Consider the following methodology for testing the model.
考虑以下用于测试该模型的方法。
Perform a methodology-based full software life cycle development for these applications, including requirements analysis, design, and development and testing.
对这些应用程序执行基于方法的完整软件生命周期开发,包括需求分析、设计以及开发和测试。
You don't need to commit yourself to methodology such as agile programming, extreme programming, or test-first design to see the advantages of planning for testing when you are writing your code.
在编写代码时,不需要在测试期间为了查看预期的优势而去掌握诸如敏捷编程、极限编程或测试优先设计等方法。
This example USES the superb Specs library, which effectively provides a DSL for the behavior-driven development testing and engineering methodology.
这个例子使用了华丽的specs库,它提供了一套高效的dsl来用于行为驱动开发测试和工程方法学。
This paper introduced the system design methodology used for automobile water pump seal performance testing, and realized of automation, intelligent for testing it.
介绍了汽车发动机冷却水泵密封性能试验台系统设计方法,实现汽车冷却水泵密封性能测试系统的自动化、智能化。
Soils: investigation and testing - Soil treated with hydraulic binder, possibly combined with lime, for use as a selected fill - Part 2: methodology of laboratory formulation studies.
土壤:调查和试验。经水凝粘合剂处理的、可能混有石灰的、用作所选填土的土壤。第2部分:实验室配方研究的方法。
Further testing is needed to establish the accuracy of this methodology as a diagnostic test for breast cancer, they conclude.
他们认为,需要进行更深入的研究去建立这种方法学(即使用该方法作为乳腺癌的诊断试验)的精确性。
Information technology. open systems interconnection. conformance testing methodology and framework. part 5: requirements on test laboratories and clients for the conformance assessment process.
信息技术。开放系统互连。合格试验方法学和框架。第5部分:合格评定过程用试验室和试验委托人的要求。
In detail, the inventive methodology is based on the use of scan chains being implemented in the integrated circuit for production testing purposes.
具体地,本发明的方法基于实现在集成电路中用于产品测试目的的扫描链的使用。
The very important thing to intrusion detection based on data mining are methodology for building and using dataset, i. e. training dataset and testing dataset.
基于数据挖掘的入侵检测系统面临的很重要的问题就是如何生成和使用数据集,即如何生成和使用训练数据集和测试数据集。
The very important thing to intrusion detection based on data mining are methodology for building and using dataset, i. e. training dataset and testing dataset.
基于数据挖掘的入侵检测系统面临的很重要的问题就是如何生成和使用数据集,即如何生成和使用训练数据集和测试数据集。
应用推荐