第三類程序 的英文怎麼說

中文拼音 [sānlèichéng]
第三類程序 英文
type 3 programming
  • : Ⅰ助詞(用在整數的數詞前 表示次序) auxiliary word for ordinal numbers Ⅱ名詞1 [書面語] (科第) gr...
  • : Ⅰ數詞1. (二加一后所得) three 2. (表示多數或多次) more than two; several; many Ⅱ名詞(姓氏) a surname
  • : Ⅰ名1 (許多相似或相同的事物的綜合; 種類) class; category; kind; type 2 (姓氏) a surname Ⅱ動詞...
  • : 名詞1 (規章; 法式) rule; regulation 2 (進度; 程序) order; procedure 3 (路途; 一段路) journe...
  • 第三 : third第三帝國 [德國] the third reich (1934 1945); 第三 (層)樓 [美國] third story; [英國] seco...
  • 程序 : 1 (進行次序) order; procedure; course; sequence; schedule; ground rule; routing process 2 [自動...
  1. Chapter 5 steered the concrete programming, concrete curtate three working extent of authoriths of the indoles consumer, designed three working interfaces

    五章進行了具體的設計,具體劃分了用戶的操作權限,設計了了個操作界面。
  2. This article canvass the status quo of the archive ' s automatization administration and the develop status of data mining, and discusses how to combine the data mining technology with the archive work from data cleaning means, data mining arithmetic, and data storage etc. and this article put forword a data mining syst em design idea. this article ' s structure is : first, in allusion to the archive data status quo, the pretreatment work of archive data that include data quality evaluation, data cleaning and data commut - ation process is bringed forword ; second, in the process of realizating data mining, the article discusses conception description, association rule, class three familiar means of applicating data mining, also put inforword the concrete arithmetic and the program design chart, and discusses the range and the foreground of all kinds of arithmetic when they are applicated in the archive ; third, the base of so you say, this article also discusses the importance of the archice applicate data storage and the means of realizing it ; last, the article discusses seval important problem of realizing an archive data mining system from data, diversity, arithmetic multiformity, mining result variety and the data pretreatment visibility, mining object descriptive visibility, mining process visibility, mining result visibil ity, user demand description and problem defining etc aspect. the article ' s core is how to import data mining technology in the archive work

    本文評述了檔案自動化管理現狀和數據挖掘技術的發展狀況,從數據清洗方法、數據挖掘演算法、數據倉庫的建立等方面論述了如何將數據挖掘技術與檔案工作相結合的具體思路,並提出了一個數據挖掘系統的設計思想。文章首先,針對檔案數據的現狀,提出了應對檔案數據進行預處理工作,包括數據質量評估、數據清理、數據變換和歸約等過;其次,在具體實現數據挖掘過中,本文結合檔案數據的特點探討了概念描述、關聯規則、分種常見挖掘形式的實現方法,提出了具體的實現演算法和設計框圖,並論述了各種演算法在檔案工作中的應用范圍及前景;,在上述基礎上,又論述數據倉庫在檔案數據挖掘中的重要性並提出了實現一個檔案數據倉庫的方法;最後,從處理數據的多樣性、演算法的多樣性、挖掘結果的多樣性、數據預處理可視化、挖掘對象描述的可視化、挖掘過可視化、結果顯示可視化、用戶需求的描述及問題定義等幾方面討論了實現一個檔案數據挖掘系統的幾個重點問題。全文以探討如何將數據挖掘技術引入到具體的檔案工作實踐中為核心。
  3. Article xxxv with regards to any engagement in any grant making activity, the foundation shall make public the nature of that activity and the application and conformity assessment procedure

    十五條本基金會開展公益資助項目,應當向社會公開所開展的公益資助項目種以及申請、評審
  4. Second part, recommend and the purchase three extremely representative countries of evaluation and analysis legislate of u. s. a., britain, germany, u. s. a. mainly concentrates the legislation type, and because of the reason of the national system, legislate to assign to and legislate for the union with two layers of structure of state law again, britain belongs to the typical self - disciplining legislative system, purchased and amalgamated the committee to control and supervised by london mainly, germany is that in some cases the commerce is used to having legal effect, synthesize above - mentioned various countries " characteristic, propose our country while purchasing legislating, should walk the doctrine of the golden mean, the due course of law that purchase should follow in operation all kinds of being must be exhaustive and having operating nature

    二部分,介紹並評析了美、英、德等個極具代表性國家的收購立法,美國主要是屬于集中立法型,並由於國家體制的原因,立法又分為聯邦立法與州立法兩層結構,英國則是屬典型的自律性立法體系,主要由倫敦城收購與合併委員會來進行控制和監管,德國則是在某些情況下商業習慣具有法律效力,綜合上述各國特點,提出我國在進行收購立法時,也應行中庸之道,對各收購行為在操作上應遵循的法定須詳盡且具操作性。
  5. Securing judgment procedure is to protect the legal rights of creditor, under that aim, there also exist two direct aim, one is safeguard the execute of the judicial addict made in the future, the other is to avoid the unredemptive damages chapter 3 the type of civil securing judgment procedure this chapter researches into the type of civil securing judgment procedure and relevant legal basis in main countries, including the arrest and einstweligeverfugung in germany and japan, the juger en refere iprocedure and qrdanance sur requite in france, attachment, temporary restraining order and preliminary injunction in u. s, pre - judgement rremedies in britain, and property preservation and advance execution in china the civil securing judgment procedure system of france, u. s. and britain don t meet the situation and tradition custom of china, while the civil securing judgment procedure system of german and japan has deficiency the conclusion of this chapter is, we should reasonably reform current civil securing judgment procedure system of china, reconstruction the dual civil securing judgment procedure system under the division of property preservation and action preservaition chaptei4 court has the power of jurisdiction this chapter researches into the court which has jurisdiction to different kinds of securing

    筆者認為,民事保全存在審理階段的保全和執行階段的,是特別的訴訟和執行兼容;民事保全請求權屬于廣義上的訴權;民事保全權屬于裁判權(司法權)和行政權並存;民事保全應當體現迅速原則、全面保護雙方當事人;權益原則、正當原則、保全措施的標的有限原則;民事保全的總目的是為了保護債權人的合法權益,其直接目的有二:一是保障將來執行文書的強制執行,二是:避免將來無法挽回的損失。章民事保全的型本章對各主要國家關於民事保全的型及其依據逐一作了論述:德國和日本的假扣押與假處分、法國的緊急審理和依申請作出裁定的、美國的, 、一。扣押和中間禁令、英國的臨時性救濟措施、我國的財產保全和先予執行。
  6. Chapter 1, we introduce this paper. chapter 2, we anatomy active signaling and probe particularly. active signaling protocol ( asp ) is an important application in active network. probe is a model to debug and inspect active environment. furthermore, we analyse rsvp and its employmet process. chapter 3, we bring forward the active signaling and probe model to scout the network state. chapter 4, we analysys key class and object in the model. chapter 5, we design programmes for user and deploy it to linux 9. 0 operating system so we can experiment partly. chapter 6, we sum up and analysis work for later

    章中,我們提出了主動信令和探針的結合模型,並用主動探針對網路狀態進行監視。在四章中,我們對于模型中的關鍵和對象進行了分析。五章我們對探針及用戶端進行了設計,並在linux9 . 0中配置ee環境,對本文提出的處理模式進行了部分實驗。
  7. Section i mainly probes into the questions of the conception, nature, characteristics of the mortgage and the classification and variety of mortgage as well. while in section ii, the paper particularly analyzes the questions of the acquiring approach of mortgage, the parties to the mortgage contract, the target objects of mortgage contract, the prescription and content of mortgage contract, mortgage registration, the organizations of mortgage registration, the procedures of mortgage registration, etc. and section iii mainly illustrates the questions of the scope of creditor ' s rights of mortgage guarantee, the scope of target objects connected with the effect of mortgage, the party ' s rights and obligations in mortgage affairs ; the relationship between mortgage and guarantee, the conflicts between mortgage and other real rights granted by way of security

    一部分主要就抵押權及抵押的概念、性質、特徵、抵押權的分、種等問題進行了探討;二部分著重分析了抵押權的獲得方式、抵押合同的當事人、抵押合同的標的物、抵押合同的訂立、內容,抵押登記、抵押登記機關、抵押登記部分闡述了抵押擔保的債權的范圍,抵押權效力所及的標的物的范圍,抵押關系中當事人的權利義務,抵押與保證的關系,抵押權與其他擔保物權的競合,抵押權的處分;四部分探討了抵押權的實現條件,抵押權的實現途徑,抵押權的實現方式,抵押權實現的限制,抵押權的次,抵押權的消滅;五部分重點研究了權利抵押權、最高額抵押權中的若干問題。
  8. Whereafter, based on the analysis on the flood influence for traffic lines, the research is centered on the following parts : firstly, the destroying modes, reasons and mechanism of flooded lines are discussed, and the frameworks and countermeasures of preventing and controlling hazards system are put forward ; secondly, the ways of region forecasting for the landslide are analyzed and the automation of landslide forecast for certain site through visual programming is realized. furthermore, the function of dynamic segmentation in arc view is made use of to realize the forecast result ' s visualization ; thirdly, the reasons and patterns of roadbed subsidence are discussed and the methods of forecasting subsidence based on the gm ( 1, 1 ) model are put forward. then the applications of the arcview software and its extended module on the study of roadbed subsidence are debates upon ; fourthly, an analysis on the sources of flood for traffic lines, which situate in the reservoir coverage area, is given

    接著,論文探討了山區交通線路災害的特點、分、時間和空間分佈規律以及災害的防治原則和對策等;然後,以洪水災害對交通線路的毀壞為主線,重點研究和分析了以下幾個問題:一,探討了洪水對交通線路的破壞方式,水毀原因以及水毀機理,並提出了交通線路水毀防禦系統框架和對策;二,分析了雨季邊坡塌方災害的區段預測方法;通過可視化編,編制了雨季邊坡塌方災害的工點預報,並結合arcview實現了預測結果的可視化;,對路基沉陷原因和模式進行了分析,並提出利用gm ( 1 , 1 )模型對路基沉陷區進行分析和預測,最後論述了arcview軟體及其擴展模塊在沉陷區研究分析中的應用;四,對汛期庫區線路災害的原因進行了分析,並探討了利用數量化理論對路基防護工抗洪能力進行預測的意義;五,提出從風險的角度對交通線路的防災減災進行管理,對風險估計的相關問題進行了論述,並探討了交通線路水害危險區段的劃分問題。
  9. After that, she adopts game theory to study twice price reductions. from the game primary factors such as participants, strategy and benefits, she sizes up the efficiency of the price competition, and analyzes the strategical selection system in competition and cooperation between humen bridge co. and humen ferry co. in the third section, firstly, she draws out the linear regression formula with time series data and vehicle flow to estimate future flow under the condition of un - reducing price with the tools of statistics

    部分先用統計學的基本原理和分析工具求得虎門大橋車流量與時間列的線性回歸方,來推算假設在未調價條件下的年流量;再運用管理經濟學的價格彈性理論比較調價前、后的車流量和價格的變化關系,求出二車的價格彈性系數,用以判斷虎門大橋這次二車調價策略的效率性。
  10. In no event unless required by applicable law or agreed to in writing will any copyright holder, or any other party who modifies and / or conveys the program as permitted above, be liable to you for damages, including any general, special, incidental or consequential damages arising out of the use or inability to use the program ( including but not limited to loss of data or data being rendered inaccurate or losses sustained by you or third parties or a failure of the program to operate with any other programs ), even if such holder or other party has been advised of the possibility of such damages

    除非受適用法律要求或者書面同意,任何版權所有者,或任何依前述方式修改和/或發布本者,對于您因為使用或不能使用本所造成的一般性、特殊性、意外性或間接性損失,不負任何責任(包括但不限於,資料損失,資料執行不精確,或應由您或人承擔的損失,或本無法與其他運作等) ,即便該版權所有者或其他組織已經被告知有此損失的可能性也是如此。
  11. This paper mainly focuses on the study of law system on asset securitizition. the first part mainly gives out the definition of asset securitization, including its conception, categories, features, applying program and functions on economy and law. the second part is mainly devoted to the law principles of asset securitization, which has made an expanded exploration for the next part. the third part is the importance of the paper, discussing the law system of asset securitization

    一部分首先簡要介紹了資產證券化的法律界定,包括資產證券化的定義、種、特徵、實現和經濟與法理功能。二部分主要闡述了資產證券化的法律原理,為下一部分資產證券化法律制度的論述做了鋪墊。部分是本文的重點,論述了資產證券化的法律制度。
  12. In the second chapter, firstly the author refers to the custody system in foreign countries, elaborates the different custody pattern in the two main legal systems and analyses the custody system comprehensively in the view of the main body, the procedure, the condition, the time limit and remediation. on this, the article summaries the common features and the individuality of the western arrest legal system and makes a further comparison with our arrest system in the main body, the procedure, the condition, the time limit and the flow

    二章中,本文首先對外國羈押制度做了一定的概述,分別闡述了大陸法系及英美法系法系主要代表國家的羈押制度模式,並從主體、、條件、時限、救濟五個大進行了全面分析。在章中,本文全面分析了當前我國逮捕制度下存在的問題,並從立法和司法角度分別分析了在法律規定及司法實踐中,我國逮捕制度的現實缺陷和潛在缺陷,並從主體、、條件、時限、救濟分別闡述了各自領域的問題。
  13. The text mainly divides into the introduction, the main body, and the conclusion three major parts, and the main body contains three major parts : the first part about administrative evidence system basic question research, contains the administrative evidence concept localization, the administrative evidence system research significance as well as the administrative evidence and comparison of the administrative proceedings evidence ; the second part about the administrative evidence type division research, in which contains administrative evidence type outline as well as our country administration evidence type determination ; the third part about the removing rule of illegal administrative evidence, in which contains the possibility of the establishment of the removing rule of illegal administrative evidence, the necessity of the establishment of the removing rule of illegal administrative evidence in our country as well as its content and appraisal

    文本主要分為引言、本體和結語大部分,其中本體又包含大部分:一部分關於行政證據制度基本問題研究,其中包含行政證據概念定位、行政證據制度研究的意義以及行政證據與行政訴訟證據之比較;二部分關於行政證據種劃分研究,其中包含行政證據種的概述以及我國行政證據種的確定;部分關於行政證據之非法排除規則研究,其中包含非法排除規則確立的可能性、我國行政證據非法排除規則確立的必要性以及我國行政中確立非法證據排除規則的內容及其評價。
  14. Secondly ndis ( network driver interface specification ) technology in windows2000 and three kinds of network drivers : protocol driver, intermediate driver and miniport driver in ndis structure are narrated in detail. the whole structure of miniport driver for the wireless card and the design of all modules are described, the layered i / o technology in network stack and the configuration module based on this technology are introduced in succession

    二部分詳細敘述了windows2000下的ndis (網路驅動介面規范)技術和ndis框架下的網路驅動:協議驅動、中間驅動和小埠驅動,並描述了所開發的ndis小埠驅動的整體架構和各模塊的設計,接著介紹了網路協議棧中的層次i o技術和基於此技術的配置模塊。
  15. You can expand the set of application types and prototypes used to define applications by installing packages supplied by microsoft or third - parties or by creating them using the system definition model software development kit

    可以擴展用來定義應用的應用型和原型的集合,方法是安裝由microsoft或方所提供的包,或者使用系統定義模型( sdm )軟體開發工具包( sdk )來創建它們。
  16. Types in the. net framework and third - party class libraries can provide methods that allow an application to continue executing while performing asynchronous operations in threads other than the main application thread

    . net framework和庫中的型可以提供允許應用在主應用之外的線中執行異步操作的同時繼續執行的方法。
  17. The first chapter in this paper provides a survey of data mining technology, and explains basic concepts, function and the whole framework of data mining and difficulties in developing and some future directions in association rule generation ; the second chapter introduce the basic concepts, brings forward a classification of association rule ; the third chapter give a deep research on algorithms of every kind of association rule, include mining single - dimensional signal - level association rule and multidimensional multilevel association rule, it describes these algorithm, point out some method to optimize this algorithm and test its quality with experiments ; the fourth and fifth chapter introduce the designs about association rule mining system basing on relation database visual foxpro in detail : according to system frame of the association rule mining, actualize a new mining algorithms and analyses every function module of program, at last further analyses the left problems in designs

    本論文一部分對數據挖掘技術進行了總體介紹,說明了基本概念、功能和系統總體框圖以及發展中的難點和研究方面;二章對關聯規則基本概念的進行了介紹,提出了關聯規則的分方法;章探討了挖掘各種關聯規則的演算法,從挖掘單維單層布爾關規則的經典的apriori開始,分析了挖掘單維、多層關聯規則的演算法,多維關聯規則的演算法到多維多值屬性關聯規則的演算法。文中提出演算法優化方法,並對其性能進行了實驗測試;四部分、五部分詳細介紹了基於關系型數據庫的關聯規則挖掘系統的設計構思,根據關聯規則挖掘系統結構框架,實現了基於visualfoxpro的關聯規則挖掘系統,其于採用了一個新型的基於關系數據庫的關聯規則挖掘演算法,提高了挖掘效率,並詳細分析了設計的各個功能模塊,最後就設計中遺留的問題進行了進一步的分析。
  18. This paper first illustrated some typical algorithms for large dataset, then gave off a processing diagram in common use second, for the dataset with large quantity and many attributes, we renovated the calculation method of the attribute ' s statistic information, giving off a ameliorated algorithm this thesis consists of five sections chapter one depicts the background knowledge and illustrates the position of data mining among many concepts also here is the data mining ' s category chapter two describes the thought of classification data mining technique, puts forward the construction and pruning algorithms of decision tree classifier chapter three discusses the problems of adapting data mining technique with large scale dataset, and demonstrates some feasible process stepso also here we touches upon the combination r - dbms data warehouse chapter four is the design of the program and some result chapter five gives the annotation the conclusion, and the arrangement of future research

    本論文的組織結構為:一章為引言,作背景知識介紹,摘要闡述了數據挖掘在企業知識管理、泱策支持中的定位,以及數據挖掘的結構、分二章講述了分數據挖掘的思路,重點講解了泱策樹分器的構建、修剪,章針對大規模數據對數據挖掘技術的影響做了講解,提出了可採取的相應的處理手段,以及與關系數據庫、數據倉庫結合的問題;四章給出了論文的框架、流設計,以及幾個關鍵問題的設計;五章對提出的設計進行簡要的評述,做論文總結,並對進一步的研究進行了規劃。
  19. In capter 2, it is proved that the system possesses a global attractor and a two - side estimate for the fractal dimension of it is presented. in capter 3, several different approximate intertial manifolds of the system are constructed by applying linear galerkin method, method of projecting operator and operator eigenvalue and successive iterative method, and it is proved that arbitary trajectory of the system enters into a small neighbourhood of the global attractor after large time. capter 4 studies the asymptotic attractor of the system by constructing a solution sequence which approaches to the global attractor of the equation in long time, and the dimentional estimate of the asymptotic attractor is given

    二章證明了該系統的整體吸引子的存在性,給出了其分形維數的上下界;章利用線性galerkin方法、運算元投射和運算元特徵值方法及逐次迭代方法構造了幾近似慣性流形,證明了該方的任意解軌道在長時間后進入整體吸引子的任意小鄰域;四章構造了一個有限維解列即該系統的漸近吸引子,證明了它在長時間后無限趨于方的整體吸引子,並給出了漸近吸引子的維數估計
  20. In part 2 of this three - part series, you ll turn the classes - which you created to access the database in part 1 - into three different applications using derby s single - user embedded mode, its multiuser network mode, and a combination of the two from within a web environment

    在本系列教2部分中,我們將把1部分中創建的數據庫訪問轉換為種不同的應用,分別使用derby的單用戶嵌入模式、多用戶網路模式和web環境下兩種模式的結合。
分享友人