辨認碼 的英文怎麼說

中文拼音 [bānrèn]
辨認碼 英文
id identification/identity/identifier
  • : Ⅰ動詞(辨別; 分辨; 明察) distinguish; discriminate; differentiate; recognize Ⅱ名詞(姓氏) a surname
  • : 動詞1 (認識; 分辨) recognize; know; make out; identify 2 (建立關系) enter into a certain rela...
  • : Ⅰ名詞(表示數目的符號或用具) a sign or object indicating number; code Ⅱ量詞1 (指一件事或一類的...
  • 辨認 : (辨別認定) identify; recognize; make out
  1. I will not write down his real name even in this bothersome yiddish-letter cipher.

    即使是用難以的意弟緒語字母的密,我也不願意在這里寫下他的真實姓名。
  2. When submission is made in acceptable physical forms, a label shall be affixed to the diskette cd - rom with identification information such as name of sender, contact telephone no. address and file reference written thereon

    如以合符規定的實物形式提交電子紀錄,請于該磁碟或唯讀光碟貼上標簽,並寫上有關的資料,如提交人的姓名,聯絡電話地址及檔案號
  3. Firstly, the system is divided into many modules according to different point of view ; secondly, to the hardware equipment - vidicon, lenses, revolver, shield and decode device, their principle of work has been explained ; thirdly, according to image identification experience and other indexes of the system, the focus of the lenses and relative aperture are calculated, and the type of the camera is confirmed, at the same time, the energy of infrared lamp is also computed in the thesis ; at the same time, synthesis control box is devised

    首先,按照角度的不同,將系統劃分成許多模塊。其次,對硬體設備? ?攝像機,鏡頭,雲臺,防護罩,解器等的工作原理進行了闡述,再次,以人的成像的經驗判據為依據,結合系統的其它指標,設計計算出鏡頭的焦距f 、相對孔徑d ,同時確定攝像機的型號,並計算出紅外燈光源。最後,對綜合控制箱進行設計,指出了設計的意義,實現的功能,並附上了綜合控制箱的外形圖。
  4. " in addition, to comply with the security requirements of the ordinance, web sites that display personal data that may be considered sensitive are advised to consider some form of authentication for parties that are authorised to access such personal data, e. g. by assigning passwords to such parties, " mr. lau said

    此外,為符合條例在個人資料保安方面的規定,我們建議展示敏感性個人資料的網址考慮實施某些確形式,以識獲授權查閱該等個人資料的人士,例如指定密給有關人士使用。
  5. In the main - process, the coordinates of nodal points on part outline curve can be calculated by replacing this curve with a linear approximation. the codes expressed in nc program form which can be recognized by nc machine tool are got according to the coordinates of these nodal points in the post - process

    在前置處理中,用直線逼近零件輪廓,得到輪廓曲線的節點坐標:在後置處理中,根據這些節點坐標按照數控程序的格式得到數控機床可以的程序代
  6. Levels of different password protection systems ; the first level is company identification code. in order to keep the uniqueness for protection locks purchased by each company, mcamos technology provides each customer with an exclusive id, which is a unique and unrepeatable number

    層不同的密保護機制第一層為公司辨認碼,為使每個公司所購買的保護鎖具有唯一性,先趨科技提供每一家客戶一個專屬的,該為唯一且不重復號
  7. We have seen some recent, positive developments, including the passage of a new copyright law that provides criminal penalties for piracy, prosecution of retailers of pirated cds, a new source identifier code requirement, and tighter controls on raw materials used to produce audio and video discs

    我們已經看到最近一些積極的進展,包括新通過的懲治盜版行為的版權法案,起訴出售盜版光碟者,要求新的源,以及加強控制用於生產音影光碟的原材料。
  8. For completion of the e - form of ird

    發出的有效數證書,以身分。
  9. It is thus understandable that the general public and the businesses would prefer using simpler authentication methods such as one - time password or pin

    因此,一般市民及企業選擇使用如一次性密或個人等較簡單的證方法,這點是可以理解的。
  10. What a person knows ( the code or accompanying pin number to be entered on a keypad )

    使用者所知道的(即透過按鈕牌輸入密和個人
  11. Secondly, the thesis analyzes the different transfer theories, selects the cognitive perspective, puts forward the idea of designing instructional strategy for enhancing transfer which based on the internal transfer mechanism - coding, organization, discrimination and mind inclining. furthermore, according to psychology theory, learning and teaching theory, the paper raises some microcosmic strategies aimed at each of the four transfer mechanisms, and then expounds and proves them

    其次,針對如何設計促進遷移的教學策略的問題,深入分析各派遷移理論,選擇較為科學的知視角,提出設計的思路:根據遷移產生的內在機制? ?編、組織、別和心向,從促進有效編、合理組織、清晰別和心向建立四個方面來設計相應的教學策略。
  12. When scanned by a nearby reader, the embedded chip yields the data - say an id number that links to a computer database file containing more detailed information

    當附近的信息閱讀器掃描到晶元的時候,這種微型晶元就會發送出數據,例如發送該人的身份證號,而電腦通過身份證號,將可以提供此人更詳細的資料。
  13. When scanned by a nearby reader, the embedded chip yields the data - say an id number that links to a computer database file containing more detailed information. most embedded chip designs are so - called passive chips which yield information only when scanned by a nearby reader

    當附近的信息閱讀器掃描到晶元的時候,這種微型晶元就會發送出數據,例如發送該人的身份證號,而電腦通過身份證號,將可以提供此人更詳細的資料。
  14. B authentication by digital certificate via existing authentication means ; and pre - registered accounts identified by taxpayer identification number and e - stamp account number with password control

    B證i數證書使用現行證方式ii以稅務編號和印花易帳戶號的預先登記戶口,輔以通行密身分。
  15. A 999 emergency telephone system with automatic emergency call number and location identification capability

    有自動緊急來電號及位置功能的九九九緊急求助電話系統;
  16. The most popular forms of biometric identifiers are retina scans, hand geometry, thumb scans, fingerprints, voice recognition, and digitised photographs

    在生物統計學的領域中,最常見的身分識別符包括視網膜、掌紋、指模、聲線及數相片。
  17. Its form of reflection contains listening, speaking, reading, and writing, etc. the latter, on one side, decomposes and encodes ( classification ) the outside input of information, and at the same time, draws ( activate, search ) the mode of the inside cognition structure, then identifies the mode in order to decide in which way to solve the outside input, by answering or making a new mode

    其反映形式有聽、說、讀、寫等。內部交流,一方面是對外部輸入的信息進行分解、編(歸類) ,同時對內部知結構中的模式進行提取(激活、搜尋) ,然後進行模式,決定回答還是建構新的模式以解決外部輸入的問題,再譯返回。
  18. The biometric feature, the card face data and the pin feature available in the smart id card present a new infrastructure to support the introduction of e - services with appropriate authentication options

    智能身份證的生物特徵功能、身份證證面資料和個人功能,將會形成一個新的基礎設施,在適當的證選擇配合下,支援更多電子服務。
分享友人