隱式標識 的英文怎麼說

中文拼音 [yǐnshìbiāozhì]
隱式標識 英文
implicit identification
  • : Ⅰ動詞(隱瞞; 隱藏) hide; conceal Ⅱ形容詞1 (隱藏不露) hidden from view; concealed 2 (潛伏的; ...
  • : 名詞1 (樣式) type; style 2 (格式) pattern; form 3 (儀式; 典禮) ceremony; ritual 4 (自然科...
  • : Ⅰ名詞1 [書面語] (樹梢) treetop; the tip of a tree2 (枝節或表面) symptom; outside appearance; ...
  • : 識Ⅰ動詞[書面語] (記) remember; commit to memory Ⅱ名詞1. [書面語] (記號) mark; sign 2. (姓氏) a surname
  • 標識 : [物理學] characteristic; identification; identifying標識碼 identification code; 標識位置 home position
  1. The article points out the importance and necessity of the information - security from its actuality in our country. the resources in the information system, for instance, hardware, software, data, document, operator, meterial and so on, are evaluated and gived safety grade firstly. and then, it analyses the menace including the nonauthorized access, the information leak, the refused sevice, the internal objection which the system will take. the following are the corresponding control police : confirm the users " rights and duties, including the mode of using account, the limit of accessing resource, the application of password, the building of backup ; confirm the administrators " right and duties, including physical safety, system configuration, account configuration and usufruct, password management, audit and control, backup and individual intimity ; run - of - mill measure of security defence, including access control, symbol and identification, integrality control, password technique, firewall system, audit and resumption, safety of operating system, safety of database system, defence of computers " virus and resisting - deny protocol. in the end, the article offers the strategies of disposing the safety - accident and analyse after ithow. to report it, how to solve it in phase, and how to avoid it happening again. in a word, the article presents a holistic resolvent about keeping away the information system ' s security, and supplies a essential frame for its configuration, management and application

    然後,對系統可能受到的威脅,包括非授權訪問、信息泄漏、拒絕服務和內部缺陷等進行分析,並提出了相應的控制策略:確定用戶的權力和責任,包括帳戶使用方、資源訪問權限、口令應用以及建立備份等;確定系統管理員的權力和責任,包括物理安全、系統配置、帳戶設置及使用權限、口令管理、審計和監控、備份以及個人私等方面;一般性的安全防護措施:存取控制、和認證、完整性控制、密碼技術、防火墻系統、審計和恢復、操作系統安全、數據庫系統安全、計算機病毒防護和抗抵賴協議等。最後,對事故處理和事後分析提供策略,如何報告安全事故,如何協調解決安全事故,如何避免安全事故再次發生。總之,本文對信息系統安全防範工作給出一個整體的解決方案,為其在配置、管理和應用方面提供了基本的框架。
  2. By using it, the section mapping drawings of multi - types & complex pipeline system can be automatically generated through the entity crossing operation. this method composes of the following three key steps. in the first, different graphic entities are identified from the complex pipelines drawing in terms of the layer information they owned, then the correspondent information is to be encapsulated to keep the spatial data completeness of the graphic symbols

    該方法通過管線系統設計圖中的圖形實體的分層處理與信息封裝,首先實現了復雜管線實體的自動別並確保了圖形實體具有對應管線實體對象的完備空間信息;在此基礎上,根據用戶給出的任意位置截切線,構造描述的截切面並與描述的管線實體進行求交運算;最後通過對求交結果的坐變換,生成能夠直觀反映出多類型復雜管線系統空間分佈信息的截切面映射圖。
  3. In the el, identifiers not associated with implicit objects are assumed to name objects stored in the four jsp scopes

    在el中,與對象無關聯的符被認為是存儲在四個jsp作用域中的名稱對象。
  4. The correction of camera distortion is a main part of camera calibration. an algorithm of camera distortion correction based on bp neural networks is proposed in this dissertation. in the special applications that the 3d points are coplanar, a 2d plane calibration algorithm based on rb

    本文成功的開發了足球機器人視覺別系統,首先應用基於lvq神經網路的顏色別演算法進行指定顏色屬性的物體的別,接著提出小球和機器人小車的別演算法,然後大連理工大學博士學位論文應用i ) ; l練收斂后的神經網路進行攝像機定。
  5. If a method, type, or assembly is not explicitly identified to succeed, it is implicitly identified as

    如果方法、類型或程序集未顯為成功的,則會隱式標識
  6. Data, information and explicit knowledge are always converted into organizational capital through document. tacit knowledge and skills must be identified their locations by knowledge map and expertise index at first, then, they will be replicated and extended in small scope through team work. finally they can be converted into organizational capital such as operative standards, regulations and rules

    性知和技能首先是以知圖、索引表等形明確這類智力資本的位置,然後通過學徒、團隊等方在小范圍內復制和推廣該項技能,最後以操作準、規章制度、管理制度等制度流程類組織資本留在企業當中。
  7. Object recognition based on affine invariants in implicit polynomial curves

    基於含多項曲線仿射不變量的目
  8. The subjects are the children aged 3 - 6 from the high class, middle class and low class of the kindergarten. the learning ways that the research designed is to watch english cartoon. basing on the subjects " test scores on english phonological awareness, the research aims to probe the developmental characteristic of child in different age stages by watching different cartoon material and by learning in different modes, the implicit learning effect and it ' s impacting factors, as well as the implicit learning effect of child with different chinese phonological awareness in different indicator of english phono logical awareness, and to describe the child ' s emotion manifestation and behavior characteristic while watching english cartoon, as well as the degree of child ' s interests in the two cartoon styles

    本研究把以上的兩種問題結合了起來,主要採用準實驗的研究方法,並用錄像觀察、訪談等定性研究方法做補充,以幼兒園小、中和大班的3 - 6歲兒童為研究被試,通過英語動畫片這種學習媒體,以英語語音意的測驗結果為著眼點,來考察不同年齡階段的兒童在不同類型的動畫片素材及不同的學習方下的發展特點、內學習效果和影響因素,還考察了不同的漢語語音意水平的兒童在英語語音意各個指上的內學習效果,並描述了兒童在觀看英語動畫片時的情緒表現和行為特點以及兒童對這兩種動畫片類型的喜愛程度。
  9. Contains fields that identify an implicit resource key

    包含資源鍵的欄位。
  10. Class contains fields that identify an implicit resource key

    類包含資源鍵的欄位。
  11. The steps and goals to build ks are also presented. thirdly, after the theoretical analysis of kss, it concludes the goals and drivers and gives an illustration of two main patterns to create and accumulate knowledge : cross transition patterns of tacit and explicit knowledge, and architectural and component knowledge, then suggests that the push and pull interaction based on sense and respond pattern is the general pattern of kss. it designs a measurement index system for knowledge stock and develops a bp artificial neural network to stimulate the knowledge stock and its structure

    再次,論文在追溯了企業知專門化的理論淵源之後,總結了企業采納知專門化戰略的目和動因,論述了企業創造和積累知的主要模? ? 「性? ?顯性知」和「構架? ?元素知」的交互轉化模,提出了基於「感測與響應」的「推拉」互動模是企業知專門化戰略的一般模,設計了一套企業知存量的評價指體系,並構造bp人工神經元網路對企業知存量進行了模擬,對其知存量及結構進行了比較分析。
  12. The identifiers for the 11 el implicit objects are listed in table 1

    表1中列出了11個el對象的符。
  13. Interfaces allow the application server and the resource adapter to handle signing on to an eis - by implicitly passing along a user id and password combination to the back end on behalf of the client, for example

    介面允許應用程序服務器和資源適配器處理在eis上的登錄例如,通過方法把用戶和密碼組合發送到代表客戶機的後端。
  14. The function of leisure education is the influence on invidual and society by enhancing people " s leisure quality. as for individual, leisure education could promote people " s ownership. improve people " s complete development, enhance person ' s living quantity ; as for society, it plays a very important role in politics, economy, culture. the forth part : the construction of leisure education in final part, the writer put forward five facts of leisure education based on background analysis, definition and function of leisure education. first, as for the object of leisure education, we should advocate the whole membership of leisure education and notice individual ' s differences. second, as for the purpose of leis

    這一部分是在分析了背景,界定了內涵,認了功能的基礎上提出構建閑暇教育的理念:閑暇教育的對象,倡導閑暇教育的全員性,但應注意的對象的差異性:閑暇教育的目的,關注閑暇教育的全面性,注重目的針對性;閑暇教育的途徑,一要把學校教育、家庭教育、社會教育與自我教育有機結合;閑暇教育的課程,使專門課程與滲透課程、顯性課程與潛課程、學科課程與活動課程相結合,重視滲透課程、潛課程、活動課程;閑暇教育的方法,確定方法既要考慮內在因素,也要考慮外在因素,其指導思想以內在因素確定為主,以外在因素確定為輔。
  15. Based on developing of vision recognition system of micro - robot world cup soccer tournament, this dissertation is devoted to investigating some related techniques in computer vision, which include edge detection and contour tracking, conventional calibration techniques, self - calibration techniques, implicit calibration based on artificial neural networks

    本文以足球機器人視覺別系統的開發為主要的工程應用背景,對邊緣檢測和輪廓跟蹤演算法、傳統定技術、自定技術、定技術等相關技術進行深入研究。
分享友人