數據存取策略 的英文怎麼說

中文拼音 [shǔcúnlüè]
數據存取策略 英文
strategy for data access
  • : 數副詞(屢次) frequently; repeatedly
  • : 據Ⅰ動詞1 (占據) occupy; seize 2 (憑借; 依靠) rely on; depend on Ⅱ介詞(按照; 依據) according...
  • : 動詞1 (存在; 生存) exist; live; survive 2 (儲存; 保存) store; keep 3 (蓄積; 聚集) accumulat...
  • : Ⅰ動詞1 (拿到身邊) take; get; fetch 2 (得到; 招致) aim at; seek 3 (採取; 選取) adopt; assume...
  • : Ⅰ名詞1 (通「冊」 古代寫字用的竹片或木片) bamboo or wooden slips used for writing on in ancient ...
  • : Ⅰ名詞1 (簡單扼要的敘述) summary; outline; brief account; résumé: 節略 memorandum; aide mémoire;...
  • 數據 : data; record; information
  • 策略 : 1 (制定的行動方針和斗爭方式) tactics 2 (講究斗爭藝術) tactful 3 [數學] (對策) policy; strat...
  1. Because of the great quantity, strong specialization, wide involved range of the knowledge of engine, this paper introduces the construction of the repository, reasoning machine, program interface and the knowledge acquirement of dmas wearing fault integrated diagnostician system, puts forward the method of storing and managing the fault diagnostic knowledge by database, carries out fault diagnostic with proper reasoning strategy, and discusses the realization of the system from the view of the theory and engineering. 3, the research on the remote fault diagnostic system

    2 、 dmas故障診斷專家系統的研究本文主要針對發動機的知識具有量大、專業性強、經驗成分多、涉及面廣等特點,介紹了dmas磨損故障綜合診斷專家系統的知識庫、推理機、人機界面和知識獲的實現,並提出把故障領域知識入相應的庫,運用庫技術進行管理,結合合適的推理進行故障診斷,並從理論和具體方法上對系統的實現過程進行了探討。
  2. The article points out the importance and necessity of the information - security from its actuality in our country. the resources in the information system, for instance, hardware, software, data, document, operator, meterial and so on, are evaluated and gived safety grade firstly. and then, it analyses the menace including the nonauthorized access, the information leak, the refused sevice, the internal objection which the system will take. the following are the corresponding control police : confirm the users " rights and duties, including the mode of using account, the limit of accessing resource, the application of password, the building of backup ; confirm the administrators " right and duties, including physical safety, system configuration, account configuration and usufruct, password management, audit and control, backup and individual intimity ; run - of - mill measure of security defence, including access control, symbol and identification, integrality control, password technique, firewall system, audit and resumption, safety of operating system, safety of database system, defence of computers " virus and resisting - deny protocol. in the end, the article offers the strategies of disposing the safety - accident and analyse after ithow. to report it, how to solve it in phase, and how to avoid it happening again. in a word, the article presents a holistic resolvent about keeping away the information system ' s security, and supplies a essential frame for its configuration, management and application

    然後,對系統可能受到的威脅,包括非授權訪問、信息泄漏、拒絕服務和內部缺陷等進行分析,並提出了相應的控制:確定用戶的權力和責任,包括帳戶使用方式、資源訪問權限、口令應用以及建立備份等;確定系統管理員的權力和責任,包括物理安全、系統配置、帳戶設置及使用權限、口令管理、審計和監控、備份以及個人隱私等方面;一般性的安全防護措施:控制、標識和認證、完整性控制、密碼技術、防火墻系統、審計和恢復、操作系統安全、庫系統安全、計算機病毒防護和抗抵賴協議等。最後,對事故處理和事後分析提供,如何報告安全事故,如何協調解決安全事故,如何避免安全事故再次發生。總之,本文對信息系統安全防範工作給出一個整體的解決方案,為其在配置、管理和應用方面提供了基本的框架。
  3. As an important component of the above researches, this paper covers following aspects : ? firstly, product design theories are summarized, status and development trend of machinery product design are analyzed, and application of knowledge based design method in machinery product design is put forward. ? kbe ( knowledge based engineering ) theories such as knowledge acquisition, representation and storage are discussed, kbe concept is integrated with ug secondary development technology, and design knowledge is induced and stored to establish the design knowledge base. ? product case representation is researched, a hierarchical tree type product case library for complex products is established, retrieve strategy for cases of the nearest filed is put forward and corresponding algorithm is given

    本文的主要研究內容及成果如下: ?對產品設計理論和方法進行了總結和概括,分析了機械產品設計的現狀和發展趨勢,將基於知識的設計方法應用到機械產品的設計中; ?研究了知識獲、表達、儲等kbe理論,並將kbe思想應用到ug二次開發中,將設計知識歸納儲,建立了設計知識庫; ?研究了產品實例表示,建立了復雜產品層次樹狀產品實例庫,介紹了最近鄰域實例檢索並給出相應的演算法; ?研究了基於知識重用的三維產品建模技術,研究了在設計過程中的設計資源的重用,計算過程的重用,計算的重用,推理過程的重用等等;介紹了基於設計重用的凸輪三維模型的實現方法。
  4. 3. as there are up to 106 managed objects on element level of tmn ( telecommunications management network ) in telecommunications network, and the scheme to collect management information affects the performance of network management, a new algorithm - saa ( self - adaptive algorithm ) used for retrieving multi objects information has been put forward in this thesis. saa can adjust the retrieving objects and interval of retrieval self - adaptively by using the schemes of self - adaptivity, fault tolerance, recognition status of object dynamically etc., and thus can use fewer network resources without alteration of snmp ( simple network management protocol ), iiop ( internet inter - operability protocol ) or cmip ( common management information protocol )

    針對傳統的定時提網路管理信息方法的不足,提出了一種提多管理對象信息的新演算法? ?自適應演算法saa ( self - adaptivealgorithm ) ,該演算法能在不改變管理協議,如iiop ( internetinter - operabilityprotocol ) 、 snmp或cmip ( commonmanagementinformationprotocol ,公共管理信息協議)的情況下,採用自適應、容錯、動態識別被管對象狀態、被管對象儲空間的動態刷新,根本次訪問被管國防科學技術大學研究生院學位論文對象所得出的網路通信量,自適應地調整下次應該訪問的被管對象和讀被管劉?象的時間間隔,從而可以較少地消耗所用的網路帶寬和cpu資源。
  5. Firstly, it presents the storing arithmetic based on the mapping policy between xml data modal and object - oriented modal. reference to the arithmetic of extracting object - oriented database schemas from xml dtds using inheritance and other commercial tools for xml storing, it improves mapping policy from xml to object, which optimizes the new semantic classes, what ' s more, it present object clustering policy to resolve the uncertainty of xml schema and the complexity of information intergration, which simultaneously focuses on the semanteme and structure of new object classes. on the other hand, it presents method to realize exchanging from object to xml

    本文研究構造基於xml信息集成系統結構的面向對象庫包裝器,提出面向對象庫包裝器的系統結構;根該結構提出xml的模式與面向對象庫對象模式的映射及相互儲轉化演算法,一方面我們借鑒基於dtd模式的繼承對象映射提演算法及各種商業工具,提出dtd簡化演算法和基於dtd簡化結構的對象圖映射演算法,優化了生成的對象類、提高了對象類的語義表達能力,也改進了對象映射提;同時採用模糊聚類,提出對象聚類處理演算法,改善了xml語義定義的隨意性給對象類提及信息集成帶來的復雜性;另一方面本文提出對象到xml的轉化演算法,採用系統自動定義對象到xml的轉化方法實現對象到xml的轉化處理。
  6. Aiming at various problems that exist management system of ore blending in open - pit and actual production in sandaozhuang open - pit, this thesis brings forth the ore blending ' s method making use of the linear program and gets a total the strategy to the ore blending. this thesis, in specific operation, adopts a simplification model with ore blending. the primitive data of ore blending direct come from measuring

    本論文針對目前露天礦配礦管理系統中在的各類問題以及三道莊露天礦的生產實際,提出了先採用線性規劃配礦原理配礦,得到一個總體配礦,然後再採用一個簡化配礦模型來處理,其中配礦原始直接從爆堆測量中獲,保證了的準確性和快捷性。
  7. This dissertation analyzes detailed research about some key technology and security policy, such as secure saving and getting between agents, secure communication between agents and hosts or agent proxy servers, mobile agent self - safe, safe transfer and control and timestamp, md5, dsa, identity authentication, digital signature etc. the insecure, single problems are resolved gradually, the whole safe framework needs to synthesize the consideration and form further

    由於很多安全問題之間也有相互制約,只能根實際情況,找到最適合實際需要的安全。接下來對某些關鍵技術,諸如移動agent之間, agent與主機、代理服務器之間的安全資源,移動agent自身保護,安全地傳輸與控制,安全的通信,時間戳技術,消息摘要,字簽名身份認證等安全,進行較詳細的剖析研究。
  8. Aiming at the major problems in the staple fibre marketing of lypc, the author makes the analysis and forecast of the supply and demand of staple fibre products home and abroad. the author studies the tendency of market competition and the main competitors, making the in - depth analysis of the enterprises " internal conditions. finally the strategies of target market choice and product orientation of staple fibre marketing of lypc are worked out as well as the strategies such as product, price, promotion and sales channel etc., the above of which are expected to be for reference on the enterprise ' s operation strategy to a certain extent thus the conclusions are made as follows on the marketing strategy of lypc staple fibre : ( 1 ) product strategy : the strategies of product differentiation and combination are worked out and the 3 - party combined operation pattern with downstream intermediate dealer and textile plant is put forward creatively

    本論文直面全球化給石化企業帶來的挑戰,在查閱大量文獻的同時,結合遼陽石化現狀進行實證研究,採用運用理統計、對比分析和同業討論等方法和信息互通等技術手段獲所需最新,針對遼陽石化公司滌綸短絲產品市場營銷工作中在的主要問題,通過對滌綸短絲產品的國內外供需狀況進行分析預測,對市場競爭態勢與主要競爭對手進行研判,對企業內部條件進行深入剖析,最終提出遼陽石化滌綸短絲產品目標市場選擇與產品定位戰,以及產品、價格、促銷和銷售渠道等,以期對企業經營戰的制定有一定的借鑒作用。
  9. The paper puts forward a combined - allocation - scheme based on the idea of constrained - block - allocation at the storing allocation strategy and gives disk - striping about the storing of big capacity disk array. in the study about the access path of the multi - media data, we introduce several kinds of representative multi - dimensions data index structure including k - d tree, r tree, vp tree and so on. ( 3 ) the research of multi - media database system architecture.

    儲分配上根受限塊分配( constrainedblock ? allocation )的思想,本文提出了聯合分配模式( combinedallocationscheme ) ;並針對大容量磁盤陣列的儲給出了條形分配方案( diskstriping ) ;在多媒體路徑的探討中,重點介紹了幾種有代表性的多維索引結構,有k - d樹、 r *樹、 vp樹等。
  10. Now there are two basic target recognition strategies, such as processing from bottom to top, which is called data - driving method, and processing from top to bottom, which is called knowledge - driving method. the former begins with low layer processing for example, general segmentation, label and feature extraction, then judges whether the feature vector extracted from the labeled area is in accordance with the feature vector of the object model. the latter firstly brings forward a hypothesis on probably existed feature, secondly proceeds with purposeful segmentation, label and feature extraction, lastly judges whether the feature vector extracted from the labeled area is in accordance with the feature vector of the object model

    目標識別在工農業生產、國防建設中具有極其重要的地位,目前目標識別的演算法常用的有兩種,一種是由下而上的驅動型,即不管目標屬於何種類型,一律先對原圖像進行一股性的分割、標記和特徵抽等低層次處理,然後將每個帶標記的已分割區域的特徵矢量與目標模型相匹配;另一種是由上而下的知識驅動型,即先對圖像中可能在的特徵提出假設,根假設進行有目的地分割、標記和特徵抽,在此基礎上與目標模型進行精確匹配。
  11. Agricultural land use is the foundation of sustainable agriculture and rural development. the contradiction between land and people in the hills of the central sichuan basin is quite intense. irrational land use leads to the humble effectiveness of agriculture economy and ecology. this paper began from the agricultural land use, after full consideration of traditional adaptive strategy of this area, based on the mathematical programming theory and relevant indexes, the sustainable agriculture and rural development planning model was set up

    本研究選廣安區代市鎮為研究試點,在充分考慮該地區農民傳統生的基礎上,以經濟和生態效益最優化為目標,從農業土地優化利用和農業生態系統的結構調整出發,在實地收集資料和的基礎上,採用線性規劃方法對農業土地資源進行優化利用,通過excel軟體進行不斷調試和計算,比較分析了優化結果和現狀農業在經濟和生態效益方面的差異,並以資源的影子價格分析了規劃模型的穩定性。
  12. Last, it presents querying and data maintaing arithmetic to grasp data information correctly and maintain the wrapper effectivly ground on this storing one, which processes user reque sts such as xml querying, updating and deleting

    同時我們還提出針對該的查詢處理演算法及結構維護演算法,使用戶快速準確地獲信息並且有效的進行維護。
  13. At present, there is still a great deal of problem in the application of the secure model of the distributed database. under common circumstance, the secure usually is self - contradict with vivid in the database, while customer wanting to get stronger and vivid capability, needing the sacrifice to the database secure in some extent, vice versa. based on distributed database system and secure characteristic, this text analyzed its database safe strategy and related secure model, the system appearance and operate rule, the system appearance and operate rule, studied the customer role management, safe strategy and the role authorition problem, specially emphatically studied the bell. lapadula model. ( including its basic concept, system appearance, related operation and the secure rule gather ). according to the actual application environment, this text carried bell. lapadula model to entity to turn, through a research discover that model adoption compulsory secure strategy, attain a vivid secure control not easily, so increase the secure strategy of the independent access control mechanism to carry on " flabby " to the original model, and relatedly increased rule, put forward a new kind of secure mechanism - ddm ( the distributed database discretionary mandatory ). turn the rule principle according to the ddm secure mechanism and entity, designed a secure controller of database - dds ( the distributed database secure distribute ) controller adopted ddm secure mechanism, and established the secure control mechanism of the dds secure controller

    拉帕丟拉模型進行實體化,通過研究發現該模型採用強制性安全,不易做到靈活的安全控制,因此添加自主控制機制的安全對原模型進行「鬆弛」 ,並相應的增加了規則,提出一種新的安全機制? ? ddm ( distributeddatabasediscretionaryandmandatory ,分散式庫自主與強制性)安全機制。基於實體化規則原理,設計了一個採用ddm安全機制的庫控制器? ? dds ( distributeddatabasesecure ,分散式庫安全)控制器,並設置了dds安全控制器的安全控制機制。通過dds安全控制器在實踐中的應用,本文分析了dds安全控制器的各項功能和安全特點,設計了實際應用中dds控制器的管理方案,實現了分散式庫安全控制。
  14. In this thesis, it lucubrated how to obtain a plenty of programs, how to store a mass of mpeg video data, how to share the media library effectively, how to realize the load balance and so on

    本文深入研究了如何獲豐富的視頻節目,如何儲大量的mpeg視頻,如何有效的共享節目資源庫,如何實現動態的負載均衡等。
  15. The combination of the subtree - based storage model with the document - based to ensure the efficiency and integrality of the data retrieval for all sorts of heterogeneous and context mixed data to the fullest extent ; 2. dynamically branching and merging combined with the data mapping mechanism, supports the xml document efficiently and can improve the operation capability of the system to some extent ; 3. referring to the characteristic of xquery, it presents a new operation language for xml data, xqul, which supports the query operation as well as the update operation on xml ; 4

    本文提出了一套較為通用的非結構化信息的nativexml文檔儲訪問和實現方案作為對非結構化信息機制研究的探索和嘗試,主要包括下列理論及技術: 1 .基於子樹和基於文檔的儲模式相結合,以最大程度保證底層各類形式異構和內容混雜的的有效性和完整性; 2 .動態分枝合成技術和映像機制的引入,實現對xml文檔的有效支持,並在一定程度上提高系統處理性能; 3 .結合xquery查詢語言特點,提出一種新型xml操作語言xqul ,支持xml的查詢以及更新操作; 4 .三種索引(文檔索引、結構索引、值索引)的建立,為xml提供從站點到文檔,從文檔到元素的多級訪問
  16. Gets the number of minutes between refreshes of the cache of the policy - store data

    區的緩刷新間隔時間(分鐘) 。
分享友人