英语人>网络例句>binary coded decimal 相关的网络例句
binary coded decimal相关的网络例句

查询词典 binary coded decimal

与 binary coded decimal 相关的网络例句 [注:此内容来源于网络,仅供参考]

Furthermore, Binary stars have been neglected in most studies of the integrated light of the stellar populations with the EPS methods. However in real clusters and galaxies over 50% stars are in binaries, and binary interaction can result in some important classes of objects, such as blue straggles and subdwarf B stars (sdB, also referred as extreme horizontal branch ) which contribute significantly to the integrated light.

另外,多数演化星族合成模型在对星族进行研究时没有考虑双星作用,而在真实星团或星系中50%以上的恒星属于双星系统,双星相互作用可以产生一些重要天体,例如蓝离散星和B型亚矮星,而这类天体对积分光谱有重要影响,因此本论文研究目的之二就是在演化星族合成模型中考虑双星作用。

Upon this foundation,a corpus-based algorithm was designed and implemented to acquire and filter binary semantic pattern rules automatically. In the algorithm,a data mining method for cross-level association rules is adopted,which is guided by metarule,to find the semantic laws of word combinations in Chinese phrase corpus. Then statistic results are used to filter the findings. In the end,the remains are transformed into binary semantic pattern rules.

在此基础上,本文设计并实现了基于语料库的二元语义模式规则自动挖掘和优选算法,该算法先采用数据挖掘中元规则制导的交叉层关联规则挖掘方法,自动发现汉语短语熟语料库中词语两两组合的语义规律,再根据统计结果自动优选后转换生成候选二元语义模式规则集。

For this reason, the author used mid-value filtering method for diminishing the pattern noise, the binary-image transformation method by selecting variable threshold value, and the extraction method of the central line for full-field binary-image.

为此作者使用中值滤波法对图像噪声进行抑制,利用可变阈值对图像进行二值化,实现了二值图像条纹灰度中心线的自动检出。

Traversals work with any binary tree, not just with binary search trees.

下一步,insert必须先确定新节点插入的位置。

To increase the security of the watermark, a new binary image encryption algorithm based on TD-ERCS map is presented. The watermark is encrypted by a chaos sequence generated by TD-ERCS map; A novel color image watermarking algorithm is proposed based on discrete chaotic map and 2-dimensions discrete wavelet transform. The watermark is encrypted by the new binary image encryption algorithm, and the encrypted watermark is embed into four sub-bands of the most deep level of blue branch of host image by three-level wavelet transform, and the embedded positions are determined by general cat cha otic map; A novel color-image blind detection watermarking algorithm is proposed based on integer wavelet transform and subsampling. The scrambled watermark is encrypted and embed into the low sub-bands after four sub-images of the Y branch of host image is transformed by two-level wavelet transform, and the embedded positions are determined by Logistic chaotic map, this watermarking scheme can realize blind extraction.

为了提高水印图像的安全性,提出了一种基于TD-ERCS混沌映射的二值水印图像的加密算法,该算法利用TD-ERCS映射产生的混沌序列加密水印图像;将离散混沌映射和二维离散小波变换相结合,研究了彩色图像水印新算法,该算法先对混沌序列加密后的水印图像进行小波变换,再嵌入到宿主图像的蓝色分量的最深层的四个子带中,嵌入位置则由广义猫映射确定;将整数小波变换和图像子采样技术应用于数字水印,提出了一种彩色图像盲提取水印算法,水印嵌入时,先对宿主图像在YIQ色彩空间中的Y分量进行子采样,并对得到的四个子图像分别进行二级离散小波变换,然后将置乱并加密后的水印图像嵌入到小波变换后的低频子带中,其嵌入位置由Logistic混沌映射产生的混沌序列确定,实现了水印的盲提取。

Convert Base 10 Integers to Binary, Octa - Convert Base 10 Integers to Binary, Octal And Hex

将十进制的整数转换为二进制的,八进制的和十六进制的数。

Eight bits, grouped together to form a single binary quantity, is known as a byte. Four bits, grouped together as one binary number, is known by the humorous title of nibble, often spelled as nybble.

八位比特分为一组组合成一个单个的二进制数的数量,被看做一个字节,四位比特被分为一组形成一个二进制数字,通过一个幽默的4bit 标题被大家所知道,经常被品做& nybble &。

Later wags would expand the terminology to include byte (usually an 8-digit binary number) and even nybble (half a byte, or 4 binary digits).

后来的维纳把这一术语引伸到包含字节(通常是一个8位二进制数),甚至半字节(半个字节,即4位二进制数)的意思。

By means of these conditions, computer searches out many quasi-perfect and double quasi-perfect binary array pairs with small sizes. The composite construction methods for quasi-perfect and double quasi-perfect binary array pairs are studied.

研究了准最佳和双准最佳二进阵列偶的复合构造法;并利用最佳、准最佳和双准最佳二进阵列偶之间的联系,给出了构造最佳二进阵列偶和准最佳二进阵列偶的方法。

By means of these conditions, computer searches out many quasi-perfect and double quasi-perfect binary array pairs with small sizes. The composite construction methods for quasi-perfect and double quasi-perfect binary array pairs are studied.

本文较为详细地分析综述了几十年来,最佳相关信号的研究成果,它已在现代通信、雷达、声纳、制导、空间测控、以及电子对抗等方面得到了广泛地应用,为工程应用提供更多具有良好相关特性的最佳离散信号是研究最佳离散信号的目的之一。

第25/235页 首页 < ... 21 22 23 24 25 26 27 28 29 ... > 尾页
相关中文对照歌词
Binary Love
Binary Mind
An Awful Lot Of Running
I'm On It
Binary Reality
Rusted Machines
Knights
Typecast
Binary
I'll Buss 'Em You Punish 'Em
推荐网络例句

Wenxing consistently adheres to the principle of "trict Management,All Member Participation,Quality First,Users Foremost" and follows the business philosophy of excellent quality,highly active and pursue excellence,thus outdoing its counterparts in terms of technology,production scale and administration.

文兴一贯秉承&严格管理、全员参与、质量第一、用户至上&的企业方针,遵循优质、高效和追求卓越的经营理念,从而实现在技术上、规模上、管理上处于同行领先地位。

The left atrium of the guinea pigs was innervated by the two afferent system.

豚鼠左心房受心脏的两个传入系统的双重支配。

"Those are the orders," replied the lamplighter.

"这是命令。"点灯的人回答道。