隱式數據結構 的英文怎麼說

中文拼音 [yǐnshìshǔjiēgòu]
隱式數據結構 英文
implicit data structure
  • : Ⅰ動詞(隱瞞; 隱藏) hide; conceal Ⅱ形容詞1 (隱藏不露) hidden from view; concealed 2 (潛伏的; ...
  • : 名詞1 (樣式) type; style 2 (格式) pattern; form 3 (儀式; 典禮) ceremony; ritual 4 (自然科...
  • : 數副詞(屢次) frequently; repeatedly
  • : 據Ⅰ動詞1 (占據) occupy; seize 2 (憑借; 依靠) rely on; depend on Ⅱ介詞(按照; 依據) according...
  • : 結動詞(長出果實或種子) bear (fruit); form (seed)
  • : Ⅰ動詞1 (構造; 組合) construct; form; compose 2 (結成) fabricate; make up 3 (建造; 架屋) bui...
  • 數據 : data; record; information
  • 結構 : 1 (各組成部分的搭配形式) structure; composition; construction; formation; constitution; fabric;...
  1. The structure of this paper goes like this, the first chapter introduce the development of e - b / l in practice and in laws. and draw a conclution that the electrification of the b / l is a history tide. in the second chapter, on the basic of reseach the security trap in e - b / l running, 1 conclude six security elements of, e - b / l : the liability of the system, the authenticity of dealers ' identity. the integrity and secrecy of electronic data, and the validity and evidence effectiveness of electronic data. from the third chapter to the eighth, 1 reseach these elements one by one. the third chapter introduce the establishment of the e - b / l security system, and some related laws the fourth chapter introduce the certification authority of e - b / l. in the fifth chapter, 1 introduce the encrypt of electronic information and some countries ' control on use / import / export crytography. the sixth chapter introduce the concept and principle of digital signature, and reseach some related legal issues. the seventh chapter reseach the legal demand of validity, then come to a conclution that to establish a independent electronic information system is necessary. in the eighth chapter, 1 reseach some countries " regulation on the evidence effectiveness of electronic data

    第二章在分析電子提單運作中的安全患的基礎上,歸納出其六大安全要素,即系統的可靠性、交易者身份的真實性、電訊的機密性和完整性、電訊的合法有效性以及交易者行為的不可抵賴性。第三章到第八章分別對這六大要素進行分析:第三章介紹了電子提單網路安全體系的建立以及系統安全保護法規,第四章則介紹了電子提單的安全認證機,第五章介紹了信息加密技術以及各國立法對密碼技術的進出口及使用的控制,第六章介紹了字簽名的概念及原理,並以bolero為例介紹了字簽名的技術方,對有關法律問題作了論述;第七章首先論述了電子提單對有效性的法律需求,然後合國內法和國際規則的規定論證了電訊制度產生的必然性;第八章通過對各國立法對電子證的法律效力的規定,論述了對電子交易至關重要的電訊的不可抵賴性。
  2. M ( 4 ) do a deep research on the privilege management of the engineering database system co - s _ dbs, and aimed at the requirements of the cooperative design for the privilege management, purpose a privilege management model s _ pmm. this model can not only provide the well - designed structure of the privilege control table and the paniculate privilege control, but also support role mechanism, positive and negative privilege mechanism, concealed privilege mechanism, which well satisfies the requirements of the cooperative design

    ( 4 )對co - s _ dbs工程庫系統的權限管理進行了深入的研究,針對協同設計對權限管理的要求設計了權限管理模型s _ pmm ,該模型提供了設計良好的權限控製表,細粒度的權限控制,支持角色機制、正負權限機制、權限機制,很好的滿足了協同設計的要求。
  3. In this text, we first do some research on the genetic algorithm about clustering, discuss about the way of coding and the construction of fitness function, analyze the influence that different genetic manipulation do to the effect of cluster algorithm. then analyze and research on the way that select the initial value in the k - means algorithm, we propose a mix clustering algorithm to improve the k - means algorithm by using genetic algorithm. first we use k - learning genetic algorithm to identify the number of the clusters, then use the clustering result of the genetic clustering algorithm as the initial cluster center of k - means clustering. these two steps are finished based on small database which equably sampling from the whole database, now we have known the number of the clusters and initial cluster center, finally we use k - means algorithm to finish the clustering on the whole database. because genetic algorithm search for the best solution by simulating the process of evolution, the most distinct trait of the algorithm is connotative parallelism and the ability to take advantage of the global information, so the algorithm take on strong steadiness, avoid getting into the local

    本文首先對聚類分析的遺傳演算法進行了研究,討論了聚類問題的編碼方和適應度函造方案與計算方法,分析了不同遺傳操作對聚類演算法的性能和聚類效果的影響意義。然後對k - means演算法中初值的選取方法進行了分析和研究,提出了一種基於遺傳演算法的k - means聚類改進(混合聚類演算法) ,在基於均勻采樣的小樣本集上用k值學習遺傳演算法確定聚類k ,用遺傳聚類演算法的聚類果作為k - means聚類的初始聚類中心,最後在已知初始聚類和初始聚類中心的情況下用k - means演算法對完整集進行聚類。由於遺傳演算法是一種通過模擬自然進化過程搜索最優解的方法,其顯著特點是含并行性和對全局信息的有效利用的能力,所以新的改進演算法具有較強的穩健性,可避免陷入局部最優,大大提高聚類效果。
  4. Finally, we set up the object oriented data modeling ( oodm ) of the data processing based on c + + object oriented technology ( oot ) and we implemented the unitary architecture designing, its function module partition based on the software framework theory and its program design and development

    最後,通過使用軟體體系理論中的基於抽象類型的面向對象體系設計和基於事件調用的設計兩種設計方法合起來,進行各功能模塊的劃分、整體框架的設計,以及具體的的軟體設計和開發工作。
  5. At the same time, according to the excellent capability of ip curves, we study fitting and description of objects, determination of invariants of objects, symmetry detection and recognition of objects based on ip curves. in all, the main contributions in the dissertation are as follows : ( 1 ) a method of determining automatically the scale of the multiscale edge detection is proposed based on the variant distance of the variogram function, and a method of segmenting texture images is also presented. the variograin values are taken as stochastic and structural properties of texture images and variant distance is taken as the size of image window

    同時,基於含多項曲線良好的物體描述與識別能力,對物體邊界輪廓的擬合、描述、不變量特徵的提取、識別以及物體對稱性檢測作了系統的研究,主要成果及創新之處有: ( 1 )基於變差函的變程,提出了圖像多尺度邊緣檢測中尺度大小的自動確定方法;將變差函的變差值作為紋理的統計和特徵,依變程確定窗口大小,給出一種新的紋理圖像的分割方法。
  6. Nowadays, 99 % web site organize their information to web paper by html which is a semi structure format, and provides no semantic, and data organized by it can not be understand by computer, so computer can not analyze those data - in order to help people to find the information they want, some filter systems based on keywords appears. and those systems have became a indispensable part of the filter techniche. on the base of researching those systems, we provide a arithmetic based on qa

    現在, 99的web站點的格都是採用html這種半化的來表示,而html標記語言缺乏對語義的支持,無法讓計算機理解信息所蘊涵的語義,從而也無法從這些中分析出含的信息。為了幫助用戶從基於html的文檔中查找有用信息,出現了很多基於關鍵詞的過濾系統,另一方面,形成了面向網際網路的過濾技術中不可或缺的一部分。
  7. Comparing with iso7489 - 2, aiming at the hidden troubles of the distributed 3 - tiers architecture, we redefine the security services of x - pdm into 4 classes, which are authentication, access control, data security and anti - repudiation

    作者以iso7489 - 2為基礎,針對分散三層的安全患,將x - pdm的安全服務類別重新描述為鑒別、訪問控制、安全、抗否認等4類。
分享友人