數據訪問協議 的英文怎麼說

中文拼音 [shǔfǎngwènxié]
數據訪問協議 英文
dadata access protocol
  • : 數副詞(屢次) frequently; repeatedly
  • : 據Ⅰ動詞1 (占據) occupy; seize 2 (憑借; 依靠) rely on; depend on Ⅱ介詞(按照; 依據) according...
  • : 動詞1. (訪問) call on; interview; visit 2. (調查; 尋求) inquiry into; seek by inquiry [search]; try to get
  • : Ⅰ動詞1 (請人解答) ask; inquire 2 (詢問; 慰問) question; ask about [after]; inquire about [aft...
  • : Ⅰ形容詞(共同) joint; common Ⅱ動詞(協助) assist; help; aid
  • : Ⅰ名詞(意見; 言論) opinion; view Ⅱ動詞(商議) discuss; exchange views on; talk over
  • 數據 : data; record; information
  • 訪問 : visit; call on; interview; access; addressing; reference to
  1. The article points out the importance and necessity of the information - security from its actuality in our country. the resources in the information system, for instance, hardware, software, data, document, operator, meterial and so on, are evaluated and gived safety grade firstly. and then, it analyses the menace including the nonauthorized access, the information leak, the refused sevice, the internal objection which the system will take. the following are the corresponding control police : confirm the users " rights and duties, including the mode of using account, the limit of accessing resource, the application of password, the building of backup ; confirm the administrators " right and duties, including physical safety, system configuration, account configuration and usufruct, password management, audit and control, backup and individual intimity ; run - of - mill measure of security defence, including access control, symbol and identification, integrality control, password technique, firewall system, audit and resumption, safety of operating system, safety of database system, defence of computers " virus and resisting - deny protocol. in the end, the article offers the strategies of disposing the safety - accident and analyse after ithow. to report it, how to solve it in phase, and how to avoid it happening again. in a word, the article presents a holistic resolvent about keeping away the information system ' s security, and supplies a essential frame for its configuration, management and application

    然後,對系統可能受到的威脅,包括非授權、信息泄漏、拒絕服務和內部缺陷等進行分析,並提出了相應的控制策略:確定用戶的權力和責任,包括帳戶使用方式、資源權限、口令應用以及建立備份等;確定系統管理員的權力和責任,包括物理安全、系統配置、帳戶設置及使用權限、口令管理、審計和監控、備份以及個人隱私等方面;一般性的安全防護措施:存取控制、標識和認證、完整性控制、密碼技術、防火墻系統、審計和恢復、操作系統安全、庫系統安全、計算機病毒防護和抗抵賴等。最後,對事故處理和事後分析提供策略,如何報告安全事故,如何調解決安全事故,如何避免安全事故再次發生。總之,本文對信息系統安全防範工作給出一個整體的解決方案,為其在配置、管理和應用方面提供了基本的框架。
  2. Lap - m link access procedure for modems

    機連接
  3. 3. as there are up to 106 managed objects on element level of tmn ( telecommunications management network ) in telecommunications network, and the scheme to collect management information affects the performance of network management, a new algorithm - saa ( self - adaptive algorithm ) used for retrieving multi objects information has been put forward in this thesis. saa can adjust the retrieving objects and interval of retrieval self - adaptively by using the schemes of self - adaptivity, fault tolerance, recognition status of object dynamically etc., and thus can use fewer network resources without alteration of snmp ( simple network management protocol ), iiop ( internet inter - operability protocol ) or cmip ( common management information protocol )

    針對傳統的定時提取網路管理信息方法的不足,提出了一種提取多管理對象信息的新演算法? ?自適應演算法saa ( self - adaptivealgorithm ) ,該演算法能在不改變管理,如iiop ( internetinter - operabilityprotocol ) 、 snmp或cmip ( commonmanagementinformationprotocol ,公共管理信息)的情況下,採用自適應策略、容錯策略、動態識別被管對象狀態策略、被管對象存儲空間的動態刷新策略,根本次被管國防科學技術大學研究生院學位論文對象所得出的網路通信量,自適應地調整下次應該的被管對象和讀取被管劉?象的時間間隔,從而可以較少地消耗所用的網路帶寬和cpu資源。
  4. Several authentication methods are discussed, and several vpn implementation protocols that include pptp / l2tp protocol, ipsec protocol, socks protocol and mpls protocol are discussed. to implement access vpn, this dissertation use socks protocol, kerberos protocol and domestic cryptographical algorithm

    針對遠程vpn密碼系統的實現,我們採用socks做為vpn實現,使用kerberos來進行身份認證,使用國內專用密碼演算法來進行的加解密。
  5. Active directory application mode adam is a new mode of the active directory directory service that is designed to meet the needs of line - of - business applications that require a dedicated lightweight directory access protocol ldap data store, e - commerce applications that require simple ldap authentication support, and enterprise environments that require an application directory that is separate from their network operating system infrastructure directory

    Active directory應用程序模式( adam )是active directory目錄服務的新模式,設計用於滿足以下應用程序或環境的需要:需要專用輕型目錄( ldap )存儲的行業應用程序,需要簡單ldap身份驗證支持的電子商務應用程序,以及需要獨立於網路操作系統( nos )結構目錄的應用程序目錄的企業環境。
  6. With the characteristics of the underwater acoustic channel, media access control protocols at data link layer adopt the maca protocol which uses rts - cts exchange to solve the hidden and exposed situation and automatically control power

    鏈路層的設計中針對水下聲通道的特點,對于介質控制採用了maca,它使用rts - cts控制報文握手機制來解決uan中的隱蔽終端、暴露終端以及功率控制題。
  7. This system makes people fell convenient in looking for data, try my best to our environment protection. the following problems and related solutions are given in this paper : data structure suitable for web computing multi - user access and concurrent control mechanism in webgis network protocol and intelligent information agent of spatial information spatial information security in web computing environment web integration strategy of spatial information based on metadata architecture of webgis at last, the development trend of webgis is discussed

    通過論文工作提出了以下幾個題並給出了相應的解決方案適合web計算的模型webgis中的多用戶與並發控制機制空間信息的網路計算策略與實施方案及關鍵演算法空間信息的網路傳輸與智能空間信息代理web計算環境下的空間信息安全性題基於metadata的空間信息web集成方案與智能空間搜索引擎webgis體系結構最後,論文對webgis發展趨勢進行了探討。
  8. In order to save the energy and based on the protocol of ieee 802. 15. 4, we add a timer to maintain the physical and mac layer automatically. our mac protocol can sleep and listen circularly to satisfy the goal of energy saving. in the consideration of the design the software of layers of network and application, we bring forward an idea to fulfill the function of routing and data fusion

    在設計過程中,本文首先基於ieee802 . 15 . 4標準,對物理層和mac層需要符合的標準的ieee802 . 15 . 4增加了定時器的自動維護工作,從而形成了我們自己的物理層、 mac層,解決了節點的媒體和定時休眠、監聽控制,達到了節能的目的;本文在網路層和應用層設計中,提出了路由表維護和融合的思想,並進行了設計的實現。
  9. Information technology - open systems interconnection - remote database access - part 1 : generic model, service and protocol

    信息技術開放系統互連遠程第1部分:類屬模型服務與
  10. This card largely depends on three integrate chips to fulfill its function : 1 ) nic control main chip, corresponding the mac sublayer of ethernet, to realize csma / cd media access protocol, manage the sending and receiving buffers integrated on the chip and provide motherboard pci interface. 2 ) serdes ( serializing and deserializing ) chip, corresponding pcs and pma sublayers in ethernet, mainly to complete 8b / 10b coding and convert 10 bits parallel data to serial data, and convert them again at the receiving end. 3 ) fibre transceiver unit, completing light - electrical conversion of seri

    該網卡主要由3塊集成的晶元完成其功能,分別是i )網路控制主晶元,對應于以太網的mac子層,主要完成csmaicd介質,管理片上集成的發送和接收緩沖區,並提供和主板p0總線的介面: b ) s rd s (串列解串列化器)晶元,對應于以太同的pcs和pma子層,主要完成sb lob編碼並將10位并行的轉換為串列,在接收端完成相反的功能:涌)光纖收發器,完成串列的光電轉換功能。
  11. With wmi, system administrators and management application developers can use a single interface for local and remote access to win32, system monitor, wmi for windows driver model ( wdm ), registry, event logs, desktop management interface ( dmi ), simple network management protocol ( snmp ), and any other data wmi generates

    使用wmi ,系統管理員和管理應用程序的開發人員使用單一的界面即可從本地和遠程win32 、系統監視器、 wmiforwindows驅動程序模型( wdm ) 、注冊表、事件日誌、桌面管理介面( dmi ) 、簡單網路管理( snmp )和任何其他wmi生成的
  12. It can provide security service that includes access control, integrality, authentication, replay attack protection, privacy and privacy of finite communication

    通過ah和esp來以下的安全服務:控制,無連接完整性,源認證,重放攻擊保護,機密性和有限的通信流保密性。
  13. Web service realized internet service invoking which is based on soap 、 uddi etc. technologies, and these technologies are based on xml. web service is a software interface, which describes a group of operations which can be visited via standardized xml message transfer. it uses xml - based protocols to describe the operations or the data that will be exchange with another web service

    Web服務是一個軟體介面,它描述了一組可以在網路上通過標準化的xml消息傳遞來的操作。它使用基於xml語言的來描述要執行的操作或者要與另一個web服務交換的。 xmlengine是建立在webservice上的一種技術。
  14. Different from traditional routers, the gateway proposed here focuses on the routing strategies rather than the routing protocol itself. it maximizes the utilization rate of each network access line by forwarding data packets according to the routing strategies of each network respectively

    與傳統路由器不同,本文提出的轉發網關,並不關心路由本身,而將重點放在路由策略上,通過兩個網路的不同路由策略實現包的動態轉發,使得每條接入線路的利用率達到最大。
  15. We follow the principle " based on talent, based on science and technology to serve the customer and society ", absorb large quantities of good technician and had developed series of communication product lead in domestic, manly including : all series of the on - the - spot data collector, battery monitoring instruments, switch power monitoring instruments, agreement converter, intellectual building air conditioner interface controller, etc. at the same time, we had developed new monitoring system platforms on the basis of power - link

    主要包括:各系列現場採集器,電池監測儀,開關電源監控器,轉換器智能樓宇空調介面控制器等,同時我公司在power - link監控系統平臺的基礎上,發展新一代的監控系統平臺,如www網路
  16. It becomes more difficult to manage, integrate and share the control system real - time data when we set up the industrial real - time database because of complicated affair between every department and isomeric character of the system. a three - level - structure model and the method to establish database is provided based on corba criterion with its character of being regardless of programming languages, hardware platform and network protocol. a universal real - time database faces multi - system is also set up by learning the distributed criterion, it can realize the request broker, and the application software can visit the database pellucidly ; thus the power station simulation model can be linked with the control system such as infi90, ovation and be made use of the control object, a closed simulation and control experiment system is set up

    在創建工控領域實時庫時,企業各部門間的復雜事務及內部異構性給實時的管理、集成和共享帶來了一定的困難,根corba規范具有語言無關性、平臺無關性和網路無關性的特點提出基於分散式計算規范corba的三層體系結構模型及建立與維護實時庫的方法和途徑;通過corba規范建立面向多個分散控制系統的通用實時庫,實現代理,使應用軟體可以透明地對實時庫進行、存取、管理;將infi90 、 ovation分散控制系統與火電廠模擬機模型進行有效的互連,以全物理過程模擬學模型為對象,構建了閉環控制模擬實驗研究系統,實現的高效連通及管理;進而通過基於corba的實時庫構建一個從火電廠模擬機對象到過程式控制制設備再到sis系統的綜合自動化試驗平臺。
  17. The problem lies in how the receiving side is able to understand the serialized simple object access protocol soap messages that contain the weakly - typed object elements and native data types

    題是接收方如何能理解被序列化了的簡單對象( simple object access protocol , soap )消息,這些消息中包含弱類型對象元素及本地類型。
  18. This paper stresses on discussing the architecture, access protocol and implementation mechanism based on xml and web services technologies, researches key technologies of metadata information service and data uniform access and management in database grid, designs and implements distributed mis subsystem and das subsystem, which support multi - domain management. mis can provides metadata information for the whole system, such as das and clients, it uses domain name 、 logical name and internal name of data object to uniformly name database resources in grid and implements name mapping mechanism and user view metadata information service and provides virtual organization and management of database resources. das can provide a scalable uniform data access by virtual organization and management of storage resources and multi - mode data share access mechanism, thus integrate database resources in grid and shields distribution and heterogeneity of resources and achieves transparent access. system adopts data access mechanism based on user request mapping to flexibly implement data access across multi domains, and adopts distributed data cache mechanism 、 security mechanism based gsi to provide high - performance secure data service for grid users

    本文論述了griddaen - dai系統的邏輯結構、服務流程以及基於webservices 、 xml等技術的實現策略,重點研究庫網格中的元服務、統一和管理等關鍵技術,設計和實現了支持多管理域的分散式元服務子系統和服務子系統。其中元服務主要為整個系統提供各種元信息支持,它採用域名、對象的邏輯名稱、物理名稱和內部名稱對廣域環境下的進行了統一命名,實現了相應的名字映射機制和全局的用戶視圖服務,提供了庫資源的虛擬組織與管理方式;服務通過提供可擴展的統一和支持多種共享模式,屏蔽了庫資源的分佈性和異構性,為用戶提供了統一透明的服務。
  19. If sql native client or a microsoft data access components mdac client is already installed, the protocol settings are preserved

    如果已安裝了sql native client或microsoft組件( mdac )客戶端,則將保留設置。
  20. Structural issues include gross organization and global control structure ; protocols for communication, synchronization, and data access ; assignment of functionality to design elements ; physical distribution ; composition of design elements ; scaling and performance ; and selection among design alternatives

    結構全局的組織和控制結構;通訊,同步和;將功能賦給設計元素;物理分佈;設計元素的組成;擴展性和性能;和在可選設計中的選擇。
分享友人