查询词典 data type
- 与 data type 相关的网络例句 [注:此内容来源于网络,仅供参考]
-
This paper is based on data mining technology,use weka as a library data mining software tool,use weka's j48 tree algorithm and data association analysis library data.mining useful data which user needs from the mass library data and get reasonable results.ultimately to improve work efficiency and scientific management.
该文以数据挖掘技术为基础,利用weka软件作为图书馆数据挖掘工具,通过weka里的j48树算法和数据关联等算法,对图书馆的馆藏数据进行相应的分析,从海量数据中挖掘出用户需要的有用数据,并得到合理的统计结果。最终达到提高工作效率,能够科学管理的目的。
-
We can divide web data into two kinds: structural data and unstructured data. We have maturer methords to deal with structural data. However, because traditional database bottom can not deal with unstructured data, a wey that deal with unstructured data need be presented.
对于结构化的Web数据,已经有较为成熟的解决方法;而对于非结构化的Web数据,由于传统数据库的底层问题,不能用来处理非结构化数据,迫切希望能提出一种方法进行非结构化数据的处理。
-
Firstly, in this paper the importance and necessity for the land using data sharing have been expatiated amply. The land using data sharing, which refers to two main concepts, has been summarized. The two concepts are acquisition and processing of land using data as well as application of land using data. In WebGIS, there are two corresponding roles, namely, data yielder and data user or consumer.
本论文首先详细阐述了土地利用数据共享的重要性和必要性,并总结土地利用数据共享活动涉及了两个主要概念:土地利用数据的获取与处理、土地利用数据的应用,在WebGIS中即对应两个角色:数据提供者和数据使用者即用户。
-
The design includes many new technologies in data exchange and data security, they are: Converting non-XML data to XML in order to apply the XML security technology to more data types; Using the technology of XKMS and PKI to manage the public key in order to overcome the shortage of complexity and difficulty in using PKI and improve the efficiency of the public key management; Using Diffe-Hellman algorithm combining with the public key technology to exchange secret key in order to furthest increase the security of the key; Using the technology of XML digital signature algorithm to ensure the integrity, message authentication and signer authentication of the data; Using the technology of XML encryption to ensure confidentiality of the data; Defining delegable access rules on the structure and content of the XML documents to provide fine-grained access control. According to the XML security framework, a XML security library is designed and implemented.
在对XML及其安全技术主要包括XML加密技术、XML数字签名、公钥管理、密钥产生和交换进行研究的基础上,结合传统密码技术和XML安全技术提出了一种基于XML的数据安全模型,模型中包含了目前网络数据交换和安全领域的一系列最新技术,主要有:将非XML格式数据转换为XML格式数据的方法,以保证现有的大部分网络数据能够应用XML安全技术;使用XML公钥管理技术结合PKI技术管理公钥,以克服PKI技术实施和部署复杂、难度大等问题,提高公钥管理的效率;使用Diffie-Hellman算法结合公钥技术交换密钥,以最大限度保证密钥的安全;使用XML数字签名技术保证数据的完整性、不可否认性和发送方身份认证;使用XML加密技术保证数据的机密性;根据XML文档的内容和结构定义授权访问规则进行良好的访问控制。
-
Under the guidance of DPRIF integrating strategy, we set up an integreted SOFM-SVM model. Then we analyzed and optimized the model from the aspects of operating mechanism, data interface and function expandedness. The PCA method was introduced to reduce dimensionality and extract features, then to strengthen the clustering explanation; defined a CMI index, to ascertain the most effective or the best clustering number; A new Anti-NO algorithm was proposed to recognize and to filter the suspecious data in the sample; The medium result of SVM model was used to extract the borderline datas between two classified groups. This research compensated for the achievements of data recognition including pattern data, noises data and borderline data.
在DPRIF整合策略指导下构建了一个整合的SOFM-SVM模型,对该模型从运作机制、数据接口、功能扩展几个方面进行分析和改进:引入PCA方法进行数据降维和特征提取,用以加强聚类解释;结合统计聚类中的聚类误差概念定义一个聚类数有效性指标,利用SOFM算法中间结果进行指标求解,以筛选出有效或最佳聚类数;提出一种新的噪声识别算法用于对样本中的异常数据进行甄别和过滤;利用SVM模型的中间结果提取分类边界数据;进一步充实了包括模式类、噪声集和边界在内的模式识别成果。
-
Facing the rapid incensement of large data collection, enterprises should have potent data analysis tools to transform the "fluent data" into "valuable knowledge", otherwise, large data will become "fluent data without useful information", what we call "data grave".
面对快速增长的海量数据收集,企业必须要有有力的数据分析工具将&丰富的数据&转换成&有价值的知识&,否则大量的数据将成为&数据丰富,但信息贫乏&的&数据坟墓&。
-
Furthermore, it can not define indiscernibility relationship when default data is included in rough data. In this dissertation, a new rough set model, which can be used to process original data which include default data, fuzzy data, or incomplete data, is proposed based on clustering methods.
本文从实际应用中存在缺值、不完全和噪音数据等问题为出发点,结合人机交互技术中数据挖掘的应用,研究分析了数据挖掘中的一些理论与方法,取得了以下主要研究成果: 1。
-
So during the collection of fault sample data and checking data, the paper sets up the mathematics model of control system first. We cause all kinds of fault in the control system, then collects a variety of fault data. After unitarily dealing, the fault data server as the sample data of training neural network. At the same time, according to the collection of checking data, it examines whether the trained neural network have the function of fault diagnosis.
在故障样本数据及检验数据的采集过程中,首先建立了控制系统的数学模型,人为地让控制系统发生各种故障,从而采集到各种故障数据,经过归一化处理后,作为训练神经网络的样本数据;同时,也采集检验数据,用以检验训练出的神经网络是否能够起到故障诊断的作用。
-
Electric seal is a method to sign a document and it is a kind of electric signature, though a document has some difference compare to other kind of data like program, data of a database, according the speciality of a electric signature to a document, such as view what we signed , validate the signature in a document directly, how to archives a document which has been signed, how to read a document has been archived, it points out that a document is exactly some data with some format data, a document could be disparted as two parts, data and format data.
电子印章是应用层的数字签名,是电子签章的一种,由于文档签名与其他类型数据如程序,数据库数据等相比有其特殊性,本文针对文档签名的特殊性,如签名的可见与可证实性,文档的归档特性,文档阅读的方便性等进行了分析,指出文档实际上是一种格式化的数据,可以分为数据与格式两个部分,在此基础上提出了对文档进行签名的要求。
-
The modular design of printNet system is divided into several application part, such as data processing tools, design tools, products, Business card printing tools, and solutions to technical tools, of which the highest is a design tool over the actions that it printLayout from page formatting and setting variables, but also can be used by an operator in a transform tool programming, so that the contents of the variables in a database in output for operations, now produetion of mostly to one-dimensional bar codes and encrypted bit or anti-false, the party is a method in the bar code by addition, subtraction, multiplication, Division, opinins Mo, and so after the results or the results of data, or the result is converted to the data that corresponds to a location in one of the ntehs detection accuracy is valid, just make a bit of the inverse operation, the operation that results in comparison with the original data, such as the same as the data is valid, such as different then the data is not valid, this scenario is the most simple and most primitive anti-counterfeit. PrintNet software to complex product environment " interpuntion and output the integration of integrated management " solution possible.
printNet系统的模块式设计分为几个应用部分,如数据处理工具、设计工具、产品制卡工具以及方案解决工具,其中技术含量最高的是对设计工具printLayout的操作,它除了设计页面格式和设置变量外,还可由操作员在转换工具中编程,以便对数据库中的变量内容在输出时进行运算操作,现在生产中应用的大多是给一维条码加校验位或是防伪加密,其方一法是将条码中的数据经过加、减、乘、除、取莫等运算后,将结果或将结果中的几位至于数据后,或将结果转换成对应符号放在数据中的某个位置,如须检测某一数据是否准确有效,只要把校验位上的数进行逆运算,把运算结果与原数据比较,如相同则数据有效,如不同则数据无效,这种方案是最简单最原始的防伪加密的方法。printNet软件系统使得在复杂产品环境下的&排版与输出一体管理&的集成解决方案成为可能。
- 相关中文对照歌词
- Some Type A Way
- I'm That Type Of Guy
- Type Of Shit I Be On
- Wifey Type
- Type Of Way
- Casanova Brown
- That Type Of Girl
- Type A Girl
- Type Of Way (Remix)
- Data De Groove
- 推荐网络例句
-
"Yes, now you can give yourself airs," she said, you have got what you wanted.
"对了,您现在高兴了,"她说道,这是您所期待的。
-
Then the LORD said to me: Rebel Israel is inwardly more just than traitorous Judah.
上主于是对我说:"失节的以色列比失信的犹大,更显得正义。
-
I do my best to guide my congregation,ok?
我尽了全力引导会众明白吗?