解碼指定 的英文怎麼說

中文拼音 [jiězhǐdìng]
解碼指定 英文
decoding assignment
  • : 解動詞(解送) send under guard
  • : Ⅰ名詞(表示數目的符號或用具) a sign or object indicating number; code Ⅱ量詞1 (指一件事或一類的...
  • : 指構詞成分。
  • : Ⅰ形容詞1 (平靜; 穩定) calm; stable 2 (已經確定的; 不改變的) fixed; settled; established Ⅱ動詞...
  • 解碼 : decoding; decipher; decode
  • 指定 : appoint; assign; allocate; appointment; destine; designation; assigning: (通過法律手續) 指定把...
  1. To interpret the encoding of the source files

    的代頁來釋源文件的編
  2. The catv charge and control system is mainly composed of the management software 、 the header data modulator and the terminal charge and control equipment. i am responsible for design catv charge and control equipment and test system. the header data modulator is used to encrypt the control single from computer and transmit it into the appointed frequency. the terminal charge and control equipment demodulate out the control single from data modulator and transmit it to the addressing control part, where the demodulated fsk single is received and well - handled by the cpu unit, decode the unauthorized signals and deliver it to the shut point, shut point make use of capability of wideband anf characteristic of shut, then the signal of illegal customer will be turn off and vice versa, the legal customer can receive the normal signal

    前端數據調制器完成對計算機輸出的控制信號加密處理,將載送到一頻率點。終端收費控制器調出控制信號,送至單片機尋址控制部分。單片機尋址控制部分接收經fsk數據調器送來的信號,送入cpu單元后,出不授權信號,然後向關斷部分送入信號,關斷部分利用pin二極體的寬帶工作能力以及關斷特性,實現對非授權用戶或者非法用戶的信號關斷,使之不能正常收視,繳費用戶進行開通正常收視,達到控制用戶通道的管理。
  3. Object that specifies a string to use instead of the original decoding operation input

    對象,它要使用的字元串而不是原始操作輸入。
  4. Firstly, the system is divided into many modules according to different point of view ; secondly, to the hardware equipment - vidicon, lenses, revolver, shield and decode device, their principle of work has been explained ; thirdly, according to image identification experience and other indexes of the system, the focus of the lenses and relative aperture are calculated, and the type of the camera is confirmed, at the same time, the energy of infrared lamp is also computed in the thesis ; at the same time, synthesis control box is devised

    首先,按照角度的不同,將系統劃分成許多模塊。其次,對硬體設備? ?攝像機,鏡頭,雲臺,防護罩,器等的工作原理進行了闡述,再次,以人的成像辨認的經驗判據為依據,結合系統的其它標,設計計算出鏡頭的焦距f 、相對孔徑d ,同時確攝像機的型號,並計算出紅外燈光源。最後,對綜合控制箱進行設計,出了設計的意義,實現的功能,並附上了綜合控制箱的外形圖。
  5. It is not many scholars to clearly prove the opinion of shifting the burden of proof, on the contrary the contradictory scholars are more prominent, for example the vice professor of southwest politics and law university, chengang, wuyue who translates and introduces the burden of proof of germany, because them there are more and more people support the opposite opinion, while in the draft of " civil evidence code ", the traditional idea win, in this draft the legislator abides by the present justice and our country ' s native circumstance, they made an scientific choice, of course, the burden of proof will directly influence the party " s possibility of losing the lawsuit, while the regulation of shifting the burden of proof increases the plaintiff ' s opportunity to win a lawsuit. to explain what is the shifting of burden of proof, the paper use the civil law as the example to point out the " reverse " is not entirly relieve the plaintiff s obligation of producing evidence, but in certain extent and in certain range make the defendant bear the burden of producing those proofs from the reverse way, which are originally beard by the plaintiff. in the three proceeding law, shifting the burden of proof have some differences, but the interior spirits are coincident - for the values of social justice and the legal reason

    論證舉證責任倒置的學者觀點明確並且論證十分充分的不多,相反卻是對此著書立說予以反駁的學者較為突出,如西南政法大學的副教授陳則博士,翻譯並介紹德國證明責任學說的吳越先生均是目前國內對舉證責任倒置持否態度的代表人物,由於他們的推動使得國內持此說的人越來越多,但在《民事證據法(草案) 》的擬過程中,並未采責任倒置的地位,這樣的立法選擇是建立在對我國法律實現的本土環境客觀認識的基礎上的科學選擇,誠然,舉證責任的分配直接影響到當事人在訴訟中的敗訴風險,而「倒置」規則的設計,則在此問題上增加了原告勝訴的籌,在理何為舉證責任倒置時,本文著重以民事法為主線,出這種「倒置」並非全部免除原告的證明責任,而是在一范圍與一程度上將通常應由原告負擔的舉證責任轉由被告從反方面承擔,舉證責任倒置在三大訴訟法中所體現的具體情形有所差異,但它們的內在精神是一致的?法律的理性與社會公平價值,在民事訴訟中舉證責任倒置的情形,一般總是將其局限於特殊侵權情形,而忽略了民事合同違約責任的訴訟中的原告也無須對被告應承擔違約責任的所有要件,對被告主觀上的過錯實行推,若被告予以否則應對其無過錯的證據舉證,在設置舉證責任倒置的規則時,從各國的立法經驗與法的內在價值要求可以總結出以下幾個原則:程序法與實體法結合原則,公平原則,訴訟經濟原則,保護弱者原則等,基於此完善舉證責任倒置的規則時首先應肯舉證責任倒置的概念,其次立法應避免求大求全,再次要配合實體法的發展,最後還可以在司法領域嘗試判例的導意義。
  6. Value is set to any nonzero value, the value is interpreted as a bitmask that specifies those processors eligible for selection

    值設置為任何非零值時,該值被釋為符合選擇條件的處理器的位掩
  7. Good passwords are commonly defined as a random mix of letters upper and lower case, numbers, and symbols at least eight characters in length - longer is better, meaning in this case harder to guess or crack

    健壯的密義通常至少八個字元長度越長越好,在這里意味著更難猜或破的字母(大寫和小寫) 、數字和符號的隨機組合。
  8. The short form of the term image encoder decoder. software or an algorithm that converts images to a specified file format encoder or from file format to displayed image decoder

    術語「圖像編器/器」的縮寫形式。將圖像轉換為文件格式(編器)或從文件格式轉換為顯示的圖像(器)的軟體或演算法。
  9. Even better, we could edit the source code of the convert program and make it use a postscript sampling resolution specified at run time

    甚至可以編輯轉換程序的源代並讓它使用在運行時的postscript采樣析度。
  10. To learn how to specify a code base, see

    若要了如何基本代,請參見
  11. Asymmetric - key cryptography, which we will discuss in chapter 10, is based on some topics in number theory, including theories related to primes, factorization of composites into primes, modular exponentiation and logarithm, quadratic residues, and the chinese remainder theorem

    我們將在第十章中討論非對稱密鑰密學,非對稱密鑰密學基於一些數論的論題,這些論題與素數、把復合數分為素數的因數分、模數與模對數、二次剩餘和中國剩餘理有關。
  12. Specifies how the code type reference is to be resolved

    類型引用的析方式。
  13. Specifies the password required to decrypt a private key that is retrieved from a file

    對從文件中檢索的私鑰進行密所需的密
  14. Password specifies the password required to decrypt the service master key that is being imported from a file

    對從文件中導入的服務主密鑰進行密時所需的密
  15. That specifies the decoding scheme

    方法的
  16. Class, including a fallback mechanism, new to the. net framework version 2. 0, that allows you to specify its behavior when it encounters problems during the encoding or decoding process

    Net framework 2 . 0版中的一項新功能) ,回退機制用於當在編過程中遇到問題時其行為。
  17. When you open a solution from source control, the management studio environment automatically retrieves the latest version of the solution and copies it to the location you specify

    從源代管理中打開決方案時, management studio環境將自動檢索該決方案的最新版本並將其復制到的位置。
  18. Core development scenarios, particularly data, have been addressed by new data controls, no - code binding, and smart data - display controls

    新增數據控制項、無代和智能數據顯示控制項已經決了核心開發方案(尤數據)問題。
  19. Method decrypts the contents of the decoded enveloped cms pkcs 7 message by using the private key associated with the certificate identified by the specified recipient information

    方法通過使用與收件人信息標識的證書關聯的私鑰來的cms / pkcs # 7封裝消息的內容。
  20. Method decrypts the contents of the decoded enveloped cms pkcs 7 message by using the private key associated with the certificate identified by the specified recipient information and by using the specified certificate collection

    方法通過使用與的收件人信息標識的證書關聯的私鑰和的證書集合來的cms / pkcs # 7封裝消息的內容。
分享友人