key for identification 中文意思是什麼

key for identification 解釋
鑒定檢索表
  • key : n 1 鑰匙。2 要害,關口,要沖。3 關鍵,線索,秘訣;解法。4 (外國書的)直譯本,圖例,題解,圖解,...
  • for : FOR f o r = free on rail 【商業】火車上交貨(價格)。1 〈表示目標、去向〉向,往。 leave [sail] f...
  • identification : n. 1. 認出,識別,鑒定,驗明(罪人正身等)。2. 【心理學】自居作用。3. 身分證。4. 【數學】黏合,同化。
  1. According to the analysis and identification of differential displayed proteome, two key enzymes, adp - l - glycerol - d - mannoheptose - 6 - epimerase and mannosyltransferase, were induced in different salt stress and salt shock for rt19, which commonly participate in the biosynthesis of l - glycerol - d - manno - heptose, a major component of lipopolysaccharide

    通過對rt19的鹽激和鹽脅迫誘導蛋白的比較分析,發現:其中12個蛋白在兩種不同的脅迫條件下都可被誘導表達。進一步證實: rt19應答不同鹽脅迫刺激採取了不同的反應機制,但這些機制存在共性,交織成復雜的調控網路。
  2. It focuses on villagers in dranang county in shannan prefecture, and naqu and nierong counties in naqu prefecture, and works with the community to improve local capacity in seven key areas : 1 domestic and stock water supply and management ; 2 improved crop production and management mainly in dranang county ; 3 livestock and rangeland management ; 4 development of improved social forestry and environmental programs involving village and homestead tree plantations ; 5 improved sanitation, preventative health measures and mother child health care ; 6 identification and development of income generation opportunities, both on - farm and off - farm ; 7 capacity building for government administrators to implement poverty reduction strategies

    自治區基本生活改善項目bhnp是一個綜合性的農村發展項目,其基本宗旨是提高項目區當地政府和農村社區減少貧困及解決基本需求的能力。項目活動主要集中在山南地區的扎朗縣和那曲地區的那曲縣和聶榮縣,分為七個主要領域: 1人畜飲用水系統安裝及管理
  3. Abstract : the paper introduces various identification methods for tracing the malicious call and calling identification services in spc telephone exchanges, especially describes the malicious call trace methods by using switch boards and " r " key tandem function and telephone set which can display calling subscriber ' s numbers

    文摘:介紹了程式控制電話交換機追查惡意呼叫和主叫用戶信息識別業務的各種識別方法,特別是詳細介紹了利用話務臺和話機上的" r "鍵轉接的功能,以及利用能顯示主叫信息的話機來顯示主叫電話號碼和追查惡意呼叫電話的方法。
  4. The paper introduces various identification methods for tracing the malicious call and calling identification services in spc telephone exchanges, especially describes the malicious call trace methods by using switch boards and " r " key tandem function and telephone set which can display calling subscriber ' s numbers

    介紹了程式控制電話交換機追查惡意呼叫和主叫用戶信息識別業務的各種識別方法,特別是詳細介紹了利用話務臺和話機上的" r "鍵轉接的功能,以及利用能顯示主叫信息的話機來顯示主叫電話號碼和追查惡意呼叫電話的方法。
  5. In the preprocessing stage the method of user and session identification often adopt heuristic algorithm for the being of cache and agent. this induce the uncertainty of data resource. the cppc algorithm avoid the limitation and has no use for complicated hash data structure. in this algorithm, by constructing a userld - url revelant matrix similar customer groups are discovered by measuring similarity between column vectors and relevant web pages are obtained by measuring similarity between row vectors ; frequent access paths can also be discovered by further processing of the latter. experiments show the effectiveness of the algorithm. in the fourth part, this thesis bring some key techniques of data mining into web usage mining, combine the characteristic of relation database design and implement a web usage mining system wlgms with function of visible. lt can provide the user with decision support, and has good practicability

    本文演算法避免了這個缺陷,且不需要復雜的hash數據結構,通過構造一個userid - uel關聯矩陣,對列向量進行相似性分析得到相似客戶群體,對行向量進行相似性度量獲得相關web頁面,對後者再進一步處理得到頻繁訪問路徑。實驗結果表明了演算法的有效性。第四是本文將傳統數據挖掘過程中的各種關鍵技術,引入到對web使用信息的挖掘活動中,結合關系數據庫的特點設計並實現了一個具有可廣西人學頎士學位論義視化功能的web使用挖掘系統wlgms 。
  6. Abstract : it is expounded the composition and detection method of the diagnostic system of dynamic failure for locomotive running gear. also discussed are the key technologies as ultrasonic resonance demodulation, identification of locomotive type & speed, message sampling of sensors tracing running mechanism and three dimensional diagnosis, as well as the feasibility test

    文摘:闡述了機車走行部動態故障診斷系統的組成及檢測方法,介紹了超聲共振解調、車型車速識別、多個傳感器跟蹤運動機械的信息采樣、三維診斷等關鍵技術及其可行性試驗情況。
  7. The identification of flutter derivatives for bridge sectional model has long been a key issue in long - span bridge flutter and buffeting analysis

    長期以來,橋梁斷面顫振導數的識別都是大跨度橋梁顫抖振響應分析中的重點和難點問題。
  8. As to the current problems existing in the identification for these flutter derivatives, the dissertation tries to trace the development in the identification for the past unsteady aerodynamic forces of long - span bridges. it also investigates the method for flutter and buffeting analysis and the flutter derivatives. based on the present methods used in obtaining the unsteady aerodynamic forces and flutter derivatives, and co - funded by a natural scientific fund from the nation and a key project fund from the railway ministry, the current research has attempted to develop a device which can be employed in the wind tunnel to test flutter derivative through a forced vibration method

    鑒于目前橋梁斷面顫振導數識別的水平和存在的問題,本文通過對大跨度橋梁非定常氣動力、顫振分析方法及顫振導數識別方法的回顧和評述,基於現有的非定常氣動力和顫振導數的測試方法,在國家自然科學基金與鐵道部重點學科基金的聯合資助下,研究開發了一套在風洞中採用強迫振動法測試顫振導數的裝置。
  9. Part 1 : identification of a novel gene, tsarg2, and its sequence character cloning new apoptosis - related novel gene is a key to further understanding of apoptosis mechanism and the biological process of germ cell, and it is of momentous significance on clarifying physiology and pathology process of spermatogenesis. to rapidly attain human novel gene full - length cdna sequence, the gene - specific primers and the vector - specific primers have been designed for successful performing nested pcr and draft human genome searching to rapidly identify the tsarg2 ( genebank accession number ay040204 ) 5 " end from a human testis cdna library by using a cdna fragment ( genebank accession number be644542 ) as a electronic probe, which was significantly changed in cryptorchidism and represents a novel gene. furthermore, a mouse homologue of this gene was identified ( genebank accession number af395083 ) by lab on - line

    本研究分為三個部分,其主要實驗方法及實驗結果如下:第一章tsarg2基因的克隆與序列分析從已獲得的在隱睪和正常睪丸對照中表達量有明顯差異的est片段( be644542 )入手,設計了基因特異性引物和載體特異性引物進行巢式pcr擴增,結合人類基因組草圖搜索法,從睪丸cdna文庫中快速分離出人類睪丸凋亡相關基因的5末端而獲得全長cdna , genbank登錄號為ay040204 ,同時應用生物信息學的方法克隆了該基因在小鼠中的同源基因, genbank登錄號為af395083 。
  10. An advanced software platform with the parameter identification as its core has been developed for load modeling. this software platform has been practiced in the engineering project of load modeling for zhangjiakou area, as well as the national power grid key project of load modeling for the north east of china

    基於論文所建立的理論,已開發了以參數辨識為基礎的系統的負荷建模軟體平臺,基於該軟體平臺先後完成了張家口地區電網負荷特性建模和東北電網負荷建模工作。
  11. An identification key of chinese ophichthidae is provided for each of the 13 genera and 33 species recognized

    對中國已有種類進行了詳盡的整理,編制了包括13屬33種蛇鰻科魚類的屬種檢索表。
  12. Fingerprinting has been considered a key method of identification for more than 100 years

    指紋作為一種關鍵的識別方法已經有上百年的歷史了。
  13. I / we shall handle a personal identification number provided by the bank including the one - time security key number with due care and shall fully indemnify the bank for all losses when failing to do so

    本人/本人等將小心保管由銀?發出之私人密碼包括一次性的確認密碼,並願對未能妥善保管密碼而造成銀?方面之一?損失作出全面賠償。
  14. The software includes the program of communication with a stand - alone module, of the identification code returned from a stand - alone module, of opening / closing door, of display, of identification the key number, of reading / writing device by i2c bus. the main function of fingerprint menjin system used for the safe is to open door by fingerprint

    軟體主要由與指紋識別模塊的通訊程序模塊、指紋識別模塊返回代碼識別程序模塊、開門模塊程序模塊、關門程序模塊、顯示程序模塊、鍵盤鍵號識別程序模塊、按i ~ 2c總線協議對時鐘晶元和串列e ~ 2prom的讀/寫程序模塊等模塊組成。
  15. ( 4 ) the intelligent inspect system for roof latticed truss structure in shenzhen citizen center is selected as a practice background, and the intelligent inspect method to the steel bracket of roof truss is researched in present paper, in which includes several tasks as follows : automatic load identification for bracket based on neural network method, prompt calculation for the stress of key points on bracket, and its service status evaluation and stress alarm

    ( 4 )以深圳市市民中心屋頂網架結構的智能監測系統為實際應用背景,詳細介紹了網架結構支撐鋼牛腿的智能化監測方法。其中包括,基於神經網路的牛腿瞬時荷載的自動識別、牛腿關鍵點應力的快速正向計算、以及關鍵點工作狀態的評估與報警。
  16. The mssr mode s technology, which was introduced firstly for the purpose of air tranfic control ( atc ) system, is based on the individually addressing and selective interrogation technology. the mode s can overcome many problems exist in mode a / c, such as signal interference, limited aircraft identification, garble and fruit, and provides the ability to build digital data link. many countries and organizations do them best to support researches about the communication, navigation and surveillance technology, which are all based on the mode s, and many productions have been adopted step by step by the international civil aviation organization ( icao ). so, to research the key technologies of mode s will contribute a lot to the development of domestic aviation system, especially for the air control system, identification friend foe and navigation system

    它建立在獨立編址、選擇性詢問的基礎之上,能夠解決在模式a / c中存在的信號干擾、有限的信息編碼、幻影( garble )和異步應答( fruit )等問題,同時在數據鏈路方面有著巨大的潛力。國際上,模式s的數據鏈技術得到了廣泛的關注,許多國家和組織大力支持基於模式s的通信、導航和監視技術以及航空管理新技術的研究,許多成果正逐步被國際民用航空組織( icao )所採用。因此,對模式s核心技術的深入研究對於我國在航空管理、敵我識別、導航等方面的發展有著重大的意義。
  17. Specifies the length of the browser identification string to use as the key for caching browser capabilities objects in the internal cache

    指定瀏覽器標識字元串的長度,該標識字元串要用作內部緩存中的緩存瀏覽器功能對象的鍵。
  18. The key of the algorithm is identification of plant. based on analysis and calculation, the thesis presents the theory and method for minimum phase plant identification. the plant with uncertainty can be estimated through plant response to a short - duration step control effort acting directly on the plant so that the pdf control coefficients can be computed

    該演算法最重要的是對對象的辨識,經過大量的分析與運算,本文提出了在對象為最小相位時,辨識對象的階數及其高階項系數的理論和方法,即以階躍信號直接激勵被控對象,對其輸出信號進行差分運算,利用所得的值判定對象的階數及其高階項系數。
  19. There are three key technologies for the optimization : 1, chromosome spaces string is shined upon the weight coefficient ; 2, the identification of fitness ; 3, genetic operation

    用遺傳演算法優化bp神經網路的關鍵有三點: 1 、染色體位串與權系數的編碼映射; 2 、適應度函數的確定; 3 、進行遺傳操作。
  20. Furthermore, a number of key initiatives are being taken with a view to facilitate early identification and handling of suspected child abuse cases, such as strengthening the multi - disciplinary training programmes, reviewing the procedures for handling child abuse cases and commissioning a study on child abuse and spouse battering to enrich and update our understanding of the problems which would shed light on the development of strategies and services to combat family violence

    此外,我們亦已採取數項主要措施,以協助盡早識別和處理懷疑虐兒個案,例如加強跨專業訓練課程,檢討處理虐待兒童個案程序,並進行虐兒個案和虐待配偶的研究,藉此加強和更新我們對這個問題的認識,此舉將有助我們制定打擊家庭暴力的策略和服務。
分享友人