數據權 的英文怎麼說
中文拼音 [shǔjùquán]
數據權
英文
database right-
The thesis design the specification of intrusion detection of the privileged program and network communication in the detail by asl specification
本文用asl詳細的設計了特權程序和網路數據包的入侵檢測的規范。As the development of underground space, it is necessary to manage the data using 3d cadastre
摘要隨著地下空間的開發,迫切需要利用三維地籍對地下空間進行數據管理和空間確權。( 3 ) distill the environmental geologic factors and analyzes their harmness and reasons mainly analyzes the status in quo, reason, distribution, harmness and defend for the falls, surface sink, mine suddenly water, landslip, castoff, etc. ( 4 ) evaluate the probability of the geology calamity take use of the method of factors and coverage union to evaluate the probability of the geology calamity, and then plot out the high, middle and low probabilit
( 3 )提取環境地質因素並進行分析其危害及成因利用提取的要素、數字地面模型和屬性數據庫及常規資料重點分析了構造、塌陷、礦坑突水、崩塌、廢棄物、地下水疏干區等要素的現狀、分佈、成因、危害及防治。 ( 4 )為金礦區地質災害易發性做出評價利用權重值和圖層疊加的方法對金礦區地質災害易發性做出評價,把金礦區劃分為高易發地區、中易發地區和低易發地區,針對這些地區提出治理措施。Study of adaptive weighted estimate algorithm of congeneric multi - sensor data fusion
同類多傳感器自適應加權估計的數據級融合演算法研究In conclusion, it is primarily described that the expectable social and economical benefits of this mis are great, and the design can be fulfilled smoothly. the difficulty of this thesis is : not only think about the coordination each other synthetically on workers, equipments, technologies, data and user ' s priorities, different project and different continuation day, but also must ensure that it is agility, controllable and safe when the data be transmitted on internet or intranet
本管理信息系統強調是針對無形的數據信息產品( gis等海量數據)的生產管理信息系統,不是單純的統計計算,還要實施嚴密的控制,除需要綜合考慮人員、設備、技能技術、權限、工程、工期在計劃調度統計方面的協調性外,還需要強調海量數據信息產品的原始數據、半成品、成品在網路上流動的靈活性、可控制性和安全性。Method of deal with data error by subsection curve fitting and discrete degree
分段曲線擬合與離散度加權的數據誤差處理方法This paper recurred to the basic theory of rough set of data mining and under the direction of the frame of intelligent decision, the main theories include i ) the different methods of data mining on the base of rough set are used to deal with typical decision system namely consistent decision system and inconsistent decision system in order to carry through data reduction and rule distilment ; ii ) in the environment of dynamic increment database, the methods of data reduction to deal with the original data and increment data are discussed in the consistent and inconsistent decision system ; iii ) the method of data mining of rough set is analysized to treat with the attributes with priority ; iv ) on the base of basic rough set theory, the data analysis methods of amalgamation of rough set theory ; v ) and also the pre - disposal method to database is analysize
本文從系統工程進行決策分析的角度出發,藉助數據挖掘技術中粗糙集的基本理論,在智能決策框架的指導下,研究了基於數據挖掘的智能決策理論及方法。主要理論包括:如何利用粗糙集對典型的決策系統即相容性決策系統和不相容性決策系統運用不同的數據挖掘方法進行有效的數據約減和規則提取;在增量動態的數據庫環境下討論了在典型決策系統中對原始數據和增量數據進行數據約減的方法;分析了帶有優先權屬性的粗糙集數據挖掘方法;以基本粗糙集為基礎探討了粗糙集擴展模型的數據分析方法;研究了粗糙集數據預處理方法。During the calibration, a regress - analyse method is used to get the weight of the different channel based on equational coefficient, the weight represents the sensitivity of each channel
為了提高測量的可靠性和精確性,對9通道數據同時採集,在測試標定時採用回歸分析方法,根據靈敏度得到不同通道的權值。In any case, each jurisdiction treats insanity claims in its own way, so they may well disagree over whether brain - image data are exculpatory
無論如何,每個對待精神錯亂權限的要求,用它自己的方法,因為他們也許在大腦成像數據是辯解無罪上有著一些不一致。Compared the equity structure and corporate governance of listed company of our country with countries such as u. s. a, japan and germany, and by game theory, this dissertation analyzes the influence mechanism of equity structure to corporate governance of a listed company from following main respects : stimulation, restriction, take - over by other company, and competition of dealership. by theoretical research, it comes to that a comparatively centralized equity structure helps to perfect corporate governance ; for its fierce competition and stability of performance, we choose the data of the industry of wholesale and retail trade listed companies of our country to analyze the influence that equity structure made to corporate governance by regression analysis, and approve it by real case. by the theory and real example, we draw the conclusion that a mode of comparatively centralized equity and main power is controlled by fictitious persons is ideal, and correspond measures are put forth to advance the economic development of our country
本文通過對我國、美國、日本利德國等發達國家的上市公司的股權結構利治理模式比較;通過採用博弈論等方法分析了上市公司股權結構對公司治理的激勵機制、監督機制、外部接管市場和代理權競爭四個方面的影響,從理論上得出相對集中的股權結構有利於完善公司治理結構:通過選取了我國競爭比較激烈、業績相對穩定的批發與零售行業的上市公司的數據、採用回歸分析的方法對不同性質和集中度的股權結構與公司業績的關系進行了實證分析,還進行了具體的案例分析,由理論利實證研究相結合得出股權結構相對集中的法人控股模式為一種理想模式,並提出了促使我國上市公司股權結構調整使治理結構合理化的相應建議。Using fumy cipher, transmission data are kept secret that can prevent others from reading or writing data without permit. it can ensure data security
為了確保數據傳輸的安全性,運用流密碼對數據進行加密傳輸,防止外來者的攻擊,未經授權進行非法數據讀寫操作。So we consider five financial indexes includes stock b / p, e / p, current stock size, current stock stru and financial levge by the international tradition, then descriptive statistical test method and cross section statistical test method proved that b / p and current stock size have marked effect on the securities yield besides coefficient b. in the third chapter, the article fut forward a risk factor model, estimates yield sequences of every risk factor by weight regression, and then estimates each risk factor coefficient of different stock by time sequence regression, at last we can reckon the portfolio risk o2p and yield rp which consists n stocks
結合國際慣例,文章考慮了股票的凈值市價比( b p ) ,市盈率倒數( e p ) ,流通規模( size ) ,流通比例( stru )和財務杠桿( levge )等五個財務指標,應用描述性統計檢驗和橫截面統計檢驗等多種方法,結果表明,除系數以外,凈值市價比( b p )和流通規模( size )對證券收益率部有重要的影響。在論文的第三章,提出了一個基於多因素的風險因子模型,並用加權回歸和時間序列回歸等方法估計出了不同證券的各風險因子系數(類似於單指數模型中的系數) ,據此,即可衡量出一個包括n只股票的組合的風險_ p ~ 2和收益率r _ p 。Audit database scope gdr event class occurs whenever a grant, revoke, or deny is issued for a statement permission by any user in microsoft sql server for database - only actions such as granting permissions on a database
每當microsoft sql server中的用戶發出針對語句權限的grant 、 revoke或deny時(僅限於數據庫操作,例如針對某個數據庫授予權限) ,都會發生Besides, the general computer courses in the junior secondary curriculum already cover such issues as copyright of computer information, data privacy and data security
此外,初中的普通電腦科課程已涵蓋電腦資料版權、數據私隱和數據安全等課題。Enables the grantee to access metadata
允許被授權者訪問元數據。Process - oriented product data authority management
面向過程的產品數據權限管理研究A database role can be granted administrator permissions, process object permissions, view object metadata permissions, and permissions to view or modify data at multiple levels within each analysis services database
數據庫角色可以被授予管理員權限、處理對象權限、查看對象元數據權限以及在每個analysis services數據庫內查看或修改多個級別的數據的權限。The main research contents are as follovvs : after the analyzing of the process of making train diagram, according with its character, and take into account the trend of innovation, chooses the total solution based on the b / s architecture, 3 - tier operation distributed and 2 - tier data distributed to separate the data from operation and simplify the development and maintenance ; the e - r data model that is accord with the 3nf criterion is designed after analyzing the data structure of the train diagram system. emphasis on the permission security of the distributed system, take the view schema, coupled with the login authentication and permissions validation, to ensure the data accessing domination, and take the synchronization, error control, and restore capability to advance the data security ; on the basis of b / s solution architecture, after comparing the existing transportation technologies, b - isdn and adsl is selected as the major solution architecture based on the package - svvitched networks. furthermore, error control, firewall, and encryption techniques are introduced to prevent the hacker attack and ensure the networks safety
論文的主要研究內容包括:對目前我國列車運行圖管理體制和編制流程進行詳細分析,根據其「幾上幾下」的特點,並結合未來「網運分離」體制改革的變化預測,選擇採用與之相適應的基於b s體系架構、三層業務分佈、二層數據分佈的整體方案,實現業務與數據的分離,降低開發與應用過程的復雜度和總體成本;對列車運行圖系統的數據信息進行分析,設計符合3nf規范的數據e - r關系模型,並著重研究處于分散式系統中的列車運行圖數據信息的訪問權限和數據安全問題,提出以視圖模式結合用戶識別權限審定實現數據權限劃分,以並發處理、容錯技術、恢復技術提高系統的數據安全性;在基於b s架構的系統整體方案基礎上,對當前多種數據傳輸技術進行分析比較,採用b - isdn為主幹網、 adsl為接入端的基於公用數據網路分組交換技術的系統網路體系結構,並針對網路自身安全性和黑客攻擊與侵入問題,詳細討論綜合採用差錯控制、防火墻、數據加密解密等技術手段提高系統的網路安全性能。Tetra has the advantage of being spectrally efficient whilst also offering the end users improved voice quality, secure encrypted communication and comprehensive data capabilities
Tetra具有強大的光譜選擇功能,同時還能提供給用戶更好的話音質量、加密的通訊及強大的數據權限。Proprietary information ” means the information, whether patenable or not, disclosed to the cjv by neither party or its affiliates or disclosed by the cjv to either party or its affiliates during the term of this contract, including technology, inventions, creations, know - how, formulations, recipes, specifications, designs, methods, processes, techniques, data, rights, devices, drawings, instructions, expertise, trade practices, trade secrets and such commercial, economic, financial or other information as is generally treated as confidential by the disclosing party, its affiliates, or the cjv, as the case may be ; provided that when such information is in unwritten or intangible form, the disclosing party, its affilates or the cjv shall, within one month of making the disclosure, provide the other party and / or the cjv with a written confirmation that such information constitues its proprietary information
「專有信息」指在本合同期內,任何一方或其關聯公司向合作經營企業披露的、或合作經營企業向任何一方或其關聯公司披露的不論可否獲得專利的信息,包括技術、發明、創造、訣竅、配製、配方、規格、設計、方法、工序、工藝、數據、權利、裝置、圖樣、知識、專門知識、商業慣例、商業機密以及披露放,其關聯公司或合作經營企業(視情況而定)通常視為機密的商業、經濟、財務或其他信息;但是,如果該等信息不是以書面或有形形式披露的,披露方、其關聯公司或合作經營企業應在披露后一個月內,向另一方和/或合作經營企業提供該等信息系其專有信息的書面確認。分享友人