隱式數據 的英文怎麼說

中文拼音 [yǐnshìshǔ]
隱式數據 英文
hidden data
  • : Ⅰ動詞(隱瞞; 隱藏) hide; conceal Ⅱ形容詞1 (隱藏不露) hidden from view; concealed 2 (潛伏的; ...
  • : 名詞1 (樣式) type; style 2 (格式) pattern; form 3 (儀式; 典禮) ceremony; ritual 4 (自然科...
  • : 數副詞(屢次) frequently; repeatedly
  • : 據Ⅰ動詞1 (占據) occupy; seize 2 (憑借; 依靠) rely on; depend on Ⅱ介詞(按照; 依據) according...
  • 數據 : data; record; information
  1. The structure of this paper goes like this, the first chapter introduce the development of e - b / l in practice and in laws. and draw a conclution that the electrification of the b / l is a history tide. in the second chapter, on the basic of reseach the security trap in e - b / l running, 1 conclude six security elements of, e - b / l : the liability of the system, the authenticity of dealers ' identity. the integrity and secrecy of electronic data, and the validity and evidence effectiveness of electronic data. from the third chapter to the eighth, 1 reseach these elements one by one. the third chapter introduce the establishment of the e - b / l security system, and some related laws the fourth chapter introduce the certification authority of e - b / l. in the fifth chapter, 1 introduce the encrypt of electronic information and some countries ' control on use / import / export crytography. the sixth chapter introduce the concept and principle of digital signature, and reseach some related legal issues. the seventh chapter reseach the legal demand of validity, then come to a conclution that to establish a independent electronic information system is necessary. in the eighth chapter, 1 reseach some countries " regulation on the evidence effectiveness of electronic data

    第二章在分析電子提單運作中的安全患的基礎上,歸納出其六大安全要素,即系統的可靠性、交易者身份的真實性、電訊的機密性和完整性、電訊的合法有效性以及交易者行為的不可抵賴性。第三章到第八章分別對這六大要素進行分析:第三章介紹了電子提單網路安全體系的建立以及系統安全保護法規,第四章則介紹了電子提單的安全認證機構,第五章介紹了信息加密技術以及各國立法對密碼技術的進出口及使用的控制,第六章介紹了字簽名的概念及原理,並以bolero為例介紹了字簽名的技術方,對有關法律問題作了論述;第七章首先論述了電子提單對有效性的法律需求,然後結合國內法和國際規則的規定論證了電訊制度產生的必然性;第八章通過對各國立法對電子證的法律效力的規定,論述了對電子交易至關重要的電訊的不可抵賴性。
  2. In this thesis, used thermocouple to sense the temperature in the space of the hearth, attributed the thermocouple based on calorifics and scientific arithmetic, acquired data by data acquiring card, processed data according to the demand of setting up temperature model and drawing graphics and then caculated the coordinates of isothermal points and normals of isothermal facets, ascertained the order of connecting points and the model of construct, drawed the isothermal facet of temperature field with opengl at last

    通過採集板卡進行採集並與計算機介面進行處理。然後,將處理后特殊點的溫度marchingcubes演算法建立學模型求取等溫面上的點的坐標及各點的法向量等。最後,確定計算的三維坐標點的連接順序和拓撲模型,利用opengl進行等溫面的繪制、消和模變換等工作。
  3. With the rapidly development of computer network technology and the widely use of network technology in every walk of life, people transmit data through computer network more and more frequently, including all kinds of secret information ( for example, military secret ; bussiness secret ; personal private information ). today, as a result of poor security of our network system, we can not prevent the transmittied information from stealing and modifying unlawful. thus, the computer network technology is applied to our daily life restrictedly. recently, many network applications with voip ( for example msn messenger ; dialpad ; distributed multipoint multimedia conferences ) take no measures to encrypt their data

    隨著計算機網路技術的迅猛發展和網路技術在各行各業中的廣泛應用,人們通過計算機網路傳輸日益增加,其中包含了各種機密信息(例如軍事機密信息、商業機密信息、個人私信息等) 。由於目前的網路系統缺乏足夠的安全性,不能有效防止網路上所傳輸的信息被非法竊取和修改,因而極大地限制了計算機網路技術在日常工作中的應用。當前,基於voip技術的各種網路應用,如msnmessenger , dialpad ,以及一些分散多媒體會議系統,竟然未採取任何加密措施
  4. The article points out the importance and necessity of the information - security from its actuality in our country. the resources in the information system, for instance, hardware, software, data, document, operator, meterial and so on, are evaluated and gived safety grade firstly. and then, it analyses the menace including the nonauthorized access, the information leak, the refused sevice, the internal objection which the system will take. the following are the corresponding control police : confirm the users " rights and duties, including the mode of using account, the limit of accessing resource, the application of password, the building of backup ; confirm the administrators " right and duties, including physical safety, system configuration, account configuration and usufruct, password management, audit and control, backup and individual intimity ; run - of - mill measure of security defence, including access control, symbol and identification, integrality control, password technique, firewall system, audit and resumption, safety of operating system, safety of database system, defence of computers " virus and resisting - deny protocol. in the end, the article offers the strategies of disposing the safety - accident and analyse after ithow. to report it, how to solve it in phase, and how to avoid it happening again. in a word, the article presents a holistic resolvent about keeping away the information system ' s security, and supplies a essential frame for its configuration, management and application

    然後,對系統可能受到的威脅,包括非授權訪問、信息泄漏、拒絕服務和內部缺陷等進行分析,並提出了相應的控制策略:確定用戶的權力和責任,包括帳戶使用方、資源訪問權限、口令應用以及建立備份等;確定系統管理員的權力和責任,包括物理安全、系統配置、帳戶設置及使用權限、口令管理、審計和監控、備份以及個人私等方面;一般性的安全防護措施:存取控制、標識和認證、完整性控制、密碼技術、防火墻系統、審計和恢復、操作系統安全、庫系統安全、計算機病毒防護和抗抵賴協議等。最後,對事故處理和事後分析提供策略,如何報告安全事故,如何協調解決安全事故,如何避免安全事故再次發生。總之,本文對信息系統安全防範工作給出一個整體的解決方案,為其在配置、管理和應用方面提供了基本的框架。
  5. M ( 4 ) do a deep research on the privilege management of the engineering database system co - s _ dbs, and aimed at the requirements of the cooperative design for the privilege management, purpose a privilege management model s _ pmm. this model can not only provide the well - designed structure of the privilege control table and the paniculate privilege control, but also support role mechanism, positive and negative privilege mechanism, concealed privilege mechanism, which well satisfies the requirements of the cooperative design

    ( 4 )對co - s _ dbs工程庫系統的權限管理進行了深入的研究,針對協同設計對權限管理的要求設計了權限管理模型s _ pmm ,該模型提供了設計良好的權限控製表結構,細粒度的權限控制,支持角色機制、正負權限機制、權限機制,很好的滿足了協同設計的要求。
  6. In succession, this paper depict data mining which according to enterprise ' s operation object, explore and analyze a lot of enterprise ' s data to hint hidden, unbeknown or known business rule

    它是按企業既定業務目標,對大量的企業進行探索和分析,提示藏的、未知的或驗證已知的商業規律,且進一步將其模化的處理方法。
  7. During the procedure of system design and implementation, the author has made some innovative efforts such as : ( d establishing the user interest orientated model, the model receiving user interests continuously and conjecturing user interests by interaction with the user, accumulating user preferences in information demand, thereby achieving self - adaptive retrieval, ? roviding a feedback method which is based on the human - machine interaction, summarizing the user operations on the interface of result presentation, and designing an algorithm for capturing user operation behaviors, by which the changes in user interests and preferences can be learned potentially, ? ffering a method for user interest mining which can extract subjects of information confirmed by user, thereby conjecturing or predicting different kinds of expressions of the same interest or extracting the new interests or unexpressed interests, ? roposing a solution of personalized internet information retrieval based on the user interests in accordance with the above - mentioned work, the solution having very strong feasibility and practicality with taking user interest model as center, employing machine learning ( active learning and passive learning ) and data mining as tools, and being assisted with network robot,

    Piirs系統分析與設計過程中所做的創新性的嘗試主要有以下幾個方面:實現了基於用戶興趣的用戶模型,該模型通過與用戶的交互(主動交互和被動交互) ,不斷地接收用戶的興趣和推測用戶的興趣,積累用戶信息需求的偏好,實現自適應的檢索;提供了一種基於人機交互的反饋方法,對用戶在結果呈現界面上的操作進行了歸納總結,設計了用戶操作捕獲演算法, 「性地」學習用戶興趣和偏好的變化;提供了一種用戶需求挖掘的方法,對用戶已確定的信息做進一步的主題挖掘,由此推測或預測用戶同一興趣的不同表述方或者挖掘出用戶新的或未表達出來的興趣;在上述工作基礎上提出了一套完整的基於用戶興趣的個性化網路信息檢索的解決方案,該方案以用戶興趣模型為中心,以機器學習(主動學習和被動學習)和挖掘為手段,輔以網路機器人,具有很強的可行性和實用性。
  8. Data mining is an important research subject in the field of information technology. it means a process of nontrivial extraction of implicit, previously unknown and potentially useful information from data in databases or datawarehouses. it involves such subject areas as database, artificial intelligence, machine learning and statistics. classification analysis is an important data mining problem

    挖掘( datamining )是信息處理技術研究領域的一項重要課題。它是指從大型庫或倉庫中提取含的、未知的、非平凡的以及有潛在應用價值的信息或模的過程。
  9. Currently, the army is developping military network based oa project with effort among which military email transferring system is an essential application module. this paper proposed a data model of military email transferring as well as detailed design scheme according to the potential threat in email service system, practical condition of current military network and official model as well as document transferring process. it discussed the security requirement of military email transferring system in detail as well as analyzed and design relevent data model, mail exchange protocol and application requirement of cryptogram management

    該文針對電子郵件服務系統中存在的安全患,基於對目前國內外電子郵件安全技術的分析研究,立足於現有軍事計算機網路的實際現狀,根目前軍隊的辦公模、公文傳輸流程,提出了一種適合於軍隊辦公自動化中軍用電子郵件傳輸的模型及具體的設計方案,詳細討論了軍用電子郵件傳輸系統的安全服務需求,對相關的模型、郵件交換協議、密碼管理的應用需求等進行了詳細的分析和設計。
  10. You might want to do this to keep some data hidden but still used in a formula on one of the visible worksheets

    若要藏部分,並確保某可見工作表中的公依然可使用這些,就可使用此功能。
  11. To prevent them from being used outside of your class ; this technique is called data hiding, and is how customer information such as the account balance is protected

    以防止它們在類的外部使用;這種技術被稱為「藏」 ,是對帳戶余額等客戶信息的保護方
  12. In this text, we first do some research on the genetic algorithm about clustering, discuss about the way of coding and the construction of fitness function, analyze the influence that different genetic manipulation do to the effect of cluster algorithm. then analyze and research on the way that select the initial value in the k - means algorithm, we propose a mix clustering algorithm to improve the k - means algorithm by using genetic algorithm. first we use k - learning genetic algorithm to identify the number of the clusters, then use the clustering result of the genetic clustering algorithm as the initial cluster center of k - means clustering. these two steps are finished based on small database which equably sampling from the whole database, now we have known the number of the clusters and initial cluster center, finally we use k - means algorithm to finish the clustering on the whole database. because genetic algorithm search for the best solution by simulating the process of evolution, the most distinct trait of the algorithm is connotative parallelism and the ability to take advantage of the global information, so the algorithm take on strong steadiness, avoid getting into the local

    本文首先對聚類分析的遺傳演算法進行了研究,討論了聚類問題的編碼方和適應度函的構造方案與計算方法,分析了不同遺傳操作對聚類演算法的性能和聚類效果的影響意義。然後對k - means演算法中初值的選取方法進行了分析和研究,提出了一種基於遺傳演算法的k - means聚類改進(混合聚類演算法) ,在基於均勻采樣的小樣本集上用k值學習遺傳演算法確定聚類k ,用遺傳聚類演算法的聚類結果作為k - means聚類的初始聚類中心,最後在已知初始聚類和初始聚類中心的情況下用k - means演算法對完整集進行聚類。由於遺傳演算法是一種通過模擬自然進化過程搜索最優解的方法,其顯著特點是含并行性和對全局信息的有效利用的能力,所以新的改進演算法具有較強的穩健性,可避免陷入局部最優,大大提高聚類效果。
  13. The explicit finite element method ( fem ) based on the varying time - step was selected to analyse the dynamic roll - pass process ; the nodes on the leading face of the steady - state elements set was extracted and projected onto a plane to give the required mesh, also called the origin mesh ; the implicit fem was selected to analyses the inter - pass transient thermal process ; a geometric part from the mesh was generated and meshed by using the quadrilateral elements, a heat transfer analysis was selected to transfer the node temperature data ; a new model was created by using hexahedral elements, mapping the node temperature and the equivalent plastic strain on the integration points

    利用基於變步長中心差分格的顯積分方法分析瞬態軋制過程;提取穩態單元集節點形成截面網格;利用積分方法分析軋制道次間隙瞬態溫度場;對型鋼斷面進行平面四邊形網格劃分並映射節點溫度;利用六面體單元構建有限元分析模型,映射單元節點的溫度、積分點的等效塑性應變,進行值分析。
  14. To hide a column in the datagrid programmatically

    以編程方網格中的列
  15. An expression can use arguments and operands that have incompatible data types, and in that case the expression evaluator cannot perform implicit data conversion

    表達可使用類型不兼容的參和操作,在這種情況下,表達計算器無法執行隱式數據轉換。
  16. With the occurene of new application, the development of network technology and prompting popularity, database is faced with many new problems and challenge, one of which is that the alteration of operating environment bring a series of proplems. at present, database oprerationg environments are not integrated system of single database but distributed environment based on network. therefore, it has academic and realistic requirement that how to implement integrated questions of distrubited system, arrive at centralized management and share with data, meanwhile make the area disperse hindered by system

    隨著新應用的出現、網路技術的發展以及www的迅速普及,庫在理論和實踐方面都面臨著許多新問題和新挑戰,這其中的一個問題就是庫運行環境的變化所帶來的一系列問題。現在庫的運行環境已不是單個庫的集中系統而是聯網的的分散環境,因而,如何在分佈環境下實現分散庫的集成問題,既達到對的集中管理和共享,又能使地域的分散性被系統蔽起來,所有這些具有理論和現實的要求。
  17. In proc. the 30th acm symp. principles of programming languages, new orleans, louisiana, usa, 2003, pp. 1 - 13

    在內部格中,這個值將出現在這個外部格所在的位置上,而這個外部格將被藏起來。
  18. Restricts implicit data type conversions to only widening conversions

    隱式數據類型轉換限制為只能是「拓寬」轉換。
  19. The following illustration shows all explicit and implicit data type conversions that are allowed for sql server 2005 system - supplied data types

    以下圖例顯示了可對sql server 2005系統提供的類型執行的所有顯隱式數據類型轉換。
  20. In this model, sometimes called dynamic crosscutting, the combination of implicit data, wildcards, and dynamic properties such as control flow lets you capture join points without modifying the captured program elements

    在這種有時稱為動態橫切的模型中,隱式數據、通配符和動態屬性(如控制流程的結合)使您不用修改所捕獲的程序的元素就可以捕獲連接點。
分享友人