核實檔案 的英文怎麼說

中文拼音 [shídàngàn]
核實檔案 英文
verify verify a file
  • : 核構詞成分。
  • : Ⅰ形容詞1 (內部完全填滿 沒有空隙) solid 2 (真實; 實在) true; real; honest Ⅱ名詞1 (實際; 事實...
  • : Ⅰ名詞1 (帶格子的架子或櫥) shelves (for files); pigeonholes 2 (檔案) files; archives 3 (器...
  • : 名詞1 (長桌) table; desk 2 (案件) case; law [legal] case 3 (案卷; 記錄)record; file 4 (提...
  • 核實 : verify; check
  • 檔案 : files; archives; record; dossier檔案保管 archives keeping; 檔案編目 cataloguing of file; 檔案標記...
  1. This article canvass the status quo of the archive ' s automatization administration and the develop status of data mining, and discusses how to combine the data mining technology with the archive work from data cleaning means, data mining arithmetic, and data storage etc. and this article put forword a data mining syst em design idea. this article ' s structure is : first, in allusion to the archive data status quo, the pretreatment work of archive data that include data quality evaluation, data cleaning and data commut - ation process is bringed forword ; second, in the process of realizating data mining, the article discusses conception description, association rule, class three familiar means of applicating data mining, also put inforword the concrete arithmetic and the program design chart, and discusses the range and the foreground of all kinds of arithmetic when they are applicated in the archive ; third, the base of so you say, this article also discusses the importance of the archice applicate data storage and the means of realizing it ; last, the article discusses seval important problem of realizing an archive data mining system from data, diversity, arithmetic multiformity, mining result variety and the data pretreatment visibility, mining object descriptive visibility, mining process visibility, mining result visibil ity, user demand description and problem defining etc aspect. the article ' s core is how to import data mining technology in the archive work

    本文評述了自動化管理現狀和數據挖掘技術的發展狀況,從數據清洗方法、數據挖掘演算法、數據倉庫的建立等方面論述了如何將數據挖掘技術與工作相結合的具體思路,並提出了一個數據挖掘系統的設計思想。文章首先,針對數據的現狀,提出了應對數據進行預處理工作,包括數據質量評估、數據清理、數據變換和歸約等過程;其次,在具體現數據挖掘過程中,本文結合數據的特點探討了概念描述、關聯規則、分類等三種常見挖掘形式的現方法,提出了具體的現演算法和程序設計框圖,並論述了各種演算法在工作中的應用范圍及前景;第三,在上述基礎上,又論述數據倉庫在數據挖掘中的重要性並提出了現一個數據倉庫的方法;最後,從處理數據的多樣性、演算法的多樣性、挖掘結果的多樣性、數據預處理可視化、挖掘對象描述的可視化、挖掘過程可視化、結果顯示可視化、用戶需求的描述及問題定義等幾方面討論了現一個數據挖掘系統的幾個重點問題。全文以探討如何將數據挖掘技術引入到具體的工作踐中為心。
  2. Since pins are mailed to the collection address on file with ups, you should ask the identified manager to verify that the ups collection address is a valid u. k. mail delivery stop that receives mail

    由於ups會把pin寄到中的收件地址,所以您應詢問指定的經理,ups收件地址為有效且可收件的郵寄地址。
  3. Under these circumstances, we cooperate with computer specialists for the purpose of researching and developing a new method which answers the needs of prosthodontics, which covers the information disposition work of the prosthodontics office in clinical activities, in personnel files management, in storehouse property management, in economic cost accounting and so on, and which solves the problems of relative information ' s construction, disposition, storage, inquiry, statistics and dynamic monitor forthwith with advanced information technology

    正是在這種狀況下,我們和計算機專業人員合作,旨在研究和建立完全符合口腔修復科專業要求,能夠涵蓋修復科在臨床醫療活動、人事管理、庫房資產管理、經濟成本算等相關活動中需要解決的信息處理問題,將相關信息的構建、處理、存儲、查詢、統計、時動態監控等操作以先進的信息技術處理方式加以解決。
  4. Thirdly, the working time depends on season change and there is a different focus in the evaluation of merit & benefit. lastly, there are many scattered manufactured sites for one unit, so the employers work not in a single site. in order to adapt to the requirement of management information and the modernization, it is urgently to develop a hrmd to supply information integration and share of human resources management in those institutes

    我國市級科研所正處于科研體制改革時期,在人力資源管理上具有「專業技術人員多,知識群體密集;多種分配模式並存,際工資和工資分離;工作時間季節性強,績效考各有側重;生產基地多,人員分散」等特點,為適應管理信息化、現代化的發展要求,迫切需要開發一個符合行業管理特點,能為人力資源管理活動提供信息集成和共享的人力資源管理與決策支持系統。
  5. Require the domestic difficulty candidate for an entrance examination of derate exam charge, must carry the following data, after the sectional examine and verify that is in charge of the job that take an examination of wu by each province city affirms, conduction derate exam studies the procedures of wu charge : ( the county that the examinee of the town family that 1 ) enjoys national minimum life to ensure gold must carry its family seat ( area, city ) civil administration branch issued enjoyment the proof that lowermost life ensures ( original ) and low assure ( xerox ) ; ( of family of 2 ) country absolutely poverty enter oneself for an examination personnel the county by its family seat ( area, city ) help deficient up to do ( branch ) issued especially tired proof ( original ) with especially tired family fundamental condition file card ( xerox )

    需減免考試費用的家庭困難考生,必須攜帶以下材料,由各省市負責考務工作的部門審確認后,辦理減免考試考務費用的手續: ( 1 )享受國家最低生活保障金的城鎮家庭的考生須攜帶其家庭所在地的縣(區、市)民政部門出具的享受最低生活保障的證(原件)和低保證(復印件) ; ( 2 )農村絕對貧困家庭的報考人員憑其家庭所在地的縣(區、市)扶貧辦(部門)出具的特困證(原件)和特困家庭基本情況卡(復印件) 。
  6. Secondly we take digital archive retrieval system ( dars ) of soochow university as an example to describe how these technologies have been used into the implement of the heterogeneous information integration platform

    並以蘇州大學館電子檢索系統為例,詳細地介紹了在fis應用框架內,運用以組件為心的多層應用框架現面向只讀應用的異構信息集成平臺的具體現技術。
  7. This thesis based on the task study deals with design and realization of cc criteria security risk assessment system first presents the concepts and statuses of information security and risk assessment. it then expounds risk assessment ' s two main parts, criteria and process & methods. and it discusses deeply in the theory research results of the task prophase include cc criteria and cc evaluation process & methods, especially in cc ' s main idea, the applications of cc, work of the three phases in cc evaluation process and the applications of the cem documents together with cc in evaluation phase used in this security risk assessment system

    本文以基於cc標準的風險評估系統的設計和開發課題為背景,首先對信息安全及風險評估的相關概念及現狀做了介紹,其次詳細的闡述了風險評估概念及兩個重要組成? ?標準體系以及評估的過程和方法,然後總結了評估系統在設計時所涉及到的課題前期理論研究成果包括cc評估標準以及cc評估過程和方法等內容,特別是對cc標準的心思想、 cc標準的具體應用、 cc評估過程三個階段的工作以及cc標準的伴隨文cem作為評估方法依據在執行評估階段的具體應用等方面做了深入研究和詳細論述,並指出這些理論依據當前存在的不足,本文最後以前面的理論研究成果為依據,闡述了cc評估系統的組成部分以及總體的設計方,並對已完成的現部分做了介紹。
  8. Uml is a good kind of modeling language which is defined properly and can be described easily and has powerful functions. it is a good modeling tool in object - oriented design. according to power plant soft - package ’ s requirement of northeast electric power design institute enterprise standard, and following the oo design method, we developed sizing flash tanks and chimney outlet velocity software system

    該系統符合東北電力設計院《電廠設計軟體包》的要求,改變了以往人工計算工作量大、易出錯、計算不完整、輸入輸出不明顯的缺點,現了便於用戶使用和檢查、調整計算和設計方、保存計算結果、便於校和存等自動功能。
  9. With the information virtualization of core datum such as commercial data and documents, the security problem comes up to the people. the investment in network security constrution has become a new wave for every companies. security investment does not satisfy the demand

    隨著企業的商業數據、文件等心價值資料越來越多地現信息虛擬化,安全問題開始浮出水面,對網路安全建設的投資,成為當前各企業新一輪信息化建設的高潮。
  10. A data file storing a mathematical key which is assigned to a single individual but can be made publicly available. others can use this key to verify signatures created with its corresponding

    其他人士可使用該匙由對應的私人密碼匙所產生的數碼簽署,及把信息或加密。
  11. " the revamped computer system also allows the reporting agencies to submit data online to crda, thereby greatly streamlining the work flow and improving data quality and timeliness

    呈報機構可透過網際網路傳送濫藥者資料到室,大大減少工序,加快處理資料的時間及便利呈報數字。
分享友人