庫中項 的英文怎麼說
中文拼音 [kùzhōngxiàng]
庫中項
英文
library entry
-
項 :
Ⅰ名詞1 (頸的後部) nape (of the neck) 2 (款項) sum (of money) 3 [數學] (不用加、減號連接...
-
No money shall be drawn from the treasury, but in consequence of appropriations made by law.
除了依照法律的規定撥款之外,任何
項款不得自國
庫中提出。
-
How to : display ads from a database using the adrotator web server control
如何:使用adrotator web服務器控制
項顯示數據
庫中的廣告
-
The gis developed with the combination of mapx controls and object language, realizes the integral saving and management of spatial data and attribute data, and theoretically ensures the datashare and the integrality of data. such a system has been applied to the daily management of chongqing expressway, is proved to be of active contribution to the work efficiency and effect. it will surely promote the development of its in the future
基於oraclespatial ,運用mapx控制
項和面向對象語言相結合開發的gis應用系統,實現對gis空間數據和屬性數據的一體化存儲和查詢,即不將地理信息存儲在原來的地理信息系統
中,而是存到關系數據
庫中,這種一體化技術實現了數據管理的規范化和數據操縱的標準化,使用戶可以比較方便的組織各類空間信息處理事務,在數據完整性方面提供了有效保證。
-
The destination of classification is to learn a classification function or classification model that can map a data item to a preassigned class
分類的目的是學會一個分類函數或分類模型,該模型能把數據
庫中的數據
項映射到給定類別
中的某一個。
-
The system of liability of law - officer in ancient china is one of the results of the secularity of the law. with the declination of the system of ordeal, judges took the burden to decide the result of cases
特別是唐宋明清時期,該
項制度進入了高度的成熟化階段后,它所提供的責任規范范圍和責任追究方式為現代完善司法責任制度提供了重要經驗,成為
中國傳統法律寶
庫中的重要內容。
-
In this paper, we propose a novel approach using sentential frequent itemset, a concept comes from association rule mining, for text classification, which views a sentence rather than a document as a transaction, and uses a variable precision rough set based method to evaluate each sentential frequent itemset s contribution to the classification
為了解決這一問題,參考目前的數據挖掘領域的工作,提出了一個文檔數據
庫模型,即將每一篇文檔映射為一個文檔數據
庫,文檔
中的每個句子看作數據
庫中的一個交易,每一個詞看作一個
項目。
-
This paper presents the directed itemsets graph to store the information of frequent itemsets of transaction databases, and puts forward the trifurcate linked list storage structure of directed itemsets graph, and provides the mining algorithm of frequent closed itemsets based on directed itemsets graph
摘要利用了有向
項集圖來存儲事務數據
庫中有關頻繁
項集的信息,提出了有向
項集圖的三叉鏈表式存儲結構和在於有向
項集圖的頻繁閉
項集挖掘演算法。
-
After adding the item, the source control plug - in binds your local working copy of a solution or project to its version in the database
在添加該
項之後,源代碼管理插件將您解決方案或者
項目的本地工作副本綁定到其數據
庫中的版本上。
-
When you request an operation for which change propagation is enabled, the source control plug - in changes your working copy of the source - controlled item, the master copy in the database, and the copies of other users when you check in the item and the other users retrieve it
當您請求一個啟用了更改傳播的操作時,源代碼管理插件在您簽入該
項和其他用戶獲取它時更改您受源代碼管理
項的工作副本、數據
庫中的主控副本和其他用戶的副本。
-
0ne of the basic assumptions in tradi tiona1 associat ion ru1es is that a11 items in the database are equa11y important. thi s is, however, rare1y true in rea1 - - 1 if e app1ications t users " interests may vary from item to item, users " interests toward a certain item may vary from time to time
傳統關聯規則挖掘假定數據
庫中每個
項目具有相同的重要性,然而在很多實際應用
中,事實並非如此:用戶可能對某些特定的
項目興趣更大,而且同一
項目在不同時段的重要性也可能是不同的。
-
In this study, the model emphasizes particularly on time series of geological entity and at the same time it realizes the integration of the spatial model and the attributive model by integrating complicated spatial and attributive character of forest resources. program is realized by matlab. the ann toolbox of matlab established many tool functions based on ann theory
本
項研究
中,基於gis的神經網路預測模型主要側重的是地理實體數量時間結構序列,模型結合森林資源復雜的空間和屬性特徵,不僅使用了gis關系數據
庫中的屬性時間序列值,同時也使用了一定的空間模型,實現了空間模型與屬性模型的有效結z 、口0在程序的實現上採用m八tlab開發環境,其
中的神經網路工具箱以人工神經網路理論為基礎,構造了網路分析和設計的許多工具函數。
-
Data mining is an important research subject in the field of information technology. it means a process of nontrivial extraction of implicit, previously unknown and potentially useful information from data in databases or datawarehouses. it involves such subject areas as database, artificial intelligence, machine learning and statistics. classification analysis is an important data mining problem
數據挖掘( datamining )是信息處理技術研究領域的一
項重要課題。它是指從大型數據
庫或數據倉
庫中提取隱含的、未知的、非平凡的以及有潛在應用價值的信息或模式的過程。
-
Control can display any type of hierarchical data, even if the data hierarchy is logical, as in a database, and not physical, as in an xml file
控制
項可以顯示任何類型的分層數據,即使數據的層次結構是邏輯性的(如在數據
庫中) ,而不是物理的(如在xml文件
中) 。
-
Firstly, we generalize and analyze the advantages and present research of elliptic curve cryptography ; secondly, we study the basic theory of the ecc ; thirdly, we illustrate the safety of the ecc and discuss the elliptic curve key agreement scheme, elliptic curve encryption scheme and elliptic curve digital signature algorithm ; fourthly, we study fast algorithms of the multiplication and inversion multiplication of the element of in the underlying finite field f2m whose characteristic is two represented by the two basis of optimal normal basis and polynomial basis. we make improvements to the fast algorithm of the polynomial basis multiplication by hankerson and base on the experiments, we describe the properties and compare the advantages of the multiplication and inversion multiplication of the elements in f2m field under optimal normal bases and polynomial basis. results concluding from the study car be used as references in the realization of the elliptic curve cryptosystem ; fifthly, we overview the current fast algorithm of point multiplication, improve the fix base point comb algorithm, advance the speed of the whole system and remark the advantages and disadvantages of the popular algorithms based upon the experimental datas ; sixthly we realize the algorithm library of elliptic curve cryptography based on the f2m. only change slightly in our algorithm library can we realize the ecdh, eces, ecdsa based onf2m of anysize ; seventhly, we realize the ecc on two secure elliptic curves, including ecdh, eces, ecdsa
本文首先介紹並分析了橢圓曲線密碼體制的優點及研究現狀;其次研究了橢圓曲線密碼體制的基本理論;第三,分析了橢圓曲線密碼的安全性並介紹了密鑰共享,加密,數字簽名等橢圓曲線密碼體制;第四,深入研究了特徵為2的有限域f _ 2m
中的元素在多
項式基和最優正規基表示下的乘法運算和乘法逆運算的快速演算法,並對hankerson等人提出的多
項式基下的乘法運算的快速演算法作了改進,而且在實驗的基礎上不僅分析研究了f _ 2m域
中元素在多
項式基和最優正規基表示下的乘法和乘法逆運算的性能,還對這兩種基表示下的f _ 2m域
中元素運算效率的優劣作了比較和研究,所得的結論可供在實現橢圓曲線密碼體制時參考;第五,研究了目前流行的計算橢圓曲線標量乘法的快速演算法,同時改進了固定基點梳形法,提高了整個系統的速度,並在實驗的基礎上分析研究了流行演算法的優劣;第六,實現了基於f _ 2m的橢圓曲線密碼體制的演算法
庫,在我們的演算法
庫中只需稍微改變便能實現基於任意尺寸的f _ 2m上的ecdh , eces , ecdsa等橢圓曲線密碼體制;第七,實現了兩條安全橢圓曲線上的橢圓曲線密碼體制,包括ecdh , eces , ecdsa 。
-
Before the digitalization warehouse project, the deliver center warehouse of jiangmen frigorifico co., ltd. was managed by handwork. it could neither distinguish the batch of storage goods nor optimize the slot configeration, so the first - in ? first - out policy can ’ t be performed when getting goods from warehouse. therefore some goods was kept in the warehouse so long time that it affected the corporation benefit badly
在數字化倉
庫項目建設以前,江門冷凍廠有限公司原有配送
中心倉
庫庫存管理依靠的是手工的方式,根本無法區分各批次的
庫存貨物,無法做到貨物的先進先出和貨位優化管理,從而導致部分貨物長期存放在倉
庫中,嚴重影響了企業的經濟效益。
-
This paper discusses the construction background and significance of chinese and foreign drug quality standard database, which is the sub - project of jalis characteristic databases in second stage, as long as its content and structure, metadata analysis, platform choice and so on
摘要論文探討了jalis二期特色數據
庫子
項目《
中外藥品質量標準數據
庫》的建設背景與意義、數據
庫的內容與結構、數據
庫的元數據分析及數據
庫平臺選擇等相關問題。
-
In teletext, a facility whereby an item of information from the teletext database is superimposed on the broadcast picture displayed on the television set
電視文字廣播
中的一種設施,它可將廣播型可視數據檢索系統數據
庫中的一
項信息疊映在電視機所顯示的廣播畫面上。
-
Removes entries for a server type library from the web. config and default. disco files, depending on security options
從web . config和default . disco文件
中移除服務器類型
庫的
項,具體由安全選
項確定。
-
Searches for an object in the type library, setting search options or using the options currently set in the
搜索類型
庫中的對象,同時設置搜索選
項或使用當前在
-
Specifically, the time to copy increases exponentially as the number of items in the media library increases
特別值得注意的是,隨著媒體庫中項目的增多,復制時間將呈指數增加。