identification process 中文意思是什麼

identification process 解釋
身分查驗過程
  • identification : n. 1. 認出,識別,鑒定,驗明(罪人正身等)。2. 【心理學】自居作用。3. 身分證。4. 【數學】黏合,同化。
  • process : n 1 進行,經過;過程,歷程;作用。 2 處置,方法,步驟;加工處理,工藝程序,工序;製作法。3 【攝影...
  1. Because it is impossible to adjust the air bearing absolutely balance, the difference between mass center and rotation center must lead to a notable gravity disturbance torque. in the process of identification, modeling and identification of gravity disturbance torque is considered, and an extended kalman filter is educed for identifying air bearing inertia matrix and gravity disturbance torque, and then the algorithm is validated

    由於氣浮臺平衡調試方法和手段的限制,實驗過程中氣浮臺質心與轉動中心有一定的位置偏差,必將導致較大的重力干擾力矩,在辨識演算法的推導過程中,重點考慮了重力干擾力矩的建模和參數辨識問題,推導了氣浮臺的轉動慣量和重力干擾力矩辨識的擴展卡爾曼濾波演算法,並對演算法進行了數學模擬和全物理模擬驗證。
  2. Isolation and identification of bacteria in burley curing process

    白肋煙晾制期間煙葉中細菌的分離和鑒定
  3. Online instant lottery uses computer and communication network system as its distribution carrier. the sale of the lottery tickets is concentrated in lottery - selling halls, using the betting card as the final accounts tool. it is an instant electronic lottery completing the whole lottery - buying, betting and identification process in the betting terminal according to a certain betting rules

    在線即開型彩票是以計算機和通信網路系統作為發行載體,通過彩票銷售廳集中銷售,使用投注卡作為結算工具,按照一定的玩法規則,在投注終端完成購票、投注和兌獎全過程的一種即開型電子彩票。
  4. Besides, to enforce the security of authentication process, in this thesis we propose the design and implementation of a passwd checker and mandatary identification and authentication mechanism in ercist 4. 0 secure operating system

    本文還介紹了安勝4 . 0安全操作系統中口令檢查器和強身份認證機制的設計和實現,以增強鑒別過程的安全性。
  5. The process of participant observation and the field notes being taken into the frame of academic thinking, the dissertation will analyze the lingual and non - lingual communication, cultural conception and cultural identification, as well as the features of human nature when civilized, in the clues of language, culture and education. it also compares the changeable and unchangeable modalities, surface discontinuity and deep discontinuity

    為了使在學校內外的參與觀察過程和田野筆記方便納入筆者的學術思維框架,本論文將在語言、文化和教育的三條線索之中,以大量實例和分析說明日本人在語言與非語言交流、文化的理念與認同、以及人性及其教化的特徵。
  6. In these years, image measuring has been used in every walk of life gradually. this paper discusses the characteristic, the virtue and the application of digital image measuring. in this paper. after analyzing the practical situation and theory, it has confirmed the project that identify automatically the pointer and the reticle of the pressure gauge with technique of optic photographic system, image process and automatic identification

    近年來,圖像測量逐漸應用到各行各業。本文討論了數字圖像測量的特點、優點及應用范圍,結合實際情況和理論分析,確定了利用光學攝像系統和圖像處理、識別技術,自動識別壓力表的指針和刻線的方案,解決了壓力表示值的自動檢定問題,研製了一套集計算機、圖像處理和識別、自動控制和光學等技術於一體的壓力表示值的自動檢定系統。
  7. However, information from a comprehensive risk management process, including the identification of management and board concerns, can assist the internal auditor in planning audit activities

    但是,來自綜合性風險管理過程的信息(包括對管理層和董事會所關心問題的確認)有助於內部審計師計劃審計工作。
  8. The characteristics of speech signal have caused the difficulty of speech recognition, these characteristics include changefulness, dynamism, instantance and continuity etc. the process of computer recognition for speech and the identification process for speech by a person are basically consistent

    語音信號本身的特點造成了語音識別的困難,這些特點包括多變性、動態性、瞬時性和連續性等。計算機對語音識別的過程和人對語音的識別過程基本上一致。
  9. It maintains that, in the cognitive process, the sense of identification and interest are interactive, and they are inner factors, instead of outer factors. cognitivism derives from constructivism on the issue of international mechanism

    為了現在和可預見的未來的共同利益,採用具有地域色彩的合作機制模式,克服各種艱難險阻,中國與東盟各國能夠實現長久的和平、穩定與發展。
  10. This paper takes the venture capital company as subject in risk management, and the risk factors in venture capital investment cycle as object, spreads out from three sides which include outside guarantee of risk management in venture capital that is to keep away macro condition risk, inside base that is congnition of risk managementsubject, and central content that involve micro management mechanism of different risk object. through a plenty of emperical investigation including evaluation of macro condition risk, identification of subject of risk management, information obstacle in decision process, agency risk performance of entrepreneur, risk attitude of venture capitalist and entrepreneur, control actuality at post - investment stage, supply and demand of value - added service, and exit practice etc., the paper firstly analyzes the risk management mechanism of venture capital wholely in system

    本文以創業投資公司為風險管理主體,以創業投資周期中的風險因素為管理客體,從外在保證? ?宏觀環境風險防範、內部基礎? ?風險管理主體的認知、核心內容? ?不同風險客體的微觀管理機制三個層面展開,首次通過大量的實證研究,包括宏觀環境風險的評價、風險管理主體的認知、決策過程中的信息障礙、創業企業家代理風險的行為表現、創業投資家和創業企業家的風險態度、投資后階段的監控現狀、增值服務的供需、退出實踐等內容,在理論分析和實證調查的基礎上系統而全面地研究創業投資的風險管理機制。
  11. This thesis includes four parts in which the technologies of web usage mininig are systematically researched. in the first part we summarize the techniques of data mining and web usage mining, present the significance of the research on web usage mininig, the status of research and the problem which web usage mininig will face with. in the second part we discuss the web usage mininig according to the process of web mining. in the stage of data preparing and preprocessing we discuss the algorithm of data cleaning, user and session identification in detail, and present a data model of association rules and sequential patterns in the stage of pattern discovery, discuss the useful method of pattern analysis in last stage. a synthesis clustering algorithm cppc is proposed in the third part of this thesis

    本文分主要從以下四個方面對web使用挖掘進行了系統的分析和研究。第一是對數據挖掘和web挖掘進行了概述,闡述了web挖掘的意義、研究的現狀、面臨的問題。第二是討論了web使用挖掘的三個階段:在數據準備和預處理階段重點討論了數據清洗及用戶和會話識別演算法;在模式發現階段定義了關聯規則和序列模式的數據模型;模式分析階段則討論了現行的幾種分析方法。
  12. In order to achieve the above objectives, project implementation will be organized based on the scientific logic of mechanism identification - process simulation - control basis - objective response

    為實現上述研究目標,將按照「機理識別過程模擬調控基礎目標響應」的科學邏輯組織實施。
  13. Doctor johnson says the medical profession has learned a lot about earlier signs of autism. she says the identification process can begin in the waiting room at a doctor ' s office

    醫生們習慣性認為只有兒童出現語言遲緩或是重復性異常舉止時才有患有自閉癥的可能,這些可能是該病的明顯癥狀,但是在兒童二歲或三歲之前通常都不會出現這些癥狀。
  14. More to the point, the identification process might be the same in all use cases that required identification

    而且,在所有需要標識的用例中,標識過程也許是相同的。
  15. On its own, this rule would be a poor one - it would match too many legitimate messages - but taken in conjunction with the results of other rules, it still contributes effectively to the spam - identification process

    只採用這一條規則,不能體現它所有的能力。當與所有其它規則的結果結合使用時,在垃圾郵件標識過程中,它就起到了很有效的作用。
  16. This identification process, as well as the storage of public keys, is the province of a pki system

    數學告訴我們,對于整個宇宙生命周期, 256位很可能足以保護消息假設該演算法是高質量的。
  17. Triggers may be discovered in the risk identification process and watched in the risk monitoring and control process

    可在風險識別過程中發現風險誘因,然後在風險監視和控制過程中進行監控。
  18. In the fem simulation of the loading identification process, the bending moment maintains a constant amplitude, hut its direction is alterable

    在有限元模擬計算中,彎矩載荷的大小保持不變,但方向可調。
  19. " by involving the relatives in the identification process i am confident that we will soon be able to identify all the victims with certainty.

    「在鑒定工作中,因為得到了死者家屬的大力協助,我們確信很快就能夠確定所有死者的身份。 」
  20. " every tiny detail of the identification process had to be recorded. if an alleged suspect was identified, the witness would be asked to write down the relevant number on the statement and signed his confirmation

    每次進行相片認人,我們需要將過程記錄下來,如果他們認出當事人,便要在口供紙寫上編號和讓他們簽名作實。
分享友人