hidden process 中文意思是什麼

hidden process 解釋
隱藏進程
  • hidden : adj 隱藏的;秘密的;神秘的。 A hidden danger 隱患。 A hidden meaning 言外之意。 A hidden micropho...
  • process : n 1 進行,經過;過程,歷程;作用。 2 處置,方法,步驟;加工處理,工藝程序,工序;製作法。3 【攝影...
  1. If any of these objects is left unpatched, it can be used as the litmus test to determine whether or not a process is hidden

    如果這些對象有任何一個沒被修改,它就可以用做確定是否有進程被隱藏的試金石。
  2. During the process of the rapid economy transformation in china, due to the lagging of the system arrangement, systematic credibility shortage comes forth, especially in the field of the real estate appraisal. " unfair appraisal, skullduggery together " abounds, which has become the hidden trouble of the economy running, and endangered the security of the national finance system

    摘要中國在經濟快速轉型的過程中,由於制度安排相對滯后,出現了系統性的信用缺失,在房地產估價業尤顯突出,大量存在的「高估低評、合謀作假」 ,成為宏觀經濟運行的隱患,並將危及國家金融安全。
  3. Other names for this form of buddhism are mantrayana ( vehicle of the mantra ), which refers to the use of the mantra to prevent the mind from going astray into the world of its fictions and their attendant verbiage and to remain aware of reality as such ; and guhyamantrayana, in which the word guhya ( " hidden " ) refers not to concealment but to the intangibility of the process of becoming aware of reality

    這個佛教術語的其他名稱是咒乘(咒語的傳達手段) ,用咒語去防止思想誤入岐途,進入虛構的世界,他們的服務是空話,仍然對真實保持覺醒等諸如此類;密咒乘,其中的「密」 (隱藏)不僅代表隱藏,而且還代表知曉真實的無形過程。
  4. With accelerating pace of science development, the demands on capability of large - scale information analysis are increasing. data mining is the process through which we can extract hidden but useful knowledge from half - backed, noising, fuzzy and random data sets

    數據挖掘( datamining )就是從大量的、不完全的、有噪聲的、模糊的、隨機的數據中,提取隱含在其中的、人們事先不知道的、但又是潛在有用的信息和知識的過程。
  5. ( 3 ) a new system for humanity education in medical institutions of higher learning should be established, which is composed of five parts : a four - dimensional training model consisting of the in class, after class, campus cultural atmosphere and self - taught acquisition of humanity education ; a curriculum system made up of common humanity curricula, medical humanity curricula and hidden curricula ; a system of teaching methodology encompassing " self - realization ", " imagination ", " dialogue and discussion " and " experience and reflection " ; a supporting system comprised of the development of disciplines and the cultivation of teaching staff, improvement of educational facilities, and creation of campus cultural atmosphere ; and an instructional assessment system of teaching - learning process and effectiveness

    研究指出,高等醫學院校人文教育體系應該由以下五個方面組成:培養模式(第一課堂、第二課堂、第三課堂和自我教育) ;課程體系(共同性人文課程、醫學人文課程和隱性課程人教學方法體系( 「隱喻」 、 「想象」 、 「對話」 、 「討論」 、 「體驗」 、 「實踐」和「反思」 ) ;教學支撐體系(師資隊伍和學科建設、教學條件建設和校園文化建設) ;教學評價體系(評價機制與評價指標體系建設) 。第六部分為結語,是對本研究的回顧與前瞻。
  6. By applying the theory and method of geological anomaly, it is focused on the analysis of the characters of major geological anomalies and their effect of mineralization in daye - jiurui region. the analysis result shows that the basement fault anomalies control a few major large hidden batholiths and their associated orefields ; that the anomalies of cover structure confine most cu - au deposits and fe - cu deposits within their scope ; that the geochemical anomalies and lithofacies - paleogeographical anomalies are major geological factors leading to trataboundness of some cu - au deposits ; that the anomalies of rock operties provide the favorable chemical and physical conditions for the ore - forming process, including the seepage, circulation, convergence and deposit of ore - bearing hydrothermal solution ; that the anomalous ctive stage of mesozoic magmatite is almost consistent with the major mineralization epoch of the fe, cu deposits, and the structure of multi - levels, and the zoning in magmatic system determine the spatial distribution of the mineralization system. then, based on the above analysis, a comprehensive variate, geological combination entropy, is brought forward for reflecting the complex degree of the combination of geological ore - controlling factors. after circumscribing the anomalies of geological combination entropy, the relations between the anomalies and ore deposits are determined

    從地質異常的角度,重點分析了大冶九瑞地區主要地質異常的特徵及其對成礦的影響.由分析可知:基底斷裂異常控制了本區若干重要規模較大的隱伏巖基及伴生礦田,而蓋層構造異常控制銅金礦床和鐵銅礦床的空間位置;地層的地球化學異常和巖相古地理異常是造成一些銅金礦床層控性的主要地質因素;蓋層的巖性異常為含礦熱液的滲流、循環、聚集和礦質沉澱等一系列成礦作用提供了有利的物理和化學條件;中生代巖漿巖的異常活動期也是本區主要的鐵銅成礦期,巖漿巖系統的多層分枝和分帶性結構控制了本區成礦系統的三維空間分佈.在上述分析的基礎上,構置了地質組合熵作為反映控礦地質因素組合系統結構復雜程度的綜合變量,並圈定出組合熵異常,由此確定了綜合地質異常與礦床的關系
  7. The first part of this paper analyzed present situation of food security, includes the hidden danger in the production process and circulation process

    本文第一章首先分析了食品安全的現狀,包括生產過程中存在的安全隱患以及流通過程中存在的安全隱患。
  8. By adding high pressure water cleaning, hot water washing and optimization of bubble point test and filter core assemble process, the energy was saved, the consumption was reduced, the cleaning effiencency and quality was improved, the lifetime of filter was prolonged, the safety hidden danger of the process in pet production was removed

    摘要闡述了通過增加一道高壓水清洗、熱水洗以及對泡點試驗和過濾芯組裝等過程的優化,達到節能降耗,提高清洗效率,延長了過濾器使用周期,消除了此工序給聚酯生產帶來的安全隱患。
  9. In thailand, fast growth reduced the poverty rate, but analysis on income of different groups and income structure of different places shows that the richest part of the population benefits the most from the growth and the poorer one is, the less he benefits. that is to say, most thai people do not benefit from the growth. the weak social safety net is a hidden trouble of social development in economic growth process

    雖然泰國的經濟增長使得貧困率迅速降低,但通過各收入階層與各地區收入構成的分析發現,實際上泰國的最富裕階層從經濟增長中獲得的收益最大,這說明大多數人並沒有能夠分享增長的利益;而且,社會安全的保障機制微弱,經濟增長過程中早就潛伏著社會發展不均衡的隱患。
  10. The studies of the operating mechanism of the transformating process of knowledges, and the transformating mechanism of hidden knowledges

    知識轉移過程的運行機制與隱性知識轉移機理研究
  11. Firstly, influence factors of generalization of neural network are presented in this thesis, in order to improve neural network ’ s generalization ability and dynamic knowledge acquirement adaptive ability, a structure auto - adaptive neural network new model based on genetic algorithm is proposed to optimize structure parameter of nn including hidden layer nodes, training epochs, initial weights, and so on ; secondly, through establishing integrating neural network and introducing data fusion technique, the integrality and precision of acquired knowledge is greatly improved. then aiming at the incompleteness and uncertainty problem consisting in the process of knowledge acquirement, knowledge acquirement method based on rough sets is explored to fulfill the rule extraction for intelligent diagnosis expert system, by completing missing value data and eliminating unnecessary attributes, discretization of continuous attribute, reducing redundancy, extracting rules in this thesis. finally, rough sets theory and neural network are combined to form rnn ( rough neural network ) model for acquiring knowledge, in which rough sets theory is employed to carry out some preprocessing and neural network is acted as one role of dynamic knowledge acquirement, and rnn can improve the speed and quality of knowledge acquirement greatly

    本文首先討論了影響神經網路的泛化能力的因素,提出了一種新的結構自適應神經網路學習演算法,在新方法中,採用了遺傳演算法對神經網路的結構參數(隱層節點數、訓練精度、初始權值)進行優化,大大提高了神經網路的泛化能力和知識動態獲取自適應能力;其次,構造集成神經網路,引入數據融合演算法,實現了基於集成神經網路的融合診斷,有效地提高了知識獲取的全面性、完善性及精度;然後,針對知識獲取過程中所存在的不確定性、不完備性等問題,探討了運用粗糙集理論的知識獲取方法,通過缺損數據補齊、連續數據的離散、沖突消除、冗餘信息約簡、知識規則抽取等一系列的演算法實現了智能診斷的知識規則獲取;最後,將粗糙集理論與神經網路相結合,研究了粗糙集-神經網路的知識獲取方法。
  12. The natural herb - based feed additives and pesticides we currently research and manufacture are distilled from alkaloid of plants on the basis of characteristic of herb through our high - tech process sciences and manufacturing. we provide a full range of natural herb - based feed additives and pesticides with specific effectiveness. in an effort to making our unique contribution to removing the hidden danger of food safety through food chain system, we ve built our business by offering customers new choices that make them more productive and profitable

    我公司研發生產的天然植物飼料添加劑和殺蟲劑,採用現代高科技手段,根據天然植物草本的特性,提取植物中的生物堿,精練配製而成,門類全,功效獨到,可從食品鏈層面上根本杜絕食品安全隱患,還人類食品以「清白」 。
  13. The technology of currency recognition is used to research the visible and hidden currency characters, identify features all - around and dispose of the process on time

    貨幣識別技術是研究貨幣的顯性和隱性特徵,建立相應的數學模型,對抽取出的特徵信息進行全面識別,實時準確地做出處理的技術。
  14. It is a process to find valuable information and knowledge hidden behind data and unknown from a lot of incomplete, noise, vague, random, real application data

    它是從大量的、不完全的、有噪聲的、模糊的、隨機的實際應用數據中,提取隱含在其中的、事先未知的但又是潛在有用的信息和知識的過程。
  15. Data mining is the process of extracting hidden, unknown but potential useful information and knowledge from vast, incomplete, noisy, fuzzy and random datum. data mining technology is oriented to application

    數據挖掘是從大量的、不完全的、有噪聲的、模糊的、隨機的數據中,提取隱含在其中的、事先不為人知的、但又是潛在有用的信息和知識的過程。
  16. By applying the ahp ( ana1ytic hierarchy process ) to prediction of hidden ore deposits in large - scab location based on the results of metallogenetic analysis and mine realization information, a digital model for location prediction of ore deposits was established and the mineralization favorable degrees were computed, in addition to the fact that 8 prospecting prediction cells sere evaluated in this paper

    摘要通過銅陵鳳凰山銅礦成礦規律研究,利用找礦分析成果和多元找礦信息,運用層次分析法,開展隱伏礦床大比例尺定位預測研究,建立了礦床定位預測模型,並對預測單元進行了成礦有利度計算和評價。
  17. In computer security, a computer program with an apparently or actually useful function that contains additional ( hidden ) functions that surreptitiously exploit the legitimate authorizations of the invoking process to the detriment of security

    在計算機安全學中,一種計算機程序,表面上或實際上有某種有用的功能,而含有附加的(隱藏的)可能利用了調用進程的合法特許來危害系統安全的功能。
  18. This thesis provided some correlative formulas for the replaceable method of inerting by analyzing and calculating it. also, analyzed and probed into the technological process by using flammability diagram to avoid the hidden dangers of fire and explosion. these will offer relevant foundation for the safe operation

    本文通過對惰化置換的方法及其使用惰氣量的分析和計算,給出了相關的計算公式,並結合貨品的可燃圖對安全裝卸貨物的工藝流程進行了分析和探討,避免了在裝卸貨物的過程中潛在的的燃燒和爆炸危險,為保障操作安全提供了相應的依據。
  19. Abstract : by analyzing the method for evaluating the hidden danger in explosive factories , based on the essential framework of self - learning of machine , the process of implement the self - learning program with rote learning of such evaluation is discussed in detail

    文摘:通過對火炸藥工廠重大事故隱患危險性評估方法的分析,以計算機自學習的基本結構為主線,詳細探討了以機械學習策略完成該評估程序中對新危險品源自學習的過程。
  20. You only need to click the mouse will easily be able to terminate these hidden process, and can also display the running order for the process

    你只需要點擊一下鼠標就能輕松終止這些隱藏的進程,還可以顯示和對正在運行的進程進行排序。
分享友人