查询词典 mining
- 与 mining 相关的网络例句 [注:此内容来源于网络,仅供参考]
-
It is understood that in a large number of text mining technology with the manufacturers, Beijing TRS Information Technology Co., Ltd is the first to have real practical use text mining products enterprises.
据了解,在数量众多的拥有文本挖掘技术的厂商中,北京拓尔思信息技术股份有限公司是国内第一家拥有真正实用化文本挖掘产品的企业。
-
To bigger and stronger, so long enterprises, companies rely on the China University of Mining and Technology and personnel, co-developed with the advanced international level, fill the gaps in the series LZJ slurry pump and XS series of two-cycle suction pump, the product line Widespread use of mining, coal, petroleum, chemical, metallurgical, power, infrastructure construction, dredging and other businesses.
为了做大做强、做久企业,公司依托中国矿业大学的技术和人才优势,共同开发出了具有国际先进水平、填补国内空白的LZJ系列渣浆泵和XS系列双吸循环泵,该系列产品广泛使用采矿、煤炭、石油、化工、冶金、电力、基础建设、清淤等各行各业。
-
The company produces and supplies a full range of tyres including Mining Bias OTR Tyre, Construction Bias OTR Tyre, Radial Mining OTR Tire, Radial construction OTR tires, industrial tyre, heavy duty truck tyre, agricultural tyre and solid tyre, more than 100 specifications.
该公司生产和供应全系列的轮胎,其中包括采矿偏见工程机械轮胎,建筑偏见工程机械轮胎,径向采矿工程机械轮胎,径向建设工程机械轮胎,工业轮胎,重型卡车轮胎,农业轮胎和实心轮胎, 100多个规格。
-
Analysis is made on the influences of the main constructions in the mine on the roof wall rock and the water containing layer, the ubiety between the roof and the interlayer or relative interlayer, the influence of the water containing layer and exploration drilling on jamb mining. The safety mining depth as well as the height of collapsed belt and the cranny guiding water are calculated. Furthermore, the ANSYS software is adopted to simulate the stability of the cover terrane and the maximum permit exposure area.
分析了矿区内主要构造对顶板围岩及含水层影响、顶板与隔水层和相对隔水层位置关系、含水层及勘探钻孔对矿柱回收的影响;计算了冒落带和导水裂隙高度及安全开采深度;用ANSYS有限元软件模拟了空区上覆岩层稳定性及最大允许暴露面积。
-
The inappropriate data mining methods based on these uncertain data will result in poor, even unaccepted quality of mining models.
如果不充分考虑这些数据的不确定性,不采用合适的数据挖掘方法,那么必然会导致挖掘模型性能下降,甚至是不可接受的。
-
Among them, the assets placed in Mountain Coal Group 7 furniture have an independent legal personality of the coal trade companies 100% equity; inject assets of Mountain Coal Group held three coal mining companies and coal trade 18 shares, and its headquarters and domestic coal business-related assets and liabilities, the underlying asset Hill Coal Group include coal mining and coal trading business segment of the integrity of the two major operating assets.
其中,在山煤业集团7家具放置的资产有煤炭贸易公司的独立法人资格的100%股权,注入山区煤炭集团资产举行了三次煤矿企业和煤炭贸易18日的股票,其总部和国内的煤炭企业相关的资产和负债,基础资产山煤业集团包括煤炭开采和煤炭交易的两个主要经营资产的完整的业务部门。
-
Among them, into the assets of the Group of Kyrgyzstan in order to transfer all the shares held by the company in the process of transfer from the Shan Coal Group to its name and to the trust after Hill Coal Group 7 of the furniture there is an independent legal personality of the coal trading company 100% equity; Hill for the injection of assets held by Coal Group 3 coal mining companies and 18 coal trading company with headquarters and its stake in the domestic coal business-related assets and liabilities of the underlying asset Hill Coal Group include coal mining and coal trading business two The integrity of the operating assets of the plate.
其中,进入吉尔吉斯斯坦集团的资产,以便将所有的该公司举行的移交给山煤业集团股票的过程和它的名字后山煤矿集团的7家具有一个信任独立法人资格的煤炭贸易公司100%股权,对因煤矿采煤集团三公司和总部和在国内煤炭企业的股份公司18日煤炭贸易有关的资产及相关资产负债的资产注入山山煤炭集团包括煤炭开采和煤炭贸易业务的两个板块的经营资产的完整性。
-
At last, the paper discusses the function of user interface and gives the method of selecting constraints according to information plus, the operating flow of association rule mining system based on meta-knowledge, and the idea of inducting meta-knowledge in theevaluating phase in order to unit evaluating rule to whole procession, thus can do better in enhancing mining efficiency and veracity.
最后,提出了利用信息增益选择约束的方法,给出了基于元知识的关联规则挖掘系统的操作流程,探讨了可视化的功能实现问题,提出了在结果评价阶段将评价规则作为元知识统一到挖掘过程中的思想,以利于提高全系统的挖掘效率和准确性。
-
Traditional data mining techologies used in data mining need to build intrusion detection model in labled data set. The process to lable data set is all by hands, and if the lables have some errors, the efficiency of the intrusion detection system will be affected. Unsupervised anomaly detection methods can detect the anomaly records in unlabled dataset.
传统的面向入侵检测的数据挖掘技术需要在大量的已标记数据集上建立入侵检测模型,数据集的标记过程需要以手工的方式进行,并且如果标记错误,将导致入侵检测系统检测效率的降低。
-
The effective approach to resolve mine disasters is that of mining rights should be owned by vendue and the implement of mining rights should be safeguard by cruel torture and severe law.
矿业权在市场上公开拍卖和用严刑峻法保障矿业权的实施才是从根本上解决矿难问题的途径。
- 相关中文对照歌词
- New York Mining Disaster 1941
- New York Mining Disaster 1941
- Mining For Gold
- Mining For Coal
- Red Hill Mining Town
- New York Mining Disaster 1996
- 推荐网络例句
-
This one mode pays close attention to network credence foundation of the businessman very much.
这一模式非常关注商人的网络信用基础。
-
Cell morphology of bacterial ghost of Pasteurella multocida was observed by scanning electron microscopy and inactivation ratio was estimated by CFU analysi.
扫描电镜观察多杀性巴氏杆菌细菌幽灵和菌落形成单位评价遗传灭活率。
-
There is no differences of cell proliferation vitality between labeled and unlabeled NSCs.
双标记神经干细胞的增殖、分化活力与未标记神经干细胞相比无改变。