information identification 中文意思是什麼

information identification 解釋
信息識別
  • information : n. 1. 通知,通報,報告。2. 報導,消息,情報。3. 資料,知識,學識。4. 【自動化】信息,數據。5. 【法律】起訴,告發。adj. -al
  • identification : n. 1. 認出,識別,鑒定,驗明(罪人正身等)。2. 【心理學】自居作用。3. 身分證。4. 【數學】黏合,同化。
  1. The functions of system include the display of classification information, the search of classification data, the background manage of database, and the identification of unknown species of termite based on the dichotomous key or multi - way search

    本系統具有分類資料顯示、分類資料檢索、數據庫的后臺管理和基於二項式檢索表的鑒定或多途徑檢索鑒定四個功能。
  2. The identification card is free of charge, parents can use this to record important information, such as children s finger prints, photo and physical description

    兒童身分證是免費贈送的,家長可利用其紀錄重要資訊,如孩子的指紋照片和身體特徵描述。
  3. Motor compressors for refrigerating systems ; standard rating conditions ; testing ; information to be specified on data sheets and identification plates

    製冷系統用電動壓縮機.標準額定條件檢驗數據表規
  4. Open compressors for refrigerating systems ; standard rating conditions, testing, information to be specified on data sheets and identification plates

    製冷系統的敞開式壓縮機.標準額定條件.試驗.規定在數
  5. Single stage condensing units for refrigerating systems ; standard rating conditions ; testing ; information to be specified on data sheets and identification plates

    製冷機用單級冷凝裝置.標準額定條件.試驗.數據單和標
  6. The article points out the importance and necessity of the information - security from its actuality in our country. the resources in the information system, for instance, hardware, software, data, document, operator, meterial and so on, are evaluated and gived safety grade firstly. and then, it analyses the menace including the nonauthorized access, the information leak, the refused sevice, the internal objection which the system will take. the following are the corresponding control police : confirm the users " rights and duties, including the mode of using account, the limit of accessing resource, the application of password, the building of backup ; confirm the administrators " right and duties, including physical safety, system configuration, account configuration and usufruct, password management, audit and control, backup and individual intimity ; run - of - mill measure of security defence, including access control, symbol and identification, integrality control, password technique, firewall system, audit and resumption, safety of operating system, safety of database system, defence of computers " virus and resisting - deny protocol. in the end, the article offers the strategies of disposing the safety - accident and analyse after ithow. to report it, how to solve it in phase, and how to avoid it happening again. in a word, the article presents a holistic resolvent about keeping away the information system ' s security, and supplies a essential frame for its configuration, management and application

    然後,對系統可能受到的威脅,包括非授權訪問、信息泄漏、拒絕服務和內部缺陷等進行分析,並提出了相應的控制策略:確定用戶的權力和責任,包括帳戶使用方式、資源訪問權限、口令應用以及建立備份等;確定系統管理員的權力和責任,包括物理安全、系統配置、帳戶設置及使用權限、口令管理、審計和監控、備份以及個人隱私等方面;一般性的安全防護措施:存取控制、標識和認證、完整性控制、密碼技術、防火墻系統、審計和恢復、操作系統安全、數據庫系統安全、計算機病毒防護和抗抵賴協議等。最後,對事故處理和事後分析提供策略,如何報告安全事故,如何協調解決安全事故,如何避免安全事故再次發生。總之,本文對信息系統安全防範工作給出一個整體的解決方案,為其在配置、管理和應用方面提供了基本的框架。
  7. Cinematography - manufacturer printed latent image identification information for 35mm motion - picture colour - print film - specifications

    電影攝影. 35mm電影彩色拷貝膠片用生產商印製的隱約圖像識別信息
  8. Compared with the low range resolution ( lrr ), high range resolution ( hrr ) radar can supply more structure information of targets. it is one of the most important development directions in modern radar. hrr radar has much extensive application prospects in targets detection, targets imaging, targets identification and so on

    高距離分辨雷達較低分辨雷達能提供更多的目標結構信息,是現代軍用雷達裝備的重要發展方向之一,在目標檢測、目標成像和目標識別等方面有極其廣闊的應用前景。
  9. Travel companions personal information - names, identification card or passport numbers and their frequent flyer programme numbers

    同行貴賓的個人資料,包括姓名身份證或護照號碼及個別飛行常客計劃會員號碼
  10. Information technology - identification cards - integrated circuit cards with contacts - part 4 : interindustry commands for interchange amendment 1 : impact of secure messaging on the structures of apdu messages

    信息技術.識別卡.帶觸點的集成電路卡.第4部分:用於交換的行業間命令.修改件1 :安全發送電文對apdu電文的影響
  11. However, information from a comprehensive risk management process, including the identification of management and board concerns, can assist the internal auditor in planning audit activities

    但是,來自綜合性風險管理過程的信息(包括對管理層和董事會所關心問題的確認)有助於內部審計師計劃審計工作。
  12. Private integrated services network specification, functional model and information flows - call identification and call linkage additional network features v1. 1. 1

    專用綜合業務網.規范功能模型和信息流.呼叫識別和呼叫鏈接補充網路特性
  13. Based on this kind of relations between the topological structures and the content distributions we study the web modelling, community identification and some related application problems in detail : first, after some existed characteristics of the web topology are verified, some new characteristics are discovered : the high clustering property in micro - topology ( high average gathering coefficient ), the obvious mapping relation between the topological struture and the content in micro - level 、 linear irrelevant between the degree distribution of network nodes and the relative degree distribution of contents etc. then after analysis the topology of the complex network and the network modeling, the muti - scale determinism is proposed, especially for the information network a web evolvement model ( prcp model ) that fused the node authority and the node correlation is proposed. the model deduction, evolving learning verification and large scale experiment proof indicate that the model can explain the micro - topology centralizing phenomena, can imitate the mapping relation between the network connecting distribution and network content relative distribution and also can predict the mapping relation between the topology clustering and content clustering

    本文在詳細觀察了web網路的拓撲結構特徵以及拓撲結構與內容分佈相互關系的基礎上,以信息網路的物理連接拓撲結構與節點內容相關度分佈之間的相互關系為主線,從網路特徵、網路建模、社區分析及相關應用方面問題進行了深入細致地探討:首先在驗證了前人提出的web網路拓撲結構特徵基礎上,進一步發現了信息網路所具有的一些新特徵: 1 )網路微觀顆粒度的拓撲結構聚團與內容聚團存在明顯的映射關系,具體包括節點之間的物理連邊概率與節點之間的內容相關度成指數比例關系、節點形成三角形拓撲結構的概率與節點內容相關緊密程度之間同樣具有一種指數比例關系; 2 )網路節點連接度整體分佈與節點內容相關度整體分佈是線性無關的; 3 )網路微觀拓撲結構中的存在很強的集聚性(平均聚團系數很高) 。
  14. This paper takes the venture capital company as subject in risk management, and the risk factors in venture capital investment cycle as object, spreads out from three sides which include outside guarantee of risk management in venture capital that is to keep away macro condition risk, inside base that is congnition of risk managementsubject, and central content that involve micro management mechanism of different risk object. through a plenty of emperical investigation including evaluation of macro condition risk, identification of subject of risk management, information obstacle in decision process, agency risk performance of entrepreneur, risk attitude of venture capitalist and entrepreneur, control actuality at post - investment stage, supply and demand of value - added service, and exit practice etc., the paper firstly analyzes the risk management mechanism of venture capital wholely in system

    本文以創業投資公司為風險管理主體,以創業投資周期中的風險因素為管理客體,從外在保證? ?宏觀環境風險防範、內部基礎? ?風險管理主體的認知、核心內容? ?不同風險客體的微觀管理機制三個層面展開,首次通過大量的實證研究,包括宏觀環境風險的評價、風險管理主體的認知、決策過程中的信息障礙、創業企業家代理風險的行為表現、創業投資家和創業企業家的風險態度、投資后階段的監控現狀、增值服務的供需、退出實踐等內容,在理論分析和實證調查的基礎上系統而全面地研究創業投資的風險管理機制。
  15. The editing system interface of media asset management system integrates the user authority identification, the module of downloading and uploading, the selection of programs and advertisements, the configuration of transferring data information, the display of downloading stuff information, the restriction of system requirement, audio formats ’ selectivity conversion and other functions

    媒體資產管理系統的編輯系統介面里,集成了用戶權限識別、導入導出模塊、節目廣告分選、上傳素材信息設置、下載素材信息顯示、系統要求限定、音頻格式可選擇性轉換等功能。
  16. Morphology all ephedra species from china are illustrated with great details on male and female cones. the photographs provide valuable information of characters including peduncle of cone, bract, and micropylar tube etc. for classification and identification of ephedra species from china

    2 、形態學提供了中國麻黃屬種類的標本(包括模式標本)照片資料及中國麻黃屬植物的雌球花和雄球花的照片資料,為麻黃屬分類和系統學研究提供了證據。
  17. After analyzing the character of risk, i introduce data mining method into risk management, to solve the contradiction between great capacity of data and lack of information, the methods include mathematics statistics and artificial neural network ( ann ). then, i study on the methods of risk management in risk identification, risk evaluation and risk disposal, what is advanced, fault tree analysis method based on fuzzy probability, stochastic simulation method and the topsis method based on interval number all consider the characteristic of risk. finally, i discussed the application of information system ( mis ) in project risk management, and developed a risk management information system

    論文在深入分析了風險特徵之後,將數據挖掘技術引入風險管理,用以解決海量數據與貧乏信息之間的矛盾,所採用的技術有數理統計和人工神經網路( ann )兩種方法;接著,論文對風險識別、風險評價、風險處理中的風險管理方法進行了研究,所提出的基於模糊概率的故障樹技術、隨機模擬技術和基於區間數的topsis方法都體現了風險管理的特點;最後,論文對信息系統( mis )在工程項目風險管理中的應用進行了探討,開發出一個風險管理信息系統。
  18. Also, through the spectral analysis in digital image processing, methods of geometric correction and accuracy analysis, strengthening of information and extraction of the feature information of emerging of ratio and information ; the extraction of species and division into sub - compartment by using multi - supplementary information sources " ; and from the identification ability of a compartment, division into sub - compartments, land type and species and the ability of accuracy of geomatric correction and map - drawing ; they can be used as the comprehensive assessment of the ability of landscape planning and many other aspects, and determine the adaptiue faculty of different information sources in the forest management inventory

    經過數字圖像的光譜分析、多種方法的幾何校正及精度分析、信息增強、比值及信息融合等多重技術進行特徵信息的提取,並應用dem 、林相圖和地形圖等多種輔助信息源,提取樹種、小班區劃等信息,提高了林班區劃、小班區劃、地類和樹種識別的能力與幾何校正精度、制圖能力,可用於風景區劃等方面進行綜合評價,確定不同信息源在森林資源二類清查中的適用性能力。
  19. The configuration space contains vendor and product identification information

    配置空間包含供貨商和產品辨認信息。
  20. So, study and discuss the credit relationship between the commercial bank and the corporation, including the information distribution, the information communication, the information identification, the information disposal and so on, is very important to control and alleviate the credit risk and support the developing of the market economy

    因此,研究和探討信貸關系中銀行與企業之間的信息分佈、信息溝通、信息識別、信息處理機制,對于防範和化解信貸風險,支持市場經濟發展,具有十分重要的意義。
分享友人