標稱字數 的英文怎麼說

中文拼音 [biāochènshǔ]
標稱字數 英文
nominal words
  • : Ⅰ名詞1 [書面語] (樹梢) treetop; the tip of a tree2 (枝節或表面) symptom; outside appearance; ...
  • : 稱動詞(適合; 相當) fit; match; suit
  • : Ⅰ名詞1 (文字) character; word 2 (字音) pronunciation 3 (字體) form of a written or printed ...
  • : 數副詞(屢次) frequently; repeatedly
  • 字數 : word number
  1. Speaking from a user s perspective, mr terence chan, the university bursar, said that about 400 companies have already registered on the new e - tendering system since its launch in may. one company has secured over hk $ 200, 000 worth of business from cuhk by tendering through e - jing

    香港中文大學財務長陳鎮榮先生,由今年五月至今,已有接近四百間公司上網登記,成為電子投系統的用戶,其中更有公司透過該系統獲取達六位的訂單。
  2. The international phonetic alphabet is a system used for describing the sounds of spoken language. the letters chosen for the ipa are generally drawn from the latin and greek alphabets, or are modifications of latin or greek letters. there are also a few letters derived from latin punctuation, it was originally developed by french and british language teachers led by paul passy under the auspices of the international phonetic association, established in paris in 1886 both the organisation and the phonetic script are best known as ipa

    國際音international phonetic alphabet ,簡ipa是一組語言學者和語言工作者用來個別示各種人類所能發出來的聲音指單音或音素的語音符號系統,作為統一示所有語言中語音的準符號,其中大多的符號都取自或衍生自羅馬母的小寫印刷體,其他的有些來自希臘母,有些則明顯地與其他任何的準毫無關系。
  3. Its objective is to fill a 9 9 grid so that each column, each row and each of the nine 3 3 boxes ( also called blocks or regions ) contains the digits from 1 to 9

    它的目是在一個九宮格中填上,使九宮格的每一行和每一列,以及九宮格中的九個3 3的小方框(又「塊」或「區」 )里都包含1到9 。
  4. If the name contains delimited identifiers, the number should not be included as part of the identifier ; use the appropriate delimiter around only

    如果名中包含分隔識符,則不應包含在識符中;只應在
  5. The categories of preprocessing token are : header names, identifiers, preprocessing numbers, character literals, string literals, preprocessing - op - or - punc, and single non - white - space characters that do not lexically match the other preprocessing token categories

    預處理記有以下幾類:頭名識符,預處理元文量,元串文量,預處理運算符或點,以及不符合以上詞法類型的單個非空白元。
  6. Scalars the scalar variables hold only one value, which may be a numeric literal, or a string literal. scalar variable names always begin with a $ sign

    量變量僅保存一個值,它可以是一個面值,或一個元串面值。量變量名始終用一個$元開始。
  7. This paper presents an study on the interior orientation techniques in computer vision, and proposes a collimation mark recognition algorithm which applies to practicality images on barycenter of symmetrical figure

    介紹了對計算機視覺中影像的內定向技術的進一步研究,對現有框識別方法進行了改進,提出了基於對圖形重心的框自動識別方法
  8. Begin the name of a unique style with a number sign, as shown in the following code example

    唯一樣式的名記( # )開頭,如下面的代碼示例所示。
  9. The thesis is organized as below : in chapter 1, the background knowledge is given which is needed for study on bluetooth security mechanism and implementation. first bluetooth technology is overviewed including its develop history, radio interface, physical links, interference, network topology, core protocol, etc. next communication security is introduced according to the model of network security architecture from osi. finally some primary cryptographic techniques are discussed based on symmetric encryption, asymmetric encryption and advanced encryption standard published years ago

    本文研究了利用藍牙技術提供各種安全服務和實現的課題,並通過一些具體實現的實例進行闡述,具體安排如下:在第一部分,本文首先回顧了藍牙技術及發展情況,主要包括藍牙發展簡史、藍牙準的射頻介面、物理鏈路、干擾情況、網路拓撲結構以及核心協議等;然後介紹了通信安全的基礎知識,討論了osi系統中的四層網路安全結構模型;最後給出了各種加密技術的基本理論,包括對加密體制如des和blowfish 、非對加密體制( rsa公鑰演算法、簽名和身份證明等)以及新一代的高級加密準( advancedencryptionstandard , aes )等。
  10. The following table identifies the predefined numeric format names

    下表識預定義格式的名
  11. As the 3rd generation computer - assisted digital measurement and testing instrumentation, virtual instrument is the outcome accomplished with the development of electronics technology, measurement and testing technology, and computer technology, moving toward bus and driver standardization, programming platform graphics, hardware and software modularization, and hardware plug and play

    作為第三代基於計算機化測量測試儀器技術的虛擬儀器( virtualinstrument簡vi )是電子技術、測試技術和計算機技術綜合集成的產物。它正沿著總線與驅動程序準化、硬軟體模塊化、編程平臺圖形化和硬體模塊的即插即用方向前進。
  12. The name provides better support than numeric labels for scripting policy changes

    對于腳本撰寫策略更改,名可以比簽提供更好的支持。
  13. Lines of code preceded by an identifying string or integer are said to be labeled

    元串或整后的代碼行為「已記」 。
  14. Called whole of vehicle marking ( wovm ), the system assigns a unique 17 digit vehicle identification number to each vehicle upon importation into new zealand

    為全車輛識的系統( wovm ) ,含有17位的獨特車輛辨識號碼,被噴在每輛進口到紐西蘭的車輛上。
  15. Essential requirements for terminal equipment intended for connection to unstructured digital leased circuits of the public telecommunications network using a ccitt recommendation g. 703 interface at a rate of 2048 kbit s with a 75 unbalanced presentation

    使用ccitt g . 703推薦準規定的介面在75歐姆不對表示的2048 k比特每秒掃描率與公共通信網非結構出租電路終端設備相連接的基本要求
  16. Essential requirements for terminal equipment intended for connection to unstructured digital leased circuits of the public telecommunications network using a ccitt recommendation g. 703 interface at a rate of 34368 kbit s with a 75 unbalanced presentation

    使用ccitt g . 703推薦準規定的介面在75歐姆不對表示的34368 k比特秒掃描率與公共通信網非結構出租電路終端設備相連接的基本要求
  17. A name token can contain letters, numbers, and some punctuation symbols such as periods, dashes, underscores and colons

    記可以包含母、和一些點符號,例如句點、破折號、下劃線和冒號。
  18. This thesis begins with hfc network theory and docsis, analyses modulation / demodulation process of data communication in hfc. then, several theories are analysed including qam ( quadrature amplitude modulation ), nyquist root square filter, fec ( forward error correction ), map ( bandwidth allocation map ). and digital signal transmission involved the other important international standard ? itu - t j. 83 annex a / b, is discussed

    本文從hfc網路理論和docsis協議入手,分析了hfc據通信的調制解調過程,對qam調制、奈奎斯特均方根濾波器、前向糾錯( forwarderrorcorrection ,簡fec ) 、 map通信等進行了闡述;還從中探討了電纜據機需要用到的另一個國際準ituj . 83annexa / b所設計的mpeg信號的傳輸。
  19. A secure authentication and key exchange protocol is designed in this thesis, which could prevent man - in - the - middle attack, increasing the reliability of authentication and security of key exchange. the data encryption module is implemented by openssl including symmetry key algorithm, public key algorithm, hash function. the system ’ s function is tested finally, the data transmission rate using different encryption algorithm

    研究並設計了一套基於證書和簽名技術的身份認證協議和密鑰交換協議,能夠有效地防止中間人的竊取和篡改,提高了身份認證的可靠性和密鑰交換的安全性;利用openssl準庫函實現系統的據加密模塊,實現對加密、非對加密以及信息摘要的常用演算法。
  20. A strong name consists of the assembly s identity simple text name, version number, and culture information, plus a public key token and a digital signature

    強名是由程序集的識(簡單文本名、版本號和區域性信息)加上公鑰記和簽名組成的。
分享友人