數據碼 的英文怎麼說

中文拼音 [shǔ]
數據碼 英文
numeric data code
  • : 數副詞(屢次) frequently; repeatedly
  • : 據Ⅰ動詞1 (占據) occupy; seize 2 (憑借; 依靠) rely on; depend on Ⅱ介詞(按照; 依據) according...
  • : Ⅰ名詞(表示數目的符號或用具) a sign or object indicating number; code Ⅱ量詞1 (指一件事或一類的...
  • 數據 : data; record; information
  1. This paper discusses the designing and making of the dynamic testing systems of engine electronic control system. base on the construction and operation principle of santana 2000gsi m3. 8. 2 engine electronic control systems, design and manufacture led circuit of dynamic testing and fault imitating electronic control unit. on the inspect board, design and equip with motronic 3. 8. 2 ecu i / o measuring joints, design and set up obd - ii diagnostic communication link, design and install fuel pressure inspecting meter. depend on the obd - ii diagnostic communication link and ecu i / o measuring joints, this dynamic testing system can inspect engine electronic fuel injection system, distributorless ignition system, idle speed control system and evaporative emission control system, and can inspect m3. 8. 2 sensors, ecu and actuators, and can interrogate fault memory and erase fault memory ; and can analyse data stream ; and can carry out fault imitating. besides, this paper analyses sensors and actuators typical fault w aves

    2電控單元電路連接器設計製成輸入輸出電子控制檢測端子,並在檢測面板上布置了obd -診斷插座和燃油壓力表。使該動態測試系統能實現對電噴發動機的燃油系統、直接點火系統、怠速控制系統和燃油蒸氣排放控制系統的動態檢測;並通過obd -診斷座、 ecu輸入輸出檢測端子和故障模擬處理單元實現對電噴發動機電控系統各傳感器、電控單元、執行器進行故障讀取與清除;動態讀取和波形測試和故障模擬等。此外,本論文還分析了傳感器和執行器典型故障波形。
  2. Bar coding - structured data files ; german version en 12403 : 1998

    .結構文件
  3. Also designed this part of correspondences procedure process and procedure codes. the thesis takes a simple introduction about the data transmission on base band

    論文對基帶傳輸編做了簡單介紹,闡述了字基帶信號的型選擇的原則。
  4. 3. added icc system for canbus protocol, with functions : read trouble code, clear trouble code, read datastream, work support, can diagnosis, function test, ecu programming and bcu programming, etc

    3新增了can bus協議icc系統,包括讀故障清除故障流can診斷工作支持動作測試ecu編和bcu編等功能。
  5. The encryption method is n ' t considered the characteristic of the video signal, regard the image data file as the general binary scale data file to encrypt

    一是用純密演算法加密技術,將圖像文件當作一般的二進制文件進行加密。
  6. Data encryption standard cipher block chaining packet encryption

    加密標準密分組鏈接分組加密
  7. Class use a chaining mode called cipher block chaining, which requires a key and an initialization vector to perform cryptographic transformations on data

    類派生的類使用一種稱為密塊鏈接( cbc )的鏈接模式,該鏈接模式需要密鑰和初始化向量才能執行的加密轉換。
  8. The block cipher classes provided in the base class library use a chaining mode called cipher block chaining, which uses a key and an initialization vector to perform cryptographic transformations on data

    基類庫中提供的塊密類使用稱作密塊鏈( cbc )的鏈模式,它使用一個密鑰和一個初始化向量( iv )對執行加密轉換。
  9. The structure of this paper goes like this, the first chapter introduce the development of e - b / l in practice and in laws. and draw a conclution that the electrification of the b / l is a history tide. in the second chapter, on the basic of reseach the security trap in e - b / l running, 1 conclude six security elements of, e - b / l : the liability of the system, the authenticity of dealers ' identity. the integrity and secrecy of electronic data, and the validity and evidence effectiveness of electronic data. from the third chapter to the eighth, 1 reseach these elements one by one. the third chapter introduce the establishment of the e - b / l security system, and some related laws the fourth chapter introduce the certification authority of e - b / l. in the fifth chapter, 1 introduce the encrypt of electronic information and some countries ' control on use / import / export crytography. the sixth chapter introduce the concept and principle of digital signature, and reseach some related legal issues. the seventh chapter reseach the legal demand of validity, then come to a conclution that to establish a independent electronic information system is necessary. in the eighth chapter, 1 reseach some countries " regulation on the evidence effectiveness of electronic data

    第二章在分析電子提單運作中的安全隱患的基礎上,歸納出其六大安全要素,即系統的可靠性、交易者身份的真實性、電訊的機密性和完整性、電訊的合法有效性以及交易者行為的不可抵賴性。第三章到第八章分別對這六大要素進行分析:第三章介紹了電子提單網路安全體系的建立以及系統安全保護法規,第四章則介紹了電子提單的安全認證機構,第五章介紹了信息加密技術以及各國立法對密技術的進出口及使用的控制,第六章介紹了字簽名的概念及原理,並以bolero為例介紹了字簽名的技術方式,對有關法律問題作了論述;第七章首先論述了電子提單對有效性的法律需求,然後結合國內法和國際規則的規定論證了電訊制度產生的必然性;第八章通過對各國立法對電子證的法律效力的規定,論述了對電子交易至關重要的電訊的不可抵賴性。
  10. Digital signature operates the born and a series of sign and codes to constitute the electronics password to carry on the signature through a certain password, replace to the writing signature or an official seals, to confirm the body, the data source and integrities of signs, keeping data from burglarize to take, distort and break, thus to attain the purpose of protecting the data

    字簽名是通過某種密運算生成一系列符號及代組成電子密進行簽名,來代替書寫簽名或印章,確認簽名者的身份、來源和完整性,防止被竊取、篡改和破壞,從而達到保護的目的。
  11. Point data appearing on the coding forms can be categorized as follows.

    顯示的點,可以歸納如下。
  12. It has become an irresistible tendency to recon ciliate the relations between exploitation of these caves and their protection, to simplify management and perseverance and to provide the scientific research of the caves with necessary aids. this article applied certain research the envrionmental management information system ( emis ) application in the management of the karst caves for tourism, and made a brief introduction of the exploitation and application processes. we have made corresponding research in the mechanism of based on the system, its pivotal technology, the warning system of the caves " environmental quality, the execution of the caves " environment data base and its code, all of which have produced certain fruits

    運用信息技術協調巖溶洞穴旅遊開發與保護之間的關系,簡化洞穴管理和保護工作,為巖溶洞穴科學研究提供必要的輔助已成為大勢所趨本文就環境管理信息系統envrionmentalmanagementinformationsystem ( emis )在旅遊巖溶洞穴管理上的應用方面做出了一定的研究,對開發和應用研究過程做了簡要的闡述,主要從系統建立的機理,系統的支撐技術,洞穴環境質量預報警,洞穴環境庫實現及其編實現等方面做出了響應的研究並取得了一定的成果。
  13. In data security, a method of sending secret messages. each word or phrase is substituted by a corresponding group of symbols derived from a secret code book

    安全學中,傳送保密信息的一種方法,一個字或一個短語由密本中得出的對應的字元群代替。
  14. The contents adds the to code the system ". the colloquy dvd sees the arithmetic figure to add the project. only the that the dvd that css admit to broadcast the to can just break password see data

    「內容加密編系統」 。正式的dvd視頻字加密方案。僅css許可的dvd播放器才可以破譯視頻的密
  15. 1, the mjpeg, dv can provide the precision to the compression data code for of with machine visitting, but, mpeg2 the is according to i, p of or i, p, b of, can t attain this point. this at not the line edit can cause the material the dilatoriness that search for the etc.

    1 mjpeg dv都能提供精確到幀的隨機訪問,但是, mpeg2的壓縮數據碼流是基於i p幀的或i p b幀的,就不能做到這一點。這在非線性編輯時會引起素材搜索的遲緩等。
  16. Spi triggering allows for trigger on user - definable framing and user - definable number of bits per frame, as well as data patterns

    Spi允許在用戶義幀,用戶俯定義的每幀比特以及數據碼型上觸發
  17. Trigger on data patterns within a spi frame

    在spi幀內的特定數據碼型上觸發在i
  18. Digital phase lock loop is used in this section to synchronize to an incoming serial data stream

    接收解模塊中使用了字鎖相環技術從輸入數據碼流中提取出同步時鐘信號。
  19. 2. with a view to the generation of the high speed data, this dissertation introduces the realization of the voltage level convertor and ps convertor which completes the conversion of parallel data to serial data of multi channel

    從實現高速數據碼產生出發,著重介紹了信號電平的轉換及多通道的高速並轉串的處理。
  20. Mpeg - 4 can only adopt software compress / decompress when used in nles. when frame accuracy editing begins, the file ' s random seeking will be delayed. this article analyses why this happens, peculiar filter reulation based on directshow / des platform, which supplied by microsoft corpation, and highly efficient compressing are the main reasons

    本文分析其產生的原因在於windows操作系統提供的directshow des開發平臺所特有的過濾器機制以及mpeg - 4壓縮數據碼流是基於i 、 b 、 p幀,其高效的壓縮演算法決定了解的復雜度等多方面。
分享友人