系統定義記錄 的英文怎麼說

中文拼音 [tǒngdìng]
系統定義記錄 英文
system definition record
  • : 系動詞(打結; 扣) tie; fasten; do up; button up
  • : Ⅰ名詞1 (事物間連續的關系) interconnected system 2 (衣服等的筒狀部分) any tube shaped part of ...
  • : Ⅰ形容詞1 (平靜; 穩定) calm; stable 2 (已經確定的; 不改變的) fixed; settled; established Ⅱ動詞...
  • : Ⅰ名詞1 (正義) justice; righteousness 2 (情誼) human ties; relationship 3 (意義) meaning; si...
  • : Ⅰ動詞1 (把印象保持在腦子里) remember; bear in mind; commit to memory 2 (記錄; 記載;登記) writ...
  • : Ⅰ名1 (用做記載物的名稱) record; register; collection; selections 2 (姓氏) a surname Ⅱ動詞1 (...
  • 系統 : 1. (按一定關系組成的同類事物) system 2. (有條理的;有系統的) systematic
  • 記錄 : 1 (寫下來) take notes; keep the minutes; record; write down; log; enter; read in 2 (當場記錄下...
  1. The table will write down all about the electronic records during their life period. the content noted in the table will be the only basis on original and reality " testing of electronic records ". the major task of the second levels is to build the tight filing rules, moreover, combined the " life cycle table ", to build the test system to assure the original and the reality of the information during filing ; the assignment of the third level is to build testing and restoring measures of the original and the reality. by maintaining the media of electronic archives or building information file of electronic archives etc, electronic archives can maintain their available ^ visuak understandable during their deadline ; meanwhile, to build the safe control of the system through the workers dispersed authorization and deterring skills, to formulate the standards of the protective system, such as the standard of the basic structure of united electronic records ^ electronic archives. all of this is important to protect the original and the reality of electronic records and electronic archives

    「生命周期表」所的內容將作為電子文件歸檔時檢驗原始性、真實性的唯一依據;電子文件歸檔管理層中的主要任務是要建立起嚴密的歸檔制度,同時結合「文件生命同期表」建立檢驗措施保證電子文件在歸檔過程中信息內容的原始性、真實性;電子檔案保管層中主要任務是建立電子檔案數據原始性、真實性檢驗及原始數據恢復管理措施,通過對電子檔案載體的維護、建立電子檔案維護管理的信息文檔等工作,確保在保管期限中的電子檔案保持其可用性、可存取性、可理解性:建立電子文件與電子檔案原始性、真實性保護體安全控制,通過對工作人員授權分散化、建立用戶標識與認證技術等措施確保「保護體」安全運行;加強「保護體」涉及的標準與規范的制工作,如建立一的歸檔電于文件、電子檔案基本結構等標準對保護電子文件、電子檔案信息原始性、真實性有著重要意
  2. Semg signal is the sum of bioelectrical activities that recorded from the skin of working muscle by surface electrodes. the change in semg signal could reflect motor units activation patters and the status of muscle fatigue in some certain degree. because it was non - invasive and local sensitive, the technique of semg signal analysis had become very important method in examining and evaluating human muscle function

    Semg信號是從肌肉表面引導和到的肌肉活動時神經肌肉生物電變化的一維時間序列信號,由於其檢測具有非損傷性和良好的局部性以及semg信號的變化在一的程度上能夠反映運動單位的活動模式和肌肉疲勞的狀態,因此應用semg信號分析技術檢測和評價肌肉疲勞以及進一步探討其生理機制具有重要的理論意和實用價值。
  3. Audit trail is defined as a chronological record of system activities to enable the reconstruction and examination of the sequence of events andor changes in an event

    審計追蹤被為按活動的時間先後,可以用作重組和檢查一組事件的發生次序,及或一件事件的連串變化。
  4. The underwater - radio buoy for use as obtaining the ocean ' s acoustical parameters, applied for synthetic experimentations that seeing about ocean underwater acoustic environment, can obtain and memorize the data for all kind of underwater acoustic experimentations, for example, acoustic propagation, reverberation, ocean ' s noise etc. the system can not only reduce requires in quantity of using ships and scales in military strength equipment but also keep away from ships environments, reduce background noise and increase the quality of the gathered data

    海洋環境參數獲取浮標監測用於海洋水聲環境綜合考察試驗中,獲取和水聲傳播試驗數據。該不但可以減小參試艦船數量要求,降低兵力配備規模,而且可以遠離艦船環境,降低背景噪聲,提高所採集數據的質量。因此,浮標的研製對于保證未來海試完成既試驗目標、順利完成試驗項目具有重要意
  5. The ids works by two way, misuse detection and anomaly detection, misuse detection flags an intrusion on intrusion signature, this kind of detecting technic can be realized much more easily, and much more accurate, but it can not find some intrusiones that have been disguised or new kinds of intrusion. the anomaly detection can detect in more wide field, anomaly detection can compare new statistic data with average record, then anomaly record will be found, but it ' s more difficult to set a threshold, if the threshold is too big, some intrusion may be put through, if the threshold is too small, the ids will give more false positive alarm, and the threshold will be different with different people or different period, so the ids just simply show us their suspicious record, the administrator or expert will be in duty to analyze this record and give conclusion, the ids give more alarm than it should, leave us more detection record to analyze, and this is a hard work, we can not distinguish an intrusion or not if we analyze only one record, but we can judge if we find the relation among mass detection evidence. in this article, we try distinguish an intrusion using d - s theory ( proof theory ) instead using manual work, the ids will be more helpful and efficient

    濫用檢測採用的是特徵檢測的方法,實現較為簡單,判斷的準確性較高,但是不能判斷一些經過偽裝的入侵或特徵庫中尚未包含的入侵,異常檢測能夠根據以往的特徵平均值,判斷出異常情況,但是對于異常到什麼程度才視為入侵,這個閥值非常難以確,閥值設的太高,有可能漏過真正的入侵,如果設的閥值太低,又會產生較高的誤警率,而且這個閥值因人而異,因時而異,因此現在的入侵檢測把這部分異常以一的形式顯示出來或通知管理人員,交給管理人員去判斷,而這些ids難以判斷的,如果對每個證據單獨地進行觀察,可能是難以判斷是否是入侵,而把許多先後證據關聯起來,專家或管理人員根據經驗能夠判斷訪問的合法性,本文試圖引入人工智慧中證據理論的推理策略和示例學習方法,代替人工檢查分析,可以提高效率,降低誤警率,並可以對一個正在進行得可疑訪問實現實時檢測,通過搜索及時判斷,及時阻斷非法訪問,比事後得人工處理更有意
  6. 754 horizontal - component digital broad - band records in western north america are processed. the acceleration response spectra are calculated and used as part of the database. the response spectrum values are estimated by the earthquake magnitude definition and are used as another part of the database

    將美國西部地區作為參考地區,對美國南加州地區的數字寬頻帶進行了搜集與處理後作為觀測資料,共754條水平向,與利用震級所估計的反應譜值一起,用計回歸的方法建立美國西部長周期加速度反應譜衰減關
  7. Significance the bms ( bonus - malus system ) is namely prize and punishment system, in our motor vehicle insurance it is called to be no - claim bonus system. it is like this a kind of widely adopted system in the motor vehicle insurance : in the next insurance year, the policyholders who have some claim records will be punished by the premium from the insurance company, while those who have no claim record will be rewarded

    I .選題意bms即獎懲( bonus - malussystem ) ,在我國機動車輛保險中將它稱作無賠款優待,它是機動車輛保險中普遍採用的這樣一種體:在續保時,對有索賠的投保人在保費上給予一的懲罰;而對無索賠的投保人給予一的獎勵。
  8. Uml is a graphical language for specifying, visualizing, constructing, and documenting the artifacts of software systems. it is well - defined, expressive, powerful and widely useful and it has been approved by the object management group ( omg ) as a object - oriented standard in novermber, 1997

    Uml是一種用來指、可視化、構建和軟體的建模語言,它良好、易於表達、功能強大且普遍適用,被服g組織確為面向對象的標準建模語言。
  9. Cefr equipment reliability database is used mostly in following ways : providing equipment reliability parameters through equipment operation log and maintenance records analysis for cefr ' s pra and on - line risk monitor system. providing fault causes of related equipment through the equipment fault records and reason analysis in order to control spare parts macroscopically and adopt necessary improvement. providing curves of equipment fault characteristic through historical records of equipment fault for preventive maintenance

    Erd將是cefr的重要信息,它不僅可以提供設備原始特性參數,而且可以提供設備失效趨勢分析曲線, erd的主要用途如下: ?通過對設備運行和維修的分析給出設備可靠性參數,用於cefr的pra分析及風險管理; ?通過對設備失效及原因分析給出相關設備失效的根本原因,以便從宏觀上控制備品備件或採取必要的改造; ?通過對設備失效歷史的分析給出設備失效的特性曲線,提供預防性維修所需信息; ?另外erd在大修優化、 rcm 、期試驗以及維修政策方面有重要的指導意
  10. In many cases today, using aspects to extend another library is working from a fairly inconsistent or undocumented definition of what events occur in the system life cycle

    在今天的許多案例中,使用方面來擴展另一個庫是在對發生在生命周期中的事件存在相當不一致的或無文檔的情況下進行的。
  11. Not specified or not known to an operating system. for example, an " undefined record " is a record of unspecified or unknown length

    指對某一操作而言是未確的或不知道的。例如,某條「未」就是一種未確或不知道長度的
  12. Then user browses the web pages, selects interested web page as sample page and create conceptual schema based on the understanding of content of the sample page. thirdly, the user marks the interested information blocks in sample page and build up the correspondence between the interested information blocks of sample page and fields of conceptual schema, and at the meanwhile system passes the correspondence to learning module to form extraction rules and stores them into rule database. fourthly, extraction module extracts information from the similar - structured pages by using the extraction ailes and sends the extracted results to classified cache database for users " further query

    首先將web信息按模式和風格劃分為不同領域,建立領域知識庫,以便對用戶的查詢進行導航並縮小查詢范圍;然後利用現有的搜索引擎實現關鍵詞查詢,利用瀏覽功能尋找感興趣的網頁,對找到的網頁根據其內容建立自的用戶概念模式;利用概念模式對網頁進行標,使概念模式中的欄位與網頁中的信息塊對應起來,建立對應關並傳給學習模塊以形成抽取規則並存入規則庫;抽取模塊根據規則庫中的抽取規則進行信息抽取並將抽取到的信息按用戶的概念模式形成,按領域分類存儲于cache庫中以備用戶查詢;最後,用戶利用查詢功能實現個性化查詢。
  13. For example, if an application uses the file system watcher event provider, the provider requires an xml schema definition language file that documents the event schema

    例如,如果應用程序使用文件觀察器事件提供程序,則該提供程序需要使用一個事件架構的xml架構語言( xsd )文件。
分享友人