機讀編目資料 的英文怎麼說

中文拼音 [dòubiānliào]
機讀編目資料 英文
computer-readable catalogue record
  • : machineengine
  • : 讀名詞(語句中的停頓) a slight pause in reading
  • : Ⅰ動詞1 (編織) weave; plait; braid 2 (組織; 排列) make a list; arrange in a list; organize; gr...
  • : Ⅰ名詞1 (眼睛) eye 2 (大項中再分的小項) item 3 [生物學] (把同一綱的生物按彼此相似的特徵分為幾...
  • : Ⅰ名詞1 (錢財; 費用) money; wealth; expenses 2 (資質) intelligence; endowment 3 (資格) quali...
  • : 名詞1 (材料; 原料) material; stuff 2 (喂牲口用的穀物) feed; fodder 3 (料器) glassware 4 (...
  • 資料 : 1. (生產或生活的必需品) means 2. (依據的材料) data; material
  1. It is convenient, shortcut, simple, and creative. this system can carry on hydrological data reorganization, which are various, huge, complicated. it can offer a lot of functions of the storage, analysis, calculation, fetching, chart drawing ( output ), search of hydrology information

    本軟體系統可進行灌區乾渠欄繁多、內容龐大、復雜多樣的水文計算,提供了灌區水文信息的存儲、分析、計算、取、制圖表(輸出) 、檢索、查詢等形式多樣、方便快捷、美觀實用的各種功能。
  2. Furthermore, we propose a fuzzy method for classifying and cataloguing books as well as a practical approach for recording the fuzzy metadata to bibliographical databases in cmarc format

    再者,提出圖書模糊分類與,以及將模糊詮釋以中國格式注錄至書庫之方法。
  3. Fortunately, ipsec provides us security services for ip layer and higher layers, such as access control, connectionless integrity, data origin authentication, rejection of replayed packets ( a form of partial sequence integrity ), confidentiality ( encryption ), limited traffic flow confidentiality, and so on. the thesis gives a type of network security architecture based on ipsec system, it includes the following contents : 1 analyzing the security problem in tcp / ip protocol stack, current main network attack methods and regular defense methods. 2 studing the overall architecture, main security protocols, application environments, and working mechanism of ipsec

    本文所提出的新一代網路安全體制就是建立在ipsec體系基礎上的,在本文的撰寫過程中,我主要進行了如下一些工作: 1深入分析了由tcp ip協議棧本身帶來的安全問題、當前主要的網路攻擊方法以及常採用的防範對策; 2研究了ipsec標準的總體結構、主要安全協議、應用場合以及其工作制; 3研究了當前常用的各種數據加解密制以及密碼演算法,深入分析了它們各自的特性和具體的使用方式; 4閱了大量關于混沌密碼的文獻,了解前混沌密碼的研究動態和成果,研究混沌密碼體制的工作理,然後利用vc + + 6 . 0作為開發平臺對一類混沌密碼體制進行了實現,並為它寫測試代碼評估其性能。
分享友人