data identification 中文意思是什麼

data identification 解釋
數據識別
  • data : n 1 資料,材料〈此詞系 datum 的復數。但 datum 罕用,一般即以 data 作為集合詞,在口語中往往用單數...
  • identification : n. 1. 認出,識別,鑒定,驗明(罪人正身等)。2. 【心理學】自居作用。3. 身分證。4. 【數學】黏合,同化。
  1. As to the critical technological problems of the interlock control of three - car coke oven - oven number identification, accurate contraposition and data transmission, the author proposes solutions respectively - rfid, three - light positioning device, coke oven controller and radio transmission network. these solutions can ensure accurate identification of the oven number. for example, the deviation of the automatic parking position is within 10mm

    針對三車聯鎖控制環節的關鍵技術:爐號識別、精確對正和數據通信,本系統採用了射頻識別( rfid )裝置、三燈位置檢測裝置、焦車控制器、無線通訊網路等解決方案,可實現無差錯的爐號識別,自動停車定位誤差在10mm以下,通信數據可靠等系統要求。
  2. The functions of system include the display of classification information, the search of classification data, the background manage of database, and the identification of unknown species of termite based on the dichotomous key or multi - way search

    本系統具有分類資料顯示、分類資料檢索、數據庫的后臺管理和基於二項式檢索表的鑒定或多途徑檢索鑒定四個功能。
  3. Preservation, identification, extrication and documentation of computer evidence ; giving ability to gather files, lltbkfdt collect backups of data, gives tools to look at what was going on with data

    保存、鑒別、抽取和歸檔計算機證據;提供能力來搜集文件和數據備份,提供工具來觀察過去的時間里發生的與數據有關的事件。
  4. Hamada and wu ( 1991 ) identified important location effects by imputing the censored data. and bihua has considered identification of both location and dispersion effects from unreplicated factorial experiment with right - censored data

    對于這樣的截尾數據, hamada與wu ( 1991 )通過對截尾數據補值,給出了模型選擇以及鑒別和估計位置效應的方法。
  5. Identification method of oil - bearing reservoirs based on gas logging data

    基於氣測資料的儲層含油氣性識別方法
  6. Motor compressors for refrigerating systems ; standard rating conditions ; testing ; information to be specified on data sheets and identification plates

    製冷系統用電動壓縮機.標準額定條件檢驗數據表規
  7. Open compressors for refrigerating systems ; standard rating conditions, testing, information to be specified on data sheets and identification plates

    製冷系統的敞開式壓縮機.標準額定條件.試驗.規定在數
  8. Single stage condensing units for refrigerating systems ; standard rating conditions ; testing ; information to be specified on data sheets and identification plates

    製冷機用單級冷凝裝置.標準額定條件.試驗.數據單和標
  9. The article points out the importance and necessity of the information - security from its actuality in our country. the resources in the information system, for instance, hardware, software, data, document, operator, meterial and so on, are evaluated and gived safety grade firstly. and then, it analyses the menace including the nonauthorized access, the information leak, the refused sevice, the internal objection which the system will take. the following are the corresponding control police : confirm the users " rights and duties, including the mode of using account, the limit of accessing resource, the application of password, the building of backup ; confirm the administrators " right and duties, including physical safety, system configuration, account configuration and usufruct, password management, audit and control, backup and individual intimity ; run - of - mill measure of security defence, including access control, symbol and identification, integrality control, password technique, firewall system, audit and resumption, safety of operating system, safety of database system, defence of computers " virus and resisting - deny protocol. in the end, the article offers the strategies of disposing the safety - accident and analyse after ithow. to report it, how to solve it in phase, and how to avoid it happening again. in a word, the article presents a holistic resolvent about keeping away the information system ' s security, and supplies a essential frame for its configuration, management and application

    然後,對系統可能受到的威脅,包括非授權訪問、信息泄漏、拒絕服務和內部缺陷等進行分析,並提出了相應的控制策略:確定用戶的權力和責任,包括帳戶使用方式、資源訪問權限、口令應用以及建立備份等;確定系統管理員的權力和責任,包括物理安全、系統配置、帳戶設置及使用權限、口令管理、審計和監控、備份以及個人隱私等方面;一般性的安全防護措施:存取控制、標識和認證、完整性控制、密碼技術、防火墻系統、審計和恢復、操作系統安全、數據庫系統安全、計算機病毒防護和抗抵賴協議等。最後,對事故處理和事後分析提供策略,如何報告安全事故,如何協調解決安全事故,如何避免安全事故再次發生。總之,本文對信息系統安全防範工作給出一個整體的解決方案,為其在配置、管理和應用方面提供了基本的框架。
  10. Following data should submit when dealing with : ( 1 ) " estate move registers requisition " ; ( 2 ) identification ; ( 3 ) transforms the agreement of the compensation that tear open change of card doing object lesson via program land branch or old city ; ( 4 ) compensation and estate of the change that be torn open have price difference, the paid poor cost that the part that need a value should submit photocopy of filling difference bill and development business to issue proves

    辦理時應提交下列資料: ( 1 ) 《房地產轉移登記申請書》 ; ( 2 )身份證實; ( 3 )經規劃國土部門或舊城改造辦鑒證的拆遷賠償協議書; ( 4 )補償與被拆遷房地產有差價的,差值部分應提交補差發票復印件及發展商出具的付清差價款證實。
  11. Spectral data analysis and identification of d - - sodium pantothenate

    右旋泛酸鈉的波譜數據和結構分析
  12. Lastly, several conclusions on bad data detection and identification for distribution system are given

    最後,得到了配電網路不良數據檢測與辨識的若干結論。
  13. Abstract the problem about bad data detection and identification in distribution system state estimation is focused in this thesis

    本文著重分析了配電網狀態估計中的不良數據檢測與辨識的問題。
  14. There are kinds of contents, for example state estimation, bad data identification and network wiring identification

    發展至今,很多方面,例如電力系統的實時狀態估計已在很多地區和國家的電網中運行成功。
  15. Finally, the present method is applied to the modal identification from the i / o data of fem dynamic analysis and on board measurement for a container ship

    最後以一貨櫃輪之有限元素動態分析模擬與實船量測結果為例進行船體整體振動之態特性識別。
  16. Using the perturbation transfer matrix method as well as the tested data in the laboratory, the 1st and 2nd order perturbed identification of dynamic parameters of the rotor of a boiler pump is made

    摘要利用攝動傳遞矩陣法,結合實驗室的試驗,對某電站鍋爐給水泵轉子的動力學參數進行了一階和二階攝動識別。
  17. In the preprocessing stage the method of user and session identification often adopt heuristic algorithm for the being of cache and agent. this induce the uncertainty of data resource. the cppc algorithm avoid the limitation and has no use for complicated hash data structure. in this algorithm, by constructing a userld - url revelant matrix similar customer groups are discovered by measuring similarity between column vectors and relevant web pages are obtained by measuring similarity between row vectors ; frequent access paths can also be discovered by further processing of the latter. experiments show the effectiveness of the algorithm. in the fourth part, this thesis bring some key techniques of data mining into web usage mining, combine the characteristic of relation database design and implement a web usage mining system wlgms with function of visible. lt can provide the user with decision support, and has good practicability

    本文演算法避免了這個缺陷,且不需要復雜的hash數據結構,通過構造一個userid - uel關聯矩陣,對列向量進行相似性分析得到相似客戶群體,對行向量進行相似性度量獲得相關web頁面,對後者再進一步處理得到頻繁訪問路徑。實驗結果表明了演算法的有效性。第四是本文將傳統數據挖掘過程中的各種關鍵技術,引入到對web使用信息的挖掘活動中,結合關系數據庫的特點設計並實現了一個具有可廣西人學頎士學位論義視化功能的web使用挖掘系統wlgms 。
  18. This thesis includes four parts in which the technologies of web usage mininig are systematically researched. in the first part we summarize the techniques of data mining and web usage mining, present the significance of the research on web usage mininig, the status of research and the problem which web usage mininig will face with. in the second part we discuss the web usage mininig according to the process of web mining. in the stage of data preparing and preprocessing we discuss the algorithm of data cleaning, user and session identification in detail, and present a data model of association rules and sequential patterns in the stage of pattern discovery, discuss the useful method of pattern analysis in last stage. a synthesis clustering algorithm cppc is proposed in the third part of this thesis

    本文分主要從以下四個方面對web使用挖掘進行了系統的分析和研究。第一是對數據挖掘和web挖掘進行了概述,闡述了web挖掘的意義、研究的現狀、面臨的問題。第二是討論了web使用挖掘的三個階段:在數據準備和預處理階段重點討論了數據清洗及用戶和會話識別演算法;在模式發現階段定義了關聯規則和序列模式的數據模型;模式分析階段則討論了現行的幾種分析方法。
  19. This article briefly introduces the theory, advantages and main function of crosswell technology, and the developing statues of it. in this article, the author elaborates the operation method of crosswell in block shen95, and detailed analyses the designing of layout, identification of complicated wave field, gained data, field quality control measures and data processing & interpretation method

    本文簡要介紹了井間地震技術的原理、優勢、主要作用以及國內外發展概況,闡述了沈95塊井間地震試驗的施工方法,較詳細地對觀測系統的設計、復雜波場識別、獲得的數據資料、野外質量監控措施以及資料處理、解釋方法進行了分析。
  20. This article briefly formulates the development method of information system and focuses on the introduction of bsp ( business system plan ). by directed against the management features of the water supply corporation, this article systematically the target, boundary and requirement of management information system of the water supply corporation, performs process - data identification, defines the data

    論文首先介紹了供水公司的企業特點和存在問題,並對其原因進行了分析,然後介紹了企業的發展戰略以及mis的規劃目標,簡述了信息系統的開發方法,重點介紹了企業系統規劃法。
分享友人