數值數據代碼 的英文怎麼說

中文拼音 [shǔzhíshǔdài]
數值數據代碼 英文
numeric data code
  • : 數副詞(屢次) frequently; repeatedly
  • : 據Ⅰ動詞1 (占據) occupy; seize 2 (憑借; 依靠) rely on; depend on Ⅱ介詞(按照; 依據) according...
  • : Ⅰ動詞1 (代替) take the place of; be in place of 2 (代理) act on behalf of; acting Ⅱ名詞1 (歷...
  • : Ⅰ名詞(表示數目的符號或用具) a sign or object indicating number; code Ⅱ量詞1 (指一件事或一類的...
  • 數值 : numerical value; numerial number; figure; magnitude; value數值表 numerical tabular; 數值天氣預報 ...
  • 數據 : data; record; information
  1. In rsdm, binary patterns are replaced by real - valued patterns, accordingly avoiding the coding process ; the outer learning rule is replaced by regression rule, therefore the model has not only the ability of pattern recognition but the ability of function approximation. the prearrangement of the address array bases on the distribution of patterns. if the distribution of patterns is uniform. then the address array is prearranged randomly, otherwise predisposed with the theory of genetic algorithm and the pruneing measure so as to indicate the distribution of patterns and improve the network performance. non - linear function approximation, time - series prediction and handwritten numeral recognition show that the modified model is effective and feasible

    在rsdm中,以實模式替二模式,避免了實到二的編過程:以回歸學習規則替外積法,使該模型在具有識別能力的同時具有了對函的逼近能力;地址矩陣的預置根樣本的分佈採取不同方法,若樣本均勻分佈,則隨機預置,否則利用遺傳演算法的原理和消減措施來預置地址矩陣,使之反映樣本的分佈,改善網路的性能。
  2. Requirements analysis, system frame design, algorithm design, code compile and software test of protection setting verifying and analysis system of sub power system are all accomplished. main research work of this paper is concentrated on three respects : ( 1 ) knowledge expressing of mathematic model and physics model of power system using relation database and object oriented language, ( 2 ) new methods of in - substation topology and net topology analysis based on topology of hierarchical model, ( 3 ) father research of protection coordination considering difference of protection setting verifying and fixing

    論文提出了進行保護定在線校驗的意義和方法,並按照軟體工程的規范化開發的要求,完成了滄州地區電網保護定在線校驗分析系統的需求分析、系統框架設計、演算法設計、編寫和軟體測試的大部分工作,主要的研究工作集中在: ( 1 )利用關系庫和面向對象語言對電網進行物理模型和學模型上的知識表示。
  3. A hash - based message authentication code hmac uses a hash function where data is hashed by iterating a basic compression function on blocks of data

    基於哈希的消息驗證( hmac )使用一個哈希函,通過在塊上迭基本壓縮函來計算的哈希
  4. Provides code showing how to handle data - entry errors that originate from the data source when the user attempts to commit a new value

    提供,該演示當用戶嘗試提交新時如何處理源自源的輸入錯誤。
  5. The example code supplied here demonstrates how to trap the key and the cursor keys to provide better data entry processing

    這個示例演示了如何捕獲鍵盤和鼠標輸入以提供更好的輸入處理。
  6. The integrated debugger lets you find and fix runtime and logic errors, control program execution, and step through code to watch variables and modify data values

    閱讀編譯器信息,集成的調試器允許你找出並修復運行和邏輯錯誤,控製程序執行,並步進以監視變量並修改
  7. Gets a numeric error code from sql server that represents an error, warning or " no data found " message

    從sql server中獲取一個錯誤,它表示錯誤、警告或「未找到」消息。
  8. First of all, the algorithm base on the boundary problem of helmholtz equation and finite - difference technique, calculate the field in “ cold ” cavity and disperse the helmholtz equation, as a result of the formula : ax = x. secondly, according to the eigenvalue of matrix theory and applied iterative methods, eigenmode adopt a numerical approach which allows the improved chebyshev polynomial iteration which based on the power method to extract the isolated eigenmode in the spectrum. finally, we resolve the problem of compatibility in software and insert the eigenmode module into the chipic which will have the function of eigenmode analysis

    具體的說: ( 1 )首先以電磁理論中的亥姆霍茲方程的邊問題理論和計算電磁學中的有限差分法為基礎,計算冷腔中的場分佈並離散亥姆霍茲方程,得到標準的本徵問題: ax = x ; ( 2 )然後根矩陣理論中的eigenvalue問題和計算中的迭方法,採用改進后的chebyshev多項式,在power迭法的基礎上對ax = x進行多項式迭,實現對頻譜中孤立本徵模的萃取; ( 3 )最後將用fortran語言編制的eigenmode模塊加入到chipic軟體中,解決了eigenmode模塊與chipic主的兼容問題,從而實現了chipic軟體的模式分析功能。
  9. Enterprise information system framework provides a series of reusable groupware, such as persistence layer which introduces dynamic value object 、 value list hander and command pattern, it encapsulates the detail of accessing database and affords the interface of different persistence layer framework ; basing on asynchronous javascript and xml ( ajax for short ), we develops the client validity check engine 、 dynamic cascading menu and common 、 dynamic tree structure groupware, as well as a set of tag library which include query 、 pagination 、 cache an so on. they reduce the code redundancy and predigests the development of interface layer enormously ; the security subsystem which is based on secure socket layer ( ssl for short ) and role - based access control ( rbac for short ) ensures the data security transmission and privilege control. furthermore, the model of enterprise application integration ( eai for short ) which based on web services, it supply some helpful explore for the sake of system integration and data communion for the future

    企業信息系統框架提供了一系列可復用組件,例如採用動態vo 、列表處理器以及命令模式的持久層組件,封裝了庫訪問細節,並為不同的持久層框架提供調用介面;基於ajax ( asynchronousjavascriptandxml )技術的客戶端校驗引擎、動態級聯菜單以及通用動態樹型結構組件,一系列查詢、分頁、緩存等標簽庫則減少了表示層的冗餘,簡化了表示層開發;基於ssl登錄以及基於角色的訪問控制的安全子系統則初步實現了安全傳輸和權限控制;此外基於web服務的企業應用集成模型為今後系統集成、共享提供了有益探索。
  10. I select a special field of ip protocol itself : option field, give it a special value. because of the value, any active node can identify whether the packet bring data and code or not

    這種方案利用ip協議本身的一個特殊域:選項域,將ip選項域中的設置為一個特殊,利用這個特殊使主動節點能識別該包中攜帶有程序
  11. Other parts of the code can use this identifier to declare variables, parameters, and function return values to be of this structure s data type

    中的其他部分可以使用此標識符聲明變量、參以及函返回(其類型為此結構的類型) 。
  12. When data is marshaled to unmanaged code by value or by reference, the marshaler typically copies the data to a secondary buffer possibly converting character sets during the copy and passes a reference to the buffer to the callee

    System . string和system . text . stringbuilder當通過或通過引用將封送到非託管時,封送拆收器通常將復制到輔助緩沖區(可能在復制期間轉換字符集) ,並將對緩沖區的引用傳遞給被調用方。
  13. Financial transaction card originated messages - interchange message specifications - part 1 : messages, data elements and code values

    金融交易卡原始電文.交換電文規范.第1部分:電文元和
  14. Exception mode is also useful because you can structure your error handling more clearly than with traditional php - style warnings, and with less code nesting than by running in silent mode and explicitly checking the return value of each database call

    異常模式另一個有用的地方是,與傳統的php風格的警告相比,您可以更清晰地構造自己的錯誤處理,而且,比起以靜寂方式以及顯式地檢查每個庫調用的返回,異常模式需要的/嵌套也更少。
  15. On the basis of this introduction, some part of algorithm is improved. it includes : a new bit - allocation algorithm based on linear predication, that is to predicate the initial value used in bit - allocation procedure by the initial value of previous frame according to the correlation of the previous frame and the current frame. so the iterated loop number is reduced and the complexity of audio coding is reduced

    其中的一些主要改進有:提出一種基於線性預測的比特分配演算法,即利用幀與幀之間存在的相關性,根前幾幀的比特分配信息初預測出當前幀的比特分配信息初,通過合理設定比特分配信息初,使得比特分配的迭減少,從而節省了音頻編的運算量。
分享友人