The research methods of social science generate two kinds of data.
社会科学的研究方法生成两类数据。
The architecture and methods shown here can be applied to any data of your choice.
这里展示的架构和方法能够应用于您所选择的任何数据。
Because you'll be modeling data rather than behavior, you can ignore the methods.
因为我们要建模的是数据而不是行为,可以忽略方法部分。
You can then access the data using standard PHP object access and methods.
然后,您就可以使用标准的PHP对象访问和方法访问数据。
The data source statement cache size can be tuned using a few different methods.
可以使用一些不同的方法来调优数据库语句缓存大小。
Process data using access methods provided in the response object.
使用请求对象中所提供的访问方法处理数据。
Then use the methods shown to access and iterate over all the target data.
然后使用所展示的方法来访问并迭代所有目标数据。
The methods in Listing 4 form the core of the data access tier.
清单4中的方法构成了数据访问层的核心。
The variables @contacts or @contact are given data in their appropriate methods.
变量 @contacts或者 @contact是它们的适当方法中所给出的数据。
The BusinessLogicBase class has methods to store and receive data from the Distributed Map.
businesslogicbase类具有在分布式映射缓存存储和接收数据的方法。
There are two methods of running the data collectors within IBM Support Assistant
在IBMSupportAssistant中,有两种方法运行数据收集器
The data model (which holds information and provides methods for display)
数据模型(保存信息并提供显示方法)
They provide the user with methods that set and/or get member data.
这些类将为用户提供设置和(或)获取成员数据的方法。
They provide the user with methods that set member data.
这些类将为用户提供设置成员数据的方法。
They provide the user with methods that get member data.
这些类将为用户提供获取成员数据的方法。
These methods determine how the data is sent to the server.
这两个方法决定了将数据发送给服务器的方式。
To establish a connection to a data source, use one of the following methods.
要建立到一个数据源的连接,可以使用下面的某一种方法。
EasyMock has similar methods for the primitive data types.
EasyMock为基本数据类型提供相似的方法。
The store and notify methods help store the data within the vmap object.
store和notify方法帮助存储vmap对象中的数据。
Methods The fixed effect model was used for data analysis.
方法采用固定效应模型进行数据分析。
The third part is research methods and data analysis.
第三部分是研究方法和数据分析。
The encryption of sensitive data is one of the most important methods in data security.
对敏感数据进行加密是数据安全防护中最核心的手段之一。
The unique character of data streams brings a big challenge to traditional data processing methods.
数据流独特的特点,对传统数据的处理方法带来了很大的挑战。
Are the methods suited to the data?
方法是否适合于数据?
The experimental results with UCI data set show that two methods are effective and efficient.
通过UCI机器学习实验数据测试,表明两者均取得了预期的效果。
Methods To analyse the experience in practice and data in clinic.
方法:对实践经验和临床资料进行分析。
The majority of the data access methods are available through the abstract Database class.
大多数的数据访问方法是有效的,在抽象的数据库类中。
Methods Analysis of the clinical data.
方法分析临床资料,复习有关文献。
Methods Combination method of the water quality data and the clue investigation.
方法采用水质资料及线索调查相结合的方法。
Methods Combination method of the water quality data and the clue investigation.
方法采用水质资料及线索调查相结合的方法。
应用推荐