特徵碼 的英文怎麼說

中文拼音 [zhǐ]
特徵碼 英文
condition code
  • : Ⅰ形容詞(特殊; 超出一般) particular; special; exceptional; unusual Ⅱ副詞1 (特別) especially; v...
  • : 名詞[音樂] (古代五音之一 相當于簡譜的「5」) a note of the ancient chinese five tone scale corre...
  • : Ⅰ名詞(表示數目的符號或用具) a sign or object indicating number; code Ⅱ量詞1 (指一件事或一類的...
  • 特徵 : characteristic; feature; properties; aspect; trait
  1. Wireless features : calling number identification restriction

    無線電通信:呼叫號識別限制
  2. Wireless features : calling number identification presentation

    無線電通信:呼叫號識別顯示
  3. This dissertation brings forward and realizes the multilevel classifiable method which is based on characters coding. above all, this method realizes the first - grade classification by extracting enough effective characters from characters and coding them, to the others which coundn " t be recognized by the first - grade classification, the method will adopt the second - grade classification using template matching to recognize these characters

    本文提出並實現了基於的多級分類識別方法,通過給字元抽取足夠多的有效的並給實現第一級分類,對于第一級分類后仍不能區分的字元,再進入第二級分類用模板匹配的方法最終達到區分的目的,這種方法的重點在第一級分類階段。
  4. Analyzing the characteristics of start codon in prokaryote and yeast genomes

    原核生物和酵母基因組中起始密分析
  5. On the base of researching the theory of the scheme and analyzing the signal feature, it is obtained that the existence manners and character of distance information in the differential frequency signal. at the same time, a new conclusion is gained that the technology of frequency agility can decrease the constant error of system. it is also to say that frequency agility and frequency modulation fixed - distance fuze has the similar feature to random period frequency modulation fixed - distance fuze. according to the theory of address coding in the hopping - frequency communication, the paper presents the principle of selecting the frequency agility sequence which fit to the radio fuze and constructs the frequency agility sequence family based on the rs codes

    在深入研究方案原理和分析信號的基礎上,獲得了該體制引信差頻信號中,距離信息的存在形式和點,得出了頻率捷變技術的引入降低了系統定距固定誤差這一新的結論,即頻率捷變調頻定距引信在定距性能上具有類似隨機周期調頻定距的。本文引入跳頻通信地址編理論,結合無線電引信的具體,提出了適用於無線電引信的頻率捷變序列的選擇原則,並構造了基於rs的寬間隔頻率捷變序列族。
  6. 3. characteristic points are established through projecting images of regular points to measured surface. space dimidiate coding method which is called rough match and correlation technology, centroid technology, corner detect technology which are called precise match are used to acquire characteristic points accurately

    將空間規則點圖案投射到被測物體表面形成點,然後利用空間二分編粗略獲得空間點(稱為粗匹配) ,再利用自相關技術、質心技術和角點技術精確獲得空間點的圖像坐標(稱謂細匹配) 。
  7. We excogitate the gabor filter based - on sub - block texture analyse to extract the feature of iris normalized image and encode them. then, we use hamming distance to match two iris codes. in order to reduce the rotation of iris, we work out a new method

    4 .研究出基於子塊紋理分析的gabor濾波器方法來對虹膜歸一化圖像進行提取和編;在虹膜編匹配中,本論文採用hamming距離來進行編之間的匹配。
  8. The serial number of furcated needle is composed of three sections including 11 digital codes : the first section ( 1 - 5 digits ) is the standard size of international general mode ; the second section of the 6th digital code is the location of bending helve ; in the third section, except letter h representing " hengxiang " brand, the other group of digits represent the characters different parts of pricker

    叉形針的編號由三部分共11位代組成:第一部分( 1 - 5位)是國際通用方式的標準尺寸;第二部分即第6位代表示彎柄位置;第三部分除英文字母h代表「恆翔」牌外,其餘一組數字表示叉形針的各部
  9. Zero - day attacks are ones that take place between the time of an exploit ' s publication and the release of the initial patch or antivirus / malware signature

    零日攻擊發生於漏洞公布日到發布補丁或反病毒/惡意軟體特徵碼日之間。
  10. A patent pending keylogger guard tool, which uses behavioral detection as opposed to signature - dependent methods to detect and block keylogger activities on your computer

    未決行為偵測專利的密竊取防護工具,通過與依賴于特徵碼的偵測方式相反的行為偵測來判斷並阻止計算機上的密竊取活動。
  11. Using our new behavioral detection spyware doctor can prevent these keyloggers from recording keystrokes and causing damage much sooner than keylogger blockers based on signature - dependent methods

    較之於傳統基於特徵碼偵測方竊密反的式取工具,使用了最新行為偵測技術的s . d將能夠阻的松輕常非止密竊取器記錄鍵盤敲擊定位以的成造此由及損失
  12. Newly released and custom written keyloggers designed for specific attacks, will not normally be blocked by conventional signature detection methods

    最新釋放的殊了為及以的攻擊目的而採取自定義編寫設計器取竊密的,將很難通過傳統的特徵碼偵測方較。
  13. Thirty - nine feature code

    卅九特徵碼
  14. Based on the criterion of maximizing the total average signal to interference plus noise ratio ( sinr ), the optimal subchannel allocation strategy is obtained in theory when random signature sequences are used. for its implementation, an iterative algorithm is proposed, which is similar to the water filling principle. by using the proposed algorithm, we obtain significant improvement on the performance of the system, and the transmission quality can be guaranteed

    根據最大信號干擾加噪聲比原理,分析得出了隨機特徵碼條件下最優的子通道分配策略,並提出了一種類似於灌水原理的子通道分配演算法,該演算法能在保證各個用戶傳輸質量的前提下,使系統的整體性能接近最優。
  15. Twenty - nine feature code

    二十九特徵碼
  16. Allows users to easily update stable packages that contain information that quickly goes out of date. examples are a virus scanner s signatures list or a spam filter s pattern set. for more information and a list of mirrors, please see the archive s

    服務可以讓使用者輕易得進行stable的套件更新,因為某些套件,像是病毒掃瞄引擎所使用的特徵碼列表,或是垃圾郵件過濾器所使用的樣本資訊,往往很快得就過時了。
  17. Feature codes menu

    特徵碼清單
  18. The database currently incorporates over 50, 000 signatures

    該數據庫現已搜集了超過50000的特徵碼
  19. In a sense, the opposite of heuristic analysis in av is not signature scanning, but algorithmic scanning, of which signature scanning is a special case

    在某種意義上,反病毒軟體使用的非啟發式分析方法並不是特徵碼掃描,而是基於演算法的掃描,特徵碼掃描只是其中的例。
  20. " future license file format or misspelling in license file. the file was issued for a later version of flexlm than this program understands.

    如果軟體許可證的特徵碼被修改了,這種提示就會出現,這將導致發出的軟體許可證無效。此時請與軟體許可證發放人聯系,確認軟體許可證無誤。
分享友人