被標識的數據 的英文怎麼說

中文拼音 [bèibiāozhìdeshǔ]
被標識的數據 英文
identified data
  • : Ⅰ名詞1 (被子) quilt 2 (姓氏) a surname Ⅱ動詞[書面語]1 (復蓋) cover; spread 2 (遭受) suffe...
  • : Ⅰ名詞1 [書面語] (樹梢) treetop; the tip of a tree2 (枝節或表面) symptom; outside appearance; ...
  • : 識Ⅰ動詞[書面語] (記) remember; commit to memory Ⅱ名詞1. [書面語] (記號) mark; sign 2. (姓氏) a surname
  • : 4次方是 The fourth power of 2 is direction
  • : 數副詞(屢次) frequently; repeatedly
  • : 據Ⅰ動詞1 (占據) occupy; seize 2 (憑借; 依靠) rely on; depend on Ⅱ介詞(按照; 依據) according...
  • 標識 : [物理學] characteristic; identification; identifying標識碼 identification code; 標識位置 home position
  • 數據 : data; record; information
  1. These parameters are the bases of terrain classification and target detection and recognition. therefore, terrain surface vegetation parameters inversion using polinsar data has been hot research topics in polarimetric interferometry in recent years

    地表參提取為地表分類及進一步目別奠定了基礎,因此用極化干涉雷達提取地表植是當前極化干涉研究熱點問題。
  2. Data source identifiers are used to satisfy the second design goal : that the annotations be stored separately from the data being annotated and that the data sources be independent of location

    符可用來滿足第二個設計目:注釋與注釋分開存儲,並且源獨立於位置。
  3. According to the standard of kddcup ' 99 and by adopting numeric mixed coding, 41 features of the captured network packets are extracted and transferred into numerical form which can be accepted by neural network in this paper, we present a misuse detection model based on hybrid neural network and decision tree

    第三屆國際知發現和挖掘競賽( kddcup ' 99 )準,對截獲網路包進行41維特徵抽取,並採用混合值編碼方法,使這些特徵轉化為能神經網路處理值形式。
  4. With the extensive use of xml in applications over the web, how toupdate xml data is becoming an important issue because the role ofxml has expanded beyond traditional applications in which xml isused for information exchange and data representation over theweb

    在lorel模型中, xml建模為帶號邊有向圖,一個節點表示一個xml元素,表示為一個對,這里eid是一個唯一元素符, value是一個原子字元串或復雜值。
  5. This essay firstly systematically introduces the theories and key technologies of vpn with the detailed presentation of the functions of safety manage central - - - - the automatic production and distribution of passwords, remote - controlled destroy of passive and active passwords, loading special data in air and special tracing of cell phones that are out of control. besides, the researchers has analyzed the contents and findings of similar researches both domestics and overseas with the emphases on the in - depth research of safety communication gateway in order to confirm a system model and carry out the macro - design. after that is the detailed introduction of the design realization of special information transportation

    本文首先系統地介紹了gsm移動通信保密專網原理知及關鍵技術,詳細介紹了安全管理中心功能- -密鑰自動產生和分配、動式和主動式密鑰遙控銷毀、專用空中加載、以及失控專用手機追蹤等,並且對國內外同類研究內容和成果進行分析;重點對安全通信網關進行了深入研究,確定了一種系統模型並進行了總體設計,然後對其中專用信息傳輸設計實現進行重點介紹;本文還對安全管理中心短消息安全通信網關與專用手機進行性能測試,測試結果表明該系統符合課題各項技術指,實現了安全通信網關各項功能需求;最後,總結課題工作,對下一步系統進行完善和發展內容提出了具體建議。
  6. For example, if all records in the database have been deleted, compacting the database sets the value of the identity column of the next record to the seed value

    例如,如果庫中所有記錄均已刪除,對庫進行壓縮便會將下一條記錄值設為種子值。
  7. Is not given, the identity values for this column in the data file being imported are ignored, and sql server 2005 automatically assigns unique values based on the seed and increment values specified during table creation

    ,則將忽略導入文件中此列值,而且sql server 2005將根創建表期間指定種子值和增量值自動分配唯一值。
  8. All informal changes are recorded in history, and other data impacted by those changes are highlighted so that all team members can identify which data might be " suspect.

    所有信息變更記錄在歷史中,其他受變更影響重點明,這樣其他小組成員即可別那些可能「懷疑」 。
  9. What makes this challenge particularly difficult with multi - tier j2ee systems where j2ee application code contacts a database using jdbc, sqlj, or cmp beans is that, traditionally, the end user s identity information is lost

    使得此挑戰對于多層次j2ee系統(其中j2ee應用程序代碼會訪問庫使用jdbc 、 sqlj或cmp bean )特別困難是,最終用戶信息通常會丟失。
分享友人