identification data 中文意思是什麼

identification data 解釋
標識數據
  • identification : n. 1. 認出,識別,鑒定,驗明(罪人正身等)。2. 【心理學】自居作用。3. 身分證。4. 【數學】黏合,同化。
  • data : n 1 資料,材料〈此詞系 datum 的復數。但 datum 罕用,一般即以 data 作為集合詞,在口語中往往用單數...
  1. As to the critical technological problems of the interlock control of three - car coke oven - oven number identification, accurate contraposition and data transmission, the author proposes solutions respectively - rfid, three - light positioning device, coke oven controller and radio transmission network. these solutions can ensure accurate identification of the oven number. for example, the deviation of the automatic parking position is within 10mm

    針對三車聯鎖控制環節的關鍵技術:爐號識別、精確對正和數據通信,本系統採用了射頻識別( rfid )裝置、三燈位置檢測裝置、焦車控制器、無線通訊網路等解決方案,可實現無差錯的爐號識別,自動停車定位誤差在10mm以下,通信數據可靠等系統要求。
  2. The functions of system include the display of classification information, the search of classification data, the background manage of database, and the identification of unknown species of termite based on the dichotomous key or multi - way search

    本系統具有分類資料顯示、分類資料檢索、數據庫的后臺管理和基於二項式檢索表的鑒定或多途徑檢索鑒定四個功能。
  3. Preservation, identification, extrication and documentation of computer evidence ; giving ability to gather files, lltbkfdt collect backups of data, gives tools to look at what was going on with data

    保存、鑒別、抽取和歸檔計算機證據;提供能力來搜集文件和數據備份,提供工具來觀察過去的時間里發生的與數據有關的事件。
  4. Hamada and wu ( 1991 ) identified important location effects by imputing the censored data. and bihua has considered identification of both location and dispersion effects from unreplicated factorial experiment with right - censored data

    對于這樣的截尾數據, hamada與wu ( 1991 )通過對截尾數據補值,給出了模型選擇以及鑒別和估計位置效應的方法。
  5. Identification method of oil - bearing reservoirs based on gas logging data

    基於氣測資料的儲層含油氣性識別方法
  6. Motor compressors for refrigerating systems ; standard rating conditions ; testing ; information to be specified on data sheets and identification plates

    製冷系統用電動壓縮機.標準額定條件檢驗數據表規
  7. Open compressors for refrigerating systems ; standard rating conditions, testing, information to be specified on data sheets and identification plates

    製冷系統的敞開式壓縮機.標準額定條件.試驗.規定在數
  8. Single stage condensing units for refrigerating systems ; standard rating conditions ; testing ; information to be specified on data sheets and identification plates

    製冷機用單級冷凝裝置.標準額定條件.試驗.數據單和標
  9. The article points out the importance and necessity of the information - security from its actuality in our country. the resources in the information system, for instance, hardware, software, data, document, operator, meterial and so on, are evaluated and gived safety grade firstly. and then, it analyses the menace including the nonauthorized access, the information leak, the refused sevice, the internal objection which the system will take. the following are the corresponding control police : confirm the users " rights and duties, including the mode of using account, the limit of accessing resource, the application of password, the building of backup ; confirm the administrators " right and duties, including physical safety, system configuration, account configuration and usufruct, password management, audit and control, backup and individual intimity ; run - of - mill measure of security defence, including access control, symbol and identification, integrality control, password technique, firewall system, audit and resumption, safety of operating system, safety of database system, defence of computers " virus and resisting - deny protocol. in the end, the article offers the strategies of disposing the safety - accident and analyse after ithow. to report it, how to solve it in phase, and how to avoid it happening again. in a word, the article presents a holistic resolvent about keeping away the information system ' s security, and supplies a essential frame for its configuration, management and application

    然後,對系統可能受到的威脅,包括非授權訪問、信息泄漏、拒絕服務和內部缺陷等進行分析,並提出了相應的控制策略:確定用戶的權力和責任,包括帳戶使用方式、資源訪問權限、口令應用以及建立備份等;確定系統管理員的權力和責任,包括物理安全、系統配置、帳戶設置及使用權限、口令管理、審計和監控、備份以及個人隱私等方面;一般性的安全防護措施:存取控制、標識和認證、完整性控制、密碼技術、防火墻系統、審計和恢復、操作系統安全、數據庫系統安全、計算機病毒防護和抗抵賴協議等。最後,對事故處理和事後分析提供策略,如何報告安全事故,如何協調解決安全事故,如何避免安全事故再次發生。總之,本文對信息系統安全防範工作給出一個整體的解決方案,為其在配置、管理和應用方面提供了基本的框架。
  10. E - edid enhanced extended identification data

    增強形擴充身份辨識數據
  11. Beacon identification data

    示標識別資料
  12. In the paper, identification data method is firstly applied to realized the condenser fault diagnosis

    本文的研究表明,用粗糙集方法對凝汽器故障進行特徵提取,效果較好。
  13. A request for grant of a certificate for a variety with identification data for the applicant and the author of the variety

    授與品種證書的請求,以及申請人和品種原創人的身份資料
  14. “ when you put all identification data in one place in the body there can be no mistakes. you have an immediate identification, ” said thevissen

    「你把所有的身份資料放在自己身體的一個部位,就不會出現差錯,因為你擁有了一個可以隨身攜帶的身份證, 」泰威森如是說。
  15. 5. a multivariable process identification based on asymptotic black - box theory is studied. firstly, a high - order mimo arx model and its frequency error bound is estimated from identification data and low - order siso models is obtained from high - order mimo arx model

    作者對一種基於漸近黑箱理論的多變量過程辨識方法進行了研究:首先用高階arx模型估計模型參數,並給出高階模型的頻域均方誤差;然後,對高階arx模型進行降階處理。
  16. We get the sensitivity matrix using the model that contains model error in the following two cases. if the identification data are got using the model without model error before and after the damage, the error resulted from model error can be overlooked. if the data are got using model with model error before the damage and using the model without model error after the damage, error results from model error is first order and model error can bring more assessment errors

    2 、本文詳細分析了模型誤差對損傷識別結果的影響,經過公式推導及實例分析說明,損傷靈敏度矩陣用有模型誤差的理論分析模型來建立,如果損傷前後都用無模型誤差的實測數據來識別,此時誤差為二階微量可以忽略;如果損傷前採用有模型誤差的數據而損傷后採用無模型誤差的實測數據,此時誤差為一階量,可能引起較大的識別誤差。
  17. " the project aims to develop middleware for manufacturing, retail and distribution companies in the prd region to integrate rfid radio frequency identification data with back - end systems, business processes and logistics and scm supply chain management solutions, " said professor tan chung - jen, director of eti, hku. " eti will head the development of the core technology and collaborate with partner universities to develop applications and pilot projects with local enterprises in the region.

    這個專案的目的是為珠三角地區的製造、零售、物流等行業開發一套中間件,將rfid資料與企業的后臺系統、商業過程以及物流和供應鏈管理等系統集成一起,香港大學電子商業科技研究所( eti )總監譚崇仁教授指出, 「 eti將領導核心技術的研發工作,與合作大學一起開發應用程式,並在珠三角地區的企業中實施試驗專案。
  18. The advent of the internet and the wide availability ofcomputers, scanners and printers make digital data acquisition, exchange and transmission a simple task. however, making digital data accessible to others through networks also creates opportunities for malicious parties to make salable copies of copyrighted content without permission of the content owner. digital watermarking is likely to be a potential solution to this problem. digital watermarking has been proposed as a solution to the problem of copyright protection of multimedia documents in networked environments. it makes possible to embed a watermark ( such as identification data, serials number, text or image etc. ) to multimedia documents allowing copyright protection, secret communication, document authentication and so on. in this paper, we present a new digital image watermarking method based on svd ( singular value decomposition ), and then give some theoretical analysis about the algorithm. extensive experimental results show that this method is much more robust than other methods presented before

    隨著計算機和網路技術的飛速發展,數字圖像、音頻和視頻產品愈來愈需要一種有效的版權保護方法,另外通信系統在網路環境下的信息安全問題也日益顯露出來.數字圖像水印技術為上述問題提供了一個潛在的解決方案.所謂水印技術就是將數字、序列號、文字、圖像標志等版權信息嵌入到多媒體數據中,以起到版權保護、秘密通信、數據文件的真偽鑒別和產品標志等作用.本文提出了一種新的基於奇異值分解的數字水印演算法並且對該方法的理論基礎給出分析.實驗結果表明這種方法要比目前提出的流行演算法魯棒
  19. This paper divides the web usage mining process into three main parts : data collecting consists of the three server logs - access, referer, and agent, the html files the make up the site, and registration data ; data preprocessing, includes data cleaning, user identification, session identification, path completion and transaction identification ; data analysis consists of mining frequent access paths and association rule. thinking about the amount of hits on homepage, this paper improves the algorithm of finding frequent items

    並結合網頁特點,考慮到主頁的點擊率的影響,對生成頻繁訪問瀏覽頁的演算法做了改進;在web使用挖掘的基礎上引入部分web結構挖掘,對挖掘瀏覽頁的關聯規則做了補充,在web結構挖掘基礎上挖掘出的相關瀏覽頁也推薦給用戶,在一定程度上提高了關聯規則的精確度。
  20. Huge bridges have long interspace span, many binding point and complex structure, it involves many fields such as architecture, mechanics, communications, model identification, data fusion and error analysis, it is a popular research field in the world today, there still have many subjects waiting for us to resolve

    橋梁空間結構巨大,約束點多,結構變形復雜,對於它的健康監測涉及到建築學、力學、通信、數據融合、模態識別、誤差分析等多學科、多領域的知識,具有相當大的難度,是涉及多學科、多領域的前沿科學,該領域中還有許多問題值得我們去研究和探討。
分享友人