數據操作庫 的英文怎麼說

中文拼音 [shǔcāozuò]
數據操作庫 英文
data manipulation library
  • : 數副詞(屢次) frequently; repeatedly
  • : 據Ⅰ動詞1 (占據) occupy; seize 2 (憑借; 依靠) rely on; depend on Ⅱ介詞(按照; 依據) according...
  • : Ⅰ動詞1 (抓在手裡; 拿; 掌握) hold; grasp 2 (做; 從事) act; do; operate 3 (用某種語言、方言說...
  • 數據 : data; record; information
  • 操作 : 1 (按照一定的程序和技術要求進行活動) operate; manipulate; handle 2 (所進行的若干連續生產活動的...
  1. Secondly, there are so many same objects managed in the storage manage system and a greate deal of memory is occupied, and in order to access the resources between processes entry management library is presented. thirdly, this paper also researches the ag ( atomic group ) function, then implements an method to deal with the disater recovery in san and ag make users easier to operate than a volume

    另外,針對存儲管理系統中要保存諸多同類信息、佔用內存大的問題,同時考慮到能夠實現進程間的訪問,提出,設計並實現了entry管理,從而大大降低了內存的使用量。另外,本文還設計和實現了ag ( atomicgroup )功能,提供了一種解決災難恢復的方案,同時相對于單個volume的,以組為單位,簡化了用戶的
  2. At design time, some actions, like dragging a database table from a data window onto a blank form, will create the

    在設計時,某些(如將表從窗口拖動到空白窗體)將創建
  3. As a whole the system may compart three modules : ndis drivers in the kernel mode, the dll program in the user mode and the user application program, adopting the share memory technology three modules realize the data share of the control canal rule, the encapsulation data and the network neiborhood name and so on, so we can easily finis1 " the packet authentication by the control canal rule, improve the filtering efficiency of the system. whereas the current of firewall technology, the system has wide utily value and business value. this software is based on windows 2000 operating system, the programming language is chosen as visual c + + 6. 0 and win2000 ddk

    從總體上可以劃分為以下三個模塊:核心層的ndis網路驅動程序、應用層的動態鏈接程序以及用戶應用程序,這三個模塊之間通過內存共享技術完成對控管規則、封裝、網上鄰居名字列表等的讀寫,從而很方便的根控管規則實現了對網路封包的認證,提高了系統的過濾效率。鑒于目前防火墻技術的發展趨勢,本系統具有廣泛的實用價值和商業價值,因此具有一定的推廣前景。軟體的開發基於windows2000系統,開發語言採用visualc + + 6 . 0和win2000ddk 。
  4. 2. the technology of objectarx programming has been lucubrated. the 2d and 3d graphics of shaft parts have been automatically drawn by objectarx visiting the autocad database directly and entitative boolean calculation

    2 、深入研究了objectarx的編程技術,通過對autocad進行讀寫,並採用實體間的布爾運算解決了復雜立體圖形和平面圖形的自動繪制。
  5. Audit database scope gdr event class occurs whenever a grant, revoke, or deny is issued for a statement permission by any user in microsoft sql server for database - only actions such as granting permissions on a database

    每當microsoft sql server中的用戶發出針對語句權限的grant 、 revoke或deny時(僅限於,例如針對某個授予權限) ,都會發生
  6. Multithreading and message drive mechanism is applied to simulate the intercurrent and schedule of the multitask in power distribution system, which builds the foundation of the development based on real - time operation of the project. at the same time, the software deals with the real - time data by the means of memory database and uses the thread security class to maintain the data ' s integrity

    利用windows的消息驅動和多線程機制模擬了配電系統中多任務的並發和調度過程,為課題在嵌入式實時系統下的開展打下了一定的基礎;同時,對系統中大量實時則採用內存管理方式,並利用線程安全類來保證讀取的完整性。
  7. The article points out the importance and necessity of the information - security from its actuality in our country. the resources in the information system, for instance, hardware, software, data, document, operator, meterial and so on, are evaluated and gived safety grade firstly. and then, it analyses the menace including the nonauthorized access, the information leak, the refused sevice, the internal objection which the system will take. the following are the corresponding control police : confirm the users " rights and duties, including the mode of using account, the limit of accessing resource, the application of password, the building of backup ; confirm the administrators " right and duties, including physical safety, system configuration, account configuration and usufruct, password management, audit and control, backup and individual intimity ; run - of - mill measure of security defence, including access control, symbol and identification, integrality control, password technique, firewall system, audit and resumption, safety of operating system, safety of database system, defence of computers " virus and resisting - deny protocol. in the end, the article offers the strategies of disposing the safety - accident and analyse after ithow. to report it, how to solve it in phase, and how to avoid it happening again. in a word, the article presents a holistic resolvent about keeping away the information system ' s security, and supplies a essential frame for its configuration, management and application

    然後,對系統可能受到的威脅,包括非授權訪問、信息泄漏、拒絕服務和內部缺陷等進行分析,並提出了相應的控制策略:確定用戶的權力和責任,包括帳戶使用方式、資源訪問權限、口令應用以及建立備份等;確定系統管理員的權力和責任,包括物理安全、系統配置、帳戶設置及使用權限、口令管理、審計和監控、備份以及個人隱私等方面;一般性的安全防護措施:存取控制、標識和認證、完整性控制、密碼技術、防火墻系統、審計和恢復、系統安全、系統安全、計算機病毒防護和抗抵賴協議等。最後,對事故處理和事後分析提供策略,如何報告安全事故,如何協調解決安全事故,如何避免安全事故再次發生。總之,本文對信息系統安全防範工給出一個整體的解決方案,為其在配置、管理和應用方面提供了基本的框架。
  8. Tradition rdb and oltp technique which provided transaction support can " t afford the requirement of deepen process of the data

    傳統的和oltp技術提供了性的支持,卻不支持對的深層次的處理。
  9. The architecture of client / server based on transaction middleware is a typical kind of the distributed on - line transaction processing, becoming a major platform of enterprise information system, which offers communication of striding platform, loading balance, fault - tolerant and resumable ability, and strengthens a new generation middleware in common with 3 - layer architecture provided with the strong security, excellent management and high availability in common. numerous distributed system, different database and different network environment are closely linked up among an enterprise, offering the function of mutual operation on application layer

    基於交易中間件的c s結構是一種典型的分散式事務處理系統,成為構築企業信息系統的主流平臺,它提供了強大的跨平臺通訊、負載平衡、容錯及其故障恢復能力,並在這個基礎上進一步強化了安全性、可管理性和高可用性的新一代通用型三層結構平臺的中間件,把企業中眾多的異構系統、異構、不同網路環境緊密的聯系起來,並在應用層提供了互性的功能。
  10. And then it emphasizes the structure model and the process of data warehouse, the ways of extracting data from operation model and guiding into the data warehouse, the realization techniques of dealing with data synthetically, as well as the mechanism of how to superadd the upper data into the data warehouse, and introduces the realization techniques of the mining model of association rule, the apriori and the fp - growth arithmetic particularly

    接著重點討論了的構建模型和構建過程,從型環境抽取並導入方法,對進行綜合處理的實現技術,以及後期如何追加到的機制,並詳細介紹了關聯規則挖掘模型, apriori演算法,和fp - growth演算法的實現技術。
  11. The chip simulation network laboratory system this paper disguessed is a distribute network simulation system based on lan. the system ' s architecture is a c / s of three lays. the front platform are the chip simulation network system application program terminer ; the middle lay is a dcom server, it ' s duty is to deal with the communication and data transmission between the terminer and then database server, and to execute the logical operation. the application program just connect with the middle lay and get data from it, the connection and operation with database server will be managed by the dcom server. the duty of database server is to access and backup the final data

    具體是由位於網路各個終端的晶元模擬網路實驗系統應用程序為前臺;中間層為dcom應用程序服務器,負責處理前臺應用程序與后臺的通信和傳輸,並執行業務邏輯,前臺應用程序只需要與應用程序服務器建立連接,在中間層即可,與后臺的連接和由應用程序服務器來統一管理。后臺只負責的存取。本論文實施的晶元模擬網路實驗系統模擬了主要的邏輯電路器件, 8088cpu ,存儲器,寄存器,總線,地址總線和控制總線,及其它相關晶元。
  12. In analysis services, a folder that contains shared objects, such as shared dimensions, that can be used by multiple objects within a database. linguistic casing functionality provided by the win32 api for unicode simple case mapping of turkic and other locales

    2 .對於事務隔離,在啟用基於行版本控制隔離級別的情況下,引擎維護受語言( dml )執行情況影響的行版本的過程。
  13. Focus on the method of driver usb device in labview develop environment, three ways ( i / o, cin, clf ) were discussed, and the way of using visa ( visual instrument software architecture ) to communicate with usb device was used that can easily develop instruments driver and application software and improve the applicability of instruments on various operating systems

    並重點分析了常用的labview開發環境下驅動自製採集卡的三種方式:直接訪問寄存器方式;調用c語言源代碼方式;調用動態連接的方式。提出了利用visa ( visualinstrumentsoftwarearchitecture )來直接驅動usbraw設備,簡化驅動程序和虛擬儀器軟體的開發難度,提高儀器在多種平臺上的通用性。
  14. When you request an operation for which change propagation is enabled, the source control plug - in changes your working copy of the source - controlled item, the master copy in the database, and the copies of other users when you check in the item and the other users retrieve it

    當您請求一個啟用了更改傳播的時,源代碼管理插件在您簽入該項和其他用戶獲取它時更改您受源代碼管理項的工副本、中的主控副本和其他用戶的副本。
  15. In ddmm, the rdb is taken as the bottom storing medium and the upper xml view is set up for data exchange and direct application under internet / intranet environment. based on ddmm, the multi - tiered and bi - directional data integration technique between xml and rdb, is studied systematically and in detail, and the reciprocal data accessing and exchange between rdb and xml is carried out on respectively three levels : static data transformation, dynamic data query and synchronized data update. the infrastructure for manufacturing informationlization will certainly be internet / intranet, and xml has been a factual standard for data representation under internet / intranet environment

    製造業信息化的基礎平臺將是internet intranet , xml ( extensiblemarkuplanguage ,可擴展標記語言)已經成為internet intranet環境下表達的事實標準,而目前企業大量仍存在於佔主導地位的關系( relationaldatabase ,簡稱rdb )中,如何在rdb與xml之間架起交換與的橋梁,已成為製造業在internet intranet環境實現信息化迫切需要解決的突出問題之一。
  16. A dml trigger is an action programmed to execute when a data manipulation language event occurs in the database server

    Dml觸發器是當服務器中發生語言( dml )事件時要執行的
  17. So this paper focuses on the researching about data compression methods and storage architectures which are suitable for ssdb and corresponding query processing technology on them, including data operations and query optimizations

    因此,本文的研究內容包括:研究適合於科學與統計壓縮演算法及存儲結構;研究在壓縮科學與統計上的查詢處理技術,包括演算法和查詢優化演算法。
  18. Visual database tools are the tools that help you create databases, maintain databases, and design the data manipulation portions of your visual studio database applications

    可視化工具幫助您創建、維護和設計visual studio應用程序的部分。
  19. The research results is briefed as follow. ( 1 ) a new communication and decision - making method is presented, which integrated several new tools as well as some old ones ; ( 2 ) a new concept of " virtual communicating place shared in real time by multi - user " is brought forward, and a new technology based on event - driving and message - transferring mechanism is designed to realize graphic data shared by multi - user and displayed synchronously under net environment, which is the basis of the whole system. ( 3 ) a new mechanism for team members to share data efficiently is devised, which supports collaborative working in progress, maintains the consistency of data, records the history of design and etc. by defining a new type of the design data attributes and the privilege of team member to access to data in different time, using a new method of data manipulating, the team data sharing is realized

    本文的主要研究成果為: ( 1 )在研究國內外網路決策交流方式方法的基礎上,綜合多種方法的優點,提出了一種新的決策交流方式,採用了多種手段和工具,完善了網路決策交流的機制; ( 2 )提出了多用戶共享的可視化虛擬交流空間的概念,並對其實現技術進行仔細的分析,針對目前存在的技術難點,提出了可行的解決方案,設計了一種新型的基於事件驅動和消息傳遞機制的多用戶實時共享圖形的解決方案,並採用了跨平臺的java技術實現了網路環境下圖形的實時交流和顯示; ( 3 )針對團隊協同的網路cad系統的特點和要求,提出了一種新的團隊共享機制,通過對產品的基本屬性、歷史屬性、共享狀態屬性和關聯屬性的定義,結合對團隊成員在不同設計階段的權限控制,採用新型的對共享方法,動態地維護團隊的共享、設計的變更、設計進程的同步、關連的一致性、以及多個團隊之間的交流。
  20. In addition to supporting triggers that are fired by data manipulation language statements that modify data insert, update, and delete, the database engine includes a new class of triggers fired by ddl statements that modify database objects, such as the statements that start with create, alter, or drop

    除了對修改語言語句( insert 、 update和delete )所激發的觸發器提供支持外,引擎還包括一類新的觸發器,由修改對象的ddl語句(如以create 、 alter或drop開頭的語句)激發。
分享友人