庫中項 的英文怎麼說

中文拼音 [zhōngxiàng]
庫中項 英文
library entry
  • : Ⅰ名詞1 (頸的後部) nape (of the neck) 2 (款項) sum (of money) 3 [數學] (不用加、減號連接...
  1. No money shall be drawn from the treasury, but in consequence of appropriations made by law.

    除了依照法律的規定撥款之外,任何款不得自國提出。
  2. How to : display ads from a database using the adrotator web server control

    如何:使用adrotator web服務器控制顯示數據的廣告
  3. The gis developed with the combination of mapx controls and object language, realizes the integral saving and management of spatial data and attribute data, and theoretically ensures the datashare and the integrality of data. such a system has been applied to the daily management of chongqing expressway, is proved to be of active contribution to the work efficiency and effect. it will surely promote the development of its in the future

    基於oraclespatial ,運用mapx控制和面向對象語言相結合開發的gis應用系統,實現對gis空間數據和屬性數據的一體化存儲和查詢,即不將地理信息存儲在原來的地理信息系統,而是存到關系數據,這種一體化技術實現了數據管理的規范化和數據操縱的標準化,使用戶可以比較方便的組織各類空間信息處理事務,在數據完整性方面提供了有效保證。
  4. The destination of classification is to learn a classification function or classification model that can map a data item to a preassigned class

    分類的目的是學會一個分類函數或分類模型,該模型能把數據的數據映射到給定類別的某一個。
  5. The system of liability of law - officer in ancient china is one of the results of the secularity of the law. with the declination of the system of ordeal, judges took the burden to decide the result of cases

    特別是唐宋明清時期,該制度進入了高度的成熟化階段后,它所提供的責任規范范圍和責任追究方式為現代完善司法責任制度提供了重要經驗,成為國傳統法律寶的重要內容。
  6. In this paper, we propose a novel approach using sentential frequent itemset, a concept comes from association rule mining, for text classification, which views a sentence rather than a document as a transaction, and uses a variable precision rough set based method to evaluate each sentential frequent itemset s contribution to the classification

    為了解決這一問題,參考目前的數據挖掘領域的工作,提出了一個文檔數據模型,即將每一篇文檔映射為一個文檔數據,文檔的每個句子看作數據的一個交易,每一個詞看作一個目。
  7. This paper presents the directed itemsets graph to store the information of frequent itemsets of transaction databases, and puts forward the trifurcate linked list storage structure of directed itemsets graph, and provides the mining algorithm of frequent closed itemsets based on directed itemsets graph

    摘要利用了有向集圖來存儲事務數據有關頻繁集的信息,提出了有向集圖的三叉鏈表式存儲結構和在於有向集圖的頻繁閉集挖掘演算法。
  8. After adding the item, the source control plug - in binds your local working copy of a solution or project to its version in the database

    在添加該之後,源代碼管理插件將您解決方案或者目的本地工作副本綁定到其數據的版本上。
  9. When you request an operation for which change propagation is enabled, the source control plug - in changes your working copy of the source - controlled item, the master copy in the database, and the copies of other users when you check in the item and the other users retrieve it

    當您請求一個啟用了更改傳播的操作時,源代碼管理插件在您簽入該和其他用戶獲取它時更改您受源代碼管理的工作副本、數據的主控副本和其他用戶的副本。
  10. 0ne of the basic assumptions in tradi tiona1 associat ion ru1es is that a11 items in the database are equa11y important. thi s is, however, rare1y true in rea1 - - 1 if e app1ications t users " interests may vary from item to item, users " interests toward a certain item may vary from time to time

    傳統關聯規則挖掘假定數據每個目具有相同的重要性,然而在很多實際應用,事實並非如此:用戶可能對某些特定的目興趣更大,而且同一目在不同時段的重要性也可能是不同的。
  11. In this study, the model emphasizes particularly on time series of geological entity and at the same time it realizes the integration of the spatial model and the attributive model by integrating complicated spatial and attributive character of forest resources. program is realized by matlab. the ann toolbox of matlab established many tool functions based on ann theory

    研究,基於gis的神經網路預測模型主要側重的是地理實體數量時間結構序列,模型結合森林資源復雜的空間和屬性特徵,不僅使用了gis關系數據的屬性時間序列值,同時也使用了一定的空間模型,實現了空間模型與屬性模型的有效結z 、口0在程序的實現上採用m八tlab開發環境,其的神經網路工具箱以人工神經網路理論為基礎,構造了網路分析和設計的許多工具函數。
  12. Data mining is an important research subject in the field of information technology. it means a process of nontrivial extraction of implicit, previously unknown and potentially useful information from data in databases or datawarehouses. it involves such subject areas as database, artificial intelligence, machine learning and statistics. classification analysis is an important data mining problem

    數據挖掘( datamining )是信息處理技術研究領域的一重要課題。它是指從大型數據或數據倉提取隱含的、未知的、非平凡的以及有潛在應用價值的信息或模式的過程。
  13. Control can display any type of hierarchical data, even if the data hierarchy is logical, as in a database, and not physical, as in an xml file

    控制可以顯示任何類型的分層數據,即使數據的層次結構是邏輯性的(如在數據) ,而不是物理的(如在xml文件) 。
  14. Firstly, we generalize and analyze the advantages and present research of elliptic curve cryptography ; secondly, we study the basic theory of the ecc ; thirdly, we illustrate the safety of the ecc and discuss the elliptic curve key agreement scheme, elliptic curve encryption scheme and elliptic curve digital signature algorithm ; fourthly, we study fast algorithms of the multiplication and inversion multiplication of the element of in the underlying finite field f2m whose characteristic is two represented by the two basis of optimal normal basis and polynomial basis. we make improvements to the fast algorithm of the polynomial basis multiplication by hankerson and base on the experiments, we describe the properties and compare the advantages of the multiplication and inversion multiplication of the elements in f2m field under optimal normal bases and polynomial basis. results concluding from the study car be used as references in the realization of the elliptic curve cryptosystem ; fifthly, we overview the current fast algorithm of point multiplication, improve the fix base point comb algorithm, advance the speed of the whole system and remark the advantages and disadvantages of the popular algorithms based upon the experimental datas ; sixthly we realize the algorithm library of elliptic curve cryptography based on the f2m. only change slightly in our algorithm library can we realize the ecdh, eces, ecdsa based onf2m of anysize ; seventhly, we realize the ecc on two secure elliptic curves, including ecdh, eces, ecdsa

    本文首先介紹並分析了橢圓曲線密碼體制的優點及研究現狀;其次研究了橢圓曲線密碼體制的基本理論;第三,分析了橢圓曲線密碼的安全性並介紹了密鑰共享,加密,數字簽名等橢圓曲線密碼體制;第四,深入研究了特徵為2的有限域f _ 2m的元素在多式基和最優正規基表示下的乘法運算和乘法逆運算的快速演算法,並對hankerson等人提出的多式基下的乘法運算的快速演算法作了改進,而且在實驗的基礎上不僅分析研究了f _ 2m域元素在多式基和最優正規基表示下的乘法和乘法逆運算的性能,還對這兩種基表示下的f _ 2m域元素運算效率的優劣作了比較和研究,所得的結論可供在實現橢圓曲線密碼體制時參考;第五,研究了目前流行的計算橢圓曲線標量乘法的快速演算法,同時改進了固定基點梳形法,提高了整個系統的速度,並在實驗的基礎上分析研究了流行演算法的優劣;第六,實現了基於f _ 2m的橢圓曲線密碼體制的演算法,在我們的演算法只需稍微改變便能實現基於任意尺寸的f _ 2m上的ecdh , eces , ecdsa等橢圓曲線密碼體制;第七,實現了兩條安全橢圓曲線上的橢圓曲線密碼體制,包括ecdh , eces , ecdsa 。
  15. Before the digitalization warehouse project, the deliver center warehouse of jiangmen frigorifico co., ltd. was managed by handwork. it could neither distinguish the batch of storage goods nor optimize the slot configeration, so the first - in ? first - out policy can ’ t be performed when getting goods from warehouse. therefore some goods was kept in the warehouse so long time that it affected the corporation benefit badly

    在數字化倉目建設以前,江門冷凍廠有限公司原有配送心倉存管理依靠的是手工的方式,根本無法區分各批次的存貨物,無法做到貨物的先進先出和貨位優化管理,從而導致部分貨物長期存放在倉,嚴重影響了企業的經濟效益。
  16. This paper discusses the construction background and significance of chinese and foreign drug quality standard database, which is the sub - project of jalis characteristic databases in second stage, as long as its content and structure, metadata analysis, platform choice and so on

    摘要論文探討了jalis二期特色數據目《外藥品質量標準數據》的建設背景與意義、數據的內容與結構、數據的元數據分析及數據平臺選擇等相關問題。
  17. In teletext, a facility whereby an item of information from the teletext database is superimposed on the broadcast picture displayed on the television set

    電視文字廣播的一種設施,它可將廣播型可視數據檢索系統數據的一信息疊映在電視機所顯示的廣播畫面上。
  18. Removes entries for a server type library from the web. config and default. disco files, depending on security options

    從web . config和default . disco文件移除服務器類型,具體由安全選確定。
  19. Searches for an object in the type library, setting search options or using the options currently set in the

    搜索類型的對象,同時設置搜索選或使用當前在
  20. Specifically, the time to copy increases exponentially as the number of items in the media library increases

    特別值得注意的是,隨著媒體庫中項目的增多,復制時間將呈指數增加。
分享友人