binary condition 中文意思是什麼

binary condition 解釋
二進制條件
  • binary : adj. 二,雙,復;【化學】二元的;【數學】二進制的。n. 二,雙,復;雙體,復體;【天文學】雙[聯]星【數學】二進制。
  • condition : n 1 狀態,狀況,情形;品質。2 〈pl 〉外界狀況,周圍情形。3 地位,身分。4 條件;【語法】條件子句。...
  1. Component technology is the further development of objected - oriented technology. it makes program components to be modified and replaced under binary condition. incorporated with component technology, three - tire structure has stronger maintainability and extensibility

    組件技術是面向對象技術的進一步發展,它使得程序部件可以在二進制情況下修改和替換,結合了組件技術的三層架構具有更強的可擴展性和可維護性。
  2. Finally, the method of estimating power customer emission level based on binary linear regression is put forward, which make it a condition that harmonic emission is steady at the point of common coupling. combined with power system thevenin equivalent and customer norton equivalent, according to the principle of least squares method, the voltage that a customer ' s harmonic current begets at the point of common coupling can be estimated in the light of the plural correlation of network parameters

    最後,提出了基於二元線性回歸的用戶諧波發射水平估計方法,該方法在假設公共聯接點諧波發射穩定的情況下,結合系統側戴維南等值與用戶側諾頓等值的電路圖,按照最小二乘法原理,利用電網各參數的復數關系推導關于系統側諧波阻抗的二元線性回歸方程,並根據諧波阻抗的估計值求取用戶諧波電流在公共聯四川大學碩士學位論文( 2003 )接點產生的電壓降。
  3. In this thesis, first, we present the theory of sess system, the generation of the sess spreading code and its characteristics and the acquisition theory of conventional spread spectrum communication system. an efficient acquisition scheme based on periodically transmitting the synchronization head, which is composed of binary chaotic codes, using the matched filter and automatic decision threshold - level control based on a so - called constant false alarm criterion for sess system is present. the acquisition model of sess system is built and simulated in the awgn channel, the raleigh fading channel and imulti - address interfere condition

    本文首先概述了自編碼擴頻通信的原理、自編碼擴頻序列的產生方法及其特性和擴頻通信系統編碼同步的理論,然後針對自編碼擴頻通信系統提出了擴頻序列捕獲方案:周期性地加入混沌序列同步碼,並採用恆虛警率匹配濾波器捕獲法;在加性白高斯噪聲通道、瑞利衰落通道和多址干擾情況下進行了模擬,分析了各種捕獲性能:在選擇性能最優的混沌序列、適當的序列長度、虛警概率及門限值的情況下,可以獲得較短的捕獲時間和較大的捕獲概率。
  4. In this paper, we will more deeply research on the base of the works, the first part, we give the summarize for the condition and the significance. the second part, we give the preparation knowledge to the whole paper ; the third part, we research the lower and upper bound of the generalized hamming weights for the linear codes ; include d ( r, n, k ) bound, the finite sum representation of the lower and upper bound function of generalized hamming weights for linear codes, generalized griesmer bounds ; the 4 - th part, research the definition, the property of the r - th generalized weights for the non - linear codes and non - linear constant codes, and give the expression of the generalized weight of binary ( n, m, d ) non - linear codes ; the 5 - th part, research the weight hierarchy of linear codes and non - linear codes, for example, necessary condition and sufficient condition, the 6 - th part, we research the expression of the r - th generalized hamming weights of reseaval classes codes

    本文在已有的基礎之上作了進一步的探討,第一章綜述了廣義hamming重量的現狀和意義;第二章給出了全文的預備知識;第三章研究了線性碼的廣義hamming重量的一些上下界;包括d ( r , n , k )界,上下限函數有限和表達式,廣義griesmer界;第四章討論了非線性碼及非線性等重碼的廣義hamming重量的定義、性質,給出了2元( n , m , d )非線性碼的第r廣義hamming重量的表達式;第五章研究了線性碼、非線性碼的重量譜系;第六章給出了幾類碼的廣義hamming重量的表達式,這些碼包括直和碼( directsumcodes ) 、笛卡爾積碼( cartesianproductcodes ) 、張量積碼( tensorproductcodes ) 、延長hamming碼。
  5. The impact behaviors of pp / eoc and pp / caco3 were compared. the toughening mechanisms of pp / eoc and pp / caco3 systems are firstly proved to agree well with wu ' s percolation theory. the essential condition occurring brittle - tough transition in two binary systems is that the matrix ligament thickness ( l ) is lower than the critical matrix ligament thickness ( lc ) which is approximate to 0. 095 ? m

    比較ppffioc和ppcacos二體系的增韌行為,發現加入eoc和cacos都能增韌pp ,首次驗證了新型彈性體eoc和無機剛性粒子cacos增韌pp的機理符合wu氏逾滲理論,二體系發生脆韌轉變的基本條件是基體帶厚度l小於臨界基體帶厚度人( 。
  6. Solutions presented in this thesis can be summarized as follows : - a sufficient and necessary condition is given for the negacyclic codes whose binary images under the gray map being cyclic, and the binary images are determined when the condition is satisfied

    本文的主要結果為: 1給出了判定一個四元負循環碼的二元像是否是循環碼的充分必要條件,並在條件成立時,給出了其二元像的結構; 2
  7. To validate the performance of the proposed scheme, the scheme is simulated with fpga, and the simulation result indicates that compared with the conventional pn acquisition schemes, the pn acquisition using auxiliary sequence and binary search can decrease the acquisition time greatly on the same condition

    同時,為了進一步驗證該同步捕獲方案的捕獲性能,文中採用fpga器件對捕獲方案進行模擬,分析結果表明:與傳統的序列捕獲方案相比,基於輔助序列和二分法的同步捕獲方案可以在系統復雜度和性能不變的前提下,大大縮短捕獲時間,實現擴頻序列的快速捕獲。
  8. The magnetic recording of binary characters in which the pattern of magnetization used to represent zeros and ones occupies only part of the storage cell, the remainder of the cell being magnetized to a reference condition

    一種二進制字元的磁記錄方法,其中磁化的方式為:僅佔用每個存儲單元的一部分來表示「 0 」和「 1 」 ,存儲單元的其餘部分被磁化為基準狀態。
  9. It is shown that under the enviromental condition of vortices group the merger process of binary vortices happened in the case of weak enviromental fields no longer currs ; and meanwhile, the introduction of vortices swarm might lead to the intensification of vortices

    指出:弱環境流條件下雙渦合併的過程,在渦群環境條件下不再存在;同時,渦群環境流的引進可使渦強度顯著增強。
  10. To implement dynamic binary translation effectively, several optimized methods come up in this thesis : efla algorithm to enhance the efficiency of emulating the condition code of the source platform on target platform ; two algorithms to handle the active and passive exception in application level ; and a translation - guided algorithm for register allocation

    針對動態二進制翻譯,本文提出了若干種優化方案:提高在目標機器上模擬源機器標志位效率的efla演算法;處理應用級主動異常和被動異常的兩個演算法;翻譯制導的寄存器優化演算法。
  11. An indicator, usually a single binary bit, whose state is used to inform a later section of a program that a condition, identified with flag, had occurred

    通常由一個二進制位組成的指示符,它的狀態用來通知一個程序的後面的某一部分,由指示符所標識的以及由它所指定的狀態業已發生。
  12. The main works of this paper are presented as follows : ( 1 ) analyzed the research condition and the difficulty of multi - agent security research at present, and we gave the definition of security in a multi - agent system ; ( 2 ) analyzed and sampled involved immune mechanism, we constructed a immune agent and described its mental attribute by dfl ; ( 3 ) gave a communication form based on mental attribute ; ( 4 ) based on dfl, we proposed a diseriminating model among tias by taking into account the theories of dynamic immune network ; ( 5 ) based on the principle of clone selection, we gave a tia ’ s immune algorithm, and put forward single tia ’ s distinghuishing model and multi - tia ’ s distinghuishing model by taking this algorithm as foundation ; ( 6 ) the security model carried on an application in the detection of computer virus, for this purpose, we also developed a simple simulation program based on binary coding

    主要包括如下工作: ( 1 )分析了當前多agent安全的研究現狀及其面臨的困難,給出了多agent安全的需求和定義; ( 2 )分析和抽取了相關的免疫機制,構造了一種免疫agent ,並利用動態模糊邏輯對其非空心智狀態進行了描述; ( 3 )給出了agent之間基於心智屬性的通信方式; ( 4 )以動態免疫網路理論為基礎,結合動態模糊邏輯,給出了tia的狀態鑒別模型; ( 5 )給出了基於克隆選擇原理的tia免疫演算法,並在該演算法的基礎上提出了單tia非自體識別模型和多tia協商非自體識別模型; ( 6 )將該安全模式在計算機病毒檢測中進行了應用,實現了一個簡單的基於二進制編碼的計算機病毒檢測模擬系統。
分享友人