數據碼 的英文怎麼說
中文拼音 [shǔjùmǎ]
數據碼
英文
numeric data code-
This paper discusses the designing and making of the dynamic testing systems of engine electronic control system. base on the construction and operation principle of santana 2000gsi m3. 8. 2 engine electronic control systems, design and manufacture led circuit of dynamic testing and fault imitating electronic control unit. on the inspect board, design and equip with motronic 3. 8. 2 ecu i / o measuring joints, design and set up obd - ii diagnostic communication link, design and install fuel pressure inspecting meter. depend on the obd - ii diagnostic communication link and ecu i / o measuring joints, this dynamic testing system can inspect engine electronic fuel injection system, distributorless ignition system, idle speed control system and evaporative emission control system, and can inspect m3. 8. 2 sensors, ecu and actuators, and can interrogate fault memory and erase fault memory ; and can analyse data stream ; and can carry out fault imitating. besides, this paper analyses sensors and actuators typical fault w aves
2電控單元電路連接器設計製成輸入輸出電子控制檢測端子,並在檢測面板上布置了obd -診斷插座和燃油壓力表。使該動態測試系統能實現對電噴發動機的燃油系統、直接點火系統、怠速控制系統和燃油蒸氣排放控制系統的動態檢測;並通過obd -診斷座、 ecu輸入輸出檢測端子和故障模擬處理單元實現對電噴發動機電控系統各傳感器、電控單元、執行器進行故障碼讀取與清除;動態數據讀取和波形測試和故障模擬等。此外,本論文還分析了傳感器和執行器典型故障波形。Bar coding - structured data files ; german version en 12403 : 1998
條碼.結構數據文件Also designed this part of correspondences procedure process and procedure codes. the thesis takes a simple introduction about the data transmission on base band
論文對數據基帶傳輸編碼做了簡單介紹,闡述了數字基帶信號的碼型選擇的原則。3. added icc system for canbus protocol, with functions : read trouble code, clear trouble code, read datastream, work support, can diagnosis, function test, ecu programming and bcu programming, etc
3新增了can bus協議icc系統,包括讀故障碼清除故障碼讀數據流can診斷工作支持動作測試ecu編碼和bcu編碼等功能。The encryption method is n ' t considered the characteristic of the video signal, regard the image data file as the general binary scale data file to encrypt
一是用純密碼演算法加密技術,將圖像數據文件當作一般的二進制數據文件進行加密。Data encryption standard cipher block chaining packet encryption
數據加密標準密碼分組鏈接分組加密Class use a chaining mode called cipher block chaining, which requires a key and an initialization vector to perform cryptographic transformations on data
類派生的類使用一種稱為密碼塊鏈接( cbc )的鏈接模式,該鏈接模式需要密鑰和初始化向量才能執行數據的加密轉換。The block cipher classes provided in the base class library use a chaining mode called cipher block chaining, which uses a key and an initialization vector to perform cryptographic transformations on data
基類庫中提供的塊密碼類使用稱作密碼塊鏈( cbc )的鏈模式,它使用一個密鑰和一個初始化向量( iv )對數據執行加密轉換。The structure of this paper goes like this, the first chapter introduce the development of e - b / l in practice and in laws. and draw a conclution that the electrification of the b / l is a history tide. in the second chapter, on the basic of reseach the security trap in e - b / l running, 1 conclude six security elements of, e - b / l : the liability of the system, the authenticity of dealers ' identity. the integrity and secrecy of electronic data, and the validity and evidence effectiveness of electronic data. from the third chapter to the eighth, 1 reseach these elements one by one. the third chapter introduce the establishment of the e - b / l security system, and some related laws the fourth chapter introduce the certification authority of e - b / l. in the fifth chapter, 1 introduce the encrypt of electronic information and some countries ' control on use / import / export crytography. the sixth chapter introduce the concept and principle of digital signature, and reseach some related legal issues. the seventh chapter reseach the legal demand of validity, then come to a conclution that to establish a independent electronic information system is necessary. in the eighth chapter, 1 reseach some countries " regulation on the evidence effectiveness of electronic data
第二章在分析電子提單運作中的安全隱患的基礎上,歸納出其六大安全要素,即系統的可靠性、交易者身份的真實性、數據電訊的機密性和完整性、數據電訊的合法有效性以及交易者行為的不可抵賴性。第三章到第八章分別對這六大要素進行分析:第三章介紹了電子提單網路安全體系的建立以及系統安全保護法規,第四章則介紹了電子提單的安全認證機構,第五章介紹了信息加密技術以及各國立法對密碼技術的進出口及使用的控制,第六章介紹了數字簽名的概念及原理,並以bolero為例介紹了數字簽名的技術方式,對有關法律問題作了論述;第七章首先論述了電子提單對有效性的法律需求,然後結合國內法和國際規則的規定論證了數據電訊制度產生的必然性;第八章通過對各國立法對電子證據的法律效力的規定,論述了對電子交易至關重要的數據電訊的不可抵賴性。Digital signature operates the born and a series of sign and codes to constitute the electronics password to carry on the signature through a certain password, replace to the writing signature or an official seals, to confirm the body, the data source and integrities of signs, keeping data from burglarize to take, distort and break, thus to attain the purpose of protecting the data
數字簽名是通過某種密碼運算生成一系列符號及代碼組成電子密碼進行簽名,來代替書寫簽名或印章,確認簽名者的身份、數據來源和完整性,防止數據被竊取、篡改和破壞,從而達到保護數據的目的。Point data appearing on the coding forms can be categorized as follows.
編碼顯示的點數據,可以歸納如下。It has become an irresistible tendency to recon ciliate the relations between exploitation of these caves and their protection, to simplify management and perseverance and to provide the scientific research of the caves with necessary aids. this article applied certain research the envrionmental management information system ( emis ) application in the management of the karst caves for tourism, and made a brief introduction of the exploitation and application processes. we have made corresponding research in the mechanism of based on the system, its pivotal technology, the warning system of the caves " environmental quality, the execution of the caves " environment data base and its code, all of which have produced certain fruits
運用信息技術協調巖溶洞穴旅遊開發與保護之間的關系,簡化洞穴管理和保護工作,為巖溶洞穴科學研究提供必要的輔助已成為大勢所趨本文就環境管理信息系統envrionmentalmanagementinformationsystem ( emis )在旅遊巖溶洞穴管理上的應用方面做出了一定的研究,對開發和應用研究過程做了簡要的闡述,主要從系統建立的機理,系統的支撐技術,洞穴環境質量預報警,洞穴環境數據庫實現及其編碼實現等方面做出了響應的研究並取得了一定的成果。In data security, a method of sending secret messages. each word or phrase is substituted by a corresponding group of symbols derived from a secret code book
在數據安全學中,傳送保密信息的一種方法,一個字或一個短語由密碼本中得出的對應的字元群代替。The contents adds the to code the system ". the colloquy dvd sees the arithmetic figure to add the project. only the that the dvd that css admit to broadcast the to can just break password see data
「內容加密編碼系統」 。正式的dvd視頻數字加密方案。僅css許可的dvd播放器才可以破譯視頻數據的密碼。1, the mjpeg, dv can provide the precision to the compression data code for of with machine visitting, but, mpeg2 the is according to i, p of or i, p, b of, can t attain this point. this at not the line edit can cause the material the dilatoriness that search for the etc.
1 mjpeg dv都能提供精確到幀的隨機訪問,但是, mpeg2的壓縮數據碼流是基於i p幀的或i p b幀的,就不能做到這一點。這在非線性編輯時會引起素材搜索的遲緩等。Spi triggering allows for trigger on user - definable framing and user - definable number of bits per frame, as well as data patterns
Spi允許在用戶義幀,用戶俯定義的每幀比特數以及數據碼型上觸發Trigger on data patterns within a spi frame
在spi幀內的特定數據碼型上觸發在iDigital phase lock loop is used in this section to synchronize to an incoming serial data stream
數據接收解碼模塊中使用了數字鎖相環技術從輸入數據碼流中提取出同步時鐘信號。2. with a view to the generation of the high speed data, this dissertation introduces the realization of the voltage level convertor and ps convertor which completes the conversion of parallel data to serial data of multi channel
從實現高速數據碼產生出發,著重介紹了信號電平的轉換及多通道的高速並轉串的處理。Mpeg - 4 can only adopt software compress / decompress when used in nles. when frame accuracy editing begins, the file ' s random seeking will be delayed. this article analyses why this happens, peculiar filter reulation based on directshow / des platform, which supplied by microsoft corpation, and highly efficient compressing are the main reasons
本文分析其產生的原因在於windows操作系統提供的directshow des開發平臺所特有的過濾器機制以及mpeg - 4壓縮數據碼流是基於i 、 b 、 p幀,其高效的壓縮演算法決定了解碼的復雜度等多方面。分享友人