查询词典 data library
- 与 data library 相关的网络例句 [注:此内容来源于网络,仅供参考]
-
The quare author association turn on goes into the request of the library of quinonoid formula, vs the MS SQL Server2000 data base management system, SQL language element, the VB application program design, the VB data nbank technique steered the more thorough study and appliances, cardinal terminate to manage the demand analysis of the system to the book, the function shuttering cake curtate, the data nbank modal analysis, and designed the data nbank structure and application programs thereof.
因此本人结合开入式图书馆的要求,对MS SQL Server2000数据库管理系统、SQL语言原理、VB应用程序设计,VB数据库技术进行了较深入的学习和应用,主要完成对图书管理系统的需求分析、功能模块划分、数据库模式分析,并由此设计了数据库结构和应用程序。
-
The system can receive data from the STEP-NC interpreter by using the resource model of the function block type database, then translate the receiving data into the data of function block format; the tool path generator can dynamically transfer the function block in the function block type database; it can also use the data of function block management resource to export DSP order; depending on VC to edit function database and Dynamic Linkable Library, we can connect the tool path generator with research platform, use the tool path generated from the tool path generator to drive the tool move.
结果 通过功能块类型库中的资源模型接收STEP-NC解释器解释的数据,并将接收的数据转化成功能块格式的数据;依据工艺规划好的加工工序,刀具路径生成器动态调用功能块类型库中的功能块;利用功能块处理资源提供的数据,输出DSP指令;依靠VC语言编辑函数库和动态链接库,将刀具路径生成器与实验平台建立关联,基于刀具路径生成器生成的刀具轨迹驱动机床刀具运动。
-
LEK gives out thenuclear data from ENDF/B-IV format files as the input data of KQCS automati-cally. LEK makes it possible to generate the fast reactor multigroup constantsfrom Chinese Evaluated Nuclear Data Library in Chinese Nuclear Data Center.It is possible now for CNDC to make benchmark testing for CENDL.
LEK取数既准确又节省大量的人力,改变了KQCS程序需手工输入上万个核数据的繁烦、落后局面,使中国核数据中心用计算机计算大量核素的快中子反应堆多群常数成为可能,为检验中国评价核数据库创造了条件。
-
A parallel computing model is presented, based on migration-dependency. A Scalable Parallel Run-time Library is developed to solve all the key difficult problems such as dynamic data dependency analysis, synchronization, communication, and load balancing.
提出了基于迁移相关的DSMC并行计算模型,采用了可扩展并行运行时库(Run—time Library)来解决程序运行过程中动态的相关性分析、同步通信、负载平衡等难题。
-
The College Library Management System main library book stock and loans Library, Library Information Management System data management process.
图书管理系统是一个学校不可缺少的部分,它的内容对于学校的管理者和读者来说都至关重要,直接关系到图书的借用率,所以开发图书管理系统能够为管理员和读者提供充足的信息和快捷的查询手段。
-
One of your first tasks should be to visit the SCR data library and review the design of the current SCR network.
你的第一件工作之一应该是参观 SCR数据资料库以及检讨现在 SCR 网路的设计。
-
This paper is based on data mining technology,use weka as a library data mining software tool,use weka's j48 tree algorithm and data association analysis library data.mining useful data which user needs from the mass library data and get reasonable results.ultimately to improve work efficiency and scientific management.
该文以数据挖掘技术为基础,利用weka软件作为图书馆数据挖掘工具,通过weka里的j48树算法和数据关联等算法,对图书馆的馆藏数据进行相应的分析,从海量数据中挖掘出用户需要的有用数据,并得到合理的统计结果。最终达到提高工作效率,能够科学管理的目的。
-
The design includes many new technologies in data exchange and data security, they are: Converting non-XML data to XML in order to apply the XML security technology to more data types; Using the technology of XKMS and PKI to manage the public key in order to overcome the shortage of complexity and difficulty in using PKI and improve the efficiency of the public key management; Using Diffe-Hellman algorithm combining with the public key technology to exchange secret key in order to furthest increase the security of the key; Using the technology of XML digital signature algorithm to ensure the integrity, message authentication and signer authentication of the data; Using the technology of XML encryption to ensure confidentiality of the data; Defining delegable access rules on the structure and content of the XML documents to provide fine-grained access control. According to the XML security framework, a XML security library is designed and implemented.
在对XML及其安全技术主要包括XML加密技术、XML数字签名、公钥管理、密钥产生和交换进行研究的基础上,结合传统密码技术和XML安全技术提出了一种基于XML的数据安全模型,模型中包含了目前网络数据交换和安全领域的一系列最新技术,主要有:将非XML格式数据转换为XML格式数据的方法,以保证现有的大部分网络数据能够应用XML安全技术;使用XML公钥管理技术结合PKI技术管理公钥,以克服PKI技术实施和部署复杂、难度大等问题,提高公钥管理的效率;使用Diffie-Hellman算法结合公钥技术交换密钥,以最大限度保证密钥的安全;使用XML数字签名技术保证数据的完整性、不可否认性和发送方身份认证;使用XML加密技术保证数据的机密性;根据XML文档的内容和结构定义授权访问规则进行良好的访问控制。
-
Methods We electronically searched The Cochrane Library (Issue 4, 2009), PubMed (1980 to 2009), Ovid MEDLINE (1950 to 2009), Ovid EBM Database (1991 to 2009), EMbase (1980 to 2009), CBM (1978 to 2009) and CNKI (1979 to 2009) to collect literature about intravertebral analgesia for extern al cephalic version. We screened randomized cont rolled trials according to the predefined inclusion and exclusion criteria, extracted data and evaluated the quality of the included studies, and then performed meta-analyses by using RevMan 5.0.13 software.
计算机检索Cochrane Library (2009年第4期)、PubMed (1980~2009)、Ovid MEDLINE (1950~2009)、Ovid循证医学数据库(1991~2009)、EMbase (1980~2009)、CBM (1978~2009)和CNKI (1979~2009),按纳入和排除标准筛选椎管内镇痛在外倒转胎位术中应用的随机对照试验,提取资料及评价文献质量后,采用RevMan5.0.13软件对数据进行Meta分析。
-
These two sets of neutron optical potential parameters have been ingathered in the Nuclear Parameter Data LIBRARY of China by Chinese Nuclear Data Center.Based on these neutron optical potential parameters, program DWUCK4 has been applied to calculate direct inelastic cross sections which are used in SUNF program as input data and then the SUNF program has been used for calculating all nuclear reaction data of neutron induced on 135Ba, 136Ba, 137Ba, 138Ba and 130Te in energy range from 0.01 to 20MeV, respectively.
在这两组中子光学势参数的基础上,应用程序DWUCK4计算了直接非弹截面,作为输入数据用于SUNF程序,用SUNF程序计算了中子入射~(135)Ba、~(136)Ba、~(137)Ba、~(138)Ba和~(130)Te五个核的反应全套数据。
- 推荐网络例句
-
This one mode pays close attention to network credence foundation of the businessman very much.
这一模式非常关注商人的网络信用基础。
-
Cell morphology of bacterial ghost of Pasteurella multocida was observed by scanning electron microscopy and inactivation ratio was estimated by CFU analysi.
扫描电镜观察多杀性巴氏杆菌细菌幽灵和菌落形成单位评价遗传灭活率。
-
There is no differences of cell proliferation vitality between labeled and unlabeled NSCs.
双标记神经干细胞的增殖、分化活力与未标记神经干细胞相比无改变。