shape code 中文意思是什麼

shape code 解釋
形狀代碼
  • shape : Shape=Supreme Headquarters Allied Powers in Europe (北大西洋公約組織的)歐洲盟軍最高司令部。n 1...
  • code : n 1 法典;法規。2 規則,準則;(社會、階級等的)慣例,習俗,制度。3 (電)碼,代碼,密碼,暗碼;...
  1. This text studied the mutually interference influences to the aerodynamic force of irregular shape base on analysis using wind force and wind pressure data of super high buildings model obtained by wind tunnel tests, and provided reference to designer and expurgator on building code

    本文以超高層建築剛性模型的高頻天平測力風洞試驗數據和表面測壓風洞試驗數據為依據,研究了復雜外形建築的風力和高層建築相互干擾對風力影響,供設計者及規范修訂時參考。
  2. Plug : round shape 10pin, code no. 010 ; aami tpu innocuous cable is no harmful for the body ; special metal conductor make the using life increase 3 - 5 times ; high performance double shield cable ; gild terminal ensure connecting ; imported snap fastener ensure the longer uselife ; add the special anlistatig layer to protect the higher performance. junction box : 1 to 3 cables ; advantage technologies to avoid broken

    插頭:圓頭10pin 010 aami標準鍍金端子確保連接信號更準確高性能tpu屏蔽電纜加入抗靜電干擾塗層特殊合金導體增加線纜壽命3 - 5倍分線合:一分三患者端:按扣式
  3. The numerical calculation simulation shows that the fgb will change its shape upon propagation. ( 5 ) using the quasi - discrete hankel transform ( qdht ), the fast calculation code simulating the propagation of cylindrical symmetry laser beams passing through high power laser amplifier system is built up for the first time. the code is applied to

    ( 3 )明準訴散漢克爾變換編制寧旋轉對稱光束在高功率激光放大系統中傳輸的快冰汁彝摸擬程序,利用該程序對超高斯光束在多麟光放大系統中的傳輸和神光紅栩櫥化光傳。
  4. However, we ought to recognize that because of the low efficiency of our country ' s social circulation and the low level of the development of our country ' s logistics industry, there are still some problems for the application of the modern information technology as follows : ( 1 ) our application of the information technology is low - level ; ( 2 ) the application of the bar code is in advance, but its universal degree ca n ' t meet the demand of the development of the logistics ; ( 3 ) our application of the edi is very limited and the logistics information - sharing mechanism among the enterprises has not shape up ; ( 4 ) the network technology does remain in an initial stage ; ( 5 ) there are a few enterprises which are using various systems of integrated software for optimizing the disposition of the logistics operation

    但是我們也應看到由於我國社會流通效率低下,物流產業發展水平還比較低,現代信息技術的應用還存在著以下幾個問題:一是信息技術應用水平較低,在物流方面的應用還比較少;二是雖然條形碼技術應用開展較早,但普及程度仍不能滿足物流發展要求;三是國內edi的應用范圍非常有限,企業之間物流信息的共享機制尚未形成;四是網路技術仍然停留在初級水平;五是國內利用各種系統集成軟體優化配置物流作業的企業還非常少。
  5. 4. the humanoid chinese character recognition system. based on eight - shape code scheme and code - extraction algorithm, humanoid chinese character recognition system is presented

    在漢字八形碼編制及提取演算法的基礎上,提出了基於漢字八形碼的仿人漢字識別系統。
  6. Some research on chinese character structure is done, and after some coding schemes of chinese character are summarized and trait of computer vision is considered, a new code - eight - shape code for chinese character is presented, which indicates chinese character structure trait and can be extracted automatically by computer from chinese character images

    對漢字的構成進行了研究,在總結多種漢字編碼方案優缺點的基礎上,結合計算機視覺的特點,提出一種表徵漢字特徵的機器認知漢字八形碼編制方法。 4 )仿人漢字識別系統。
  7. Genes are a kind of code. a tree ' s genes tell what shape its leaves will be. your genes tell what color your eyes will be

    基因是一種生命編碼。樹的基因決定了樹木葉子的形狀是什麼樣的。而你的基因決定了你的眼睛的顏色。
  8. In this paper, a boundary chain code tracing method is used to extract the contour information, the process of thinning, de noising, and encoding for contour are realized at one time, so a 1d string represented the 2d contour shape information is obtained, then a contour matching method based on chain code is presented

    摘要首先利用邊界鏈碼的跟蹤技術,提取出二維碎片的輪廓信息,同時對輪廓線進行細化、去噪和編碼處理,得到二維輪廓線的一維鏈碼信息描述,並在此基礎上提出一種基於鏈碼的二維碎片輪廓匹配方法。
  9. Part ii, the source of the active obligation first of all, this section introduces the source of essence doctrine and formal doctrine in the sino - foreign criminal law theon " about the active obligation. based on the shape analyses of these formal and essence source, the source of the active obligation that the writer thinks ought to be the union of the formal and essence source, that is, on the one hand through probing into the norm kev element by form, the author thinks that the formal key element of the formal source is the following four sources : the statue source code is regulated demand in duties either the professional work the action before and the legal action. on the other hand, through the essence, the author probes the reasons of source and thinks that the essence key element is the doer " s exclusively controlling the legal right and interest confronted with pressing peril and depended on his action

    第二部分作為義務的發生根據首先,本部分介紹了中外刑法理論中關于作為義務的形式來源學說和實質來源學說。在分析了形式來源和實質來源的基礎上,筆者認為不作為犯罪作為義務的來源應當是形式來源和實質來源的統一,即:一方面從形式上探討其規范的要素,認為不作為犯的作為義務來源的形式要素即我國刑法理論關于作為義務來源的四來源說:法律明文規定、職務或業務上的要求、先行行為及法律行為四種;另一方面從實質上探討其存在根據,認為作為義務來源的實質要素是指行為人對處于緊急危險狀態的法益的危險程度加劇或危險向危害結果的現實性轉化具有排他性支配。
  10. At first, the effect of the target on the neutron flux is discussed to determine the optimal proton energy, target material, shape and dimension by using the high - energy particle transport code nmtc / jam

    首先利用高能粒子輸運程序nmtc jam計算了入射質子能量、靶的材料、形狀、尺寸以及靶與慢化器耦合對中子通量的影響。
  11. Then we introduce pulse position modulation ( ppm ) using pn code and analysis its multi - access performance, system capacity and power spectrum density. on the basis of those analyses, we study the pulse shape and the anti - jamming ability of the system. at last, multiple access with pseudochaotic time hopping is introduce

    本文首先闡述了uwb脈沖通信系統的基本原理,重點介紹了用偽隨機碼跳時的ppm (脈沖位置調制)調制,分析了他的多址性能、系統容量和功率譜密度,在此基礎上研究了改進性能的發射信號形狀和系統抗干擾能力,最後介紹了偽混沌碼跳時的多址方式。
  12. At last, acco rding the present seismic code, the simplified design method for structure with shape memory alloys re - centring isolation device is introduced

    最後,結合現行抗震規范,給出了形狀記憶合金自復位隔震結構的一種簡化設計方法。
  13. Linux is a well known os of its open source code and better security. after the deep analysis of network and traffic control mechanism in linux kernel, we finally design and implement a prototype of vpn gateway based on diffserv under linux using unified modeling language ( uml ) from object - oriented perspective. at last, we construct an actual test environment, and the test results indicate that our prototype can not only implement the main functions of ipsec family, but also support the qos of vpn based on the application with good functions of shape and bandwidth traffic control

    Linux是一個基於開放源碼的操作系統,也是目前認為比較安全的操作系統,本文最後在對linux內核中的網路和流量控制機制進行深入分析和研究的基礎上,從面向對象的角度,運用標準建模語言uml ,設計和實現了一個基於區分服務的vpn網關原型,並且構建了一個實際的實驗和測試環境,對系統進行了測試,測試結果表明:原型系統在實現ipsec協議族主要功能的基礎上能夠給予用戶基於應用的qos保證,具有較好的流量整形和帶寬控制功能。
  14. There are many situations that present code can ’ t suit the buildings ’ shape. basing the fire safety engineering, performance - based design methods confirm the fireproofing project according to the building fire characters, and find a scientific way to resolve practice problems in real projects

    以火災安全工程學的思想為指導基礎的性能化防火設計方法,依據特定建築物的火災特性確定其防火設計方案,為工程實踐中的實際問題找到了科學的解決辦法。
  15. This paper introduces the shape error concealment on video object code, then introduces some new typical shape error concealment algorithms and analyses the general features and applicability of these algorithms. and the conclusion is given out

    本文對基於視頻對象編碼的形狀差錯掩蓋技術進行了詳細描述,在此基礎之上,介紹了典型的形狀差錯掩蓋方法,並對這些方法的特點與適用環境作了分析,最後對形狀差錯掩蓋方法進行了總結。
  16. To many not strictiy self - similar image, the usual fractal image compression method based on block partition divides the image into non - overlap regular shape block collection. every block ' s iterate function system is found out by local self - similarity. the parameters of all iterate function system form fractal image compression code

    這種方法將圖象劃分為規則形狀的不重疊的子塊集,根據子塊的局部自相似性,找出集中每一個子塊的迭代函數系統,由全體子塊的迭代函數系統參數形成分形圖象壓縮編碼。
  17. The research in this article shows that the adaptive binarization filtering algorithm for gray character image is effective ; the thinning algorithm for chinese character images and the stroke - extraction algorithm can extract hen, su, pie, na four sorts stroke from chinese character images ; eight - shape code of chinese character can effectively indicates the trait of chinese character structure. the chinese character recognition system based on eight - shape code can effectively improve noise immunity and correct rate of the system

    本文研究表明,灰度文本圖像二值化濾波演算法有效可行;漢字細化及筆畫提取演算法能夠提取出漢字中的橫豎撇捺四種筆畫;八形漢字識別碼能有效的表徵漢字的本質特性;基於八形漢字識別碼的仿人漢字識別演算法能夠有效提高系統的抗干擾性和識別正確率。
  18. Code changes for the shape control

    Shape控制項的代碼更改
  19. According to the parameters given by chinese code and the shape coefficients obtained from wind tunnel experiments, the relationship between velocity and pressure of fluctuating wind is dervied, and the time - history of a fluctuating wind load is given

    然後根據國家規范提供的參數及風洞試驗得到的形狀系數,推導出脈動風速及風壓之間的關系,求出脈動風荷載的時程。
  20. The main context of this dissertation focuses on three aspects. the author simulates and optimizes the helix - slow wave structure by using the high frequency electromagnetism code cst mws, gets the results which the shape of the supports of helix impacts on the dispersion characteristic and the coupling impedance. then using ansys software, the author analyzes the thermal contact resistant will impact the thermal characteristic of the helix - slow wave structure and get the temperature of the helix slow - wave structure

    本論文主要包括以下三方面的內容:作者使用cstmws軟體對螺旋線慢波結構的夾持桿形狀進行了優化;分析了夾持桿形狀對慢波結構色散和耦合阻抗的影響,同時還分析了接觸熱阻對螺旋線慢波結構散熱性能的影響,找到了兼顧螺旋線慢波結構電特性和散熱性能的夾持桿形狀。
分享友人