被標識的數據 的英文怎麼說
中文拼音 [bèibiāozhìdeshǔjù]
被標識的數據
英文
identified data- 被 : Ⅰ名詞1 (被子) quilt 2 (姓氏) a surname Ⅱ動詞[書面語]1 (復蓋) cover; spread 2 (遭受) suffe...
- 標 : Ⅰ名詞1 [書面語] (樹梢) treetop; the tip of a tree2 (枝節或表面) symptom; outside appearance; ...
- 識 : 識Ⅰ動詞[書面語] (記) remember; commit to memory Ⅱ名詞1. [書面語] (記號) mark; sign 2. (姓氏) a surname
- 的 : 4次方是 The fourth power of 2 is direction
- 數 : 數副詞(屢次) frequently; repeatedly
- 據 : 據Ⅰ動詞1 (占據) occupy; seize 2 (憑借; 依靠) rely on; depend on Ⅱ介詞(按照; 依據) according...
- 標識 : [物理學] characteristic; identification; identifying標識碼 identification code; 標識位置 home position
- 數據 : data; record; information
-
These parameters are the bases of terrain classification and target detection and recognition. therefore, terrain surface vegetation parameters inversion using polinsar data has been hot research topics in polarimetric interferometry in recent years
地表參數的提取為地表分類及進一步目標識別奠定了基礎,因此用極化干涉雷達數據提取地表植被參數是當前極化干涉研究的熱點問題。Data source identifiers are used to satisfy the second design goal : that the annotations be stored separately from the data being annotated and that the data sources be independent of location
數據源標識符可用來滿足第二個設計目標:注釋與被注釋的數據分開存儲,並且數據源獨立於位置。According to the standard of kddcup ' 99 and by adopting numeric mixed coding, 41 features of the captured network packets are extracted and transferred into numerical form which can be accepted by neural network in this paper, we present a misuse detection model based on hybrid neural network and decision tree
根據第三屆國際知識發現和數據挖掘競賽( kddcup ' 99 )標準,對截獲的網路數據包進行41維特徵抽取,並採用混合數值編碼方法,使這些特徵轉化為能被神經網路處理的數值形式。With the extensive use of xml in applications over the web, how toupdate xml data is becoming an important issue because the role ofxml has expanded beyond traditional applications in which xml isused for information exchange and data representation over theweb
在lorel數據模型中, xml數據被建模為帶標號邊的有向圖,一個節點表示一個xml元素,表示為一個對,這里eid是一個唯一的元素標識符, value是一個原子字元串或復雜值。This essay firstly systematically introduces the theories and key technologies of vpn with the detailed presentation of the functions of safety manage central - - - - the automatic production and distribution of passwords, remote - controlled destroy of passive and active passwords, loading special data in air and special tracing of cell phones that are out of control. besides, the researchers has analyzed the contents and findings of similar researches both domestics and overseas with the emphases on the in - depth research of safety communication gateway in order to confirm a system model and carry out the macro - design. after that is the detailed introduction of the design realization of special information transportation
本文首先系統地介紹了gsm移動通信保密專網的原理知識及關鍵技術,詳細介紹了安全管理中心的功能- -密鑰自動產生和分配、被動式和主動式密鑰遙控銷毀、專用數據空中加載、以及失控專用手機追蹤等,並且對國內外同類研究的內容和成果進行分析;重點對安全通信網關進行了深入研究,確定了一種系統模型並進行了總體設計,然後對其中專用信息傳輸的設計實現進行重點介紹;本文還對安全管理中心的短消息安全通信網關與專用手機進行性能測試,測試結果表明該系統符合課題的各項技術指標,實現了安全通信網關的各項功能需求;最後,總結課題工作,對下一步系統進行完善和發展的內容提出了具體建議。For example, if all records in the database have been deleted, compacting the database sets the value of the identity column of the next record to the seed value
例如,如果數據庫中的所有記錄均已被刪除,對數據庫進行壓縮便會將下一條記錄的標識列的值設為種子值。Is not given, the identity values for this column in the data file being imported are ignored, and sql server 2005 automatically assigns unique values based on the seed and increment values specified during table creation
,則將忽略被導入的數據文件中此列的標識值,而且sql server 2005將根據創建表期間指定的種子值和增量值自動分配唯一值。All informal changes are recorded in history, and other data impacted by those changes are highlighted so that all team members can identify which data might be " suspect.
所有信息變更記錄在歷史中,其他受變更影響的數據被重點標明,這樣其他的小組成員即可識別那些數據可能被「懷疑」 。What makes this challenge particularly difficult with multi - tier j2ee systems where j2ee application code contacts a database using jdbc, sqlj, or cmp beans is that, traditionally, the end user s identity information is lost
使得此挑戰對于多層次j2ee系統(其中的j2ee應用程序代碼會訪問數據庫使用jdbc 、 sqlj或cmp bean )特別困難的是,最終用戶的標識信息通常會被丟失。分享友人