英语人>网络例句>体系结构 相关的搜索结果
网络例句

体系结构

与 体系结构 相关的网络例句 [注:此内容来源于网络,仅供参考]

Real-time processing hardware system, circuit and chip design which is the weakest link in motion vision study.

本项目研究运动图像分析,分为算法、系统及电路设计三个层次:①运动目标检测、测量与跟踪分析算法,这是知识创新的源头所在;②并行处理器逻辑与物理体系结构,这是走向实用的必经步骤;③实时处理硬件系统、电路与芯片设计,这是运动视觉研究中较薄弱的环节。

Its core principle is the resource dynamic location principle and XML based ontology, on which the event and pipe as the communication layer of the whole framework are constructed.

在Internet时代,如何构造更好的遥操作软件平台以适应遥操作系统主客体日益发展变化的性能对于遥操作系统体系结构的研究至关重要。

The SINS of FOG is designed and implemented based on DSP. The system is with a dual CPU structure. DSP is used to process data while MCU controls data acquisition and the communication between DSP and MCU is achieved by dual-port RAM. All of these constitute a small strap-down navigation system. Meanwhile introduced a kind of algorithm of SINS, SPI communication and the second boot Loder of TMS320C6713 in briefly. After testing, the system speed and accuracy satisfy design requirements and the system has been applied to actual system.

介绍了一种基于DSP的光纤陀螺捷联惯导系统的设计与实现方法;系统采用DSP+MCU的体系结构,DSP主要完成导航计算,利用单片机实现对数据采集模块的控制,并通过双口RAM实现单片机和DSP的数据通信,构成了一套小型捷联惯导系统,同时给出了一种捷联惯导算法编排,简要介绍了SPI通信和TMS320C6713的二次bootloder方式;经测试,系统速度和精度都满足了设计要求,已应用于实际系统。

Both the longitudinal and the cross aspects are taken into consideration in the system.

对企业信息系统集成的体系结构可从纵向和横向两方面进行研究。

Based on the BNA and LOTOS/E-LOTOS a new algebra framework for description and analysis of behavior of Internet routing system is proposed.

引 言Internet路由体系结构作为Internet的骨架和神经,它的行为决定网络的行为,这里的行为是指路由实现过程和动态变化规律。

It is known that the security defense intensity of the information system depends on the weakest part of Maginot line. If there is no appropriate security architecture as a guide, it is difficult for the various security components in the information system to coordinate with each other and to work in order. Then, it often appears the "safety shortcomings" phenomenon, resulting in the vulnerability in the security and all the protection efforts in the information system are in vain. 2 Trusted computing and security mechanisms come apart.

众所周知,信息系统的安全防护强度取决于"马奇诺防线"中最为薄弱的环节,如果没有合理的安全体系结构作为指导,信息系统中各安全部件就难以相互协调、有序工作,就很容易出现"安全短板"现象,从而导致信息系统安全防护不堪一击,所有的努力功亏一篑。2可信计算和安全机制相脱节。

In this paper, the function and performance of this system is firstly analyzed, which is the basis of constructing system structure and marking off function module.

本文从软件工程的角度出发,对系统的性能、功能进行了需求分析,划分了系统的功能模块,阐述了各模块具体实现的功能及方法,并给出了系统的体系结构

In this paper, the function and performance of this system is firstly analyzed, which is the basis of constructing system structure and marking off function moduel.

本文从软件工程的角度出发,对系统的性能、功能进行了需求分析,划分了系统的功能模块,阐述了各模块的功能和模型,并给出了系统的体系结构

According to the characteristics of metallurgy industry, an architecture that takes the finance management as the masterstroke is presented.

结合冶金工业的特点提出了以财务管理为中心,以成本控制为主线的CIMS体系结构,并将其应用于邯钢集团的CIMS工程。

The development of Aerospatiale Matra from setting about studying the automatic test technique for "Concord" airplane to now is expatiated,the architectures and applications of ATEC series 6 used for civil and military and SESAR 3000 used for military are introduced.

论述了法宇航AerospatialeMatra从"协和"飞机着手开展自动测试技术研究以来的发展状况,介绍了军民通用的ATEC 6系列和军用的SESAR 30 0 0系列自动测试平台的体系结构及应用。

第38/100页 首页 < ... 34 35 36 37 38 39 40 41 42 ... > 尾页
推荐网络例句

This one mode pays close attention to network credence foundation of the businessman very much.

这一模式非常关注商人的网络信用基础。

Cell morphology of bacterial ghost of Pasteurella multocida was observed by scanning electron microscopy and inactivation ratio was estimated by CFU analysi.

扫描电镜观察多杀性巴氏杆菌细菌幽灵和菌落形成单位评价遗传灭活率。

There is no differences of cell proliferation vitality between labeled and unlabeled NSCs.

双标记神经干细胞的增殖、分化活力与未标记神经干细胞相比无改变。