置換碼 的英文怎麼說

中文拼音 [zhìhuàn]
置換碼 英文
override code
  • : 動詞1. (擱; 放) place; put; lay 2. (設立; 布置) set up; establish; arrange; fix up 3. (購置) buy; purchase
  • : 動詞1. (給人東西同時從他那裡取得別的東西) exchange; barter; trade 2. (變換; 更換) change 3. (兌換) exchange; cash
  • : Ⅰ名詞(表示數目的符號或用具) a sign or object indicating number; code Ⅱ量詞1 (指一件事或一類的...
  • 置換 : displace; substitute; supersede; substitution; replacement; permutation; transposition; transposi...
  1. In the array scheme of with the diaphragm, the optimization of semiconductor optoelectric devices array forms a sky screens. while the bullel passing through the sky screens, the outputs of optoelectronic devices are amplified and coded, and then transmitted to the computer for processing

    半導體光電件陣列方案是將半導體器件陣列和光闌合理配,形成天幕,將彈丸過靶信號光電轉、放大,經過編處理,最後送入計算機處理。
  2. As to cyclic codes over finite chain rings, we study their stucture and develop the fourier transform method to finite chain rings. the permutation groups of cyclic codes and their extended codes are investigated using their mattson - solomn polynomials

    對于有限鏈環上的循環,我們研究了它們的結構,並把傅立葉變的方法推廣到有限鏈環,用循環的mattson - solomn多項式對循環及其擴展群進行了研究。
  3. At first we improve the methods of iris image preprocessing, including an efficient arithmetic of evaluation iris images, an improving method of locating iris, calibrating iris image by the translation of coordinate and the circular shift of code, a eatimate of the background illumination by bicubic spline, and the image enhancement by the dual tree complex wavelet transform. next we designed the recognition arithmetic based on the location of the local maxima of the wavelet transform modulus. in the thesis lots of simulation are performed by means of matlab and visual c + +

    首先改進了虹膜預處理方法,實現了一種快速高效的虹膜質量評價演算法;設計了一種改進的兩步虹膜定位演算法,準確的定位了虹膜的內外邊界;利用坐標轉和編的循環移位實現了對虹膜圖像的配準;利用雙三次樣條函數擬合虹膜圖像背景,去除了非均勻光照對虹膜識別的影響;使用二分樹復數小波方法增強了虹膜圖像的對比度;在識別演算法方面,本文設計了一種「基於小波模極值點位的虹膜識別演算法」 。
  4. Setup functions enable user - defined adaptation of a wide variety of options such as display contrast, record printout, saving data on the computer, general code, temperature calibration, acoustic signal, date and time, id, data transfer, update fix programs, language, c f changeover, check program, battery change, diagnosis data, printing programs, seal test, service functions for maintenance

    功能允許使用人員對多種選項進行定義和調節,例如顯示屏幕對比度列印記錄把數據記錄到計算機上總溫度校正音響信號日期和時間識別傳輸數據固定程序升級語言攝氏和華氏溫度轉檢查程序更電池診斷數據列印程序測試密封保養用服務功能。
  5. Setup functions enable user - defined adaptation of a wide variety of options such as display contrast, record printout, saving data on the computer, general code, temperature calibration, acoustic signal, date and time, id, data transfer, update fix programs, language, screen saver, c f changeover, check programme, battery change, diagnosis data, printing programs, seal test, service functions for maintenance

    功能允許使用人員對多種選項進行定義和調節,例如顯示屏幕對比度列印記錄把數據記錄到計算機上總溫度校正音響信號日期和時間識別傳輸數據固定程序升級語言屏幕保護攝氏和華氏溫度轉檢查程序更電池診斷數據列印程序測試密封保養用服務功能
  6. At the aspect of hardware design, it adopts pulse distributor and the technology of single polar voltage drive to accomplish the function of controlling and driving stepmotor ; it adopts the technology of pulse width modulation and cmos h - bridge drive to accomplish the function of controlling and driving dc servomotor ; it adopts d / a convertor to accomplish the function of controlling ac transducer ; it adopts the technology of digital phase detection to accomplish the function of detecting the feedback position signal of induction phase shifter ; it adopts dsp ’ s capture cell to accomplish the function of detecting the feedback position signal of photoelectric coder

    硬體方面,採用脈沖分配器和單極性電壓驅動技術實現了步進電機的控制和驅動功能;採用脈寬調制技術和cmos互補h橋驅動技術實現了直流伺服電機的控制和驅動功能;採用d / a轉器實現了交流變頻器的控制功能;採用數字化相位檢測技術實現了感應移相器位反饋信號的檢測功能;採用dsp的捕獲單元實現了光電編器位反饋信號的檢測功能。
  7. In cryptography, a cipher produced by a composition of a number of substitution and transposition ciphers

    學中,由替代密結合使用而構成的一種密
  8. In cryptography, an early example of monoalphabetic, or substitution cipher used in the gallic wars

    學中,在高盧戰爭中使用的一種單表,或稱替代密的早期例子。
  9. A rare code of arg was in one of the first pair of primer and all of bases of the second pair of primer were changed to biased codes of e. coli

    第一對中的一個引物,含有一個精氨酸稀有密子,第二對引物則根據密子的兼并性,所有堿基都成大腸桿菌偏愛的密子。
  10. The fundamentals and basic flow of genetic algorithm are discussed in detail. associated with the production mode and characteristics of wall - paper industry, its production scheduling belongs to the hybrid flow shop ' s problem. applied based - on permutation coding genetic algorithm and used minimal production time as target function, it is solved the problem of low efficiency of wall - paper production equipments " utility that is caused by manpower scheduling and improved the production efficiency

    2 )對生產調度問題的研究現狀和研究方法做了綜述和整理,深入探討了遺傳演算法的基本原理和基本流程,並結合墻紙行業的生產模式和生產特點,指出其屬于混合flowshop問題,採用基於的遺傳演算法,並以最小生產時間作為目標函數,較好的解決了由人工調度帶來的墻紙生產設備使用效率偏低的問題,提高了生產效率。
  11. Another point to be aware of is the need to tell zsh which characters form escape sequence in a prompt, otherwise it will assume they are all printable characters, and position the cursor incorrectly

    另一個需要注意的是需要告訴zsh在提示符中哪些字元構成序列,否則就會假設它們都是可列印字元,光標的位就會出錯。
  12. On the other hand, the cipher systems can be seen as a permutation systems under the controlling of key

    另一方面,由於密系統數學上可以看成是一個在密鑰控制下的映射。
  13. The results obtained in this thesis offers some new ideas and methods for studying of permutation theory in block cipher system

    上述工作為分組密理論的研究提供了新的方法、新的思路,並得到了一批好的源。
  14. 1 luby m, rackoff c. how to construct pseudorandom permutations from pseudorandom functions. siam journal on computing, 1988, 17 : 373 - 386. a preliminary version including other results appeared in proceedings of the 18th acm symposium on theory of computing, 1986, pp. 356 - 363

    可證明安全理論在分組密中的研究始於luby和rackoff對des的工作,他們形式化地描述了分組密的密特性,依據不同的攻擊,定義了偽隨機和超偽隨機的概念。
  15. At the same time, a novel approach to construction of ldpc codes based on the permutation matrix was proposed which got a parity check matrix with the shortest girth is 6. these codes keep the advantage of linear encoding and become more flexible. simulations show that the performance of short length codes of this kind is as excellent as other ldpc codes

    同時提出一種基於陣循環移位的構造方法,得到的校驗矩陣圍長至少為6 ,且保持編的線性復雜度,率靈活,模擬結果驗證了陣ldpc長較短時,在高斯通道下性能接近或超過現有其他構造方式的ldpc
  16. The high at content of the native gene is very difficult to express, we designed a new he gene by reverse the codon used for e. coli and yeast, then, the he gene was cloned into the expression vector pqe - 60

    本研究嘗試了其保護性抗原基因在大腸桿菌及酵母中的表達。天然bont a的hc片段基因中at含量高達76 ,其通過同義密人工合成hc段基因,將at含量降到57 。
  17. This paper first research on main technologies used by avs standard, which include prediction, transform, quantization, in - loop filter, and entropy encoding, and then focus on the 2d - vlc entropy coder of avs, which is context - based adaptive coder. this encoder operates on run - level pair, and it uses the type of current block and value of current coefficients to switch vlc code - table. these tables are designed according to the distribution of transformed coefficients, and this way is much better than using only one table to code all residual coefficients in one 8x8 block

    本文首先詳細研究了avs標準的核心技術,包括預測編、變量化、環路濾波器以及掃描和熵編等,之後重點研究了avs標準中使用的基於上下文的2d - vlc變長編方法,這種方法編的是( run , level )數對,同時根據當前編塊的類型和殘差系數這兩種上下文信息來切表,這些表是預先根據變系數在不同位的分佈信息設計好的,這樣要比只使用一個變長表來編塊內所有位上的殘差系數的壓縮效果要好得多。
  18. An application of the theory of permutations in breaking the enigma cipher

    理論在破譯enigma密中的應用
  19. Block cipher is an important branch of mordant cryptography, and permutation theory has an important role in studying and designing of block cipher

    分組密是現代密學中的一個重要研究分支,而理論在分組密的研究與設計中有著重要的地位。
  20. First a review of developing history and designing principle of block cipher is given and the important function of permutation theory in block cipher is presented in this thesis

    本文首先綜述了分組密的發展歷程、設計原理,以及理論在這個體制設計中的重要作用。
分享友人