機實時圖像採集系統;在採集的布料總圖(鳥瞰圖)的基礎上,通過圖像的濾波、圖像增強、邊緣檢測等處理,提取布料圖像的邊緣,對輪廓的矢量化的象素點進搜索,得到相應的圖案矢量圖,從而確定絎縫的加工軌跡,生成加工指令;在進給加工過程中,主計算機對動態局部圖像與總圖(鳥瞰圖)的對應部分進圖像相關的匹配計算,應用圖像理論,結合神經網路計算的改進最速下降法和模擬退火演算法,提出獨特而的相關迭代初始值賦值方法,形成穩定、高速和準確的相關運算,實現單針絎縫視覺測量和自動控制。
  2. The structure of this paper goes like this, the first chapter introduce the development of e - b / l in practice and in laws. and draw a conclution that the electrification of the b / l is a history tide. in the second chapter, on the basic of reseach the security trap in e - b / l running, 1 conclude six security elements of, e - b / l : the liability of the system, the authenticity of dealers ' identity. the integrity and secrecy of electronic data, and the validity and evidence effectiveness of electronic data. from the third chapter to the eighth, 1 reseach these elements one by one. the third chapter introduce the establishment of the e - b / l security system, and some related laws the fourth chapter introduce the certification authority of e - b / l. in the fifth chapter, 1 introduce the encrypt of electronic information and some countries ' control on use / import / export crytography. the sixth chapter introduce the concept and principle of digital signature, and reseach some related legal issues. the seventh chapter reseach the legal demand of validity, then come to a conclution that to establish a independent electronic information system is necessary. in the eighth chapter, 1 reseach some countries " regulation on the evidence effectiveness of electronic data

    第二章在分析電子提單運作中的安全隱患的基礎上,歸納出其六大安全要素,即系統的可靠性、交易者身份的真實性、據電訊的機密性和完整性、據電訊的合法性以及交易者為的不可抵賴性。第三章到第八章分別對這六大要素進分析:第三章介紹了電子提單網路安全體系的建立以及系統安全保護法規,第四章則介紹了電子提單的安全認證機構,第五章介紹了信息加密技術以及各國立法對密碼技術的進出口及使用的控制,第六章介紹了簽名的概念及原理,並以bolero為例介紹了簽名的技術方式,對關法律問題作了論述;第七章首先論述了電子提單對性的法律需求,然後結合國內法和國際規則的規定論證了據電訊制度產生的必然性;第八章通過對各國立法對電子證據的法律力的規定,論述了對電子交易至關重要的據電訊的不可抵賴性。
  3. As for script number which restrict calligraph, the model also does well

    在對限制書寫的手寫體而言,該模型同樣
  4. The proposed method is not only suitable for the involing invarence printing numerals recognition, but also for the other areas, such as script numerals which restrict calligraph, the method also does well

    實驗結果證明該系統不僅對具大旋轉角度的印刷體的識別果良好,對于那些限制書寫的手寫體而言,該系統同樣
  5. Jhs series power ampilifier is a new generation equipment of teaching power amplifier, which can restrains howl and can increase plus by 6 - 10db. the distance of picking up sound can be increased to 3 - 6 meters. if only you install three or four pcs of interface mike, the scope of picking up sound can cover with all over the platform without any equipment and you can prelect

    Jhs教學型移頻擴聲器是新一代教學擴聲設備,它能夠的抑制擴聲嘯叫,提高傳聲增益6 - 10db ,話筒的拾音距離提高到3 - 6米,只需在教室安裝3 - 4支界面話筒,拾音范圍就能覆蓋整個講臺,無需攜帶任何設備,即可進講課,使演講者徹底擺脫話筒的束縛,擴大了演講者的活動范圍
  6. By means of images processing of satellite, geometrical correction of images from uav rs system was accomplished by polynomial. in the processing of images of wuming in guangxi province, a set of scan large - scale relief maps were used

    借鑒衛星影像的處理方法,將目標區現的大比例尺地形圖化后,利用多項式法完成了廣西武鳴城區無人機遙感飛試驗影像的幾何糾正,並取得了較好的果。
  7. Improve the management level of coscon, meet the increasing demands in the capital market ; enhance the professional business ability, strengthen and develop the global container shipping network ; implement active sales policy ; solidify, penetrate and extend effective market ; equally develop fleet management and managing fleet, route extension and reduction ; build effective customer service system, win the market by “ high quality ” service ; bring the advantage of alliance cooperation into full play, improve the profit - making ability ; strengthen the use of information system, boost “ digital ” development ; implement the strategy of “ talent for strong business ”, train responsible company and responsible staff ; establish a complete financial and accounting system of capital operation to improve the level of financial management ; optimize the domestic and overseas management pattern, form a resultant force of the global container shipping network ; expand the scale of shipping capacity, enhance the company ' s competitive edge ; finish the transformation from sheer production operation to the double operations of capital and production, maintain the sound and stable development of business

    提高公司管治水平,滿足不斷提升的資本市場要求;增強專業化經營能力,鞏固發展全球集裝箱網路化運輸;實積極營銷政策,鞏固、滲透和拓展市場;實現船隊經營與經營船隊並舉及航線擴張與退出並舉;構築的客戶服務體系,以「高品質」服務贏得市場;發揮聯盟合作優勢,提高盈利能力;堅持強化運用信息系統,催生「化」 ;實施「人才強業」戰略,打造責任公司、責任員工;建立完善資本經營財會體系,提高財務管理水平;完善海內外管理模式,形成全球集裝箱運輸營銷網路的合力;擴大公司運力規模、增強公司競爭實力;完成由單純的生產經營向資本經營和生產經營並舉的轉變,實現公司業務的健康、穩健發展。
  8. In recent years, nonlinear methods have attracted more and more attention and there have been some successful cases, such as median filter, mathematical morphology, etc. as a preferred way to inverstigate nonlinear numerical problems, the continued fractions method can effectively express the gradually changing data or abrupt data, so it is meaningful to study image processing by means of the continued fractions theory and algorithms

    近年來在圖像處理領域,利用非線性方法進圖像處理取得較好果的中值濾波、學形態學等,非線性方法已引起越來越多研究者的重視。作為研究非線性值問題的首選方法?連分式方法,不僅能反映據的漸變性,也能反映據的突變性。鑒于這些原因,本文將連分式插值和逼近引入到圖像處理領域,開展了圖像插值、圖像重建等方面的研究。
  9. The study on the auto - detecting system of analog measuring instruments presents several optimum algorithms to realize the quick recognition of the dial pointer and calibration lines of detected dial. by using these efficiency algorithms, both the accuracy and the real - time quality have been improved

    採用圖像處理技術進指針式儀表的精度檢定可以大大提高檢定率,提高檢定精度,減少人為因素干擾,使檢定過程更具客觀性,檢定結果更準確,因此具廣泛的市場前景。
  10. Secondly the paper develops two new techniques that enable the software on a computer to control the electromagnetic radiation of crt monitor transmits at very low cost : digital filter and dithering technique, validates the two methods to reduce the information leakage by a experiment. aiming at the shortage of software process, this paper gives a new method which combines the software with hardware

    在此基礎上提出了兩種全新的防視頻信息泄漏技術(濾波與偽發射技術) ,並且進了實際測試和分析,驗證了它的性、可性,然後針對它們的不足之處提出了一種軟體和硬體相結合的新方法。
  11. Firstly, we generalize and analyze the advantages and present research of elliptic curve cryptography ; secondly, we study the basic theory of the ecc ; thirdly, we illustrate the safety of the ecc and discuss the elliptic curve key agreement scheme, elliptic curve encryption scheme and elliptic curve digital signature algorithm ; fourthly, we study fast algorithms of the multiplication and inversion multiplication of the element of in the underlying finite field f2m whose characteristic is two represented by the two basis of optimal normal basis and polynomial basis. we make improvements to the fast algorithm of the polynomial basis multiplication by hankerson and base on the experiments, we describe the properties and compare the advantages of the multiplication and inversion multiplication of the elements in f2m field under optimal normal bases and polynomial basis. results concluding from the study car be used as references in the realization of the elliptic curve cryptosystem ; fifthly, we overview the current fast algorithm of point multiplication, improve the fix base point comb algorithm, advance the speed of the whole system and remark the advantages and disadvantages of the popular algorithms based upon the experimental datas ; sixthly we realize the algorithm library of elliptic curve cryptography based on the f2m. only change slightly in our algorithm library can we realize the ecdh, eces, ecdsa based onf2m of anysize ; seventhly, we realize the ecc on two secure elliptic curves, including ecdh, eces, ecdsa

    本文首先介紹並分析了橢圓曲線密碼體制的優點及研究現狀;其次研究了橢圓曲線密碼體制的基本理論;第三,分析了橢圓曲線密碼的安全性並介紹了密鑰共享,加密,簽名等橢圓曲線密碼體制;第四,深入研究了特徵為2的限域f _ 2m中的元素在多項式基和最優正規基表示下的乘法運算和乘法逆運算的快速演算法,並對hankerson等人提出的多項式基下的乘法運算的快速演算法作了改進,而且在實驗的基礎上不僅分析研究了f _ 2m域中元素在多項式基和最優正規基表示下的乘法和乘法逆運算的性能,還對這兩種基表示下的f _ 2m域中元素運算率的優劣作了比較和研究,所得的結論可供在實現橢圓曲線密碼體制時參考;第五,研究了目前流的計算橢圓曲線標量乘法的快速演算法,同時改進了固定基點梳形法,提高了整個系統的速度,並在實驗的基礎上分析研究了流演算法的優劣;第六,實現了基於f _ 2m的橢圓曲線密碼體制的演算法庫,在我們的演算法庫中只需稍微改變便能實現基於任意尺寸的f _ 2m上的ecdh , eces , ecdsa等橢圓曲線密碼體制;第七,實現了兩條安全橢圓曲線上的橢圓曲線密碼體制,包括ecdh , eces , ecdsa 。
  12. The modern robust design detailed the robust design based on engineering model, which explained the specific design process, the whole process from founding system model to solving it. it obtained the optimum combination of parameters and the maximum manufacturing errors, using fuzzy comprehensive judgment to dispose the problem of many targets, handling the design results by fuzzy probability to increase the reliability of the design. in the end, there supplied an example, the optimization design of a long distance hydraulic cylinder to interpret the specific design process, achieving its optimum combination and the maximum manufacturing errors, and verifying the practicability of the design results by the method of fuzzy probability analysis

    在第二部分的基於試驗設計的穩健設計中,先對傳統的穩健設計,即三次設計(功能設計、參設計及容差設計)的設計過程及原理進了分析,指出了傳統穩健設計法中的不足,即沒充分利用計算機的強大優勢;對于多因素多指標的設計,試驗周期長、計算復雜等造成設計周期長、成本高、率低等缺點提出了改進的措施,即將虛擬現實技術應用於傳統的穩健設計中,通過模糊學的方法(模糊綜合評判)來處理設計中的多指標問題,使設計達到事半功倍的果。
  13. Based on the classification of images, this paper gives out four digital image steganography techniques which have good conceal effect, including low - three - bits hiding strategy, odd - even of hypo - low bit hiding strategy, deviation of adjacent - field hiding strategy and self - adaptive deviation of adjacent - field hiding strategy. on digital watermarking aspect, this paper gives two blind watermarking strategies which have good conceal effect and high robustness, they are single - watermarking strategy based on minimal - value exchanging and multi - watermarking strategy which hides the same watermark copy on the different parts of an image

    在對圖像進了分類的基礎上,本文給出了四個具較好掩密果的圖像隱寫策略,包括低三位隱藏策略、次低位奇偶策略、鄰域方差策略和自適應鄰域方差策略;在水印方面,提出兩個掩密果好且魯棒性較高的圖像盲水印策略,分別為基於最小值交換法的單一水印策略和嵌入同一水印多個副本的多水印策略。
  14. The advent of the internet and the wide availability ofcomputers, scanners and printers make digital data acquisition, exchange and transmission a simple task. however, making digital data accessible to others through networks also creates opportunities for malicious parties to make salable copies of copyrighted content without permission of the content owner. digital watermarking is likely to be a potential solution to this problem. digital watermarking has been proposed as a solution to the problem of copyright protection of multimedia documents in networked environments. it makes possible to embed a watermark ( such as identification data, serials number, text or image etc. ) to multimedia documents allowing copyright protection, secret communication, document authentication and so on. in this paper, we present a new digital image watermarking method based on svd ( singular value decomposition ), and then give some theoretical analysis about the algorithm. extensive experimental results show that this method is much more robust than other methods presented before

    隨著計算機和網路技術的飛速發展,圖像、音頻和視頻產品愈來愈需要一種的版權保護方法,另外通信系統在網路環境下的信息安全問題也日益顯露出來.圖像水印技術為上述問題提供了一個潛在的解決方案.所謂水印技術就是將、序列號、文、圖像標志等版權信息嵌入到多媒體據中,以起到版權保護、秘密通信、據文件的真偽鑒別和產品標志等作用.本文提出了一種新的基於奇異值分解的水印演算法並且對該方法的理論基礎給出分析.實驗結果表明這種方法要比目前提出的流演算法魯棒
  15. To modify the fp control word, then the run - time startup code will set the x87 fpu control word precision - control field to 53 - bits, so all float and double operations within an expression will occur with 53 - bit significand and 15 - bit exponent

    修改fp控制,則運庫啟動代碼會將x87 fpu控制精度控制欄位設置為53位,這樣,表達式內的所浮點運算和雙精度運算都以53位和15位指
  16. Finally, the situation of system test is introduced. at the same time, the paper affirms the significance of system research, which completely meets with the requirements of digitized, network - depended, information shared facture of tv program. also, some limitations of system function are indicated

    最後,論文對系統的測試情況進了介紹,肯定了本應用系統的研製成功對電視臺實現電視節目製作化、傳輸網路化、節目信息共享化、播出自動化和管理科學化,從而提高電視臺節目播出質量和運作率的重要意義,並指出了系統待完善的地方。
  17. This product can be widely used in e - commerce and e - government such as online bank, online securities and online stores in order to validate identity of users and servers, validity of ca and etc

    該產品可以被廣泛地應用於網上銀、網上證券和網上商戶等電子商務和電子政務活動中,用於驗證用戶身份、服務器身份、證書性等方面。
  18. Contains 7 significant digits and is rounded using rounding to nearest

    包含7位,並使用「舍入到最接近的」規則進舍入。
  19. When casting from a number, the value must be a valid number less than infinity

    當從一個強制轉換時,值必須是一個小於無限大的
  20. While the digital effects in a man called hero were complicated and intricate, chung says the artists experience with blue screen shooting and compositing while doing commercial work enabled them to step up to this big - screen challenge

    鐘志說雖然《中華英雄》裏面的很復雜,卻使許多平時處於幕后合成商業廣告的工作人員了挑戰電影的機會。
分享友人