隱式表示 的英文怎麼說

中文拼音 [yǐnshìbiǎoshì]
隱式表示 英文
implicit representation
  • : Ⅰ動詞(隱瞞; 隱藏) hide; conceal Ⅱ形容詞1 (隱藏不露) hidden from view; concealed 2 (潛伏的; ...
  • : 名詞1 (樣式) type; style 2 (格式) pattern; form 3 (儀式; 典禮) ceremony; ritual 4 (自然科...
  • : Ⅰ名詞1 (外面;外表) outside; surface; external 2 (中表親戚) the relationship between the child...
  • : Ⅰ動詞(擺出或指出使人知道; 表明) show; indicate; signify; instruct; notify Ⅱ名詞1 [書面語] (給...
  • 表示 : show; express; mean; indicate; expression; presentation; signifying; remark; representation
  1. Gets a visual style element that represents an auto hide button which is displayed as a push pin in the hot state

    獲取處于熱狀態的「自動藏」按鈕(顯為一個圖釘)的視覺樣元素。
  2. Gets a visual style element that represents an auto hide button which is displayed as a push pin in the normal state

    獲取處于正常狀態的「自動藏」按鈕(顯為一個圖釘)的視覺樣元素。
  3. Gets a visual style element that represents an auto hide button which is displayed as a push pin in the pressed state

    獲取處于按下狀態的「自動藏」按鈕(顯為一個圖標)的視覺樣元素。
  4. Gets a visual style element that represents a selected auto hide button which is displayed as a push pin in the hot state

    獲取處于熱狀態的選定的「自動藏」按鈕(顯為一個圖釘)的視覺樣元素。
  5. Gets a visual style element that represents a selected auto hide button which is displayed as a push pin in the normal state

    獲取處于正常狀態的選定的「自動藏」按鈕(顯為一個圖釘)的視覺樣元素。
  6. Solid modeling and applications, seattle, usa, 2003, pp. 262 - 265. 18 gielis j. a generic geometric transformation that unifies a wide range of natural and abstract shapes

    物體的面,即相應于所得函數的零集,可通過超形的參數化形直接高效地生成多邊形來
  7. Any information provided to who by users of the who site is held with the utmost care and security, and will not be used in ways other than as set forth in this privacy policy, or in any site - specific policies, or in ways to which you have explicitly consented

    世界衛生組織網站使用者向世界衛生組織提供的任何信息得到最高度謹慎和安全的處理,將不會以此私政策或任何特定網站政策中規定的方或者你明確同意的方之外的其它方使用。
  8. On the lrc s proposal for the privacy commissioner to issue a code of practice on all forms of surveillance in the workplace, the privacy commissioner supports this recommendation in principle, but believes that such a code should initially be restricted to common forms of surveillance in the workplace, e. g. cctv and e - mail monitoring

    關於法改會建議私專員發出涵蓋在工作地點進行的任何形的監視監聽活動的實務守則,專員原則上對此建議支持,但卻認為此守則初期應只適用於在工作地點進行的較常用的監視監聽方,例如使用閉路電視及監察電子郵件。
  9. Those who left the city with what they could carry away, abandoning their houses and half their property, did so in consequence of that latent patriotism, which finds expression, not in phrases, not in giving ones children to death for the sake of the fatherland, and such unnatural exploits, but expresses itself imperceptibly in the most simple, organic way, and so always produces the most powerful results

    那些駕車離開的人帶著拿得走的財物,留下房屋和一半財產,他們這樣做是由於而不顯的latent愛國主義,它無須用言辭達,不是用那獻齣子女以圖救國等類似的違反自然的方現,而是不知不覺地,簡單地,有生機地出來的,所以,總是產生出最有力的效果。
  10. My work include : ( 1 ) analyze the architecture of dicom application entity and working mechanism and implement the model of dicom network communication based on tcp / ip. complete the communication between 3 kinds transfer syntax : implicit vr little endian, explicit vr little endian, explicit vr big endian

    主要的工作包括: ( 1 )分析dicom應用實體結構以及運行機制,實現了基於tcp / ip協議的dicom網路通訊模型,完成了具有隱式表示低位元組優先位元組順序、顯低位元組優先位元組順序以及顯高位元組優先位元組順序三種傳輸語法的服務對象對的傳輸。
  11. Neural network is applied in design of blast parameter, which is not needed the trim and sum up of engineer and knowledge of expertise. what are needed is some succeed examples and stylebooks to train the system. to some knowledge, which is expressed by implication, at the same time to acquire knowledge, much knowledge in the same question were showed in the same network

    採用神經網路進行爆破參數設計不需要知識工程師進行整理、總結以及消化領域專家的知識,只需要用領域專家解決問題的實例或範例來訓練網路;在知識方面,採取隱式表示;在知識獲取的同時,自動產生的知識由網路的結構和權值,通用性強,便於實現知識的自動獲取和并行聯想推理。
  12. The following table shows the predefined implicit pointer conversions

    了預定義的指針轉換。
  13. In a floating - point representation, the numeral that is multiplied by the exponentiated implicit floating - point base to determine the real number represented

    浮點法中的一個數字,該數字乘上的浮點底數的冪就決定了所的實數。
  14. We pointed out the features of this infrastructure, analyzed the basis of modern applied software - mvc mode, elaborated the j2ee system infrastructure used by this system, and analyzed the integrated infrastructure system. then from the system ' s real requirement, with the object - oriented method, we used an advanced modeling tool - rose to model the system ' s requirement and logic design, then finally implemented the system design. this system uses powerdesigner to do the data modeling, jbuilder as the development tool, and struts framework to realize the separation of the expressing layer, the logic layer and the data layer

    通過研究和開發寬帶boss ,了解了有關boss的基本概念、模型、發展現狀及發展趨勢;然後分析了現代應用軟體的架構: b s架構,指出了此種架構的特點,並分析了現代應用軟體架構的基礎? ? mvc模,詳細介紹了本系統所採用的j2ee體系架構,對組成本系統的整體架構體系進行分析;隨后從本系統的實際需求出發,以面向對象的方法,採用先進的建模工具rose對系統的需求及邏輯設計進行建模;最後對系統設計加以實現,本系統用powerdesigner對數據建模,以jbuilder為開發工具,採用struts框架實現層、邏輯層及數據層的分離,數據層採用數據持久化技術hibernate ,從而可以藏訪問數據源的數據訪問api ,簡化開發。
  15. Before an asp. net application is implemented, the type list displays only those types that are defined in the microsoft core library mscorlib. dll plus a number of other implicitly referenced type libraries

    實現asp . net應用程序之前,類型列中只顯在microsoft核心庫( mscorlib . dll )以及其他許多引用的類型庫中定義的那些類型。
  16. That represents an implicit file

    ,它文件
  17. ( 3 ) a research on how to capture and then build a user profile has been done in the paper. a new method to build a user profile based on both the user ’ s explicit interests and implicit interests has been presented by analyzing their gain and expression ways

    三、論文對推薦系統中用戶興趣描述的獲取及建立進行了研究,提出了採用用戶顯興趣描述及興趣共同用戶興趣,並對它們的獲取及進行了分析。
  18. The model utilizes set theory and matrix space conception to describe the basis of information hiding, denotes the elements of information hiding by space conception and describes the processes by space transforms primarily, and then deduces the quantitative formula of information hiding benchmarks

    該模型利用集合論和矩陣空間概念對信息藏各元素進行了空間概念,同時對信息藏過程進行了空間轉換描述,然後推導出了藏評價指標的定量計算公
  19. Nowadays, 99 % web site organize their information to web paper by html which is a semi structure format, and provides no semantic, and data organized by it can not be understand by computer, so computer can not analyze those data - in order to help people to find the information they want, some filter systems based on keywords appears. and those systems have became a indispensable part of the filter techniche. on the base of researching those systems, we provide a arithmetic based on qa

    現在, 99的web站點的格都是採用html這種半結構化的數據格,而html標記語言缺乏對語義的支持,無法讓計算機理解信息所蘊涵的語義,從而也無法從這些數據中分析出含的信息。為了幫助用戶從基於html的文檔中查找有用信息,出現了很多基於關鍵詞的過濾系統,另一方面,形成了面向網際網路的過濾技術中不可或缺的一部分。
  20. According to the theory of equivalent time, creep as a function of equivalent time is expressed. by fitting experimental data, parameters of creep in equivalent time field are obtained ; initial strain implicit solution of elastic creep equation in equivalent time field is derived

    根據等效時間理論,將徐變為等效時間的函數,通過擬合試驗數據,得出等效時間域彈性模量和徐變度公的計算參數,推導了等效時間域的彈性徐變方程的初應變解法。
分享友人