数据输入
- 与 数据输入 相关的网络例句 [注:此内容来源于网络,仅供参考]
-
An augmented matrix is therefore given, of which the number of dimensions is determined by adding the observed data for l time past together, and the forecast data after augmentation are taken as the input variables in BP neural network. Then, a forecasting model is developed on the basis of DPCA-BP neural network, with its architecture described.
通过计算前l时刻数据确定增广矩阵的维数,并把得到增广后的预测数据作为BP神经网络的输入变量,建立了基于DPCA-BP神经网络的预测模型,给出了模型结构。
-
The program differentiated between data for the spreadsheet and a command for the menu by detecting the presence of a backslash character.
程序通过检查是否有斜线符号来区分电子表格数据和菜单命令,如果用户输入一个斜线符号,其后的击键将看做菜单命令,而不是数据。
-
Data Carrier Detect. An RS232 input line that is generally held high by a modem while a data connection is active.
数据载体检测:在某个数据连接激活状态下,一个RS232输入行往往被modem严格控制。
-
Configuration data is synchronized at the DCLK input, one clock cycle to send 1 bit of data.
配置数据被同步在DCLK输入上,1个时钟周期传送1位数据。
-
of this kind of platform can reduce the working load of processor, quicken data to flow at the same time. I/O quickens a technology to optimize pair of network stack processing above all, undertake trends distinguishs, allocate the cycle of CPU in the light of application, raise chip set and network controller to put an input to output data upcountry with accelerating executive speed; to pass answer ability, the job that reduced processor is laden.
这种平台方法可以减少处理器的工作负载,同时加速数据流。I/O加速技术首先优化对网络堆栈处理,进行动态区分,针对应用分配CPU的周期,以加快执行速度;通过提高芯片组和网络控制器向内存输入输出数据的响应能力,减少了处理器的工作负载。
-
The system includes the file management system, the data acquisition system and the data analysis and processing system.
该系统实现了数据的输入输出,检测参数的采集,数据的分析和处理等功能。
-
The black box test is by user's angle, embarks from the data-in and output data's corresponding relationships carries on the test.
黑盒测试是以用户的角度,从输入数据与输出数据的对应关系出发进行测试的。
-
PSD-PRE tool is developed according to this algorithm. Data-in of this software is flexible, using power flow and stability forms such as BPA and etc. Output of this software is facilitated. Applying this software can quantitatively evaluate the reliability of large-scale power system, and give abundant probability indices.
采用该算法编制了PSD-PRE软件,软件输入数据灵活,可以采用常用的BPA等软件格式的潮流和稳定数据,软件输出结果方便,应用该软件可以对大规模发输电合成系统进行可靠性定量评估,并给出丰富的概率指标。
-
In this chapter proposed the repetition iteration algorithm through the training sequence and its the corresponding array data-in repetition useenlarges the TD-SCDMA channel in the iteration step, may approach theoptimum result under the short data length, take the LMS algorithm asthe example simulation result indicated this method is feasible, mayeffectively improve the TD-SCDMA system smart antenna the performance.
本章中提出的重复迭代算法通过把TD-SCDMA信道中训练序列及其对应阵列输入数据重复使用加大迭代步数,可以在短的数据长度下逼近最佳结果,以LMS算法为例的仿真结果表明该方法是可行的,可以有效改善TD-SCDMA系统智能天线的性能。
-
According to using easy company network safe expert introduces: According to the frangibility of Web application process that OWASP organization released 2007 the statistical result of 10 big ranks makes clear, the flaw of the script that cross a station, infuse, request that cross a station is forged, information divulges the problem that waits for a respect to remain the hacker's at present popular attack way, and be atttacked with SQL infuse especially among them and cross station script attack to attach most importance to, the lawful sex that infuse of so called SQL is atttacked even if uses programmer to do not have pair of user data-in when writing code undertakes judging, bring about the person that inbreak to be able to command through insert and carrying out baleful SQL, obtain data to read the attributive; that take and revises and attack of the script that cross a station is join baleful code through be in the webpage, when the person that visit browses a webpage, the administrator of means prevail on that baleful code can be carried out or ceases through giving an administrator post a letter is browsed, win administrator limits of authority thereby, control whole website.
据动易公司网络安全专家介绍:根据2007年 OWASP 组织发布的 Web 应用程序脆弱性10大排名的统计结果表明,跨站脚本、注入漏洞、跨站请求伪造、信息泄露等方面的问题仍然是现在黑客流行的攻击方式,而其中尤以SQL注入攻击和跨站脚本攻击为重,所谓的SQL注入攻击就是利用程序员在编写代码时没有对用户输入数据的合法性进行判定,导致入侵者可以通过插入并执行恶意SQL命令,获得数据读取和修改的权限;而跨站脚本攻击则是通过在网页中加入恶意代码,当访问者浏览网页时,恶意代码会被执行或者通过给治理员发信息的方式诱使治理员浏览,从而获得治理员权限,控制整个网站。
- 推荐网络例句
-
This brought fixed cost, but it also is meant at the same time use a source to won't make you singlehanded assume a problem.
这带来了一定的成本,但它同时也意味着使用开源不会让你独力承担问题。
-
He gained a small fortune in real estate.
他在房地产上发了一笔小财。
-
Well I do not accept second-place for the United States of America.
我不接受美国坐在世界第二的位置上。