數據變換 的英文怎麼說

中文拼音 [shǔbiànhuàn]
數據變換 英文
data conversion
  • : 數副詞(屢次) frequently; repeatedly
  • : 據Ⅰ動詞1 (占據) occupy; seize 2 (憑借; 依靠) rely on; depend on Ⅱ介詞(按照; 依據) according...
  • : 動詞1. (給人東西同時從他那裡取得別的東西) exchange; barter; trade 2. (變換; 更換) change 3. (兌換) exchange; cash
  • 數據 : data; record; information
  1. Adt automatic data translator

    自動數據變換
  2. This article canvass the status quo of the archive ' s automatization administration and the develop status of data mining, and discusses how to combine the data mining technology with the archive work from data cleaning means, data mining arithmetic, and data storage etc. and this article put forword a data mining syst em design idea. this article ' s structure is : first, in allusion to the archive data status quo, the pretreatment work of archive data that include data quality evaluation, data cleaning and data commut - ation process is bringed forword ; second, in the process of realizating data mining, the article discusses conception description, association rule, class three familiar means of applicating data mining, also put inforword the concrete arithmetic and the program design chart, and discusses the range and the foreground of all kinds of arithmetic when they are applicated in the archive ; third, the base of so you say, this article also discusses the importance of the archice applicate data storage and the means of realizing it ; last, the article discusses seval important problem of realizing an archive data mining system from data, diversity, arithmetic multiformity, mining result variety and the data pretreatment visibility, mining object descriptive visibility, mining process visibility, mining result visibil ity, user demand description and problem defining etc aspect. the article ' s core is how to import data mining technology in the archive work

    本文評述了檔案自動化管理現狀和挖掘技術的發展狀況,從清洗方法、挖掘演算法、倉庫的建立等方面論述了如何將挖掘技術與檔案工作相結合的具體思路,並提出了一個挖掘系統的設計思想。文章首先,針對檔案的現狀,提出了應對檔案進行預處理工作,包括質量評估、清理、數據變換和歸約等過程;其次,在具體實現挖掘過程中,本文結合檔案的特點探討了概念描述、關聯規則、分類等三種常見挖掘形式的實現方法,提出了具體的實現演算法和程序設計框圖,並論述了各種演算法在檔案工作中的應用范圍及前景;第三,在上述基礎上,又論述倉庫在檔案挖掘中的重要性並提出了實現一個檔案倉庫的方法;最後,從處理的多樣性、演算法的多樣性、挖掘結果的多樣性、預處理可視化、挖掘對象描述的可視化、挖掘過程可視化、結果顯示可視化、用戶需求的描述及問題定義等幾方面討論了實現一個檔案挖掘系統的幾個重點問題。全文以探討如何將挖掘技術引入到具體的檔案工作實踐中為核心。
  3. The fifth chapter use huffman coding method of the row difference data and lifting wavelet transform and spiht ( set partitioning in hierarchical tree ) coding method to realize the diagnostically compression of mfl data by judging the significance of data using changing threshold and dynamic area threshold of mfl data

    在第五章通過化閾值和動態范圍閾值判斷重要性,分別採用行差分的霍夫曼編碼方法以及提升小波和層次樹集分割( spiht )編碼方法實現了的檢測無損壓縮。
  4. The next 12 lines have the net effect of transforming the date to a three - letter format, with the last line removing the three slashes from the date

    後面12行的最後效果是將數據變換成三個字母的格式,最後一行從中除去三個斜杠。
  5. Several test items are built on the basis of the efficiency and diffusion of data transform, and way which is used for every test to construct its data

    本文基於數據變換的有效性和擴散性能選擇了多項測試項目,並探討了各項測試的構造方法。
  6. It is differ from thinking method of the traditional quantity control by grouping single - body production process and forming same data distribute through data transforming

    摘要將單體生產過程成組,通過數據變換形成同一種分佈,是有別于傳統質量控制的思維方法。
  7. It includes examination - adjustment program, failure process program, display program, information management program, i / o control program and data transform program

    軟體主要由下面幾部分組成:檢測調整程序、事故處理程序、顯示程序、信息管理程序、 i o控製程序、數據變換處理程序。
  8. A structure of a c & c system for spc has been suggested. after the historical data and current data were got, the data were converted by two time and became the values obeyed the same distribution

    在相似工序的基礎上,用數據變換的方法,通過兩次數據變換,把工序質量特徵數據變換成無意義的相對值。
  9. Meanwhile the paper analyzes the deficiency of current transmission coding and describes a new data transformation method, base91 coding with high encoding efficiency but low data extension

    論文同時分析了現有的電子郵件系統傳輸編碼存在的缺陷,提出了一種利用編碼效率高、擴展率低的數據變換方法:基- 91編碼來提高編碼效率。
  10. Some of the areas that can require special attention are interprocess communication, packaging, intersystem communication client - server between aix and linux or solaris and linux, persistent storage because of endian - ness, data - exchange formats, and so on

    需要特別注意的方面包括進程間通信、打包、系統間通信( aix與linux ,或者solaris與linux之間的客戶機-服務器) 、一致存儲(出於位元組次序的因素) 、數據變換格式,等等。
  11. The simulation on synthetic data is made and the result is discussed. 5 ) by using borland c + + builder and matlab, a semi system, i _ miner, is developed to mine association rule. it can realize other functions just as data cleaning, data transform, etc. furthermore, i _ miner is applied to an actual industry database

    提出用趨勢序列dtw距離做篩選的搜索方法,有效提高整個搜索效率,並在模擬庫上進行模擬實驗,並對實驗結果進行分析和討論; 5 )以borlandc + + builder和matlab為開發平臺,設計一個進行關聯規則挖掘的準系統i _ miner ,可以實現預處理,數據變換和關聯規則挖掘等工作。
  12. To make the prediction values with independence of the general trend, which is changed from year to year, the load data are transformed by profiles, mean value, and variance. sofm is used for the prediction of profiles and mlp networks for prediction of daily mean and daily variance. at a result, load forecasting for 24 hours in a day can be gotten

    為使預測值不受負荷逐年化這一趨勢的影響,把負荷數據變換為特徵、均值和方差的形式,利用白組織競爭網路預測負荷的特徵,然後利用多層感知器網路預測負荷的日均值和方差,最終實現對一大24小時負荷的預測。
  13. In the applications of wavelets, the vlsi design has been highly required. the coefficients in the integer wavelet transform are integer, so that the perfect reconstruction and lossless compression is possible

    小波由於其小波系為整,逆可完美恢復小波前的,因此在無損圖像壓縮等領域有著重要應用。
  14. Based on the representation of interval rational bezier curves and surfaces and by a serial of mathematical transformation, the degree reductions of them are converted to those of polynomials with upper bounds, then several algorithms are presented, with linear programming and optimal approximation methods. by relaxation of some constrained conditions, approximation effects of some of them are further improved

    區間有理bezier曲線、曲面的特點,通過一系列,將其降階問題轉化為多項式的保上界降階逼近,再應用線性規劃和最優逼近方法求解,給出幾種逼近演算法,並探討通過約束不等式的鬆弛,進一步改進逼近效果。
  15. The main function of network system is transmitting the production information from the smt equipment ' s pc monitor to monitor system by data exchange and command control, then the monitor system can collect and deal with the production information, make all kinds of information sum - up list and trend change plat

    該網路系統的主要功能是通過與命令控制,將貼片設備pc控制器中有關生產信息情報傳送至監控機系統,由監控機系統對生產信息情報進行匯總、處理,生成各種信息情報的匯總報表及趨勢化圖。
  16. With the development of communications and network technology, more and more power control systems are connected into the power grid. the data interchange among dispatch center, electric plant, substation and customers is increasing quickly. it ’ s a great challenge for the security and reliability of the power network and control systems

    隨著通信技術和網路技術的發展,接入調度網的系統越來越多,調度中心、電廠、電站、用戶等之間進行的也越來越頻繁,這對電力監控系統和網路的安全性、可靠性和實時性提出了新的挑戰。
  17. Integrated optomechanical analysis devides rigid - body and aberration, then computes the pv and rms. it provides guidance for design, tolerances allocation and alignment of optomechanical system. finally, abberations are converted to a sort of data form that can be imported by corresponding optical design software to observe their impact upon the optomechanical system imaging performance

    光機集成有限元分析方法就是通過分離三種形式的剛體位移和光學表面畸的pv值和rms值,指導光機系統的設計、誤差分配和裝調,並將成光學分析軟體codev可接收的形式,對光機系統做整體成像性能評價。
  18. Since 1990s, e - data exchange, e - funds transfer and security certificate has been maturely step by step, especially the popularization of internet and e - commerce. the current business structure and distribution system will be changed and become the potential and active trading carrier in 21 century. e - commerce changes the traditional commodity trading concept and make the traditional taxation collection faced the new challenges

    當前,以國際網際網路為媒介進行的商務活動正在全球范圍內興起, 20世紀九十年代以來,伴隨著電子,電子資金轉帳和安全認證等相關技術的日益成熟,特別是網際網路的普及,電子商務發展日益迅猛,全球電子商務即將改現有的商業形態及其流通體系,將會成為21世紀最具潛力和活力的貿易載體,改了傳統的實物貿易觀念,使得傳統的稅收征管面臨著新的挑戰。
  19. To machine the honeycomb sandwich, an interpolation method based on a rotary axis is also studied. with the round vector function and rotary movement group, a model of the error curved surface of the theoretical ellipsoid is set up to describe the actually measured surface

    以圓矢量函和回轉運動群為工具討論了曲面的誤差,利用理論橢球面的誤差曲面建立了實測曲面的學模型,通過求解理論曲面的法線實現了實測曲面的等距計算和陰陽面
  20. It is generated by the transformation of the electronic record using asymmetric cryptography and a hash function

    而該簽署是用非對稱密碼技術及雜湊函,將該電子記錄作數據變換而產生。
分享友人