非數據應用 的英文怎麼說

中文拼音 [fēishǔyīngyòng]
非數據應用 英文
nonumeric application
  • : Ⅰ名詞1 (錯誤) mistake; wrong; errors 2 (指非洲) short for africa 3 (姓氏) a surname Ⅱ動詞1 ...
  • : 數副詞(屢次) frequently; repeatedly
  • : 據Ⅰ動詞1 (占據) occupy; seize 2 (憑借; 依靠) rely on; depend on Ⅱ介詞(按照; 依據) according...
  • : 應動詞1 (回答) answer; respond to; echo 2 (滿足要求) comply with; grant 3 (順應; 適應) suit...
  • : Ⅰ動詞1 (使用) use; employ; apply 2 (多用於否定: 需要) need 3 (敬辭: 吃; 喝) eat; drink Ⅱ名...
  • 數據 : data; record; information
  1. Initial growths of disturbances are measured by means of hot - wire anemometry. due to the detected signals with low signal to noise ratio, the coherence function is used to eliminate background noise during data reduction

    在擾動增長的初始階段,信號的信噪比常地低,根相關譜分析方法,相干函,將擾動信號有效地提取出來,測量了初始擾動的增長。
  2. With the rapidly development of computer network technology and the widely use of network technology in every walk of life, people transmit data through computer network more and more frequently, including all kinds of secret information ( for example, military secret ; bussiness secret ; personal private information ). today, as a result of poor security of our network system, we can not prevent the transmittied information from stealing and modifying unlawful. thus, the computer network technology is applied to our daily life restrictedly. recently, many network applications with voip ( for example msn messenger ; dialpad ; distributed multipoint multimedia conferences ) take no measures to encrypt their data

    隨著計算機網路技術的迅猛發展和網路技術在各行各業中的廣泛,人們通過計算機網路傳輸日益增加,其中包含了各種機密信息(例如軍事機密信息、商業機密信息、個人隱私信息等) 。由於目前的網路系統缺乏足夠的安全性,不能有效防止網路上所傳輸的信息被法竊取和修改,因而極大地限制了計算機網路技術在日常工作中的。當前,基於voip技術的各種網路,如msnmessenger , dialpad ,以及一些分散式多媒體會議系統,竟然未採取任何加密措施
  3. At first, this paper analyzes the factors of water - sand influencing water level of yellow river and the feasibility just using the factors of water - sand to study water level, and collects the corresponding data ; secondly, because there are strong nonlinear relation in the corresponding data, by meticulous theory analysis, this paper integrates basic nonlinear analysis method, theory of random analysis, method of least squares and so on. it puts forward a method which can get the high accuracy simulation of the data, perfects the multi - factor analysis of variable ( over three factors ) of the statistic ; thirdly, it applies the method to the approximation of corresponding water level process which belong to the capacity of sand of middle - high and middle - low, and get the high - accuracy simulation about the typical nonlinear relation ; at last, this paper definitudes the main influence mode that the capacity of sand. it mainly unite with other factors to work on the water level in the yellow river lower reaches ; mor eover, this paper analyzes the difficult point and the direction of improvement to realize the accuracy forecasting of the flood level of erodible - bed channel

    首先,系統分析了影響黃河水位的水沙因素,及僅水沙因素有效研究水位的可行性,並按變量對思想採集它們的相;其次,由於相水位過程中含極強的線性關系,本論文經細致的理論分析,將基本的線性分析方法、統計建模方法、隨機分析理論、最小均方誤差原則等等學理論及方法有機揉合,提出了能有效實現這類高精度擬合的分層篩選法,並改進了統計學中多因子(三個以上)方差分析法;再次,將這一方法於黃河中高及中低含沙類洪水相水位過程的擬合,實現了這一典型線性關系的高精度擬合,各年汛期上下游相洪水位過程的擬合誤差都較小;最後,明確黃河下游含沙量對水位的主要影響方式,即含沙量主要是與其它因素聯合對水位作;另外分析了要實現變動河床洪水位過程準確預報的困難所在及改進方向。
  4. The thesis is based on income question, forest coverage rate and grop production. to beging with, date envelopment analysis is proved that it can be applicated into grain for green in shan - bei district, and then in view of the fact, seven esential factors which have influence on the project are found out : expense of dam, expense of crop, expense of cash tree, expense of defense tree, other economic crop, expense of grass and graziery ; and the output factors include : income of gdp, pure income per captia, the area of decreasing land loss, graziery income, crop production, income of tree, the totle income of economic crop. after the date of each facts are puted into dea model, unefficiencial decision making units ( dmu ) found. the data that are got through adjusting unefficiencial dmus dy dea can offer guide in shanbei district upgrading of an industrial structure. at the same time, taking into account some possible problems in or after grain for green in shan - bei district, the thesis bring out some propesal to improve the circ umstance, enhance the life level and put the relation of population, resource and circumstance into a healthy orbit

    因此,加快退耕還林還草,調整土地利結構和產業結構,已成為實現山川秀美工程和可持續發展戰略的必經之路。論文以解決陜北地區的收入問題,植被問題以及糧食產量問題為出發點,首先從理論上分析了包絡分析方法在陜北地區退耕還林(草)中運的可行性,然後結合陜北地區目前的實際情況,綜合分析出影響陜北地區退耕還林(草)的關鍵的七個因素作為輸入指標:水利水保設施投入,農作物投入,經濟林種支出,防護林支出,其它經濟作物,草類支出,畜牧業投入;以退耕還林所要解決的最終問題作為輸出指標: gdp收入、農民人均純收入、水土流失減少量、牧業總產值、糧食產量、林業總產值、其他經濟作物總產值。將各指標所對代入模型后,通過分析求解得出有效的決策單元,再運包絡分析方法的一些基本原理對有效的決策單元進行調整,由此所得的對陜北地區的實際投入具有很好的指導意義。
  5. The article points out the importance and necessity of the information - security from its actuality in our country. the resources in the information system, for instance, hardware, software, data, document, operator, meterial and so on, are evaluated and gived safety grade firstly. and then, it analyses the menace including the nonauthorized access, the information leak, the refused sevice, the internal objection which the system will take. the following are the corresponding control police : confirm the users " rights and duties, including the mode of using account, the limit of accessing resource, the application of password, the building of backup ; confirm the administrators " right and duties, including physical safety, system configuration, account configuration and usufruct, password management, audit and control, backup and individual intimity ; run - of - mill measure of security defence, including access control, symbol and identification, integrality control, password technique, firewall system, audit and resumption, safety of operating system, safety of database system, defence of computers " virus and resisting - deny protocol. in the end, the article offers the strategies of disposing the safety - accident and analyse after ithow. to report it, how to solve it in phase, and how to avoid it happening again. in a word, the article presents a holistic resolvent about keeping away the information system ' s security, and supplies a essential frame for its configuration, management and application

    然後,對系統可能受到的威脅,包括授權訪問、信息泄漏、拒絕服務和內部缺陷等進行分析,並提出了相的控制策略:確定戶的權力和責任,包括帳戶使方式、資源訪問權限、口令以及建立備份等;確定系統管理員的權力和責任,包括物理安全、系統配置、帳戶設置及使權限、口令管理、審計和監控、備份以及個人隱私等方面;一般性的安全防護措施:存取控制、標識和認證、完整性控制、密碼技術、防火墻系統、審計和恢復、操作系統安全、庫系統安全、計算機病毒防護和抗抵賴協議等。最後,對事故處理和事後分析提供策略,如何報告安全事故,如何協調解決安全事故,如何避免安全事故再次發生。總之,本文對信息系統安全防範工作給出一個整體的解決方案,為其在配置、管理和方面提供了基本的框架。
  6. In recent years, plentiful and substantial fruits achieved by the lb method in simulations of hydraulics, multiphase flows, flows in porous media and heat transfer as well as magnetohydrodynamics, have revealed a broad perspective of application of this method, it will become a powerful competitor to the conventional approaches. in order to absorb the recent achievement in theory and application of the lb method, explore new ways in hydraulic computation to promote the development of practice, some work is car ried out in this thesis, as following : advances in the theory research and application, deductive process of the d2q9 model and some other commonly used models of the lb method are summarized. based on the hydrodynamic and general boundary conditions, a new joint boundary condition is presented, it integrates advantage of the two conditions above and obtains very good results in dealing with all kinds of boundaries of flow fields

    為了消化和吸收近年來lb方法在理論和方面的新成果,探索在水力計算方面的新途徑以促進lb方法實化的發展,本文進行了下列研究工作:綜述了lb方法在理論研究和實際方面的新進展,以及d2q9模型的推導過程和其他一些常的模型;在水動力邊界條件和通邊界條件的基礎上提出了一種新的聯合邊界條件方法,它綜合了上述兩種邊界條件的優點,在流場的各種邊界處理中取得了常好的效果,經過模塊化的處理以後這種邊界條件具有更好的實性;針對均勻網格的lb方法計算效率較低的不足,提出了雙重網格的latticeboltzmann方法,通過二維poiseulle流動、后臺階流動和渠道方槽流動三個算例的模擬,證明這種方法能夠明顯地提高流場模擬的計算效率;此外,根復雜區域流場的特徵提出了latticeboltzmann方法的分塊-耦合演算法,利lb方法的計算特性實現塊與塊之間的交換,充分利計算資源提高計算效率,通過對「 t 」型、 「十」型和「 x 」型分岔管道流場的模擬,展示了這種演算法的特徵和優點,以及它所具有的前景。
  7. This paper evaluates benefit of investment about the programming of logistic park, according to many inputs and outputs of the programming of logistic part, in order to find out noneffective planning projects of investment, and turn them into effective projects

    本文根物流園區規劃投資建設具有多投入、多產出的特點,包絡分析方法對物流園區的投資規模規劃進行投資效益評價,以期找出有效的投資規模規劃方案,並對其進行有效性改進。
  8. Based on analysis and compare of all kinds of precept - sorting of feature of plastic product for the different structural plastic product, a 3d feature library of plastic product was built on the platform by integrating feature - modeling technique with parametric technique. the feature schleps its information of non - geometry by database - externed technique of the entity. after building the database of plastic material, the module of choice of plastic material is developed by technology of odbc

    針對不同結構類型的塑件,在全面分析、比較塑件特徵分類的各種方案的基礎上,採三維特徵建模技術和參化技術,建立了注塑產品的三維特徵庫;實體擴展庫技術,使特徵攜帶幾何信息;再在建立塑料物性庫的基礎上,採odbc技術,開發了塑料材料選擇模塊;通過塑件特徵的調和人機交互輸入參的方法進行塑件三維造型,再把塑件的三維實體和塑件的幾何信息結合起來,生成塑件全信息模型。
  9. As the rdbms ( relational database system ) can hardly adapt the requirement of non - traditional application, such as incompetence of model representation, low system with a combination of 00 language, sematic, model, complex object and database system. it absorts the merit of the oodbms and the rdbms, it inherit the mature technology of the rdbms, on the other hand, it import the technology of the 00, so it can boost up the ability of handle complex object, etc

    它針對關系庫系統( rdbms )不能適傳統的要求,如:模型表達能力有限,系統效率低、事務模型太簡單等,結合面向對象語言、語義模型、復雜對象模型和庫的幾個方面的研究而形成的一個高度集成化系統。
  10. With the fleet development of mobile communication industry, the security and secrecy of information has been becoming more and more vital. nowadays, the security of communication is of great importance to confirm the safety of business information. on the situation that the mobile phone has been diffusely applied, the hidden safety troubles of mobile phone should not be ignored ( such as wire tapping, imitated handset station, blue teeth connection, in exchange with electromagnetic wave, the back door of handset, lost & stolen & lost control of mobile phone, safety of non - tone increment operation of mobile phone and cell phone virus )

    統計,目前我國gsm網路[ 1 ] [ 13 ]已覆蓋全國絕大部分地區,已超過2 . 6億,並且還在高速增長;隨著手機的普及,手機存在的安全隱患及面臨的威脅日益突出(如主動竊聽、假冒機站、藍牙連接、電磁波交換、手機后門、手機被盜、丟失或短時失控、手機話增值業務安全以及手機病毒等) ,手機安全問題已成為當前急需解決的重要問題。
  11. Jadt can be a very useful api with wordbook data accessing applications, as it provides simple and standard techniques to do the task

    Jadt對于辭典訪問程序來說是一個常有的api ,因為它為執行這類任務提供了簡單的、標準的技術。
  12. 0ne of the basic assumptions in tradi tiona1 associat ion ru1es is that a11 items in the database are equa11y important. thi s is, however, rare1y true in rea1 - - 1 if e app1ications t users " interests may vary from item to item, users " interests toward a certain item may vary from time to time

    傳統關聯規則挖掘假定庫中每個項目具有相同的重要性,然而在很多實際中,事實並如此:戶可能對某些特定的項目興趣更大,而且同一項目在不同時段的重要性也可能是不同的。
  13. Due to the short distance among the planes which fly in a group, the conventional low resolution radar can not distinguish them in both distance and azimuth ? if we use the technology of isar to resolve the difference among doppler frequency of the targets and obtain a fine resolution cross - cross image, we may separate them, but a long time of coherent processing is needed <, for the formation targets, it can be approximately divided to rigid body and nonrigid body, so for the formation targets, that can be regarded as rigid which has a relative position and an identical movement, can be approximately considered as a large target, and be compensated by translational phase with the rule of minimum entropy, but for the most those cannot accord with the approximation of rigid, being the doppler - frequency of the aim is linear changed, by the relax method with short data, increases the resolving performance of multiple target to the aim in the frequency domain, since cross - range resolution is based on the accumulative time, so it is greatly improve the resolution to formation targets by the instant cross - range image which produced by radon - wigner transformation

    低分辨isan成像及干涉技術研究一因此直接無法分辨編隊目標的架,我們借鑒isar的技術,通過較長時間的相干積累,在多普勒頻域上對目標進行分辨。而對于編隊目標,可分為近似剛性的多目標和剛性的多目標,所以對于可以近似為剛體的編隊目標相對位置固定,運動方式一致,可以近似看作一個大目標,採最小墑準則對平動相位的進行補償,但是大多並不滿足剛體近似的編隊目標,由於目標在相干積累時間的多普勒頻率近似呈線性變化,通過對較短relax的時頻分析方法,提高了頻率域上目標分辨的性能。由於橫向解析度取塊于橫向積累時間,所以利radnwigner變換得到瞬時的一維橫向距離像大大提高了對編隊目標的分辨,對模擬和實測的大量分析結果表明此方法的有效性和可行。
  14. It presents a mathematical heat transfer model of air and soil temperature in greenhouse basing on the theory of transmission of heat. the model calculates the heat diffuse coefficient of soil by difference method and establishes regression equation on experimental data by sas

    基於傳熱學的熱傳導方程,利測試的地溫,選差分法計算了土壤熱擴散率,sas軟體擬合了線性方程,建立了日光溫室土壤溫度場的學模型。
  15. These settings describe the direction that data is intended to flow between objects, however, they have no bearing on the level of indirection used by the parameters

    這些設置描述該在對象之間流動的方向,但是,它們不會影響參所使間接性的程度。
  16. Secondly, the activex plug - in of arcims in the client server allows users instantly browse, query and download the information through internet by permission. to assure the security of information exchange between the national remote sensing center and the state council, the system has an additional subsystem, which can protect the intranet of the state council from internet

    4 、在論述災情發布系統體系之前,先對arcims和arcsde的系統結構進行了分析介紹,由於都是esri公司的產品,其體系結構上有著類似的特點:多層式結構,可以分為管理、服務器端、客戶端3個邏輯層面;都偏重於管理。
  17. This class works a lot like a jvm classloader, but with the important difference that rather than linking loaded classes for execution as part of your application, the class pool makes loaded classes usable as data through the javassist api

    這個類的工作方式與jvm類裝載器常相似,但是有一個重要的區別是它不是將裝載的、要執行的類作為程序的一部分鏈接,類池使所裝載的類可以通過javassist api作為使
  18. Other classes provide services supporting data type conversion, method parameter manipulation, mathematics, remote and local program invocation, application environment management, and supervision of managed and unmanaged applications

    其他類提供支持下列操作的服務:類型轉換,方法參操作,學計算,遠程和本地程序調程序環境管理以及對託管和託管程序的監管。
  19. Then, the flow model of coarse liquid zinc is built by means of multivariable linear regression using field data in the case of little variety of viscosity. the real - time monitor system of coarse liquid zinc is also designed and developed, and has been applied in the factory

    然後在實際粗鋅液粘度變化很小的前提下,利現場的樣本多元線性回歸的方法建立了粗鋅液流量的線性學模型,並設計和開發了粗鋅液流量實時監視系統於生產現場。
  20. However, with the prevalence of sms service, the huge business opportunity from non - voice service ( data application service ) is beginning to exhibit

    但隨著簡訊的普及,語音增值業務(業務)的巨大商機也開始凸現。
分享友人