隱操作數 的英文怎麼說

中文拼音 [yǐncāozuòshǔ]
隱操作數 英文
implied operand
  • : Ⅰ動詞(隱瞞; 隱藏) hide; conceal Ⅱ形容詞1 (隱藏不露) hidden from view; concealed 2 (潛伏的; ...
  • : Ⅰ動詞1 (抓在手裡; 拿; 掌握) hold; grasp 2 (做; 從事) act; do; operate 3 (用某種語言、方言說...
  • : 數副詞(屢次) frequently; repeatedly
  • 操作 : 1 (按照一定的程序和技術要求進行活動) operate; manipulate; handle 2 (所進行的若干連續生產活動的...
  1. A web application requires protection for vulnerabilities on page static data ; for example form action, links, buttons, and hidden fields

    Web應用程序要求保護頁面靜態據中的漏洞,如、鏈接、按鈕和藏欄位。
  2. The article points out the importance and necessity of the information - security from its actuality in our country. the resources in the information system, for instance, hardware, software, data, document, operator, meterial and so on, are evaluated and gived safety grade firstly. and then, it analyses the menace including the nonauthorized access, the information leak, the refused sevice, the internal objection which the system will take. the following are the corresponding control police : confirm the users " rights and duties, including the mode of using account, the limit of accessing resource, the application of password, the building of backup ; confirm the administrators " right and duties, including physical safety, system configuration, account configuration and usufruct, password management, audit and control, backup and individual intimity ; run - of - mill measure of security defence, including access control, symbol and identification, integrality control, password technique, firewall system, audit and resumption, safety of operating system, safety of database system, defence of computers " virus and resisting - deny protocol. in the end, the article offers the strategies of disposing the safety - accident and analyse after ithow. to report it, how to solve it in phase, and how to avoid it happening again. in a word, the article presents a holistic resolvent about keeping away the information system ' s security, and supplies a essential frame for its configuration, management and application

    然後,對系統可能受到的威脅,包括非授權訪問、信息泄漏、拒絕服務和內部缺陷等進行分析,並提出了相應的控制策略:確定用戶的權力和責任,包括帳戶使用方式、資源訪問權限、口令應用以及建立備份等;確定系統管理員的權力和責任,包括物理安全、系統配置、帳戶設置及使用權限、口令管理、審計和監控、備份以及個人私等方面;一般性的安全防護措施:存取控制、標識和認證、完整性控制、密碼技術、防火墻系統、審計和恢復、系統安全、據庫系統安全、計算機病毒防護和抗抵賴協議等。最後,對事故處理和事後分析提供策略,如何報告安全事故,如何協調解決安全事故,如何避免安全事故再次發生。總之,本文對信息系統安全防範工給出一個整體的解決方案,為其在配置、管理和應用方面提供了基本的框架。
  3. During the procedure of system design and implementation, the author has made some innovative efforts such as : ( d establishing the user interest orientated model, the model receiving user interests continuously and conjecturing user interests by interaction with the user, accumulating user preferences in information demand, thereby achieving self - adaptive retrieval, ? roviding a feedback method which is based on the human - machine interaction, summarizing the user operations on the interface of result presentation, and designing an algorithm for capturing user operation behaviors, by which the changes in user interests and preferences can be learned potentially, ? ffering a method for user interest mining which can extract subjects of information confirmed by user, thereby conjecturing or predicting different kinds of expressions of the same interest or extracting the new interests or unexpressed interests, ? roposing a solution of personalized internet information retrieval based on the user interests in accordance with the above - mentioned work, the solution having very strong feasibility and practicality with taking user interest model as center, employing machine learning ( active learning and passive learning ) and data mining as tools, and being assisted with network robot,

    Piirs系統分析與設計過程中所做的創新性的嘗試主要有以下幾個方面:實現了基於用戶興趣的用戶模型,該模型通過與用戶的交互(主動交互和被動交互) ,不斷地接收用戶的興趣和推測用戶的興趣,積累用戶信息需求的偏好,實現自適應的檢索;提供了一種基於人機交互的反饋方法,對用戶在結果呈現界面上的進行了歸納總結,設計了用戶捕獲演算法, 「性地」學習用戶興趣和偏好的變化;提供了一種用戶需求挖掘的方法,對用戶已確定的信息做進一步的主題挖掘,由此推測或預測用戶同一興趣的不同表述方式或者挖掘出用戶新的或未表達出來的興趣;在上述工基礎上提出了一套完整的基於用戶興趣的個性化網路信息檢索的解決方案,該方案以用戶興趣模型為中心,以機器學習(主動學習和被動學習)和據挖掘為手段,輔以網路機器人,具有很強的可行性和實用性。
  4. Operations guide : click play entered the game, select the first one, the use of sub analogy, you have a portrait of two chutes, blue for health, yellow for the physical, a key to the roundabout hack, and s keys to normal hack, and d keys to xiapi, with the normal direction of the same key, k enter the name of the game : welcome 4455 miniclip games network, the site domain name to remember : 4455. cc and 3839. cc

    指南:點擊play進入游戲,選擇第一關,以次類推,你的頭像有兩個槽,藍色為健康,黃色為體力a鍵為迴旋砍, s鍵為正常砍, d鍵為下劈,方向鍵與正常相同,空格鍵為撞擊對手,游戲中還會有4片金子收藏,游戲后會獲得積分啊:此外,打碎一些箱子會有救命藥水來補充,其中黃色藥水是體力補充,使用時按字小鍵盤的「 1 」 ,藍色藥水是健康補充,按「 2 」 ,紫色藥水為身,按「 3 」即可,有時間限制的,可以看你的頭像啊。
  5. In this text, we first do some research on the genetic algorithm about clustering, discuss about the way of coding and the construction of fitness function, analyze the influence that different genetic manipulation do to the effect of cluster algorithm. then analyze and research on the way that select the initial value in the k - means algorithm, we propose a mix clustering algorithm to improve the k - means algorithm by using genetic algorithm. first we use k - learning genetic algorithm to identify the number of the clusters, then use the clustering result of the genetic clustering algorithm as the initial cluster center of k - means clustering. these two steps are finished based on small database which equably sampling from the whole database, now we have known the number of the clusters and initial cluster center, finally we use k - means algorithm to finish the clustering on the whole database. because genetic algorithm search for the best solution by simulating the process of evolution, the most distinct trait of the algorithm is connotative parallelism and the ability to take advantage of the global information, so the algorithm take on strong steadiness, avoid getting into the local

    本文首先對聚類分析的遺傳演算法進行了研究,討論了聚類問題的編碼方式和適應度函的構造方案與計算方法,分析了不同遺傳對聚類演算法的性能和聚類效果的影響意義。然後對k - means演算法中初值的選取方法進行了分析和研究,提出了一種基於遺傳演算法的k - means聚類改進(混合聚類演算法) ,在基於均勻采樣的小樣本集上用k值學習遺傳演算法確定聚類k ,用遺傳聚類演算法的聚類結果為k - means聚類的初始聚類中心,最後在已知初始聚類和初始聚類中心的情況下用k - means演算法對完整據集進行聚類。由於遺傳演算法是一種通過模擬自然進化過程搜索最優解的方法,其顯著特點是含并行性和對全局信息的有效利用的能力,所以新的改進演算法具有較強的穩健性,可避免陷入局部最優,大大提高聚類效果。
  6. Soft client server is secretly installed on isp, wan, host computer of important and sensitive part needed to be controlled to collect network data. after transmitting in real - time to email monitor center, pop3, information such as smtp and web - mail from these data are analysis and retrievable, password intercepted, classified and alert, mean wile the center can monitor in real - time on over 1000 nodes by controlling working status and filter condition and software refreshment etc. the system occupies less than 4 percent of system recourse under the condition of without losing package

    客戶端採用蔽式安裝方式在需要控制的敏感地區的isp 、局域網、網吧以及上網主機上安裝,對進出的網路據進行採集,然後將採集的據實時發送至電子郵件監控中心,電子郵件監控中心對這些據中的pop3 、 smtp以及web - mail電子郵件信息進行分析還原、口令截獲、歸類及報警,並根據情況對客戶端的工狀態、過濾條件、軟體更新等進行控制,從而實現了對高速網路( 100mbps以上) 、 10000個監控節點以上網路據的實時有效監控。
  7. Panny very interesting game, oh master restaurant and the former mm pretend a christmas like a lot of hidden elements we should strive to find out oh operations guide : mouse control, and dropping boson to changing clothes, certain clothing requirements than the big points can get oh, a boson point there will be less opportunity finally you see inside the kitchen is how it look like a hidden glasses aberdeen, oh we can look at the raiders out

    :非常有意思的panny料理大師游戲哦和前一聖誕mm裝一樣有非常多的藏元素,大家要努力找出來噢指南:鼠標控制,投下色子來換衣服,一定要比衣服要求的點大才能拿到哦,點一次色子便少一次機會,看看最後你的廚房裡面是怎麼樣子的吧有一個藏的眼鏡仔哦,看看大家能不能攻略出來呢?
  8. Introduction : panny very interesting game, oh master restaurant and the former mm pretend a christmas like a lot of hidden elements we should strive to find out oh operations guide : mouse control, and dropping boson to changing clothes, certain clothing requirements than the big points can get oh, a boson point there will be less opportunity finally you see inside the kitchen is how it look like a hidden glasses aberdeen, oh we can look at the raiders out ? select favorite things, and then it bo

    非常有意思的panny料理大師游戲哦和前一聖誕mm裝一樣有非常多的藏元素,大家要努力找出來噢指南:鼠標控制,投下色子來換衣服,一定要比衣服要求的點大才能拿到哦,點一次色子便少一次機會,看看最後你的廚房裡面是怎麼樣子的吧有一個藏的眼鏡仔哦,看看大家能不能攻略出來呢?
  9. The initial patch updated jet 3. 51 and associated odbc database drivers which eliminated the vulnerability that could be exploited using an excel 97 query to do malicious acts, such as deleting files or updating text files on a user s machine

    本修補程序對jet 3 . 51及相關的據庫驅動程序進行了更新,從而消除了能利用這一缺陷在excel 97查詢功能中進行諸如刪除用戶機器上文件或更新文本文件等惡意患。
  10. On - line analytical processing ( olap ) is a category of software technology that enables analysts, managers and executives to gain insight into data through fast, consistent, interactive access to a wide variety of possible views of information that has been transformed from raw data to reflect the real dimensionality of the enterprise as understood by the user

    聯機分析處理是以多維分析為基礎,刻畫了在管理和決策過程中對據進行多層面、多角度的分析處理的要求。聯機分析處理使分析員可以從多個角度、多個側面進行觀察,可以進行任意的查詢分析,快速準確地獲取藏於據間的信息。
  11. Because the reference counting algorithm implicitly serializes operations, a certain amount of thread safety is also lost

    由於引用計演算法對進行式序列化,因此也會損失一定的線程安全性。
  12. An expression can use arguments and operands that have incompatible data types, and in that case the expression evaluator cannot perform implicit data conversion

    表達式可使用據類型不兼容的參,在這種情況下,表達式計算器無法執行據轉換。
  13. By loading the hiw reader restriction in the archive, we can control conveniently the archive reader group, in addition, we can realize the following operations : forbidding the screen copy operaion and restricting the number of the printing copies whe the documents are accessed

    通過在文檔中加載藏的讀者域,實現了文檔讀者群的控制。另外,還實現了禁止拷屏和列印文件份限定、不同身份用戶設定不同存取權限和角色以及在文件審批過程中不能擅自修改審批意見等安全控制。
  14. Watch out for hidden temporaries created by parameter conversions. one good way to avoid this is to make ctors explicit when possible

    :時刻注意因為參轉換而產生藏的臨時對象。一個避免它的好辦法就是盡可能顯式的使用構造函
  15. [ guideline ] watch out for hidden temporaries created by parameter conversions. one good way to avoid this is to make ctors explicit when possible

    :時刻注意因為參轉換而產生藏的臨時對象。一個避免它的好辦法就是盡可能顯式的使用構造函
分享友人