因此,基于受限自然语言的GIS命令解析,旨在从输入的语句中抽取与GIS操作有关的信息。
Therefore, GIS command analysis based on constrained natural language aims to extract the information related to GIS operations from input sentences.
通过分析各种入侵检测技术,我们在入侵检测引擎的实现过程中采用了协议分析和命令解析以及分析统计的方法。
By comparing all kinds of intrusion detection technology, we choose statistic analysis, protocol analysis and command parsing as the detection methods in the detection engine.
这种实现方法,集中了对参数的控制,减少了耦合,有利于各参数的复用,易于逻辑关系扩展,提高了命令解析效率。
Such implementation centralizes the logical control and decreases the coupling, whereby each parameter can be reused and the system is more extensive and effective.
CDATA是XML命令,它告诉查看程序停止解析代码,并读取接下来的块中的代码,这里的代码是字符数据的形式。
CDATA is the XML command that tells the viewer to stop parsing the code and read the code within the block that follows as character data.
还可以使用类似的命令删除任何别名,并且节点将恢复为将主机名称解析为IP地址。
Any alias can also be removed using similar commands, and the node will revert to resolving the host name as an IP address.
然而,解析和执行这些命令可能会非常棘手。
Parsing and executing those commands can be tricky, however.
在解析文法想要方便地接受一个命令的多个版本时,国际化会很方便。
Internationalization is easy when the parsing grammar is intended to easily accept multiple versions of a command.
后一个命令执行更复杂的依赖项解析检查,这会导致一些过时的软件包被删除。
The latter command performs more sophisticated dependency resolution checks, which can result in some outdated packages being removed.
要更改的第一个项将是命令行参数解析。
The first item that you will change will be the command line argument parsing.
当在应用程序或本文讨论的任何诊断命令中使用主机名时,主机名必须能够解析为IP地址。
When using a host name in an application or any of the diagnostic commands covered in this article, it's imperative that the host name can be resolved to an IP address.
有些开发人员喜欢链接或符号链接的方案,这样,他们可以在命令提示符下输入gcc ,并将它解析成完整路径,例如 /tmp/experiment/bin/mingw32-gcc 。
Some developers favor schemes of linking or symbolic linking, so that they can type gcc at the command prompt, and have that resolve to, for example, /tmp/experiment/bin/mingw32-gcc.
清单3展示了如何使用这个python库中的optparse来进行其他三个参数的命令行解析。
Listing 3 shows how you used optparse from the python library for command line parsing of the other three parameters.
下面的代码定义了Getopt::Long 的变量参数,调用该段代码以解析来自命令行的参数。
The code below defines variable parameters for Getopt::Long, which is invoked to parse the parameters from the command line.
然而,如果使用清单4描述的节省内存的迭代策略,该命令将不会返回任何内容,因为解析完整个文档时将删除前面的节点。
However, when using the memory-efficient iteration strategy described in Listing 4, this command returns nothing because preceding nodes are cleared as parsing proceeds through the document.
如果您不使用DNS进行Windows名称解析,那么可以使用nmblookup命令执行一个NetBIOS名称查询。
If you are not using DNS for Windows name resolution, you can use the nmblookup command to perform a NetBIOS name lookup.
使用复制命令将它解析为新的逻辑卷pluto_lv。
With the copy command, parse it to the new logical volume, pluto_lv.
除了所有解析之外,此脚本只运行ipmitool命令并获取温度。
Aside from all the parsing, this script just runs the ipmitool command and grabs temperatures.
位于右下侧的窗口REPL是Lisp的命令行Lisp解析程序,您可以在这里运行Lisp命令。
The bottom-right window, REPL, is the command-line Lisp interpreter, where you can run Lisp commands.
您,或者是本例中称为Igor的私仆,能轻松使用Scanner解析这组违法命令,如清单8所示。
You, or in this case a personal servant called Igor, could easily parse this series of nefarious commands using Scanner, shown in Listing 8.
由于tmc2字段的长度固定,unpack命令用于将消息结构解析为一个数组。
Since the TMC2 fields are all of fixed length, the unpack command is used to parse the structure into an array.
请注意两个重要差别:第一个是在SQL命令中使用了xmlparse函数,用于执行XML存储数据的显式解析。
Note two important differences: The first is the use of the xmlparse function in the SQL command, which is used to perform explicit parsing of data for XML storage.
您可以在一条命令中使用 parse_ini_file解析整个 PHP 样式的.ini文件。
You can parse entire PHP-style .ini files in a single command using parse_ini_file.
这些代码通常与清单4类似,其中展示了一个简单的XML解析,使用命令行参数作为要解析的 XML文档的文件名。
This usually resembles Listing 4 in code, which shows a simple XML parse, using a command-line argument as the filename of the XML document to parse.
请注意将命令行参数直接传递给解析引擎的方式。
Note how the command-line arguments are passed directly to the parsing engine.
我在本文对命令行参数进行了手工解析,因为在这个例子中它相对简单,同时也是为了演示技术。
I've used manual parsing of command-line arguments in this article, since it was relatively simple, in this case, and to demonstrate the technique.
我们将在本文中使用的命令行解析有一点复杂。
The command-line parsing we will use in this article becomes a little complex.
请注意,很容易理解和修改这个扩展,而且该扩展可以与前面的非解析示例一样出色地完成工作(请参阅带命令行开关的事件循环)。
Note that the extension is easy to understand and modify, and that it can do the job just as well as the previous, non-parsing example (see the Event loop with command-line switches).
对于我们从内存转储到名为dmp的文件中的跟踪,通过使用db 2 trc命令上的一个或两个解析选项,我们可以对其进行解析,或将其格式化为可读的文本。
The trace that we have just dumped from memory to a file named DMP can be parsed or formated into readable text using one or both of the parsing options on the db2trc command.
例如,在运行命令ls- l时,如果某个文件inode给出文件的所有者是“user 501”,那么命名服务就需要将“uid 501”解析成用户名,并在ls命令输出结果中输出。
For example, while running the command ls -l, if a file inode gives the ownership as "user 501," then the naming service needs to resolve "uid 501" to the user name printed in the ls command output.
这个sendmail命令的响应是一个消息,它指出哪些ID可以解析为mailer命令。
The sendmail command will respond with a message advising which IDs can be resolved to a mailer command.
应用推荐