隱藏輸入 的英文怎麼說

中文拼音 [yǐnzàngshū]
隱藏輸入 英文
hide input
  • : Ⅰ動詞(隱瞞; 隱藏) hide; conceal Ⅱ形容詞1 (隱藏不露) hidden from view; concealed 2 (潛伏的; ...
  • : storing placedepositorydeposit
  • : Ⅰ動詞1 (運輸; 運送) transport; convey 2 [書面語] (捐獻) contribute money; donate 3 (失敗) l...
  • : Ⅰ動詞1 (進來或進去) enter 2 (參加) join; be admitted into; become a member of 3 (合乎) conf...
  • 隱藏 : hide; conceal; remain under cover; go into hiding
  • 輸入 : 1 (從外部送到內部) import 2 [電學] input; entry; entering; in fan; fan in; 輸入變壓器 input tra...
  1. This contribution contains both the files that can be dropped in on a clean copy of osc2. 2m2 as well as instructions for manually applying this contribution for those who have already tinkered with the original files

    這個外掛可以讓你在不商品價格時,價格欄位及馬上買的按鈕,用來取代前臺顯示為$ 0 . 00 ,當你的項目是一項服務或純粹作為商品目錄是非常好用的。
  2. 3. finally, according to the demand of the research project, the steganography programs downloaded from internet are integrated to be a practical system. it has simple and perspicuous interface, easy to operate

    最後我們將已經收集到的工具予以集成,對每個工具都有詳細的說明,並對不同的dos程序採用統一的界面,形成一個系統的工具體系,其界面明了簡單,用戶可以很容易操作並掌握。
  3. Renders all hidden variables on the page as hidden input fields

    將頁上的所有變量作為隱藏輸入欄位呈現。
  4. Wang lung - five thesaurus free version applicable to all operating systems and can be articulated large thesaurus, no hidden weight code, automatically adds the code can not use strokes, quanpin inputs, automatic word and most other functions there, many restrictions

    龍文五筆王小詞庫免費版適用於各種操作系統,可以掛接大的詞庫,沒有重碼、自動添加編碼,不能使用雙拼、簡拼等,其中自動加詞等大部分功能都有,限制不多。
  5. You can read standard input, write to standard output and standard error ; use any foreground and background colors you wish ; resize, reposition, hide, retitle the console window, flip between full - screen and windowed operation, and on and on and on

    你可以讀取標準的,寫標準出和標準錯誤出;使用任意的前景色和背景色;調整大小、位置,控制臺窗口,在全屏和窗口模式間切換,等等。
  6. In doing this it may change the state of the incoming or outgoing traffic to hide the identity of machines or prevent unauthorized access

    在執行過程中,它可能會改變數據流的狀態,以此機器的具體信息或防止非法侵。
  7. The program has a wrapper that deduces how many input nodes count and target are needed, based on the actual input file. choosing the number of hidden nodes is trickier

    這個程序有一個包,它能夠根據實際文件推斷出需要多少節點(計算在內的和期望的) ,選擇節點的數目是一個訣竅。
  8. This algorithm recovers the absence of the empiric in the case of the fixed - topology network and generates an optimal topology automatically. we end this chapter with some problems in the future. in chapter 2, we present an evolution strategy to infer fuzzy finite - state automaton, the fitness function of a generated automaton with respect to the set of examples of a fuzzy language, the representation of the transition and the output of the automaton and the simple mutation operators that work on these representations are given

    目前,國內外對神經網路與自動機的結合的研究己取得了一系列成果;在第一章,我們首先將對這些結果以及這個領域的研究思想與方法做一個概要的介紹;然後提出一種推導模糊有限狀態自動機的構造性演算法,解決了模擬實驗中所給出的具體網路的層神經元個數的確定問題;在實驗中,我們首先將樣本帶1個層神經元的反饋網路訓練, 150個紀元以後增加神經元,此時的新網路在124紀元時收斂;而blanco [ 3 ]的固定性網路學習好相同的樣本需要432個紀元。
  9. Under this condition, as a kind of technology to solve multimedia information security problem on network, watermarking technology comes up into being. it embeds watermarks into the digital medias, then carries out the functions such as informations hiding, storing, copyright safeguarding by tracking the use of the image by detecting the watermarks. at present, watermark technology becomes a kind of effective means to multimedia copyright authentication and its integrity safeguarding

    在這種情況下,一種專門解決網際網路上多媒體信息安全的技術? ?數字水印技術誕生了,它將水印嵌到數字化媒體中,然後通過對它的檢測(提取)來對圖像的使用情況進行跟蹤,從而實現、存儲、版權保護等功能。目前數字水印已經成為多媒體版權認證和完整性保護的有效手段。
  10. When output nodes take their inputs from hidden nodes, and the net finds that it is in error, its weight adjustments require an algorithm that will pick out how much the various nodes contributed to its overall error. the net needs to ask, " who led me astray

    出節點從節點獲得,網路發現出現了誤差,權系數的調整需要一個演算法來找出整個誤差是由多少不同的節點造成的,網路需要問, 「是誰讓我誤歧途?
  11. In actual application the data of different area have different characteristic, when the hidden layers and input nerve centers are less, we use f - psa combining with bp to predict oil reservoir parameters ; otherwise we use f - gsa combining with bp to predict oil reservoir parameters. in this thesis some emulation results and actual application results are offered

    Gsa ,並將它們與bp網路相結合應用到薄互油參數的預測中。對于不同地區,由於地區性差異,當根據實際情況,網路層和神經元較少時,將fpsa與bp網結合,完成參數預測。
  12. Java 5 added generics support to the language, giving developers a way to both check collection type - safety at compile time and hide the runtime casting involved with using a collection though at the cost of a sometimes very messy syntax for typing

    Java 5增加了對語言泛型的支持,使開發者既可以在編譯時檢查集合類型安全性,又可以使用集合所涉及的運行時重塑(盡管以一個有時會非常雜亂的語法為代價) 。
  13. Sum w, for all j where j is an output node that takes input from n. putting this together gives us a training rule

    這里j是一個從n獲得出節點,聯系起來,我們就得到了一個培訓規則,第1部分:在節點n和出節點j之間權系數改變,如下所示:
  14. The security relation is deduced that a non - malleable commitment scheme implies a modified selective decommitment scheme, but the reverse is not true

    普通承諾方案只能秘密,而且已知的大部分承諾方案都被證明是延展的。
  15. The class of cmydoc is in charge of data computing and managing which are invisible to users, while the cmyview constructs the main window, displays the input / output dialogue box and cites of all other classes

    文檔類履行數據計算和管理職責,在系統內部,不對用戶開放;視圖類負責整個計算程序的主窗口、出對話框的顯示和所有類的引用。
分享友人