模具碼 的英文怎麼說

中文拼音 []
模具碼 英文
mould code
  • : 模名詞1. (模子) mould; pattern; matrix 2. (姓氏) a surname
  • : Ⅰ名詞(表示數目的符號或用具) a sign or object indicating number; code Ⅱ量詞1 (指一件事或一類的...
  • 模具 : mould; matrix; pattern die; die模具鋼 die steel
  1. He has a prototype combination lock

    他有暗鎖的原型
  2. The findings of this thesis reflect that the object - oriented method is an effective means used in developing finite element analysis software, compared with traditional method it possesses the advantages of being more structured, easy to be compiled, maintained and extended and the program code can be much more reused. the oop method not only improve the functions of finite element software but also realize the congruity between the computing model and physical model in the real world, and promote the integrity technique of cad / cae

    本文結果表明,面向對象方法是一種強有力的工,採用面向對象方法開發大型有限元分析軟體是一種非常有效的方法,與傳統的有限元程序相比,面向對象有限元程序更加結構化、更易於編寫、更易於維護和擴充,程序代的可重用成分更大,它不僅能提高有限元軟體的功能,而且能實現數據型與計算機型以及現實世界物理型之間的一致性,方便太原理工大學碩士學位論文cad / cae系統的集成。
  3. For the anticounterfeiting of printings ( such as certificate ), the existent many ways ( such as rainbow holograms ) are not available as the need for special use : anti - distortion and anti - copy. basing in the double - random - phase transform, this article puts forward a new way that two - dimensional bar code is used as anticounterfeiting label with anti - printing ? scanning and anti - damage properties. the major job are : ( 1 ). basing in the ascii codes, numerals and alphabets are encoded and subsequently transformed into two - value bar code matrix figure. later, using amplitude - based double - random - phase transform, the enciphered gray scale figure is formed. by computer simulation ( 4f system ) and printing as well as scanning ( 20 times ), we get the result that the gray scale figure with little miscoding rate ( 0. 0026 ) by “ matrix expanding way ”

    本文主要開展了以下三項研究工作: ( 1 ) .用自定義編方案,將數字和字母( ascii)轉換成二值條圖;對該圖形進行振幅型雙隨機相位加密變換,得到原信息的加密灰度圖;通過4f光學系統計算機擬和列印-掃描實驗,證明本文提出的「矩陣擴展法」灰度圖有較小的誤率,對於20次列印-掃描實驗,誤率不大於0 . 0026 。
  4. Second, the architectures of ontology integration and all kinds of mapping methods are introduced. third, the open source ontology management project, kaon, was analyzed, and on the basis of this system, we have developed our ontology mapping module

    然後,分析一個開放源的本體管理系統? ? kaon ,並對其體系結構、存儲機制和體實現進行了分析,並在此基礎上開發了我們自己的本體映射塊。
  5. The results show that the cps signals have the thumbtack - typed ambiguity, no distance and / or speed ambiguity and excellent speed / distance measuring performances. 3. we analyze anti - interference performances of the uniform ppm - ps radar signals and the random ppm - ps radar signals, and make the comparison between them

    研究結果表明隨機脈位調制與隨機二相調相復合脈沖串信號有「圖釘型」的糊函數,不存在距離速度糊,有良好的測距測速性能。
  6. Topking is fortunately to be an urger and disseminator in this tendency. the series products available now in topking are : led pixel modules, led digital series led neon tube, screen, led project lamps spot light, underground light etc., led decorative light softlightand christmas light and led gift light

    泰景已開發出各款led應用的系列產品: led像素組, led數產品系列數管,幕墻燈, led工程燈投光燈,地埋燈,水池燈等, led裝飾燈彩虹管和聖誕燈,以及led禮品燈。
  7. The improved algorithm is combined with normalized least - mean - square ( nlms ) alg orithm. computer simulations are presented detailedly to show the algorithm exhibits excellent convergence, tracking capability, as well as lower ber

    改進演算法結合了歸一化最小均方( nlms )演算法,擬結果表明改進演算法有良好的收斂性、跟蹤性能及較低的誤率。
  8. The template - based code generated by the sproxy. exe tool for an atl server soap client makes for easy overriding of the transport on the client side

    Sproxy . exe工為atl server soap客戶端生成的基於板的代使得在客戶端上重寫傳輸更為容易。
  9. In the end, quick implementation of kasumi, f8 and f9 are simulated under the condition of windows 98 with celeron 633 and 128m memory, the simulation data show that the f8 algorithm is capable of achieving the encryption rate up to 1. 9mbit / s, while f9 algorithm only takes 20ms to compute the mac with the length of 5114 bits, both of which can reach the basica requirement of 3g

    在本文的最後我們對kasumi , f8演算法和f9演算法的快速實現進行了體的擬, f8演算法的體實現是在windows98 ,賽揚633mhz和128m內存的環境下其加密速率可以達到1 . 9mbps ,而f9演算法在同樣的條件下計算5114比特的字元串的消息認證所需時間僅為20毫秒,這些速率基本上可以滿足3g中高速率傳輸的要求。
  10. In chapter four, the design of the copy milling cnc system is brought forward. controller software architecture is constructed in the development of cnc software using finite state machine. at last, the concrete design of some modules and copy milling algorithms are made

    第四章首先介紹了開放式體系的仿型銑床數控系統的總體設計方案,給出了系統軟硬體設計方案和塊劃分方案,然後介紹了本系統的兩大塊:仿型加工和數控代解釋塊的設計方法,並給出了體的演算法。
  11. Currently, the army is developping military network based oa project with effort among which military email transferring system is an essential application module. this paper proposed a data model of military email transferring as well as detailed design scheme according to the potential threat in email service system, practical condition of current military network and official model as well as document transferring process. it discussed the security requirement of military email transferring system in detail as well as analyzed and design relevent data model, mail exchange protocol and application requirement of cryptogram management

    該文針對電子郵件服務系統中存在的安全隱患,基於對目前國內外電子郵件安全技術的分析研究,立足於現有軍事計算機網路的實際現狀,根據目前軍隊的辦公式、公文傳輸流程,提出了一種適合於軍隊辦公自動化中軍用電子郵件傳輸的數據型及體的設計方案,詳細討論了軍用電子郵件傳輸系統的安全服務需求,對相關的數據型、郵件交換協議、密管理的應用需求等進行了詳細的分析和設計。
  12. Cryptogrammic chip introduced in this paper has been tested on the altera ' s apex20ke fpga. the main clock frequency reached 40mhz. the chip includes 30, 000 les. in order to utilize esb resource in altera ' s chip, we adopted embedded rom and ram and can realize the function of whole system with only one chip. lt is the embodiment of methodology and notion of sopc ( system on a programmable chip ). the simulation of this cryptogrammic chip proves the correctness of function of the chip, which shows that the important ideology based reconfigurable architecture has special significance in designing of cryptogrammic chip

    本文所闡述的密晶元在altera公司的apex20kefpga上進行了測試。工作頻率達到了40mhz ,佔用了3萬個le . ,利用altera器件的esb資源,採用內置ram和內置rom設計方法,用一片晶元即可實現整個系統的功能,充分體現了sopc的設計方法和理念,對晶元的擬和測試均證明晶元功能正確,表明基於可重組體系結構這一重要思想在密晶元設計中有特殊的意義。該晶元的設計遵循hdl設計方法學的一般方法。
  13. Considering of the differences of task scheduling between a grid and a distributed system, this dissertation designs a real number encoded mode that mapping every task to a random resource directly by improving the encoding mode of the traditional genetic algorithm, and gives a particular design to the encoding and decoding mode. at last, this algorithm is simulated in the grid simulator. the experiment results show that the reformative genetic algorithm not only has a holistic searching ability, but also makes a fast convergent speed, which provides a preferable performance

    本文根據網格計算任務調度的特點,提出了基於改進的遺傳演算法的網格任務調度,通過對傳統遺傳演算法的編方式進行改進,針對網格任務調度與一般分散式系統任務調度的不同之處,設計了資源?任務的一一對應的實數編方法,詳細設計了其編及解方式,最後在網格擬器中進行了擬,實驗數據證明了改進后的遺傳演算法即有全局搜索能力,又有較快的收斂速度,有較好的性能,該實驗達到了本文以實現任務調度的最優跨度為目標的實驗目的。
  14. Listing 6 shows the result of mocha s attempt to decompile java code that had been obfuscated by a tool called jmangle

    清單6顯示了mocha在嘗試反匯編被一種名為jmangle的工糊處理的java代后的結果。
  15. In order to make up this gap, this paper presents a differential detection scheme that serial concatenate a ldpc code to form a iterative detection cycle. moreover, under different channel conditions, simulations show that this scheme can improve the differential system performance considerably, of which may be meritorious to the applications

    所以針對這種情況,本文在第四章提出了一種級聯ldpc的turbo差分檢測方案,並通過擬說明,在級聯不同率的ldpc下,該方案都可以使差分系統獲得明顯的性能增益,有一定的應用價值。
  16. If we could make use of the technology of computer seeing and realize automatic recognition of identifying id card numbers, we should greatly improve the efficiency of id card administration. presently, most recognition systems of id card numbers are based on scanner, but this systems cannot meet the demand of long and real time catching image. this text lucubrates theoretic about image manipulation and pattern recognition and sets up a integrated regnition system of identifying id card numbers. on ccd vedic. concretery consist : ( 1 ) firstly investigating the segmentation about image of illumination asymmetry. due to a dotal lamp - house, the illumination of id card numbers image is asymmetrical

    本文應用了圖像處理和式識別技術,建立了基於攝像頭的身份證號的識別系統。主要研究內容體包括如下: ( 1 )研究了亮度不均勻的身份證號圖像的分割。由於採用點光源進行局部照射,導致身份證號圖像的亮度不均勻,因此直接對圖像採用全局閾值進行分割不能有效地分離號體。
  17. The principles of erasure codes used under binary erasure channels are summarized and erasure codes which belong to standard classes of rs codes are introduced with emphasis on cascaded low - density erasure codes with linear time encoding and erasure recover algorithms. thresholds of regular degree distributions are analyzed. it is shown that low - density erasure codes based on ( d, 2d ) - regular sequences of degree distribution are not close to optimal ( d 3 ). two pares of irregular degree distribution sequences are introduced and a pare of improved right regular sequences of low - density erasure codes are presented, it is testified that the new sequences are asymptotically quasi - optimal. in the meantime, simulations of cascaded low - density erasure codes based on a few types of special sequences of degree distribution available are given, together with performance analyses on these codes

    闡述了應用於刪除通道下的糾刪基本原理,介紹了兩類標準的rs類糾刪,重點分析了有線性時間編和恢復演算法的漸近好?級聯型低密度糾刪,分析了正則度分佈的閾值,對正則低密度校驗在刪除通道下的糾錯性能進行了擬,從理論上證明了基於( d , 2d ) -正則度序列的低密度糾刪都不是漸近最優( d 3 ) ,同時還分析了非正則低密度校驗的度序列設計,基於右邊正則序列提出了一種改進型右邊正則序列,證明了此序列為漸近擬最優的,對基於幾類現有典型度分佈序列的級聯型低密度糾刪進行了擬及性能分析; 3
  18. The main place of innovation of this paper is to grasp the advantage of different algorithms, from different angles and levels improve modular exponentiation algorithm and scalar multiplication algorithm, and achieve new algorithm which can provide reference to the implementation of rsa and ecc, meantime the new algorithm have greater practical value

    本文的創新點在於綜合各種演算法在不同方面的優勢,從不同角度和不同層次去改進冪演算法和標量乘演算法,得到的新演算法可供在實現rsa和橢圓曲線密體制時參考,有較大的實用價值。
  19. This simulation training system has many excellent features, such as programming easily, comprehending facilely, maintaining conveniently, system functions extending simply. in the course of the design and implementation, the generalization of equipments, the verisimilitude of simulation, the flexibility of configuration, the intelligentization of training environment and the multimedia of feedback information are emphasized

    擬訓練系統有易於代開發、易於理解、易於維護管理、易於系統功能擴展的特點。在系統的設計、實現過程中,特別突出了設備的通用性和典型性、擬的逼真性、配置的靈活性、擬環境的智能化和反饋信息的多媒體化。
  20. The content of this paper is arranged as foll owing : chapter 1 introduces the concept of credit, credit risk and credit assessment, as well as the history and development of credit assessment ; chapter 2 introduces the history of ai technology, and the background of expert system and neural network. characters and disadvantages of expert system and neural network are presented respectively and the necessity of combining expert system and neural network is lightened ; chapter 3 shows the process of dealing with sample data, including the treatment of exceptional data and factor analysis, and puts forward the concrete framework of the mixed - expert credit assessment system ; chapter 4 introduces concept of object - oriented technology, and constructs object model and functional model after analyzing the whole system. it also illustrates the implementation of concrete classes by an example of rule class and the inference algorithm in the form of pseudocode ; chapter 5 introduces the structure of the whole system, the major functional models and their interfaces, and the characteristic of the system is also generalized ; chapter 6 summarizes the whole work, and points out the remaining deficiencies as well as the prospective of this method

    本文體內容安排如下:第一章介紹了信用、信用風險、信用評價的概念,回顧了信用評價的歷史、發展和現狀,並綜合各種信用評價型,指出這些型各自的優缺點:第二章簡單描述了人工智慧技術,著重介紹有關專家系統與神經網路的基礎知識,通過總結它們的優缺點,指出結合專家系統與神經網路構造混合型專家系統的必要性;本章還介紹了神經網路子塊的概念,提出了混合型專家系統的一般框架與設計步驟:第三章對樣本數據進行處理,包括異常數據的剔除、因子分析等,提出了信用評價混合型專家系統的體框架結構,介紹了系統知識庫的主要部分、基於優先級的正向推理機制的流程、以及基於事實的自動解釋機制的體實現方法;第四章介紹了面向對象技術,進而採用面向對象對信用評價系統進行分析,建立了對象型和功能型,並在此基礎上,採用c + +語言以規則類為例說明系統中體類的實現,用偽代的形式描述了推理的演算法;第五章描述了整個系統的結構,對系統主要功能塊和界面進行了介紹,並總結系統的特點;第六章總結了全文,指出本文所構造系統存在的不足以及對將來的展望。
分享友人