• The single radial rule described in the paper is composed of the airphoto radial rule, the map radial rule, the base rule and the connecting rod.

    本文介绍的“辐射尺”,辐射地图辐射尺、联动杆组成。

    youdao

  • Because the base rule of IVI is used in the component, it can realize the interchange of instrument according to change the configure file by configure tool.

    开发驱动程序组件应用IVI技术基本原理,仪器更换后只需利用配置工具更改配置文件即可,实现了仪器互换

    youdao

  • These images can be instantiated as base middleware for running business processes such as process servers, event servers, or rule servers.

    这些镜像可以作为运行时业务流程基础中间件进行实例化例如进程服务器事件服务器、或者规则服务器。

    youdao

  • The code becomes generic, as multiple rule sets can be applied using a single code base.

    代码会变得更加通用因为个代码库就可以应用多个规则

    youdao

  • You have to design your rule base to be extensible and reusable at the same time.

    设计规则必须同时具有扩展性可重用性

    youdao

  • An example of such a session bean might be one that provides an interface to a rules engine that caches its rule base (which may be hundreds of megabytes of data) in the heap.

    这种会话bean例子在堆中缓存规则基础(可能几百数据)的规则引擎提供接口的会话bean。

    youdao

  • If there is a deny or specify rule in place for a user that denies access, even if the base permission gives access by user or group, the user is denied.

    如果对于一个用户拒绝访问的denyspecify规则,那么即使基本权限通过用户或他授予了访问权,用户也会拒绝。

    youdao

  • In XML Schema 1.1, the 25-case rule is removed, and replaced with a simple concept to reflect the "what is allowed by the restriction is also allowed by the base" goal.

    XMLSchema 1.1取消25 -case规则替换简单概念,这个概念反映了“限制类型允许元素也是基础类型允许的元素”一目标

    youdao

  • In this scenario, developers run analysis rules to find and fix problems in their component code and the development manager runs a standard rule set on the application code base using Build Forge.

    这个场景下,通过使用BuildForge开发人员在他们的代码或组件运行分析规则找到发现问题,而开发经理可以在基于代码应用程序系统上运行标准规则集。

    youdao

  • The fact loopingMem (set by the first rule) is used to search through the knowledge base for these jobs.

    事实loopingMem规则设定的)整个知识库搜索这些任务

    youdao

  • The first rule specifies that user xray will override the base permissions for read and write access, as long as he is a member of the group chatt.

    第一规则指定只要用户xraychatt成员,就允许,这会覆盖基本权限

    youdao

  • The rule allow some obviously invalid derivations (that is, restriction allows more than base).

    规则允许一些明显无效派生元素(也就是说限制类型允许基础类型更多的元素)。

    youdao

  • The RDR methodology allows incremental changes to the knowledge base (RuleSet) without causing unwanted side effects to the existing knowledge base or existing rule set.

    RDR方法允许知识库(RuleSet)进行增量更改不会导致现有知识库现有规则不想要的副作用

    youdao

  • The rule base including 49 fuzzy rules is also established.

    建立了包括49 个模糊规则规则

    youdao

  • At last predicate logic is combined with production KR, as which a method to describe the reasoning rule in the knowledge base.

    最后采用谓词逻辑和产生式表示法相结合方法作为知识库中的推理规则描述方法。

    youdao

  • At last predicate logic is combined with production KR, as which a method to describe the warning rule in the knowledge base.

    最后谓词逻辑和产生式表示法相结合作为知识库预警规则描述方法

    youdao

  • The design principles of the control rule base under common conditions for non-minimum phase systems is proposed.

    并针对非最小相位系统,提出了一般情况控制规则设计原则

    youdao

  • Thus his revenue was greatly increased and it provided a strong material base for him to estadlish feabal seperationist rule and to surge "armed rebellion of seven countries".

    大大地增加了财政收入建立封建割据,掀起“国之乱”提供了雄厚物质基础

    youdao

  • Variable rule, constraint rule and effective rule were discussed, and construction approaches for configuration knowledge base are proposed.

    给出变量配置规则、配置约束规则有效性规则等。讨论了配置知识库构建方法

    youdao

  • In order to get better result when rule base is sparse, we propose a similarity interpolative reasoning method which can keep the convexity and normality of the reasoning result better.

    为了稀疏规则条件下能有好的插值推理结果提出一种相似插位推理方法

    youdao

  • Where a Specialised Section of the Code requires a rule or definition similar to one already included in this annex, it should base the wording of its rule on that given here wherever possible.

    运动规则之专门章节规定,规则定义,如果与包括附件之一类似者,尽可能基于这里给予规则措辞

    youdao

  • This hierarchical learning algorithm can reduce the redundant rules and simplify the fuzzy rule base.

    这种二层优化方法较好地减少模糊规则冗余度化简模糊规则基。

    youdao

  • The knowledge within this system knowledge base is divided into the case knowledge and reasoning rule knowledge.

    系统知识库中的知识分为事例知识推理规则知识。

    youdao

  • Here we describe knowledge representation model oriented entity, database conversion, instantiation of the knowledge base, rule editor and data check-up algorithm.

    在这里我们描述了面向实体知识表示模型数据库知识库转换、知识库的实例化、规则编辑器以及数据校验算法

    youdao

  • In this paper, we propose a fuzzy reinforcement algorithm, which map continuous state Spaces to continuous action Spaces by fuzzy inference system and then learn a rule base.

    论文提出模糊强化学习算法通过模糊推理系统连续状态空间映射连续的动作空间,然后通过学习得到一个完整的规则库。

    youdao

  • Through studying the expert knowledge of mining scheduling, this paper constructed a mining rule base for mining scheduling, and designed a ratiocinate program based on production rules.

    本文通过研究采掘领域专家知识构造了采掘计划规则设计了基于产生规则推理程序

    youdao

  • A fuzzy Q learning algorithm is proposed in this dissertation, which map continuous state Spaces to continuous action Spaces by fuzzy inference system and then learn a rule base.

    首先,提出模糊Q学习算法通过模糊推理系统连续状态空间映射连续的动作空间,然后通过学习得到一个完整的规则库。

    youdao

  • The method adopts object-oriented technology for electric devices and knowledge expression based on produced rules to build topology configuration knowledge base and operation rule knowledge base.

    采用面向对象的电气设备表示方法基于产生式规则知识表达方法,建立电网拓扑结构知识库操作规则知识库。

    youdao

  • We design a CVE-based Intrusion Detection Expert System rule base, it combine the network-based IDS and host-based IDS into a system, and provide detection, report and response together.

    本文提出种基于CVE标准建立的入侵检测专家系统规则,该入侵检测专家系统是基于网络主机的混合结合体,提供集成化的检测、报告响应功能。

    youdao

  • We design a CVE-based Intrusion Detection Expert System rule base, it combine the network-based IDS and host-based IDS into a system, and provide detection, report and response together.

    本文提出种基于CVE标准建立的入侵检测专家系统规则,该入侵检测专家系统是基于网络主机的混合结合体,提供集成化的检测、报告响应功能。

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定