说明:双击或选中下面任意单词,将显示该词的音标、读音、翻译等;选中中文或多个词,将显示翻译。
您的位置:首页 -> 词典 -> 放码规则
1)  grade rule data
放码规则
1.
By means of the method,the adapted patterns could be graded by applying the basic block pattern\'s grade rule data.
针对现行服装CAD系统中常用纸样放码方法的不足,结合服装纸样本身固有的特点,提出一种基于增量放码法,采用基础纸样的放码规则,对派生纸样实现自动放码。
2)  regular grading
规则放码
3)  coding rule
编码规则
1.
By analyzing the requirements and the application status of the coding technology for Manufacturing Execution System(MES) and after classifying the parts and components, a kind of coding rule of parts and components is put forward.
通过分析制造执行系统对零部件编码的需求和应用现状,在对装配过程中所涉及的零部件进行分类的基础上,提出了面向装配制造执行系统的零部件编码规则。
2.
The value composition of product symbol,the communication process,and the coding rule of product design was studied by taking va- rious kinds of designing element as the symbols.
主要运用符号学原理来研究产品设计,把各种设计元素看作符号,研究产品符号的价值构成,产品设计的传达过程和编码规则,帮助设计者树立正确的设计价值观,从而更好地处理产品设计中各种设计元素的关系,指导设计活动的顺利进行。
3.
Based on the analysis of a certain product s manufacturing process and production organization,the group-technology-based process coding rule for the product is developed,so it provides a favorable condition for the product s manufacturing process database development and for the process data s quick acquisition,share and resuing.
在分析某类产品制造工艺及生产组织现状的基础上,基于成组技术开发了产品零部件的工艺编码规则体系,从而为该类产品制造工艺数据库的开发以及工艺数据的快速获取、共享和重用创造了条件。
4)  code rule
编码规则
1.
Based on the real conditions of NPPs,a net-based design,a suit of user management mechanism and a mechanism of intelligent code rule management are implemented in NDMS.
根据核电站实际情况,NDMS采用了网络化设计,并设计了用户管理机制及智能编码规则管理机制。
2.
To avoid the sadness induced by losses,people usually ingeniously use the code rule of "two losses should be integrated".
为了避免损失带来的心痛感,个体常常灵巧地使用"两笔损失应整合"的编码规则,但"两笔损失应整合"编码规则并非在所有情况下都有效,在小的损失条件下,"两笔损失应整合"的编码规则是失效的。
3.
By the unified code rule the system is combined with the al.
而且依靠统一的编码规则实现了与安徽省电力调度中心现有的实时计算与分析平台的有机整合,实现继电保护相关数据与信息的高效利用和充分共享,提高了系统的可维护性和实用性。
5)  encoding rules
编码规则
1.
Besides, assuming that the encoding rules are chosen based on a uniform probability distribution, the PI and PS which denote the largest probabilities of a successful impersonation attack and of a successful substitution attack of these codes,respectively, are also computed.
假定编码规则等概分布,得到了该认证码模仿攻击成功的概率PI及替换攻击成功的概率PS。
6)  encoding rule
编码规则
1.
Moreover,assuming that the encoding rules are chosen according to uniform probability distribution,the P I and P S which denote the largest probalities of successful imitative affack and successful substitutive attack respectively,of this code are also computed.
利用有限域上的厄米特矩阵构作了一个笛卡儿认证码 ,计算了其容量参数 ,同时 ,在编码规则被采用的概率是相同的条件下 ,给出了成功的模仿攻击的概率P1和成功的替换攻击的概率Ps。
2.
1 is widely applied in network communication based on ISO/OSI 7 layers network connection model,which has rich and specific notating syntax to define and describe the complex communication protocol,and convert the communication PDU to octets flow depending on the selected encoding rule.
1规范是广泛应用在ISO/OSI七层开放互联模型的网络通讯中的国际标准,由于它具有丰富且规范的语义表达和统一的编码规则等优点,许多的国际通讯标准都采用ASN。
补充资料:湮放
1.散佚。
说明:补充资料仅用于学习参考,请勿用于其它任何用途。
参考词条