非二進碼 的英文怎麼說

中文拼音 [fēièrjìn]
非二進碼 英文
non binary code
  • : Ⅰ名詞1 (錯誤) mistake; wrong; errors 2 (指非洲) short for africa 3 (姓氏) a surname Ⅱ動詞1 ...
  • : Ⅰ數詞(一加一后所得) two Ⅱ形容詞(兩樣) different
  • : 進構詞成分。
  • : Ⅰ名詞(表示數目的符號或用具) a sign or object indicating number; code Ⅱ量詞1 (指一件事或一類的...
  1. According to the least twin multiplication to calculating the sensitivity index in several water production functions. thus, the writer obtains the fitted the value of the sensitivity index and the varied rule. at the same time, the writer puts forward a new method named rag a ( real coding based accelerating genetic algorithm ) and combines raga with dpsa to calculating the best irrigation system under the non - sufficient irrigation of well irrigation rice in sanjiang plain

    根據《隨機水文學》理論中的時間序列分析法,建立了適合三江平原井灌水稻需水量預報的平穩時序隨機模型;通過分析降雨隨機特性,選定季節性時序隨機模型,建立了適合三江平原井灌水稻降雨預報的月平均降雨模型;根據最小乘法,計算出幾種常用水分生產函數中的敏感指數及敏感系數,而得到三江平原適宜採用的水分生產函數漠型及模型中敏感指數的變化規律;本文提出遺傳動態規劃法( raga ? dp ) ,即採用改的基於實數編的加速遺傳演算法( realcodingbasedacceleratinggeneticalgorithm ,簡稱raga )與動態規劃法( dpsa )相結合,推求充分灌溉條件下三江平原井灌水稻的最優灌溉制度。
  2. The catv charge and control system is mainly composed of the management software 、 the header data modulator and the terminal charge and control equipment. i am responsible for design catv charge and control equipment and test system. the header data modulator is used to encrypt the control single from computer and transmit it into the appointed frequency. the terminal charge and control equipment demodulate out the control single from data modulator and transmit it to the addressing control part, where the demodulated fsk single is received and well - handled by the cpu unit, decode the unauthorized signals and deliver it to the shut point, shut point make use of capability of wideband anf characteristic of shut, then the signal of illegal customer will be turn off and vice versa, the legal customer can receive the normal signal

    前端數據調制器完成對計算機輸出的控制信號加密處理,將指令載送到一指定頻率點。終端收費控制器解調出控制信號,送至單片機尋址控制部分。單片機尋址控制部分接收經fsk數據解調器送來的信號,送入cpu單元后,解出不授權信號,然後向關斷部分送入信號,關斷部分利用pin極體的寬帶工作能力以及關斷特性,實現對授權用戶或者法用戶的信號關斷,使之不能正常收視,繳費用戶行開通正常收視,達到控制用戶通道的管理。
  3. Bounds of undetected error probability for binary constant weight codes

    關於一類線性等重檢錯性能的一步分析
  4. Because of the unique issues in the networks, including mobility - induced disconnection, network partition, high out - of - order delivery ratios and channel errors, the congestion control and the error recovery in the network is challenging. in this environment, the interaction between tcp and mac layer protocols, the affection of route protocols on the performance of tcp and the particular congestion control and error recovery mechanism are first discussed. then a particular transport layer protocol scheme based on the non - feedback mechanism is presented, with emphasis on the analysis and simulation of the key parameter

    文中主要討論了兩種不同網路結構中的無線tcp協議改方案,其一在最後一跳為無線鏈路的網路環境中,針對基本tcp擁塞控制機制存在的缺陷,文中在現有解決方案的基礎上提出一綜合性的方案,其中包括無線鏈路的高誤率和連接斷開問題的解決,並重點對方案中出現的交叉層問題行分析和模擬;其,考慮的是分散式網路( adhoc ) ,在文中較為詳細的分析了tcp和mac層機制間的相互作用、路由協議中造成tcp性能降低的因素、 adhoc網路中應採取的特殊擁塞控制和差錯恢復機制,在此基礎上提出了一種採用反饋機制的解決方案,重點對方案中的關鍵參數行分析和模擬,分析和模擬結果表明此機制可在很大程度上提高adhoc網路中tcp的性能。
  5. At first we improve the methods of iris image preprocessing, including an efficient arithmetic of evaluation iris images, an improving method of locating iris, calibrating iris image by the translation of coordinate and the circular shift of code, a eatimate of the background illumination by bicubic spline, and the image enhancement by the dual tree complex wavelet transform. next we designed the recognition arithmetic based on the location of the local maxima of the wavelet transform modulus. in the thesis lots of simulation are performed by means of matlab and visual c + +

    首先改了虹膜預處理方法,實現了一種快速高效的虹膜質量評價演算法;設計了一種改的兩步虹膜定位演算法,準確的定位了虹膜的內外邊界;利用坐標轉換和編的循環移位實現了對虹膜圖像的配準;利用雙三次樣條函數擬合虹膜圖像背景,去除了均勻光照對虹膜識別的影響;使用分樹復數小波方法增強了虹膜圖像的對比度;在識別演算法方面,本文設計了一種「基於小波模極值點位置的虹膜識別演算法」 。
  6. Simultaneously, for preventing prematurity, crossover positions in crossover operator choose according to not equal probability. when bringing into new genes, reverse bit binary strings those have the same number as the optimal individuals are supplied, which settles gene absence problem reproduction results in

    同時為了防止早熟現象,交叉運算元中的交叉位置按等概率選取的方法行;在納入新的基因時,加入與最優個體群等量互補的串,解決了復制操作導致基因缺失的問題。
  7. Among the arrested persons, 15 men and 48 women were arrested for breach of conditions of stay, 10 men for dealing in mobile phones, four men and 40 women for prostitution offences, eight men for gambling offences, 12 men for selling pornographic vcdsdvds, three men for selling pirated cd roms, and 10 men and 13 women for selling contraband cigarettes. a total of 14 300 pieces of pirated cd roms worth about $ 357, 000, 4 424 pieces of pornographic vcds and dvds worth about $ 91, 000 were seized. also, 40 720 pieces of contraband cigarettes worth about $ 61, 000 were found in the operation

    被捕者當中,十五男四十八女涉嫌違反逗留條件、十名男子涉嫌行手提電話交易、四男四十女涉嫌與賣淫活動有關、八名男子涉嫌干犯賭博罪行、十名男子涉嫌販賣色情影像光碟數光碟、三名男子涉嫌販賣翻版唯讀光碟,另外,十男十三女則涉嫌販賣未完稅香煙被捕。
  8. 5 the client may not independently modify software components ( change binary code ) of the client side of the trading platform, to scan ports of the server side of the trading platform, as well as make any malevolent action in order to create overload, failure or incorrect performance of the trading platform

    5顧客無權自己改形商業程序的顧客部份的程序成分(比如改變制編) ,無權掃描商業程序的服務器的部份以及無權行目的是引起商業程序的過載、故障或者正確操作的任何惡意性行動。
  9. In this paper, we will more deeply research on the base of the works, the first part, we give the summarize for the condition and the significance. the second part, we give the preparation knowledge to the whole paper ; the third part, we research the lower and upper bound of the generalized hamming weights for the linear codes ; include d ( r, n, k ) bound, the finite sum representation of the lower and upper bound function of generalized hamming weights for linear codes, generalized griesmer bounds ; the 4 - th part, research the definition, the property of the r - th generalized weights for the non - linear codes and non - linear constant codes, and give the expression of the generalized weight of binary ( n, m, d ) non - linear codes ; the 5 - th part, research the weight hierarchy of linear codes and non - linear codes, for example, necessary condition and sufficient condition, the 6 - th part, we research the expression of the r - th generalized hamming weights of reseaval classes codes

    本文在已有的基礎之上作了一步的探討,第一章綜述了廣義hamming重量的現狀和意義;第章給出了全文的預備知識;第三章研究了線性的廣義hamming重量的一些上下界;包括d ( r , n , k )界,上下限函數有限和表達式,廣義griesmer界;第四章討論了線性線性等重的廣義hamming重量的定義、性質,給出了2元( n , m , d )線性的第r廣義hamming重量的表達式;第五章研究了線性線性的重量譜系;第六章給出了幾類的廣義hamming重量的表達式,這些包括直和( directsumcodes ) 、笛卡爾積( cartesianproductcodes ) 、張量積( tensorproductcodes ) 、延長hamming
  10. In this paper, the general structure of block cipher together with its related properties is firstly discussed, then the main non - linear component of s - boxes in block cipher is analyzed. as to the boolean function in binary field, we studied its non - linearity, linearity structure, output bit independence criterion ( big ), balance, completeness, strict avalanche criterion, propagation criterion, correlation immunity, linear approximation table and xor distribution table. we also discussed the pile - up lama used to compute the combination linear probability and showed an instance of its application

    本文首先討論了分組密的一般結構及其相關特性,此外還有分組密主要的線性組成部分s盒。對於元域上的布爾函數主要討論了其線性性、線性結構、比特獨立準則、平衡性、完整性、雪崩準則、傳播準則、相關免疫性、線性分佈表及異或分佈表等特性。對計算組合線性概率的迭加定理我們也行了具體的討論,並給出了運用事例。
  11. It brought forward genetic algorithms with binary character string coding, genetic operation is the best optional optimization preserving strategy operation, multipoint crossover and nonsymmetrical mutation based on researching widely the genetic algorithms " characteristics of varied coding modes, selection modes, crossover modes and mutation modes in allusion to genetic algorithms is difficult of multi - parameter coding and genetic operation ' s realization for wave impedances inversion

    針對遺傳演算法用於波阻抗反演涉及多參數編、以及對應遺傳操作不易實現的問題,在廣泛研究了遺傳演算法的各種編方式、及其對應的選擇方式、交叉方式以及變異方式特點的基礎上,提出了採用制字元串編、遺傳操作為最優保存策略選擇、多點交叉和均勻變異的遺傳演算法。
  12. This paper brought forward global optimized wave impedances mixed inversion based on genetic algorithms with binary character string coding, genetic operation is the best optional optimization preserving strategy operation, multipoint crossover and nonsymmetrical mutation based on researching widely the genetic algorithms ' characteristics of varied coding modes, selection modes, crossover modes and mutation modes in allusion to genetic algorithms is difficult of multi - parameter coding and genetic operation ' s realization for wave impedances inversion

    摘要針對遺傳演算法用於波阻抗反演涉及多參數編、以及對應遺傳操作不易實現的問題,在廣泛研究了遺傳演算法的各種編方式、及其對應的選擇方式、交叉方式以及變異方式特點的基礎上,提出了採用制字元串編、遺傳操作為最優保存策略選擇、多點交叉和均勻變異的遺傳演算法,基於該演算法形成了全局尋優的波阻抗混合反演方法。
  13. Magnetic sensors are an important branch that can be used to detect the non - electronically characteristics through the magnetic field. the insb intellectualized magnetic coder sensor in this paper is designed for the measurement of the position of object and the angular velocity of object. through the sensor, the information of the position and the angular velocity are changed to electric pulse which can provides to other second instruments

    通過磁場的無接觸特性,對電量的測量是磁傳感器應用的一個重要方面,本文所研究的智能化磁編器是對于轉動物體的位置、角速度行高精度測量的一類傳感器,它可以把轉動物體的位置和角速度信息轉換成電脈沖信號,供次儀表使用。
  14. Though some soft - decision algorithms for binary finite field have existed, non - binary finite field is seldom concerned

    此外雖然已經存在多種軟判決方法,但都是針對制情況,沒有考慮到制的rs
  15. We discussed detailedly the application of parameter - induced stochastic resonance in binary baseband pulse amplitude modulated ( pam ) signal transmission. the system ' s measurements : bit error rate and channel capacity were deduced. the numerical simulation demonstrated our theoretical analyses

    我們著重討論了參數誘導的隨機共振在制基帶脈沖幅值調制( pam )信號傳輸中的應用,詳細推導出了衡量系統傳輸性能的誤率和通道容量公式,並利用模擬模型行了數值模擬,理論分析和模擬結果常符合。
  16. Qr code is a kind of 2d matrix barcode. it has high density, great capacity that will influent coding of 2d - barcode. a rs code is cyclic symbol error - correcting code, which can correct lost or missing data for damaged symbols

    Qrcode是一種矩陣,具有信息密度大、容量高的優點,因此,譯時受噪聲的干擾大,採用糾錯能力比較強的制bch中的一類? rs行編,可以有效地抗除干擾行糾錯。
  17. The main works of this paper are presented as follows : ( 1 ) analyzed the research condition and the difficulty of multi - agent security research at present, and we gave the definition of security in a multi - agent system ; ( 2 ) analyzed and sampled involved immune mechanism, we constructed a immune agent and described its mental attribute by dfl ; ( 3 ) gave a communication form based on mental attribute ; ( 4 ) based on dfl, we proposed a diseriminating model among tias by taking into account the theories of dynamic immune network ; ( 5 ) based on the principle of clone selection, we gave a tia ’ s immune algorithm, and put forward single tia ’ s distinghuishing model and multi - tia ’ s distinghuishing model by taking this algorithm as foundation ; ( 6 ) the security model carried on an application in the detection of computer virus, for this purpose, we also developed a simple simulation program based on binary coding

    主要包括如下工作: ( 1 )分析了當前多agent安全的研究現狀及其面臨的困難,給出了多agent安全的需求和定義; ( 2 )分析和抽取了相關的免疫機制,構造了一種免疫agent ,並利用動態模糊邏輯對其空心智狀態行了描述; ( 3 )給出了agent之間基於心智屬性的通信方式; ( 4 )以動態免疫網路理論為基礎,結合動態模糊邏輯,給出了tia的狀態鑒別模型; ( 5 )給出了基於克隆選擇原理的tia免疫演算法,並在該演算法的基礎上提出了單tia自體識別模型和多tia協商自體識別模型; ( 6 )將該安全模式在計算機病毒檢測中行了應用,實現了一個簡單的基於制編的計算機病毒檢測模擬系統。
  18. Web projects - code files, project files, resource files, . config files, referenced assemblies, sdm files, and all other non - source and non - binary files

    Web項目-代文件、項目文件、資源文件、 . config文件、引用的程序集、 sdm文件以及所有其他源文件和制文件。
  19. Abstract : according to the characteristic of hybridize and sudden change of binary coding chromosome in classical genetic algorithm, this paper defines the rule of hybridize and sudden change of continuous variables. the method is noted for easy to operate and quite good to approach the best true solution in overall situation. by means of three computed examples of nonlinear optimization and quadratic programme problem, it confirms that the method has strong adaptability and can precisely determine the best solution, in overall situation

    文摘:根據傳統遺傳演算法中對於制編染色體的雜交和突變的特點,定義了連續變量的雜交、突變規則.此方法有操作簡便,可較好地逼近全局最優的真實解的特點.通過線性優化和次規劃問題的3個算例,證實本演算法適應性強,可較精確地確定全局最優解
分享友人