比特根 的英文怎麼說

中文拼音 [gēn]
比特根 英文
buettgen
  • : Ⅰ動詞1 (比較; 較量高下、 長短、距離、好壞等) compare; compete; contrast; match; emulate 2 (比...
  • : Ⅰ形容詞(特殊; 超出一般) particular; special; exceptional; unusual Ⅱ副詞1 (特別) especially; v...
  • : Ⅰ名詞1 (植物的營養器官) root (of a plant) 2 (比喻子孫後代) descendants; posterity 3 [數學] ...
  1. Different bit rates are allocated to wavelet blocks according to energy the wavelet blocks include. bit rates in wavelet blocks are adaptively adjusted in coding process. by use of bipartition, the entropy of each wavelet block approximates to the target bit rate of one

    該演算法首先據每個小波塊所含能量的多少和到每個小波塊實際編碼所用的數,給其分配不同的碼率;然後據二分法,通過調整各小波塊的量化因子使得各小波塊的熵逼近它的目標率。
  2. The asteroids are the most important small bodies in the solarsystem, and they mainly lies in the two locations - a main belt between the mars ' s orbit and the jupiter ' s and the near - earth space. the most feature of the orbits of near - earth asteroids ( neas ) is that the semi - major axes of the orbits are nearly equal to that of the earth or the perihelia distances are approximate to or even less than the mean distance between the sun and the earth, thus they could move into inside of the earth ' s orbit, so that they might close approach or even colliside with the earth ( or other planets, such as the venus, the mars, etc. ). the characteristic brings about some difficulties in the numerical research during their orbital evolution, which leads to the failure of the normalization technique in the general removal impact singularities of celestial mechanics methods and the symplectic algorithm which is successfully applied to the investigation in quality. by comparing the computation effects of several common numerical methods ( including symplectic algorithm ), and considering the nature of the movement of the small bodies, the corresponding treatments are provided here to improve the reliability of the computation

    小行星是太陽系最重要的一類小天體,主要分佈在兩個區域;火星和木星軌道之間的一條主帶和近地空間.近地小行星軌道的最大點是其軌道半長徑與地球軌道半長徑相近,或近日距離接近甚至小於日地平均距離,其運動可深入到地球軌道的內部,這將導致該類小行星與地球(還有金星、火星等)十分靠近甚至發生碰撞.這一徵給其軌道演化數值研究帶來一些困難,包括天體力學方法中一般消除碰撞奇點的正規化處理以及對定性研究十分成功的辛演算法都將在不同程度上失效.通過對幾種常用數值方法(包括辛演算法)計算效果的較,據小天體運動自身的性,給出了相應處理措施,從而可提高計算結果的可靠性
  3. It is possible to setup integrated streams defined perfectly and can be led to pipe with constant bandwidth, if diffserv authenticates and classifies data streams of constant bit rate using the rsvp parameters or according to the types of special application

    如果diffserv使用rsvp參數或據專門應用類型對恆定率( cbr )數據流進行鑒別和分類,就可能建立完全定義的綜合流,它能夠被引導成為固定帶寬的管道。
  4. 4. an roi coding method realized by foveation technology and two of its extended applications are presented. by unevenly upscaling the wavelet coefficients, the method can not only reconstruct the roi data priorly in a low bit - rate codestream, but make the progressive reconstruction of the image data more convenient for the human vision system

    該方法據人類視覺生理點,將小波變換系數進行非均勻的上移位處理,不僅能夠保證感興趣區域圖像數據在低數據流中的優先恢復,還實現了使圖像的漸進恢復過程更加適合人類生理視覺感觀點的效果。
  5. A new bit rate control strategy with both global pre - allocation and local segmentation ( glas ) for low bit rate application is proposed. first, it allots bit date to every frame in advance according to possessive rate of buffer, and then distribute different quantization parameters according conctete detail. by means of this method, buffer is controlled more particularly. and the quality of decoded image is improved, the traditional video image coding method, that is to say, the intraframe coding based on dct and the interframe prediction coding based on motion compensation, is not suitable for low bit rate compression and aside from this, the encoder is too complicated

    它首先在總體上據緩存器的佔有率給每幀預分配數,然後再據具體細節給予不同的量化參數。使緩存器得到了更細致的控制,解碼圖像的質量有所改善。針對傳統的視頻圖像編碼方法,即幀內基於dct的編碼加幀間基於運動補償的預測編碼存在不適于低率壓縮,編碼器復雜等不足,討論了基於3 - ddct的xyz視頻圖像壓縮編碼方法,提出了3 - ddct系數的三維「 z 」形掃描方案,大大提高了編碼效率。
  6. Contact pressure, hysteresis and no - even pressure ratio of no - gradual - enlargement finger seal under different length ratio and root circle of no - gradual - enlargement finger seal are constructed and analyzed, rules are summarized

    本文對非漸擴形結構指尖密封在不同寬度圓外徑下的接觸壓力、遲滯率及偏載率等性進行了作圖、分析,得出了相應的規律。
  7. When receiving the uplink frame, olt searches the synchronization pattern to quickly capture the phase information of code flows and achieve the bit synchronization. based on the delimitation pattern, it then delimits the atm cell to accomplish the byte synchronization

    Olt在接收上行幀時,搜索同步圖案,並以此快速獲取流的相位信息,達到同步;然後據定界圖案確定atm信元的邊界,完成位元組同步。
  8. In the first place, the paper briefly discusses issues related to the main index mechanisms in spatial and temporal, studies the access methods of spatio - temporal databases which has been presented. furthermore, the paper explains the storage mechanisms in stadbs ( spatio - temporal analysis database system ) and presents a hr - tree index structure based on main memory to realize the index mechanism of stadbs, it ' s main technologies were discussed in detail. lastly, a visual demo of hr - tree based on main memory was introduced in this paper

    本文在分析討論了主要的空間和時間索引技術的基礎上,研究、分析了時空數據的存取方法,對已提出的時空索引技術進行了分類、較;據時空分析數據庫stadbs存儲機制的點,採用基於主存的hr -樹作為stadbs時空數據的索引結構,設計與實現了stadbs的時空存取方法,論文對stadbs時空索引機制的設計與實現作了較詳細的介紹,同時闡述了基於主存的hr -樹可視化演示程序的主要實現方法。
  9. According to similar ft3 frame format and its checkout mode of dnp data link layer, the relationship between fer ( frame error rate ) and ber ( bit error rate ), frame length is deduced. the computation formulas of average transmission times and repeat transmission times guaranteeing the correct transmission of telecontrol information are given as well

    據dnp3 . 0規約數據鏈路層類ft3幀及其校驗方式,推導出幀傳輸失敗概率(誤幀率)與通道誤率和幀長的關系,同時給出平均傳輸次數和重復傳輸次數的計算公式。
  10. To bobbie morganstern ' s table tomorrow night

    明晚送到巴?摩恩餐桌上
  11. In this paper, chroma dc coefficients are selected as the carrier data because chroma dc coefficients are robust. also, alterable steps are used to select one part of the coefficients, so the watermark is imperceptible ; before watermark embedding, the watermark is divided into many parts, every part is individually embedded into one gop of the video, even if a gop is destroyed, the watermark can be extracted correctly, this methods promotes the robustness of the watermark ; in addition, in order to promote the security of the watermark, the user ' s id and password are used to generate chaos sequence by the chaos system which is created in this paper, later, watermark is mixed by the chaos sequence. also, the embedding position of the watermark bit is modified by one chaos sequence, so, unauthorized person can not extract or remove the watermark, since the embedding position is unknown

    本文認為,色度dc系數是魯棒性非常好的參數,因而選擇色度dc系數作為水印信息載體,同時,採用可變的步長選擇部分系數,保證了水印的隱形性;在嵌入水印時,本文採用水印信息「網格劃分」 、各子塊獨立嵌入視頻的方案,由於水印信息子塊是相對獨立的嵌入視頻中的每一相對獨立的圖組當中,即使某一圖組收到一定破壞,也能夠恢復水印信息,使水印的健壯性得到提高;此外,為了提高水印信息的安全性,在嵌入水印信息時,據用戶輸入的id號和密碼,利用本文構造的混沌系統產生的混沌序列對水印信息進行變換,同時,對每一水印信息的嵌入位置也採用了偽隨機序列進行調整,這樣,未授權用戶不能提取水印信息,也難以擦除其中的水印信息,因為嵌入的位置是未知的。
  12. Bits transmitted by every subchannel are determined by its value of signal to noise ratio ( snr ), and the unwanted power caused by noise is distributed to every subchannel, so their damage is weakened

    據各個子通道信噪的情況確定其傳送數,由噪聲引起的干擾功率被分散到各個子通道中,降低了其引起的干擾。
  13. The quantum gate array is the natural quantum generalization of acyclic combinational logic " circuit " studied in conventional computational complexity theory. in 1995, barenco showed that almost any two - bit gate is universal, so building a feasible two - bit logic gate is the first step to engineer a quantum computer. in principle, the quantum bit can be carried by any two states system

    在眾多的量子計算機模型中目前討論最廣泛的是量子計算機門組網路模型,量子計算機門組網路模型是經典計算機門組網路結構的量子推廣,它是基於barenco等人所證明的「一個兩受控操作和對單進行任意操作的門可以構成一個『通用量子邏輯門組』 」之上的。
  14. The subimage of the lowest frequency ( ll4 ) is carried out lossless compressed coding ; 2 the subimages on diagonal direction of the highest frequency ( hhl ) is abandoned and is not carried out coding, because it is of great probability for zero, and it little affects visual

    其主要包括對最低頻子帶單獨進行無損壓縮編碼,對最高頻對角線方向子帶捨去不編碼。對其餘各子帶據視覺點的不同,分別分配不同的數並按其進行零樹量化,最後再遊程編碼。
  15. Abstract a new kind of design and implementation of a steganography algorithm based on least significant bit ( lsb ) was proposed, which used chaos system as key to encrypt the steganography information, then according to the image characteristic, adaptively regulated embedding depth

    摘要提出了一種新的利用混沌信號作為密鑰流對密寫信息進行加密,進而據載體圖像性進行分塊,自適應調節嵌入深度的最低位( lsb )密寫演算法。
  16. The thesis also gives the optimal threshold of bits resume in the watermark extraction in details

    水印的檢測過程需要恢復,本文據最小錯誤概率準則,詳細推導了水印的恢復閾值。
  17. In this scheme, data rates in probabilistic manner according to a reverse activity bit ( rab ) and an adaptive probability value broadcasted by the base station are increased or reduced in data mobiles, whereas the adaptive probability value is dynamically adjusted on the basis of the residual capacity of system

    在該演算法中,數據移動臺據基站廣播的反向激活和自適應概率值以概率方式升降速率,其中自適應概率值據系統剩餘容量動態地調整。
  18. In the next, we discuss the system of the meg - 1 layer i. the paper centers on the two kernel sub - parts : filtering coding and psychoacoustic model, do some research work in sub - band coding ( cbc ) theory and the relate theory such as quadrature mirror filter ( qmf ) and analyse sub - band filter ; also do research work in psychoacoustic theory especially the part related to the mpeg - 1 layer i. in the third chapter, introduce the ti tms320c6000 series dsps and their characteristics, also about the software development flow and the ti dsp / bios operating system of it. the forth chapter is the most important, firstly, according the algorithm flow in protocol, using c language validate the algorithm ; then, transplant and optimize the coding in dsp. in the processing of optimize, acording the assembler program characteristic of ti dsp, the paper put forward the analyse sub - band filter dsp optimization algorithm base on the eight spot idct. the algorithm has been optimize have greatly improved the work efficiency. make use of the technology of the dsp / bios host channels, data io pipe, software interrupt, we implement the musicam algorithm base on dsp / bios

    論文首先對當前語音編碼技術的發展、分類以及mpeg系列音頻標準作了介紹;接著在第二章,給出了layer的musicam ( masking - patternuniversalsubbandintegratedcodingandmultiplexing )演算法的系統組成,圍繞分析子帶濾波器和心理聲學模型兩個核心模塊,深入研究了子帶編碼工作原理、分配及子帶編碼中用到的正交鏡像濾波器和分析子帶濾波器;探討了心理聲學基本原理和mpeg . 1layer所用到的心理聲學模型。第三章對titms320c6000系列dsp作了簡介,介紹了6000系列dsp結構點、 c6000dsp軟體開發流程和tidsp / bios操作系統。第四章是本文的重點,首先據協議給出的演算法用標準c語言編程實現並調試通過。
  19. The speakable and the unspeakable : an comparative study of feng youlan ' s and wittgenstein ' s aesthetics

    馮友蘭與維斯坦美學的一種較研究
  20. Finally, combining the two extraction methods with the two classification methods, the thesis put forward four models of palmprint recognition : k - l + ld model, k - l + nn model, nn + ld model and nn + nn model. the experiments show the accuracy, efficiency and the fault tolerance ability of these models. in terms of their characteristic, we can apply them in various fields

    論文把兩種徵提取方法和兩種分類器設計方法進行結合,提出k - l變換與最小分類器、 k - l變換與bp神經網路分類器、線性神經網路與最小分類器、線性神經網路與bp神經網路分類器四種組合,最後對四種識別方法進行較,據它們識別的準確率、效率以及容錯能力對識別結果進行分析,總結出各種方法的優缺點,據它們的點,提出在不同方面的應用。
分享友人