快好知 kuaihz


descriptor造句
31. Gross shape features as well as corresponding edge-set of individual object are stored in an object record that acts as an object level descriptor. 32. When you install LILO using the /sbin/lilo command, it automatically generates this file, which holds the descriptor table (among other things). 33. Shares the memory descriptor and all Page Tables ( see Chapter 9 ). 34. In the deployment descriptor file web.xml, shown in Listing 10, you map the URIs with relative root path /* to the Wink servlet org.apache.wink.server.internal.servlet.RestServlet. 35. A reference was made to a segment not present in memory (one in which the Segment-Present flag of the Segment Descriptor was cleared). 36. Hand area is segmented based on skin color model, then the hand contour is described by use of Fourier descriptor. 37. In place of interrupt vectors, protected mode used a set of 256 interrupt descriptors that are stored in an interrupt descriptor table (IDT). 38. J2EE application components can use this deployment descriptor element to indicate whether a connection to a resource manager is shareable or unshareable. 39. The MDB only handles messages that have the JMSType header field set to package_received (this is defined in the MDB's deployment descriptor). 40. For the sake of using the research of normal systems easily, descriptor systems are changed into normal systems by using Jordan decomposition of matrixes and their observability is hold on. 41. In the shape analysis of stress surface contour of 3D footprint, the consistency of datum plane cannot be strictly controlled, so a descriptor insensitive to perspective transform is needed. 42. The destination name in the deployment descriptor serves as an overriding mechanism. 43. This paper discusses robustness analysis for a class of nonlinear descriptor systems. 43.try its best to collect and create good sentences. 44. A file descriptor would be signalled when new data were inserted to awaken the X server, and the X server could also directly examine the queue indices which were stored in the shared segment. 45. With dnotify, the file descriptor pins the directory, preventing the backing device to be unmounted, a particular problem with removable media. 46. In this paper, a method for objects shape description based on chain code and Fourier descriptor is proposed and its properties are explained and verified by experiments. 47. Notice that the only symbol definition that is exported globally is the official procedure descriptor. 48. For example, there is one layer of default preferences defined by the portlet deployment descriptor. 49. A word, symbol, or number used as a descriptor for retrieval of information from a collection, especially in a coordinate indexing system. 50. All the securable resources have a better than null security descriptor. 51. A field descriptor specifies the exact type of a field defined within a class. 52. The length of descriptor is changed to reflect the extra data. 53. A new method for CBIR based on shape Fourier descriptor is presented. 54. The circular region F-norms in low frequency band of wavelet transform is used as color feature of the image and the energy ratio of high frequency band is used to form texture descriptor. 55. If you specify NULL value, the event object is created with default security descriptor. 56. This paper presented spatial relation descriptor based on metric matrix's eigenvalue which was invariant under translation, scaling and rotation. 57. The eagle-eyed reader may have spotted that we supplied an image descriptor directly to the action. 58. A non-data descriptor is, in a sense, often a fancy name for a method -- but the particular method returned by descriptor access could be determined at runtime. 59. A security descriptor is not in the right format ( absolute or self - relative ). 60. Security descriptor should be in the self - relative mode.