题目内容 (请给出正确答案)
[主观题]

Translate into Chinese: (1)If the input to a linea...

Translate into Chinese: (1)If the input to a linear system is a sinusoidal wave, the output will also be a sinusoidal wave, and at exactly the same frequency as the input. (2)Just as we can express any signal as the sum of a series of shifted and scaled impulses, so too we can express any signal as the sum of a series of (shifted and scaled) sinusoids at different frequencies. (3)A signal is formally defined as a function of one or more variables that conveys information on the nature of a physical phenomenon. (4)Nyquist sampling theorem states that if the highest-frequency component of a CT signal x(t) is fmax, then x(t) can be recovered from its sampled sequence x(nT) if the sampling frequency fs is larger than 2fmax. (5) In fact, if a discrete-time sequence is absolutely summable, then its spectrum is, as in the continuous-time case, a bounded and continuous function of ω. (6) Systems are defined to be stable if every bounded input excites a bounded output. The condition for discrete-time systems to be stable is that all poles of H(x) lie inside the unit circle on the z-plane.

暂无答案
如搜索结果不匹配,请 联系老师 获取答案
您可能会需要:
您的账号:,可能会需要:
您的账号:
发送账号密码至手机
发送
更多“Translate into Chinese: (1)If …”相关的问题

第1题

Translate into Chinese. 1. Interest in color image...

Translate into Chinese. 1. Interest in color image processing has increased significantly in the past few years as a result of digital for Internet applications. 2. Image restoration is applied to the restoration of a know distortion for which an objective criterion can be applied . 3. Mass storage capability is a must in image processing application . An image of size 1024*1024 pixels , in which the intensity of each pixel is an 8-bit quantity , requires one megabyte of storage space if the image is not compressed . 4. Although large-scale image processing systems still are being sold for massive of applications , such as processing of satellite images , the trend continues toward miniaturizing and blending of general-purpose small computers with specialized image processing hardware. 5. In archeology , image processing methods have successfully restored blurred pictures that were the only available records of rara artifacts lost or damaged after being photographed .

点击查看答案

第2题

SECTION B ENGLISH TO CHINESE

Directions: Translate the following text into Chinese.

"If there were none of this playing at generosity in warfare, we should never go to war, except for something worth facing certain death for, as now. Then there would not be wars because Pavel Ivanitch had insulted Mihail Ivanitch. But if there is war as now, let it be really war. And then the intensity of warfare would be something quite different. All these Westphalians and Hessians Napoleon is leading against us would not have come to fight us in Russia, and we should not have gone to war in Austria and in Prussia without knowing what for.War is not a polite recreation, but the vilest thing in life, and we ought to understand that and not play at war. We ought to accept it sternly and solemnly as a fearful necessity. It all comes to this: have done with lying, and if it's war, then it's war and not a game, or else warfare is simply the favourite pastime of the idle and frivolous... The military is the most honored calling. And what is war, what is needed for success in war, what are the morals of the military world? The means employed in warfare spying, treachery, trickery and lying, which are called military strategy; the morals of the military class--absence of all independence, that is, discipline, idleness, ignorance, cruelty, debauchery, and drunkenness. And in spite of all that, it is the highest class, respected by every one.

点击查看答案

第3题

Translate into Chinese. (1) Internet of Things (lo...

Translate into Chinese. (1) Internet of Things (loT) is an integrated part of Future Internet and could be defined as a dynamic global network infrastructure with self configuring capabilities based on standard and interoperable communication protocols where physical and virtual “things” have identities, physical attributes, and virtual personalities and use intelligent interfaces, and are seamlessly integrated into the information network. (2) Terminals will be able to create a local communication network and may serve as a bridge between communication networks thus extending, particularly in urban environments, the overall infrastructure capacity. This will likely determine a different view of network architectures. (3)The function of identification is to map a unique identifier or UID (globally unique or unique within a particular scope), to an entity so as to make it without ambiguity identifiable and retrievable. UIDs may be built as a single quantity or out of a collection of attributes such that the combination of their values is unique. (4) As things move and interact with their environment, events are automatically generated. These evets can subsequently be enhanced with additional semantic information that expresses context in which each event happened, to explain why something occurred, such as why a thing was observed at a location or how and why it interacted with another thing. (5)The IoT deployment requires developments in network technology which is essential for implementing the vision reaching out to objects in the physical world and to bring them into the Internet. RFID, short-range wireless technologies and sensor networks are enabling this, while for example IPv6, with its expanded address space, allow that all things can be connected, and can be tracked.

点击查看答案

第4题

Translate into Chinese. 1.Each cell phone, when it...

Translate into Chinese. 1.Each cell phone, when it makes a call, is connected (via its antenna and electromagnetic radiation to the base station with the best apparent communication path. The base stations in a given area are connected to a mobile telephone switching office (MTSO) by high speed wire, fiber, or microwave connections. 2.All of the newer cellular systems are digital (I.e., use a binary interface), and thus, in principle, can be used for voice or data. Since these cellular systems, and their standards, originally focused on telephony, the current data rates and delays in cellular systems are essentially determined by voice requirements. 3.One approach to channel measurement is to allocate a certain portion of each transmitted packet for that purpose. During this period, a known probing sequence is transmitted and the receiver uses this known sequence either to estimate the current values for the taps in the discrete-time baseband model of the channel or to measure the actual paths in a continuous-time baseband model. 4.It appears that many wireless situations, particularly those in cellular and local area networks contain a relatively small number of significant coherent paths, and if the bandwidth is large enough to resolve these paths, then the gain is far greater than that indicated in the example above. 5.The resulting binary stream, after adding the long PN sequence, is at a rate of 1.2288 Mbps. This stream is duplicated into two streams prior to being quadrature modulated onto a cosine and sine carrier.

点击查看答案

第5题

Translate into Chinese. 1.Dense WDM however is ano...

Translate into Chinese. 1.Dense WDM however is another thing. Dense WDM refers to the close spacing of channels. Sadly, "dense" is a qualitative measure and just what dense means is largely in the mind of a particular individual. To some, a series of WDM channels spaced at 3.6 nm apart qualifies for the description. Others use the term to distinguish systems where the wavelength spacing is1nm per channel or less. 2.In 1998 the "happening” Wavelength Division area in optical communications was Multiplexing (WDM). This is the ability to send many (perhaps up to 1000) independent optical channels on a single fiber. 3.If a short pulse of light from a source such as a laser or an LED is sent down a narrow fiber, it will be changed (degraded) by its passage down the fiber. It will emerge (depending on the distance) much weaker, lengthened in time ("smeared our"), and distorted in other ways. 4.In the wide area environment a large coaxial cable system can easily involve a cable of several inches in diameter and weighing many pounds per foot. 5.It is possible to tap fiber optical cable. But it is very difficult to do and the additional loss caused by the tap is relatively easy to detect. There is an interruption to service while the tap is inserted and this can alert operational staff to the situation. In addition, there are fewer access points where an intruder can gain the kind of access to a fiber cable necessary to insert a tap.

点击查看答案

第6题

Translate into Chinese. (1) Microwaves are normall...

Translate into Chinese. (1) Microwaves are normally considered to embrace the frequency range 109-1012 Hz or a characteristic wavelength range of 30 cm to 0.3 mm. (2) The study of electromagnetic radiation is an exact science because it can be represented exactly by mathematical expressions. (3) Microwaves are necessary for communication with satellites because they can pass through the ionosphere which reflects lower frequency radio waves. (4) The rate of microwave power absorption in most materials is proportional to its water content. This property can be used to provide microwave heating. Because the microwave signal penetrates most non-conductors, microwave power provides a most efficient means of applying heat uniformly throughout a body. (5)Microwaves are potentially hazardous because of their heating effect. The effect may not be felt until damage has already been done because the heating may be internal whereas our body is designed to warm us about externally applied heat. (6) For seismic signals traveling through a portion of the earth and picked up by appropriate transducers , one can extract from their particular shape and appearance information concerning the underlying strata.

点击查看答案

第7题

Translate into Chinese. 1.More generally,signal pr...

Translate into Chinese. 1.More generally,signal processing is an operation designed for extracting,enhancing storing , and transmitting useful information. The distinction between useful and unwanted information is often subjective as well objective. 2.System using the DSP approach can be developed using software running on a generalpurpose computer. Therefore DSP is relatively convenient to develop and test , and the software is portable. 3.Digital signal processing generally approaches the problem of voice recognition in two steps : feature extraction followed by feature matching . 4.The Fourier decomposition is the basic for a broad and powerful area. Of mathematics called Fourier analysis , and the even more advanced Laplace and z-transforms . Most cutting-edge DSP algorithms are based on some aspect of there techniques. 5.DSP is the mathematics , the algorithms , and the techniques used to manipulate real world signals after they have been converted into a digital form . This includes a wide variety of goals , such as : enhancement of visual images , recognition and generation of speech , compression of date for storage and transmission , etc .

点击查看答案

第8题

Translate the following into Chinese. 1. This inve...

Translate the following into Chinese. 1. This investment is high risks as well as high income 2. I prefer depositing money with a bank, which is reasonable for emergency. 3. Varied investments may take on less risks 4. A well thought-out plan can ensure the benefit from your investment 5. It is unreasonable to invest regardless of risks. 6. Stock trading is very exciting. 7. Bonds are quite steady and safe. 8. Money market provide you easy access to your money. 9. Market changes may mean your investment is worth less when you sell it. 10. I think this investment will keep my assets value.

点击查看答案

第9题

Translate the following into Chinese.

  (1)Details

  You are requested to check the contents of the Invitation to(2)package for completeness when you receive it and then return the enclosed(3)Acknowledgment.

  (4)shall be submitted in accordance with the Instructions to(5)and Form of(6).Any deviation from the requirements of these instructions may render your(7)invalid.

  Your(8)must be received no later than 12: 00 o'clock on Friday, 3rd July, 2009(closing date)at the office of the Purchaser in Shenzhen, People's Republic of China.

  (9)shall be forwarded by courier service or delivered safe-hand, sealed and clearly addressed and marked on the outside in accordance with the Instructions to(10).

  Please note that uninvited visits to our offices to discuss the Invitation to(11)are not acceptable and that all contact shall be in writing(by letter or fax)as set out in the Instructions to(12).

  The(13)shall consider this Letter of Invitation and the enclosed Invitation to(14)documents to be confidential, and the contents shall not be divulged to any person or persons not directly concerned with the preparation of the(15).

  This Invitation to(16)is subject to your signing and returning to the Purchaser the(17)Acknowledgment contained within Section A.

点击查看答案

第10题

SECTION B ENGLISH TO CHINESE

Directions: Translate the following text into Chinese.

Chinese leaders believe it is necessary to hold the nation together, to keep it growing, to keep moving toward its destiny. China's economic growth has made it more and more dependent on the outside world for investment, markets, and energy. Computers and the Internet, fax machines and photocopiers, modems and satellites all increase the exposure to people, ideas, and the world beyond China's borders. The effect is only just beginning to be felt. Indeed, greater openness is profoundly in China's own interest. If welcomed, it will speed economic growth, enhance the world influence of China and stabilize society. Without the full freedom to think, question, create, China will be at a distinct disadvantage, competing with fully open societies in the Information Age where the greatest source of national wealth is what resides in the human mind.

点击查看答案
热门考试 全部 >
相关试卷 全部 >
账号:
你好,尊敬的上学吧用户
发送账号至手机
密码将被重置
获取验证码
发送
温馨提示
该问题答案仅针对搜题卡用户开放,请点击购买搜题卡。
马上购买搜题卡
我已购买搜题卡, 登录账号 继续查看答案
重置密码
确认修改
谢谢您的反馈

您认为本题答案有误,我们将认真、仔细核查,
如果您知道正确答案,欢迎您来纠错

警告:系统检测到您的账号存在安全风险

为了保护您的账号安全,请在“上学吧”公众号进行验证,点击“官网服务”-“账号验证”后输入验证码“”完成验证,验证成功后方可继续查看答案!

微信搜一搜
上学吧
点击打开微信
警告:系统检测到您的账号存在安全风险
抱歉,您的账号因涉嫌违反上学吧购买须知被冻结。您可在“上学吧”微信公众号中的“官网服务”-“账号解封申请”申请解封,或联系客服
微信搜一搜
上学吧
点击打开微信