恢復信息組 的英文怎麼說

中文拼音 [huīxìn]
恢復信息組 英文
ris recovery information set
  • : Ⅰ形容詞1 (重復) repeated; double; duplicate 2 (繁復) complex; compound Ⅱ動詞1 (轉過去或轉過...
  • : Ⅰ名詞1 (呼吸時進出的氣) breath 2 (消息) news 3 (利錢; 利息) interest 4 [書面語] (子女) on...
  • : Ⅰ名詞1 (由不多的人員組成的單位) group 2 (姓氏) a surname Ⅱ動詞(組織) organize; form Ⅲ量詞(...
  1. Secondly, there are so many same objects managed in the storage manage system and a greate deal of memory is occupied, and in order to access the resources between processes entry management library is presented. thirdly, this paper also researches the ag ( atomic group ) function, then implements an method to deal with the disater recovery in san and ag make users easier to operate than a volume

    另外,針對存儲管理系統中要保存諸多同類、佔用內存大的問題,同時考慮到能夠實現進程間的數據訪問,提出,設計並實現了entry管理庫,從而大大降低了內存的使用量。另外,本文還設計和實現了ag ( atomicgroup )功能,提供了一種解決災難的方案,同時相對于單個volume的操作,以為單位操作,簡化了用戶的操作。
  2. When the user is performing the recovery process using the rcd set, the following error message could be seen

    當用戶使用cd件操作過程時,會出現下面報錯
  3. Fault location techniques are used to pinpoint location of the fault on a tra - nsmission line. transmission line faults must be located accurately to allow maintena - nce crew to arrive at the scene and repair the faulted section as soon as possible, which can relief the burdens of patrol personnel and reduce the revenue losses due to power outage. the accurate fault location alogrithms play an important role in power system safety, economy and reliability. in this paper, diversified fault location algorithms are summarized. according to the principles of algorithms, they can be classified into two categories : impedence based algorithm and traveling wave based algorithm. based on the analysis and comparission of each algorithm, the corresponding merits and app - lication limitations are presented

    精確的故障定位為現場巡線工作人員及時提供準確、可靠的,減輕人工巡線的負擔,同時加快線路的供電,減少因停電造成的綜合經濟損失,為提高電力系統運行的安全性、經濟性和可靠性發揮重要的作用。本文總結了現有的各種測距方法,根據測距的原理將其分為阻抗法和行波法兩大類,對各種演算法的優缺點及適用范圍進行了分析,在此基礎上提出了一種合的測距方案,並對演算法進行了模擬分析。
  4. A preliminary study on the species composition, ecological characteristics and present distribution of vegetations in mengyang area, the largest part of xishuangbanna nature reserve, shows that there are 7 vegetation types, 15 formations, 24 community types in this area. the vegetation map was made by using gis software ( arc / info ), and the area and distribution pattern of each community was obtained. the subtropical monsoon evergreen broad leaved forest occupies the largest part, with an area of 41. 26 % of the whole, and the tropical rain forest occupies less than 10 % of the whole area. according to the topography, altitude, climate characters and present distribution of the vegetation, and based on the landscape type map, an original vegetation map under natural conditions was obtained, which could provid a theory for the vegetation restoration, especially for the tropical rain forest and its habitat, and for the development of the nature reserve

    對西雙版納勐養自然保護區植被的類型進行了劃分,包括人工和自然群落,共有7個大類、 15個群系、 24個群落類型分佈.對每個類型的主要成種類、生態特徵和分佈現狀進行了初步研究.利用地理系統軟體制取植被圖並獲得了各種植被類型的分佈面積和分佈格局特徵,這一地區亞熱帶季風常綠闊葉林的分佈面積和所佔比例最大,達總面積的41 . 26 % ;而熱帶雨林面積不超過總面積的10 % .依據地形、海拔、氣候和現狀植被分佈的規律,在獲得景觀類型圖的基礎上,得到了可以反映這一地區在完全自然條件下植被可能分佈的狀況的還原植被圖,為保護區的發展和植被的提供了理論依據。
  5. In this paper, chroma dc coefficients are selected as the carrier data because chroma dc coefficients are robust. also, alterable steps are used to select one part of the coefficients, so the watermark is imperceptible ; before watermark embedding, the watermark is divided into many parts, every part is individually embedded into one gop of the video, even if a gop is destroyed, the watermark can be extracted correctly, this methods promotes the robustness of the watermark ; in addition, in order to promote the security of the watermark, the user ' s id and password are used to generate chaos sequence by the chaos system which is created in this paper, later, watermark is mixed by the chaos sequence. also, the embedding position of the watermark bit is modified by one chaos sequence, so, unauthorized person can not extract or remove the watermark, since the embedding position is unknown

    本文認為,色度dc系數是魯棒性非常好的參數,因而選擇色度dc系數作為水印載體,同時,採用可變的步長選擇部分系數,保證了水印的隱形性;在嵌入水印時,本文採用水印「網格劃分」 、各子塊獨立嵌入視頻的方案,由於水印子塊是相對獨立的嵌入視頻中的每一相對獨立的圖當中,即使某一圖收到一定破壞,也能夠水印,使水印的健壯性得到提高;此外,為了提高水印的安全性,在嵌入水印時,根據用戶輸入的id號和密碼,利用本文構造的混沌系統產生的混沌序列對水印進行變換,同時,對每一水印比特的嵌入位置也採用了偽隨機序列進行調整,這樣,未授權用戶不能提取水印,也難以擦除其中的水印,因為嵌入的位置是未知的。
  6. Presents a method for sfs based on model of polyhedron. we carry out the algorithm by solving a overdetermined linear equations which is constructed through the distributing of the vector field. the algorithm can reconstruct 3d surface from photometric stereo image given the direction of illumination

    針對目前「從明暗物體形狀方法」存在的問題,提出了以多面體模型為基礎的快速演算法,根據向量場的分佈建立關於物體表面深度的超定線性方程,在最小二乘意義下求得物體表面的深度值。
  7. The main features of this tool include : grouping of test cases, break point resume, timeout detect and timeout control, and collecting the return information of test cases

    它具有測試用例分、斷點執行、超時監測和控制以及收集測試腳本返回等特性,方便了測試人員執行和控制測試用例。
  8. The main research contents are as follovvs : after the analyzing of the process of making train diagram, according with its character, and take into account the trend of innovation, chooses the total solution based on the b / s architecture, 3 - tier operation distributed and 2 - tier data distributed to separate the data from operation and simplify the development and maintenance ; the e - r data model that is accord with the 3nf criterion is designed after analyzing the data structure of the train diagram system. emphasis on the permission security of the distributed system, take the view schema, coupled with the login authentication and permissions validation, to ensure the data accessing domination, and take the synchronization, error control, and restore capability to advance the data security ; on the basis of b / s solution architecture, after comparing the existing transportation technologies, b - isdn and adsl is selected as the major solution architecture based on the package - svvitched networks. furthermore, error control, firewall, and encryption techniques are introduced to prevent the hacker attack and ensure the networks safety

    論文的主要研究內容包括:對目前我國列車運行圖管理體制和編制流程進行詳細分析,根據其「幾上幾下」的特點,並結合未來「網運分離」體制改革的變化預測,選擇採用與之相適應的基於b s體系架構、三層業務分佈、二層數據分佈的整體方案,實現業務與數據的分離,降低開發與應用過程的雜度和總體成本;對列車運行圖系統的數據進行分析,設計符合3nf規范的數據e - r關系模型,並著重研究處于分散式系統中的列車運行圖數據的訪問權限和數據安全問題,提出以視圖模式結合用戶識別權限審定實現數據權限劃分,以並發處理、容錯技術、技術提高系統的數據安全性;在基於b s架構的系統整體方案基礎上,對當前多種數據傳輸技術進行分析比較,採用b - isdn為主幹網、 adsl為接入端的基於公用數據網路分交換技術的系統網路體系結構,並針對網路自身安全性和黑客攻擊與侵入問題,詳細討論綜合採用差錯控制、防火墻、數據加密解密等技術手段提高系統的網路安全性能。
分享友人