識別組件 的英文怎麼說

中文拼音 [zhìbiéjiàn]
識別組件 英文
recognizer component
  • : 識Ⅰ動詞[書面語] (記) remember; commit to memory Ⅱ名詞1. [書面語] (記號) mark; sign 2. (姓氏) a surname
  • : 別動詞[方言] (改變) change (sb. 's opinion)
  • : Ⅰ名詞1 (由不多的人員組成的單位) group 2 (姓氏) a surname Ⅱ動詞(組織) organize; form Ⅲ量詞(...
  • : Ⅰ量詞(用於個體事物) piece; article; item Ⅱ名詞1. (指可以一一計算的事物) 2. (文件) letter; correspondence; paper; document
  • 識別 : 1 (辯別; 辯認) discriminate; distinguish; discern; tell the difference; spot 2 [計算機] identif...
  • 組件 : assembler
  1. Phishing e - mail is hard to identify, because attackers make their e - mail appear genuine and often mimic recognizable e - mail sent out routinely by legitimate organizations such as banks and credit card companies

    網路仿冒電子郵很難,因為攻擊者將他們的電子郵偽裝得很真實,並經常模仿合法織如銀行和信用卡公司經常發送的用戶熟悉的電子郵
  2. At first, according to the definition of wmo, i gave the index to identify strong ssw event, and by which, i had a systemic statistic on the day - by - day temperature, air pressure, wind field in the stratosphere from january to march during the period of 1950 - 2002. finally, i got 35 strong ssw events. comparing these with labitake " s research result, i found the index and process are rational

    首先,根據世界氣象織定義,給出了強ssw事發生的指標,用它對1950 ? 2002年1 ? 3月期間平流層大氣逐日溫、壓、風場進行了系統的統計,共得到35次強ssw過程,並將其與labitzke研究結果進行比較,證明了所定指標及過程的合理性。
  3. At present, the overall tendency of software development is constructing object - oriented, network based, distributed and heterogonous application system using distributed component technologies, and dividing the software system into independent components with different functions, which can be platform and programming language independent, and can communicate with each other for collaboration, handwriting - based identification recognition is an important research field of biometric identification, and also an active topic in computer vision and pattern recognition

    目前,軟體開發的整體趨勢是採用分散式技術建立面向對象的、基於網路的、分佈的和異構的大規模應用系統,把整個軟體系統劃分為一個個相互獨立的,每個完成特定的功能,可以跨越多種操作平臺,獨立於程序設計語言,並且相互通信,協同完成工作。筆跡鑒是人體生物特徵中的一個重要研究領域,也是計算機視覺和模式領域研究的熱點問題。
  4. Component, bind it to the underlying data source, and add data - aware controls all in one operation

    ,將該綁定到基礎數據源,然後添加數據控制項整體操作。
  5. Static defense relies mainly on firewall and intrusion detection system, so it is hard to meet the users ’ requirement for security

    靜態保護以防火墻系統和入侵檢測系統為主要安全,能提供對攻擊的和數據包的過濾等保護功能。
  6. Polydiacetylene vesicle a device based on molecular assembly for biological molecular recognition

    一種基於分子裝的生物分子
  7. This paper illustrates detailedly the thin groupware auto - adaptive recognition system ; it also illlustrates the procession of capture image and take indispensable foreclose to wipe off noise in order to get boundary easilyer. the recognition system uses " hough " transform method to make the recognition area orientation, and according to the unstable environment such as lights which leads to the change of the image ' s brightness, thresholds picture using an iterative selection method and then growing process for cell image segmentation based on local color similarity and global shape criteria, adaptively gets the best threshold to divide the washer off the background. the recognition system uses the classifier based on minimal - error - ratio bayes method to make decision after getting image characteristic

    本文詳細介紹了薄形自適應系統;闡明了圖像的分通道自動採集過程,以及對採集到的原始圖像所進行的預處理方法。通過採用哈夫變換去除偽邊緣點的方法,有效地解決了區域的定位問題。針對裝配零(主要是墊片)薄、小導致圖像信息少、難度大,以及材質不一導致採集到的圖像亮度波動等問題,提出了使用最佳閾值迭代法和使用種子填充的圖像串列分割技術,自適應地找出最佳閡值,使墊片和背景分離,從而提取墊片數目信息。
  8. The most recognized form of digital wrappers are digital envelopes. those pieces of code are the workhorses of e - mail encryption, locking out intruders who don ' t have the right digital key to open the envelope. the digital envelope is essentially made up of code encrypted with a cipher, or software algorithm, and carries a digital signature that properly identifies the sender to the recipient

    數字包裝器最被認可的形式是數字信封,這些代碼主要完成電子郵的加密,把想打開信封而沒有正確數字密鑰的入侵者擋在外面,數字信封主要由通過密碼加密或軟體演算法加密的代碼成,運載著能正確讓接收方發送方身份的數字簽名。
  9. The adaptive thin groupware recognition system this paper illustratored uses the machine vision inspection technology, uses the professional optics image and advanced ccd electron photograph technology to get image, puts some process arithmetic on image through computer to complete its mission, and can recognise the unqualified assemble production having the problem of assembleing less and more hardware or the wrong assemble order. the recognition system is put into use in one mechanical factory in ningbo city, zhejiang province

    本課題所研究的薄形自適應系統,運用機器視覺檢測技術、光學成像技術和ccd電子攝像技術,通過圖像處理和分析實現對薄型裝配過程的檢測,有效地解決了裝配過程中出現的多裝、漏裝和安裝次序錯誤等問題。該檢測系統在寧波某機械公司得以應用,滿足了工廠各項檢測精度的要求。
  10. But some cases often require us to examine the special material tissue what had been treated by paraffin wax and formalin fixation

    法醫實踐中某些案卻經常要求我們對送檢的特殊檢材?福爾馬林固定后的人體織(石蠟包埋塊或病理切片)進行同一認定和個人
  11. In the research task supported by the key technologies r & d program in the 9th five - year plan of jiangsu province, the study focuses on the nc milling programming software development method and the corresponding algorithms on the basis of acis. by using the development interfaces provided by acis, the author has made some innovation to tool path generation algorithms. based on acis, a new set operation method of loops is presented in this paper

    藉助acis提供的開發介面實現對一些刀具軌跡生成演算法的創新:提出了一種基於acis的環集合運算方法,該演算法充分利用了acis的功能,使演算法實現過程大大簡化,並提高了演算法效率;設計了一種加工區域演算法,該演算法可以出由存在復雜嵌套關系的多個型腔環和島嶼環成的零幾何模型中的待加工區域;提出了一種實體精加工刀具軌跡生成演算法,該演算法可以自動計算出待加工零在一個加工方向上所有的刀具軌跡,從而在某些情況下,大大方便數控編程人員完成nc代碼的生成。
  12. In order to examine the errors in assembling the manufacture timely and effectively, in this subject some treatments are given to the image of the manufacture kit through the wavelet transform and the manufacture kit through the wavelet transform and the errors are recognized

    為了及時有效地檢測出產品裝的錯誤,在課題中利用小波變換對套產品圖像進行處理,並出上述兩種裝錯誤。
  13. Non - instance - aware components are installed to the same directory by default

    默認情況下,將非實例識別組件安裝到相同目錄中:
  14. The following table shows the number of instances supported for each instance - aware component in the different editions of sql server 2005

    下表顯示了在sql server 2005的不同版中對于每個實例識別組件所支持的實例數。
  15. If the undo engine cannot identify a name for a component through the reference service, the engine will ignore any changes for that component

    如果撤消引擎無法通過引用服務來識別組件名稱,引擎將忽略該的所有更改。
  16. Using the theories of probability, algebra and number theory comprehensively, we investigate a class of boolean functions with three - valued walsh spectrum in the first part of this dissertation : the properties of the extended semi - bent functions, which are constructed from any two bent functions, are studied, followed by the structure characteristics of the boolean functions satisfying propagation criterion with respect to all but two vectors ; the definition and cryptographic properties of k - order quasi - bent functions are proposed whose walsh spectrum takes on only three values. some sufficient and necessary conditions are offered to decide whether a boolean function is a k - order quasi - bent function ; a special method is presented to construct the k - order quasi - bent functions, whose cryptographic properties are explored by the matrix method, which is different from the method of walsh spectrum and that of autocorrelation of boolean functions ; the application of this kind of boolean functions in the fields of stream cipher, communications and block ciphers is discussed, which shows the great importance of the fc - order quasi - bent functions ; some methodology are proposed to construct the k - order quasi - bent functions, including the complete construction by using the characteristic matrices of boolean functions, and the recursive method by two known k - order quasi - bent functions we further extend our investigation to the ring zp, where p is a prime, and the similar results are presented as far as the p - valued quasi - generalized - bent functions are considered

    本文首先綜合運用概率論、代數學、數論等基礎學科的理論知,並以頻譜理論作為主要研究工具,對一類譜值分佈相對均勻的函數? ?廣半bent函數、 k階擬bent函數和p值k階擬廣義bent函數進行了系統、深入的研究,給出了廣半bent函數定義,並探討了廣半bent函數的密碼學性質;給出了k階擬bent函數和p值k階擬廣義bent函數的定義及等價判;討論了k階擬bent函數和p值k階擬廣義bent函數與部分bent函數和p值廣義部分bent函數的關系,探討了它們的密碼學性質;給出了k階擬bent函數和p值k階擬廣義bent函數的典型構造方法,並將對k階擬bent函數的密碼性質的研究轉化到對一類特殊的矩陣的研究上;利用布爾函數的特徵矩陣原則上給出了k階擬bent函數的一種完全構造方法,還給出了從已有的p值k階擬廣義bent函數出發,遞歸構造變元個數更多的p值k階擬廣義bent函數的方法;初步探討了k階擬bent函數在序列密碼、分密碼以及通信中的應用;給出了一類布爾函數walsh譜的分解式,並利用這類布爾函數的walsh譜分解式給出了一類近似穩定的布爾函數的構造,特殊情形下為k階擬bent函數;利用代數數論的知考察了p值k階擬廣義bent函數的譜特徵,並給出了k階擬廣義bent函數與所有仿射函數的符合率特徵等等。
  17. It is planned quality management system for midea refrigerator oem project in the study. the planning process includes identification of process, designs of management flow chart and management items, plan of implement step

    基於對美的冰箱oem生產的實際情況的了解,為建立現代化的oem質量管理體系進行質量策劃,包括管理過程的,管理流程與內容的設計,實施步驟的規劃,織機構的規劃,質量管理體系文的策劃等。
  18. This reference can contain any combination of letters and numbers and can be a purchase order number, a customers job number, a bill of lading number, or even a group of words that identifies the shipment, such as " gift for mom.

    此參考資訊可包含字母和數字的任意合,可以是采購訂單po編號客戶工作編號提貨單編號,或者甚至是一的字詞,例如送給母親的禮物等。
  19. In this paper, i studied the frame technology, especially on the j2ee lightweight framework 。 at first, i studied the j2ee technology and analyzed some source codes of lightweight framework, on which basis, i design the system architecture of j2ee lightweight framework, then i work hard to devided the lightweight framework and design the component of the every layer. these component includes : knowledge base component 、 mvc component 、 ioc component 、 aop component and o / r mapping component etc. in succedent chapter, i introduced the designment of knowledge base component and mvc component, and finally emphasized on introducing the designment and realization of business layer and persistence layer in detail 。 at last, i have brought forth the application and validation of ioc component and aop component in relizition of o / r mapping component

    本次論文中,作者對j2ee技術和框架技術進行了研究,特是j2ee輕量級框架技術的研究,在研究了j2ee技術的新發展和分析了一些輕量級框架代碼的基礎上,提出了j2ee輕量級框架整體的分層結構的設計,並給出了各層相應的框架的設計。包括:表示層包括知和mvc;業務層包括ioc和aop;數據持久層主要是o / r映射。隨后闡述了知和mvc的設計思想,重點分析論述了業務層和持久層,並給出了業務層和數據持久層詳細的設計和實現。
  20. While this seems reasonable, it is not clear that such combined filtering will actually produce many more spam identifications than the other techniques by themselves

    雖然,這似乎合乎情理,但對于是否為垃圾郵這一點,事實上還不清楚這樣的合過濾技術是否比單獨使用那些技術要強。
分享友人