機器信息碼 的英文怎麼說

中文拼音 [xìn]
機器信息碼 英文
machine information code
  • : machineengine
  • : 名詞1. (器具) implement; utensil; ware 2. (器官) organ 3. (度量; 才能) capacity; talent 4. (姓氏) a surname
  • : Ⅰ名詞1 (呼吸時進出的氣) breath 2 (消息) news 3 (利錢; 利息) interest 4 [書面語] (子女) on...
  • : Ⅰ名詞(表示數目的符號或用具) a sign or object indicating number; code Ⅱ量詞1 (指一件事或一類的...
  • 機器 : 1. (用來轉換或利用機械能的機構) machine; machinery; engine 2. (引申為機構) apparatus; organ
  1. This version is applicable to the engine systems for the vehicles with obd2 and eobd protocols, with available functions of read dtc, clear dtc, read dynamic data stream, read freeze frame, readiness test, read version information, read specified data and read oxygen sensor status data

    此版本可測試符合obd2 eobd標準的汽車發動系統,功能有讀故障清除故障讀動態數據流讀取凍結幀準備測試讀版本讀廠家自定義數據氧傳感測試。
  2. Information processing - coding of machine readable characters micr and ocr

    處理用可讀字元編
  3. The algorithm can not only eliminate the influence of the cumulative errors of the photoelectric code recorder, but also it can satisfy the requirement of the real - time control. a direct inverse model controller of fuzzy neural network with changeable structure based on takagi - sugeno inference is presented and it is used to the motion control of mobile robot. in order to avoid the obstacles successfully, detection results from ccd and ultrasonic sensors are fused by a fuzzy neural network, which acts as an avoidance controller

    包括移動人的融合自定位問題:移動人利用光電編進行自定位,同時用擴展卡爾曼濾波融合多個超聲波傳感的測量值,採用回朔演算法將融合值用於復位光電編,消除了光電編累積誤差的影響,並能滿足實時控制的要求:並提出一種基於takagi - sugeno模型的變結構模糊神經網路直接逆模型控制,並應用於移動人的運動控制;利用模糊神經網路避障控制融合ccd攝象與超聲波傳感探測到的環境,以實現人的安全避障。
  4. It has a photoelectrical coding device on each mechanical joint arm to detect the rotating angle, then the device ' s coordination can be calculated with the value of the angle

    在硬體實現上,採用三關節械臂結構,通過安裝在每個關節上的光電編檢測每個關節的轉角,進而計算出位置
  5. The detailed opinion of the enterprise vobis microcomputer aktiengesellschaft has pertinent information on electronic computers and on notebooks. moreover, high - resolution digital cameras and monitors and / or mobile phone are offered

    (英)拾音、傳感、電視發射管、撿拾、投影、放映和數照相是我們文件中的一部分,請您電話垂詢更多
  6. However, an additional variant of the vulnerability was subsequently identified, and on october 30, 2000, the bulletin was updated to advise customers of the availability of an updated patch. the updated patch eliminates all known variants of the vulnerability

    如果用心不良的用戶成功利用了該漏洞,則由服務控制的web站點會被用來運行代,轉發,並要在所有訪問用戶的計算上讀取和寫入cookies 。
  7. A cyclic check code used to check and correct the burst error appeared in the transmission procedure of binary information sequence. it is one of the error check codes in common use for computer disc memory

    用來檢查、糾正二進制序列在傳輸過程中出現的突發錯誤的一種循環校驗,它是計算磁盤存儲常用的錯誤校驗之一。
  8. Directly painting textures on top of 3d objects in 3d perspective viewport is a new issue of human - computer interface ( hci ). this paper presents a method to solve this issue. it converts the position information of the texture pixels of texture map into color information , and then transfers both the coordinates and the color of texture pixels into screen through texture mapping at the same time. only is the color information of texture pixels converted into illumination by calculating the normal and the angle of ray incidence of the screen pixel in the method. the texture coordinates are firstly converted into the color information by generating another texture map , which is called information map whose pixels ' color represents the coordinates information. and then the corresponding texture coordinates are mapped into screen reference frame by texture mapping and stored into information buffer for later use. so we can obtain the texture coordinates of screen pixels correspondingly by decoding from information buffer. after optimizing , we can paint textures on top of 3d objects in 3d perspective viewport in real time. the paper also gives some examples and related definitions of using additional information of 2d texture map for 3d graph generating

    針對三維逶視投影視圖中對三維物體表面紋理直接進行噴繪,以獲得復雜紋理圖這一計算圖形交互技術這一新問題,研究了一種將紋理圖的象素位置轉換成彩色,然後利用紋理映射將紋理坐標連同該點上的顏色值一起傳遞到與屏幕象素對應的可見點上的方法,其中顏色值依該點處的入射光線方向和表面法向被進一步轉換為光強值,而紋理坐標則被解后還原成與該可見點對應的紋理坐標,被存入緩沖中,供以後使用,通過解,可根據屏幕點直接得到對應紋理象素點的坐標,經過演算法優化,實現了對三維物體表面紋理的實時噴繪;同時闡述了在三維圖象生成技術中使用附加紋理的應用實例以及相關定義
  9. The angle message from the sensor was conversed through the conversion of coordinates, and the termination of the bucket was obtained. after the continuous points were described in the coordinate system, the practical straight - line excavate tracer came

    光電編採集到的角度,經坐標計算得到挖掘鏟斗端點的坐標,將這些連續的坐標描點,即得到一條實際的直線挖掘軌跡。
  10. This system use the floater style sensor, mechanical encoder to get water - level signal, and use the at89c51 single chip system to transform the signal into water - level data, use modem through pstn to transmit data for a long - distance, and designed a information management software system hi the irrigation works bureau information center for communication and data management. the structure of the system was discussed in the thesis

    該系統使用浮子式傳感械式編獲取水位號,利用at89c51單片系統採集水位數據(簡稱:下位系統) ,採用數據、通過公共電話網( pstn )遠程傳輸數據,並在泰興市水務局中心通過主控計算(簡稱:上位)進行通系統管理。
  11. The total structure and working principle of the intelligentized photoelectricity fire control system which is made of the aiming telescope, image sensor, laser ranging engine, code device, decoding computer, display device etc were presented

    摘要介紹了瞄準望遠鏡、圖像傳感、激光測距、編、解算計算、圖文顯示裝置等組成的智能光電火控系統的總體結構和工作原理。
  12. The first key technique : using plain - text cipher and md5 message - digest algorithm to ensure stb and dhcp server ' s certificate and secure the stb and server ' s communications - the second key technique : using hmac algorithm to realize the safe functions - the third key technique : using ipsec to realize safe functions o those three methods " complexity increases in turn and the degree of the security increases as well which depend on the frame of the methods and the complexity of the algorithm. all theose three methods use the unique serial - number or a special slip - window to defend replay attack

    主要採用三種安全方案實現:第一種:利用約定的明文密驗證頂盒與dhcp服務的合法身份, md5驗證合法性:第二種:利用hmac演算法驗證頂盒與服務身份,合法性;第三種:利用ipsec驗證頂盒與dhcp服務身份與合法性。每一種方案中皆採用包序號唯一法或者滑動窗口法保證重放攻擊。此三種方案復雜度依次增加,安全度依次升高,主要取決于演算法的復雜度與架構的搭建。
  13. Considering practical needs and developing trend of vts, based on analyzing the signal characters of vts radar video, studying basic data compression principles in information theory, comparing international coding standards in the forefront of image processing, a vts radar video coding system suitable for transmission in the narrow channel is proposed in this thesis. its main block ? oder and decoder, is realized in the common pc with software. the working process is demonstrated detailed

    結合vts系統的現實要求和發展方向,本文從vts雷達原始視頻圖像數據的特點出發,從論中關于數據壓縮的基本原理出發,從現代號處理特別是圖像處理領域中的壓縮編國際標準出發,提出了雷達原始視頻編解系統方案,其主體部分? ?編解是在pc內利用壓縮軟體實現,闡述了系統工作流程;提出了基於jpeg壓縮演算法和h
  14. Bar code was introduced into this schema as secret image to reduce the complexity and difficulty of the server ' s auto - recognition of secret information which was hidden in images, so that made the schema more efficient

    方案中為認證服務引入了條形圖像作為密圖像,有效地降低了服務對圖像中自動識別的難度和復雜度,使得方案更加有效、實用。
  15. Actuel _ p tange donne des informations pratiques sur la commune, pr sente des photographies et des parcours pour la d couvrir pied

    廣州比天科技有限公司提供條印表、閱讀、數據採集等產品及系統集成服務。
  16. This in formation can be read by the point of sale terminal wand reader or the ticket un it reader

    這些可由銷售點的條形閱讀或讀票讀出。
  17. Jinghuai digital equipment co., ltd, founded in 1998, the company developed its own kind of bank treasury management systems, zip code query machines, counters information system, the banking system window appraisal services, and all kinds of counterfeit banknote discriminating devices, a single electronic return and other financial management tools and other products

    Ptc發熱體,櫃臺查詢系統,銀行庫房管理系統,點鈔,驗鈔,偽鈔鑒別儀,身份證鑒別議,自動扎把,按摩,營業窗口設備,電子產品代加工平陽江淮數設備有限公司創建於1998年,公司自行研製開發的有銀行庫房實物管理系統郵編快速查詢櫃臺查詢系統銀行營業窗口服務評議系統各種偽鈔鑒別儀電子回單管理等金融具等系列產品。
  18. Dsp56f805 samples the ultrasonic pulse coming back from the target, then measures the distance and shows it on led. tms320vc5509a is accomplished the detecting speed and the main control of the radar system, is 16 fixed dsp with high performance and low power produced by ti company. dsp5509a samples the wave coming from t / r module, then measures the target ’ s speed and send this information to the assistant control chip - p89v51 based on boost c51 core mcs produced by philips company, which controls the lcd

    測距雷達系統的控制和號處理的核心晶元是motorola公司的dsp型16位單片56f805 ,由它對超聲波回波脈沖進行ad采樣后,計算目標距離並在七段數管上顯示。測速雷達系統中號處理的核心晶元是ti公司的超低功耗、高性能的16位定點dsp ? ? tms320vc5509a ,由它對收發組件輸出的多普勒回波進行采樣,計算出目標運動速度后,送給輔助控制晶元? ?飛利浦公司生產的基於c51內核的增強型單片p89v51 ,並且在液晶顯示上顯示速度
  19. The designing scheme of this image monitoring network adopt the designing idea of the integration modularize. with the server as its kernel, the network introduces the photography theory of the digital camera and combines the technologies of high speed single - chip computer ( w77e58 ), fpga, high speed cmos image sensor, dot - matrix photo lcd and high speed network transmission. moreover it overcomes some problems of the digital camera in the image monitoring application such as without the network interface, transmission distance shorter and unable to control the information, and establishes a technology foundation for the further application of the techniques mentioned above in this development

    本套圖像監測網路的設計方案採用集成模塊化的設計思想,以服務為核心,藉助數攝像原理,融合高速單片w77e58技術、 fpga技術、高速cmos圖像傳感技術、點陣圖形液晶和高速網路傳輸等技術,克服了數在圖像監測應用中不帶網路介面、傳輸距離較近和不能受控等問題,為本研究方向對以上各種使用技術的進一步應用奠定了技術基礎。
  20. It reframes the traceback problem as a polynomial reconstruction problem, and uses techniques from algebraic coding theory to provide robust methods of transmission and restriction. the scheme is a new solution to the traceback problem during a dos attack ; the honeypot for ddos, which is a tool of traceback, lures the attacker to believe that he successfully compromised a slave for his needs, convincingly simulating the architecture of a potential ddos attack ; the source - based approach to ddos defense, which is a useful adjunt to traceback systems, deploys a ddos defense system at source - end networks. attacks are detected by monitoring two - way traffic flows, and the attacks originating from source networks are stopped by rate - limiting ; the routing mechanism based on pushback treats ddos attacks as a congestion - control problem

    最後,就有關ddos攻擊反向追蹤問題,從四個方面對其解決方案進行了研究:在分析比較幾種反向追蹤演算法的基礎上,著重研究了代數方法編反向追蹤的方案,該方案把追蹤重構問題當作多項式重構問題,使用代數編理論技術提供魯棒的傳送和重構方法,是dos攻擊過程中的反向追蹤問題的一種新的解決方法; ddos陷阱作為反向追蹤的工具,引誘攻擊者相自己成功與所需的傀儡主通話,令人服地模擬出潛在ddos攻擊體系結構;基於源的ddos防禦方法作為反向追蹤有用的補充,將防禦系統部署在源網路,通過監控雙向流量檢測攻擊和限制速率終止來自源的攻擊;基於向後倒推的防禦ddos的路由制把ddos攻擊看作擁塞控制問題,添加功能到每個路由來檢測並優先丟棄可能屬于攻擊的包,通過向後倒推上級路由也得到通知而把這樣的包丟棄。
分享友人