控制數據名 的英文怎麼說

中文拼音 [kòngzhìshǔmíng]
控制數據名 英文
control data name
  • : 動詞1 (告發;控告) accuse; charge 2 (控制) control; dominate 3 (使容器口兒朝下 讓裏面的液體慢...
  • : Ⅰ動詞1 (製造) make; manufacture 2 (擬訂; 規定) draw up; establish 3 (用強力約束; 限定; 管束...
  • : 數副詞(屢次) frequently; repeatedly
  • : 據Ⅰ動詞1 (占據) occupy; seize 2 (憑借; 依靠) rely on; depend on Ⅱ介詞(按照; 依據) according...
  • : Ⅰ名詞1 (名字; 名稱) name; appellation 2 (名聲; 名譽) fame; reputation 3 (名義) name 4 (姓...
  • 控制 : control; dominate; regulate; govern; manage; check; cybernate; manipulate; encraty; rule; rein; c...
  • 數據 : data; record; information
  1. The structure of this paper goes like this, the first chapter introduce the development of e - b / l in practice and in laws. and draw a conclution that the electrification of the b / l is a history tide. in the second chapter, on the basic of reseach the security trap in e - b / l running, 1 conclude six security elements of, e - b / l : the liability of the system, the authenticity of dealers ' identity. the integrity and secrecy of electronic data, and the validity and evidence effectiveness of electronic data. from the third chapter to the eighth, 1 reseach these elements one by one. the third chapter introduce the establishment of the e - b / l security system, and some related laws the fourth chapter introduce the certification authority of e - b / l. in the fifth chapter, 1 introduce the encrypt of electronic information and some countries ' control on use / import / export crytography. the sixth chapter introduce the concept and principle of digital signature, and reseach some related legal issues. the seventh chapter reseach the legal demand of validity, then come to a conclution that to establish a independent electronic information system is necessary. in the eighth chapter, 1 reseach some countries " regulation on the evidence effectiveness of electronic data

    第二章在分析電子提單運作中的安全隱患的基礎上,歸納出其六大安全要素,即系統的可靠性、交易者身份的真實性、電訊的機密性和完整性、電訊的合法有效性以及交易者行為的不可抵賴性。第三章到第八章分別對這六大要素進行分析:第三章介紹了電子提單網路安全體系的建立以及系統安全保護法規,第四章則介紹了電子提單的安全認證機構,第五章介紹了信息加密技術以及各國立法對密碼技術的進出口及使用的,第六章介紹了字簽的概念及原理,並以bolero為例介紹了字簽的技術方式,對有關法律問題作了論述;第七章首先論述了電子提單對有效性的法律需求,然後結合國內法和國際規則的規定論證了電訊度產生的必然性;第八章通過對各國立法對電子證的法律效力的規定,論述了對電子交易至關重要的電訊的不可抵賴性。
  2. Stamper and signature is very important in the affair of tradition work in government and enterprise. this article according to the characteristic of traditional signature and stamper, combinic the demands of signature and seal in e - government - affair work information system, inosculates the technology of middleware and e - government - affair security, makes use of object oriented and component technology, integrates correlation knowledge of compositive cryptogram, pki, seal digital image, activex etc, studies and achieves digital e - signature - seal middleware based on web which is used in internet / intranet environment

    印章和簽在傳統的政府辦公和企業事務處理中起著十分重要的作用。本文根傳統簽、蓋章的特點,結合電子政務辦公信息系統中的蓋章簽需求,把電子政務安全技術和中間件技術相融合,利用面向對象和組件技術,集成密碼學、 pki 、印章字圖像、 activex項等相關知識,研究並實現了一個應用於internet intranet環境中的基於web的電子簽章中間件。
  3. To control for reerse causation and selection bias, the researchers studied a birth cohort of 13, 116 children born in 1995 in manitoba, using the proince ' s health care and prescription databases

    為了倒向因果和選擇偏倚,研究者們利用省健康護理中心和處方庫的資料,對1995年在馬尼托巴出生的13116孩子進行了研究。
  4. The dcs of i / a series is regarded as main reference object, and the control is separated from model. and the configuration of control is operatised at administration system, not to be added into model, not to build control sound code also. therefore it realizes on - line adjusting, real - time control and so on. users configurate by filling table. they only define i / o condition, fill certain operation variable, and name logic variable. the software offers a friendly user ' s interface, so personnel can compile and modify the control and logic program, change the value of logic and control variable conveniently, attach themselves to run, debug and control the system, not need to know the programs deeply. so the configuration software offer a flat that control engineers can attend to control loop, not to give their attention to the complicated program

    在本課題中,採用填表的方式進行組態,用戶只需定義i / o條件、填寫具體的運算變量即可。本軟體為建模人員提供了一個友好的用戶界面,使建模人員在建模時不必對模塊內部的、邏輯程序有很深的了解就可以方便的對其進行編寫和修改,實時改變各邏輯和變量在庫里的值,參與運行和調試,從而實現對系統的。因此,本組態軟體提供的這樣一個平臺,讓工程師能集中精力于迴路的構成,而不必拘泥於一些具體而煩瑣的程序操作。
  5. Control uses for a parameter in a data operation

    項用於操作中的參的類的稱。
  6. Therefore it comes true the on - line adjusting, real - time control and so on. it sames as real locale. the software of logic protect ( include electric logic ) and control includes some usual algebraic and operation model of thermal control and logic operation of logic protect. it adopts foxboro ' s dcs as a example, so we configuration via filling table, user only define i / o condition, fill certain operation variable, and name logic variable. the software offers a friendly user ' s interface, personnel can compile and modify the control and logic program, change the value of logic and control variable conveniently, attach themselves to run, debug and control the set, not need to know about the inside of the old programs deeply. so the configuration software offer a flat that control engineer can attend to the structure of control loop and logic protect ( include electric logic ), not but to handle complicated program

    它以foxboro的dcs系統為主要參考模式,採用填表的方式進行組態,用戶只需定義i / o條件、填寫具體的運算變量、邏輯變量即可。本軟體為建模人員提供了一個友好的用戶界面,使建模人員在建模時不必對模塊內部的、邏輯程序有很深的了解就可以方便的對其進行編寫和修改,實時改變各邏輯和變量在庫里的值,參與運行和調試,從而實現對機組的。因此,本組態軟體提供的這樣一個平臺,讓工程師能集中精力于迴路及邏輯保護(包含電氣邏輯)的構成,而不必拘泥於一些具體而煩瑣的程序操作。
  7. This lets you use user - coded control statements or xmi descriptions of cobol copybook members to supply information on additional fields, long java - style names, and data types

    這使得您可以使用用戶編碼語句或者cobol代碼庫編號的xmi描述來提供關于附加欄位、長java風格稱和類型的信息。
  8. Production : high flexible control and data transmition cable andaccessories

    展品稱、種類:德國高柔性傳輸電纜及電纜附件。
  9. This dissertation analyzes detailed research about some key technology and security policy, such as secure saving and getting between agents, secure communication between agents and hosts or agent proxy servers, mobile agent self - safe, safe transfer and control and timestamp, md5, dsa, identity authentication, digital signature etc. the insecure, single problems are resolved gradually, the whole safe framework needs to synthesize the consideration and form further

    由於很多安全問題之間也有相互約,只能根實際情況,找到最適合實際需要的安全策略。接下來對某些關鍵技術,諸如移動agent之間, agent與主機、代理服務器之間的安全存取資源,移動agent自身保護,安全地傳輸與,安全的通信,時間戳技術,消息摘要,字簽身份認證等安全策略,進行較詳細的剖析研究。
  10. Control files contain the name of the database, log sequence and checkpoint information, the physical file structure etc

    文件包含庫的稱、日誌序列和檢查點信息、物理文件結構等
  11. A process that maps a record name to its physical location in the user work area ( uwa ) and notifies the dbcs ( database control system ) of the run unit ' s intention to use the database

    將記錄映象到它在用戶工作區中的物理位置,並將運行單元使用庫的意向通知系統( dbcs )的過程。
  12. Cooking channels - from the paper how to cook a covert channel is a set of two python scripts ( cgi and client ) allowing to build a communication channel over http cookies

    思義,這是一種隱藏通道工具。他提供幾種可行方法來實現允許在已被網路訪問系統授權的流上創建並建立任意流傳輸通道。
  13. Property contains the data column of that table that you want to display in the control the food name

    屬性包含該表中要在項中顯示的列(食品稱) 。
  14. The grid file system directory services specification describes the management of a namespace of federated and virtualized data from file system resources, access control mechanisms, and meta - data management

    Grid file system directory services規范描述的是對于文件系統資源進行聯邦化和虛擬化后的命空間管理,訪問,以及元的管理。
  15. Retrieves a collection of named views for the data source control

    檢索項的命視圖的集合。
  16. Data source control classes can support one or more named views on their underlying data

    項類可以支持其基礎的一個或多個命視圖。
  17. In the specify an id for the data source box, a default data source control name is displayed

    在「為源指定id 」框中,將顯示默認的稱。
  18. In the specify an id for the data source box, a default data source control name,

    在「為源指定id 」框中,將顯示默認的稱( 「 sqldatasource1 」 ) 。
  19. The important research is about the theory and methods of the cluster analysis in view of statistical theory, the theory and methods of fuzzy cluster analysis, the fkn " s structure and the fkn ' s study algorithm ( fkn, fuzzy kohonen network ) - the organic fusion of the fuzzy c - means algorithm and self - organized feature map neural network. the paper proposes the ifkn ( improved fkn ) on the basis of the hard classification idea and the soft classification idea, then carries on the cluster analysis of the artificial synthetic control chart time series through matlab program and tt ? cluster result matches the cluster result of the famous dataengine " s software of the intellectual data analysis and data mining from german mit company. finally, the paper discusses the applying of the cluster analysis to the control process, which can be widely applied to the pattern recognition of the parameter " s changing trend during the control process and the image partition processing, and utilizes the ifkn to recognize the thermotechnical parameter " s changing trend based on the engineering of clinker sintering rotary kiln automatic control system of guizhou " s aluminium factory, through which good effect is obtained

    挖掘技術在商業領域中已廣泛使用,然而在工業過程式中的應用卻極少,本文正是在這種背景下,對挖掘中的聚類分析方法及其在工業過程式中的應用研究作了償試,重點研究了基於統計理論的聚類分析理論和方法,模糊聚類分析理論和方法及模糊kohonen網路( fkn )的結構與學習演算法,即模糊c ? ?均值演算法與自組織特徵映射神經網路( kohonen網路)的有機融合,並根硬分類思想及軟分類思想提出了改進的模糊kohonen網路( ifkn ) ,通過matlab編程對人工合成時序圖集進行聚類分析,其聚類效果與當今廣泛使用的掘挖掘軟體平臺,德國mit公司著的dataengine智能分析和掘挖掘軟體的聚類效果相當,最後,論述了聚類分析在中的應用,它可以用於過程式中的參變化趨勢的模式識別及圖象分割處理等具體應用中,並以貴州鋁廠熟料燒結回轉窯自動系統為工程背景,利用ifkn識別其熱工參量變化趨勢,取得了較理想的效果。
  20. From the warehouse control database management window, fill in the control database name, schema name, user id, and password, and create the warehouse control database

    在倉庫庫的管理窗口中,填入、模式( iwh ) 、用戶id和密碼,並創建該倉庫庫。
分享友人