data origin 中文意思是什麼

data origin 解釋
數據源
  • data : n 1 資料,材料〈此詞系 datum 的復數。但 datum 罕用,一般即以 data 作為集合詞,在口語中往往用單數...
  • origin : n. 1. 開始,發端;根源,起源;起因,由來。2. 出身,來歷;血統。3. 【數學】原點;起點;【解剖學】(筋、神經的)起端。
  1. 3 the comparison of mitochondrial genomes and phylogentic relationships of amphibian there still is a lack of consensus regarding living amphibian phylogenetic relationships. the most widely accepted hypothesis, based on morphological data, supports the monophyletic origin in the late paleozoic ( 300 mya ) of the three living orders in the class amphibia and a sister - group relationship between caudata and anura ( the batrachia hypothesis ) to the exclusion of the gymnophiona

    3兩棲類動物的線粒體基因組結構比較和系統發生關系現存兩棲類的三個目的系統發生關系仍然沒有統一意見,最廣泛被接受的假說,是建立在形態學證據基礎上,支持現生的兩棲類三個目在古生代後期( 300mya )單系起源,並且無尾類和有尾類為姐妹群關系(蛙類假說) 。
  2. Theory of the 3d - visulazation of cloud. infrared nephogram of satellite has many advantages, such as high precision and wide area, so it has been chosen to be the origin data of the 3d - visulazation of cloud

    主要研究以下幾方面內容: 1 .介紹了衛星雲圖數據的獲得,探討了面向三維表現衛星雲圖的處理方法,研究如何利用衛星雲圖作為雲圖三維表現的輸入數據。
  3. Based on analyzing data from thin section, scanning electron micrograph and mercury injection, using nuclear magnetic resonance ( nmr ), rock - electr experiment and numerical simulation techniquess, etc. to analyze main origin of complex oil and water zones

    摘要在對薄片、掃描電鏡、壓汞資料分析基礎上,採用核磁共振、巖電實驗和數值模擬等手段,分析研究了復雜油水層的主要成因。
  4. The origin of data is explained in this part. chapter 2 explains the reference of the theory of interest rate liberalization. from the classical school of economics to the maynard keynesim, they all emphasized that interest rate is decided by market

    放鬆管制型的利率改革一般是在市場經濟體制為基本經濟制度的背景下展開的,利率基本上由資金的供求關系決定的,利率對社會資金的供求有一定的反映能力
  5. Then introduced the system exploration background, and the origin of data warehouse technology

    然後,介紹了系統開發背景,並簡述了數據倉庫技術的由來及發展現狀。
  6. Including personal data on suspects, defendants and witnesses who are involved in illegal activities such as smuggling, drug trafficking and abuse of narcotic drugs, intellectual property infringements, false trade description of goods involving origin, licensing and transhipment frauds, illegal import and export of strategic commodities, provision of services for the development and production of weapons of mass destruction, offences against the ordinances enforced by the department such as dutiable commodities ordinance, consumer goods safety ordinance, import and export ordinance and so on

    這包括牽涉在非法活動(例如走私、販毒、濫用毒品、侵犯知識產權、作涉及產地來源的虛假商品說明、簽證及轉運欺詐、非法進口及出口戰略物品、提供有關發展及生產大規模毀滅武器的服務、違反本署所執行的條例的規定,如《應課稅品條例》 、 《消費品安全條例》 , 《進出口條例》等等)中的疑犯、被告及證人的個人資料;
  7. Based on firsthand data of check and investigation on the internal control of commercial bank, thorough analysis is hereby made on present situation of internal control of commercial bank of our nation and its generating origin

    本文以對商業銀行內控制度稽核檢查的第一手資料為基礎,深入分析了目前我國商業銀行內部控制的現狀及其產生根源。
  8. The explicit finite element method ( fem ) based on the varying time - step was selected to analyse the dynamic roll - pass process ; the nodes on the leading face of the steady - state elements set was extracted and projected onto a plane to give the required mesh, also called the origin mesh ; the implicit fem was selected to analyses the inter - pass transient thermal process ; a geometric part from the mesh was generated and meshed by using the quadrilateral elements, a heat transfer analysis was selected to transfer the node temperature data ; a new model was created by using hexahedral elements, mapping the node temperature and the equivalent plastic strain on the integration points

    利用基於變步長中心差分格式的顯式積分方法分析瞬態軋制過程;提取穩態單元集節點形成截面網格;利用隱式積分方法分析軋制道次間隙瞬態溫度場;對型鋼斷面進行平面四邊形網格劃分並映射節點溫度數據;利用六面體單元構建有限元分析模型,映射單元節點的溫度、積分點的等效塑性應變,進行數值分析。
  9. On the basis of this, the paper specially discusses the ore precipitating mechanism and the ore origin. fluid - inclusion observations and microthermometric data suggest that the ore - forming fluid is middle - low temperature hydrothermal solution, it also reports the presence of high - salinity inclusions containing hilite in porphyry rock and ore - hosted quartz vein

    流體包裹體巖相學和顯微測溫學研究表明,銀山礦床成礦流體屬于中低溫熱液范疇,在石英斑巖和多金屬礦脈中都發現有含石鹽子礦物的高鹽度流體包裹體。
  10. This dissertation mainly deals with the surface reconstruction on the basis of the numeric tooth surface of the spiral bevel gear. the first step of surface reconstruction is designing the algorithm to partition the grids and transforming the origin data to the matrix style face by face

    螺旋錐齒輪齒面形狀復雜,一般採用數值模擬的方法進行設計,為了使得到的數值齒面能被通用cad cae軟體採用,需要把離散點連續化,重構出輪齒表面。
  11. The traffic demand tends in the planning period were studied in the fourth chapter. on the basis of existed vehicular origin - destination ( od ) surveying data, a combination model was introduced and calibrated to predict the traffic generation and distribution coordinately

    根據od調查歷史數據,通過模型結構型式的選擇、模型參數標定、路段交通量觀測數據校準等步驟,建立了交通生成-分佈組合模型。
  12. The 2005 cross - boundary travel survey will be carried out in october to november 2005 to collect updated statistical data in such areas as trip purpose, origin and destination for cross - boundary trips and socio - economic status of travellers

    " 2005年跨界旅運統計調查"將於2005年10至11月進行,以?集有關跨界旅運的最新統計資料,例如行程目的、起點和終點,以及旅客的社會經濟特徵等。
  13. The set of security services offered includes access control, connectionless integrity, data origin authentication, protection against replays, confidentiality, and limited traffic flow confidentiality

    Ipsec協議提供的安全服務集包括存取控制、無連接的完整性、數據源鑒別、反重放攻擊、機密性和有限的通信量的機密性。
  14. The reconstruction of these digital human data sets of chinese origin provides excellent resources for medical education and life science research. our strong collaborative research effort and clinical strength can maximize the impact and utilization of advanced computing and engineering technology in modern healthcare and medical education, " said professor cheng

    成功重建這批中國虛擬人數據集,為醫學教育及生命科學研究提供了珍貴的資源;我們結合出色的研究與臨床醫療的優勢,可使先進的電腦和工程技術在現代醫療和醫學教學發揮極大的影響和效用。
  15. Ipsec offers security services including connectionless integrity, data origin authentication, protection against replays, confidentiality and limited traffic flow confidentiality for ip and upper layer protocols

    Ipsec為ip及上層協議提供了無連接完整性、數據源身份認證、抗重播攻擊、數據內容的機密性和有限的通信流量機密性等安全服務。
  16. Next in view of daqing petrochemical parent company daily operation flow and analyzing the data origin and the data processing flow and according to the collected material and the enterprise profession standard and the open system structure, we design the daily equipment management system. it gives prominence to the profession characteristic of the enterprise equipment management system

    其次針對大慶石化總廠的日常業務流程,分析數據來源及數據處理流程,並根據收集到的資料,遵循煉化企業行業規范和開放性的體系結構設計適合該廠的日常設備管理系統,突出煉化企業設備管理系統的行業特點。
  17. This chapter provides design patterns for data confidentiality and data origin authentication

    本章為數據保密性和數據來源的鑒定提供了設計模式。
  18. Fortunately, ipsec provides us security services for ip layer and higher layers, such as access control, connectionless integrity, data origin authentication, rejection of replayed packets ( a form of partial sequence integrity ), confidentiality ( encryption ), limited traffic flow confidentiality, and so on. the thesis gives a type of network security architecture based on ipsec system, it includes the following contents : 1 analyzing the security problem in tcp / ip protocol stack, current main network attack methods and regular defense methods. 2 studing the overall architecture, main security protocols, application environments, and working mechanism of ipsec

    本文所提出的新一代網路安全體制就是建立在ipsec體系基礎上的,在本文的撰寫過程中,我主要進行了如下一些工作: 1深入分析了由tcp ip協議棧本身帶來的安全問題、當前主要的網路攻擊方法以及常採用的防範對策; 2研究了ipsec標準的總體結構、主要安全協議、應用場合以及其工作機制; 3研究了當前常用的各種數據加解密機制以及密碼演算法,深入分析了它們各自的特性和具體的使用方式; 4閱讀了大量關于混沌密碼的文獻資料,了解目前混沌密碼的研究動態和成果,研究混沌密碼體制的工作機理,然後利用vc + + 6 . 0作為開發平臺對一類混沌密碼體制進行了實現,並為它編寫測試代碼評估其性能。
  19. In tcp / ip protocol suite, the ipsec protocol provide interoperable, high quality, cryptographically - based security for ipv4 and ipv6. the set of security services offered includes access control, connectionless integrity, data origin authentication, protection against replays ( a form of partial sequence integrity ), confidentiality ( encryption ), and limited traffic flow confidentiality

    在tcp ip協議族中, ipsec ( internetprotocolsecurity )協議提供的安全服務保證數據在網路傳輸過程中的機密性、完整性和抗重放保護,以及對網路通信中的通信流分析攻擊提供有限的保護, ipsec協議還提供對網路的訪問控制能力。
  20. A digital signature is a value computed with a cyplographic algorithm and appended to data such that anyone who receives the date can use the signature to verity the data origin and integrity

    數碼簽署指利用密碼學的計算方法產生一個數值,該數值會附加在文件或信息中,用作核實發出信訊來源及內容的完整性。
分享友人