| 1. | Returned when an error occurs during a fill operation 在填充操作过程中出现错误时返回。 |
| 2. | On the ado object when the fill operation is complete 方法的这一重载会在填充操作完成时在ado对象上隐式调用 |
| 3. | On the ado object when the fill operation is complete . therefore , always call 方法的这一重载不会在填充操作完成时在ado对象上隐式调用 |
| 4. | Gets or sets a value indicating whether to continue the fill operation despite the error 获取或设置一个值,指示是否继续执行填充操作而不考虑该错误。 |
| 5. | Event allows a user to determine whether or not the fill operation should continue after the error occurs 事件允许用户确定出现错误后是否应继续执行填充操作。可能发生 |
| 6. | You should view the crawl log at the end of any significant full - text index population operation , or when you find that a population did not complete 在任何重要的全文索引填充操作结束时,或在发现填充未完成时,应当查看爬网日志。 |
| 7. | Then you populate operations in the wsdl file by importing cics cobol or c programs that contain the structure for input and output at the cics server 然后您通过在cics服务器上导入包含输入或输出结构的cics cobol或c程序,在wsdl文件中填充操作。 |
| 8. | In view of the imperfection of the segmentation results of wood surface defect images , the methods of image post - processing based on mathematical morphology were proposed , including the use of mathematical morphology filling operation , morphology filter as well as morphology gradient edge detection and so on 针对木材表面缺陷图像分割效果不完善的问题,提出基于数学形态学的图像后处理方法,包括应用数学形态学的填充操作、形态滤波以及形态梯度边缘检测等。 |
| 9. | The additional operation to pad 0 or 1 to the beginning of the message blocks makes the length extension attack not to be work . the method to construct the encryption block based on aes makes the algorithm stay safe under the differential cryptanalysis . the secure domain extension method makes it resist on the multi - collision attack 算法附加的填充操作使它能抵抗长度扩展攻击、所采用的基于aes的加密模块使它能抵抗差分分析、采用的安全的域扩展使它能抵抗多冲突攻击、采用的安全pgv方案使它能有效抵抗固定点攻击;总体上,它能达到 |