數據配置 的英文怎麼說

中文拼音 [shǔpèizhì]
數據配置 英文
data mapping
  • : 數副詞(屢次) frequently; repeatedly
  • : 據Ⅰ動詞1 (占據) occupy; seize 2 (憑借; 依靠) rely on; depend on Ⅱ介詞(按照; 依據) according...
  • : Ⅰ動詞1 (兩性結合) join in marriage 2 (使動物交配) mate (animals) 3 (按適當的標準或比例加以...
  • : 動詞1. (擱; 放) place; put; lay 2. (設立; 布置) set up; establish; arrange; fix up 3. (購置) buy; purchase
  • 數據 : data; record; information
  • 配置 : dispose (troops, etc. ); deploy; allocation; collocation; configuration; positioning; allotment
  1. The science database has been successfully relocated. the splitters and assimilator are back online

    科學庫已經安好。任務分和回收系統也已經回復正常。
  2. Base band data processing is implemented in the integrated communication controller for user - friendly communication and configuration via spi interface

    Ax6042通過靈活的spi處理,客戶可以低成本的mcu完成控制。
  3. Then this paper concerns about the network packet intercepting technology of linux os and gives a thoroughly overview of network hacking methods and some application protocol criterion, including http, ftp, telnet, nntp, pop3, smtp etc. then the system design scheme of the transparent proxy has been discussed, this system can be divided to 4 modules below : establishment of transparent charnel, implement of proxy service, gui configuration and management application, accessory filter functions ( such as url filter, command filter and logger etc ). we explain key techniques in all 4 main parts of this system, define the interfaces of each module, what is more the main data structures and software implements codes are all illustrated

    首先,論文陳述了防火墻的相關技術基礎,分析了透明代理作為一種先進易用的防火墻技術的原理,闡述了linux操作系統網路包攔截技術和http 、 ftp 、 telnet 、 nntp 、 pop3 、 smtp等應用層協議的協議規范和具體的工作流程。接著敘述了本透明代理服務器的系統總體設計方案,將系統分為以下幾個部分:透明通道建立、代理服務實現、 gui管理程序以及過濾功能(如url過濾、命令過濾和日誌審計等) 。論文然後分別介紹各個關鍵部分的具體實現要點,解釋了相互間的介面關系,列出了主要結構和實現流程。
  4. Configuring the data mining model training destination

    挖掘模型定型目標
  5. On data level, it is firstly explored fusing signature data from sparse - band collocated radars to obtain wider band target frequency response. the most difficult problem which restricts the fusion process is the lack of mutual coherence between the various radar subbands

    層,首先探索了對多個在同一地方的不同頻帶雷達測得的目標頻率響應進行融合,以獲取更寬頻帶目標頻率響應的方法。
  6. In this paper, a safe, reliable, and intellectual control plan is provided aiming at the heat charge for dwelling district, which contains epigynous machine responsible for data processing and hypogynous mahcine responsible for unlocking the valve, by means of serial communication between them, combining homemade three - channel valve, to adminstrate the charge data and the valve efficiently. the main idea is based on the homemade three - channel valve. the vavle is locked at peacetime, while it is opened with the help of open tool and a water flow in the caliduct. as soon as the flow stops, the valve locks automatically. the open tool has data in its memory, and implement function by lcd and keyborad. so it can identify data and drive motor, to open the valve intellectually. the epigynous machine database manage system administrator the dweller information, standard heat charge and payment infomation etc, including store, configure, query, print etc, then store in the memory of open tool. as a result, the plan can do well in the experiment

    此閥平時是鎖閉的,只有用開啟器以暖氣片中的水流才可打開,一旦水流斷開,則此閥會自會鎖閉。而開啟器則是根其存儲器中的以液晶顯示及小鍵盤,完成確認及電機驅動,自動對相應用戶的三通閥打開特定角度,完成開啟任務。上位機庫管理系統完成對用戶信息、熱費標準、繳費信息等原始的常規管理,包括存儲、設、查詢、列印等,最後將處理后的傳到開啟器中存儲。
  7. Rx and tx module independently configurable number of label rx and tx channels

    Tx或rx的fifo容量可
  8. Multiple lamps ; flash lamp arrays ; photometric data

    多盞燈.閃光燈的.光度
  9. This feature saves administrators from the gruelling task of finding the right configuration parameters that best suit a database

    這一特性就避免了管理員費盡心思地去尋找最適合庫的
  10. Intrusion detection can monitor and analyze the behavior of users and system, audit the system configuration and holes, assess the integrality of data and sensitive system, recognize attack action, stat and audit the abnormal behavior, collect the patch related with system automatically, and record the hacker ' s action uses honey pot. intrusion detection helps system administrator monitor, audit and assess the system state easily and available

    入侵檢測具有監視分析用戶和系統的行為、審計系統和漏洞、評估敏感系統和的完整性、識別攻擊行為、對異常行為進行統計和審計、自動地收集和系統相關的補丁、使用誘騙服務器記錄黑客行為等功能,使系統管理員可以較有效地監視、審計、評估自己的系統。
  11. After comparing in detail the current popular 24 idss or ids prototypes from the aspects of the granularity, methods, and tune of detection, data - collection, and data - processing, we find out the problems in the most of the current idss that they are generally platform dependent, inefficient in detection methods, lack intelligent in data analysis, inextensible as the network configurations changed or upgraded, and inadaptive when the new attack methods emerge

    本文首先從來源、處理周期、收集和分析、入侵檢測方法、系統運行平臺等七個方面對當前較具有影響力的24種入侵檢測系統或原型進行了詳細的比較,分析了現有入侵檢測系統在系統平臺的異構性、系統檢測方法的效率、入侵分析的智能性、面臨新的入侵方法時的適應性和網路發生變化時的可擴展性等方面的不足和問題。
  12. The article points out the importance and necessity of the information - security from its actuality in our country. the resources in the information system, for instance, hardware, software, data, document, operator, meterial and so on, are evaluated and gived safety grade firstly. and then, it analyses the menace including the nonauthorized access, the information leak, the refused sevice, the internal objection which the system will take. the following are the corresponding control police : confirm the users " rights and duties, including the mode of using account, the limit of accessing resource, the application of password, the building of backup ; confirm the administrators " right and duties, including physical safety, system configuration, account configuration and usufruct, password management, audit and control, backup and individual intimity ; run - of - mill measure of security defence, including access control, symbol and identification, integrality control, password technique, firewall system, audit and resumption, safety of operating system, safety of database system, defence of computers " virus and resisting - deny protocol. in the end, the article offers the strategies of disposing the safety - accident and analyse after ithow. to report it, how to solve it in phase, and how to avoid it happening again. in a word, the article presents a holistic resolvent about keeping away the information system ' s security, and supplies a essential frame for its configuration, management and application

    然後,對系統可能受到的威脅,包括非授權訪問、信息泄漏、拒絕服務和內部缺陷等進行分析,並提出了相應的控制策略:確定用戶的權力和責任,包括帳戶使用方式、資源訪問權限、口令應用以及建立備份等;確定系統管理員的權力和責任,包括物理安全、系統、帳戶設及使用權限、口令管理、審計和監控、備份以及個人隱私等方面;一般性的安全防護措施:存取控制、標識和認證、完整性控制、密碼技術、防火墻系統、審計和恢復、操作系統安全、庫系統安全、計算機病毒防護和抗抵賴協議等。最後,對事故處理和事後分析提供策略,如何報告安全事故,如何協調解決安全事故,如何避免安全事故再次發生。總之,本文對信息系統安全防範工作給出一個整體的解決方案,為其在、管理和應用方面提供了基本的框架。
  13. Nevermore, the past accommodating restructuring, the industrial restructuring shall turn to strategically one. the writer considered that it should apply the input - output analysis to the study of restructuring as the basis and use the data and models of input - output to calculate and forecast the restructuring orientation in recent and future periods in order to optimize its structure and obtain effective allocation of resources

    我國產業結構調整已不再是過去的適應性調整,將轉變為戰略性調整,我認為這個層次的結構調整應以投入產出分析為基礎,運用投入產出與模型來核算和預測我國產業結構目前和今後一個時期的調整方向,以優化產業結構,達到資源的有效
  14. Glass in building - procedures for goodness of fit and confidence intervals for weibull distributed glass strength data

    建築玻璃.魏布爾分佈玻璃強度信區間和適性規程
  15. To configure the data source control for inserting data

    為插入數據配置源控制項
  16. Allows specific manipulation of configuration sections and assembly - key containers based on the supplied parameters

    允許根提供的參節和程序集密鑰容器執行特定操作。
  17. A description file is used by the web parts import feature to import the control it describes into a web parts page, and to configure the imported control with the saved data

    Web部件導入功能使用說明文件將它描述的控制項導入web部件頁,並使用說明文件與保存的數據配置導入的控制項。
  18. After program and data are successfully loaded, all single boards shall be able to run normally, but it is possible that the single board runs abnormally due to causes such as data configuration fault or the single board failure

    當程序和成功加載后,各單板應該可以正常運行,但也可能由於數據配置錯誤或單板故障等原因造成單板運行不正常。
  19. After program and data are successfully loaded, all single boards should be able to run normally, but it is possible that the single board runs abnormally due to causes such as data configuration fault or the single board failure

    當程序和成功加載后,各單板應該可以正常運行,但也可能由於數據配置錯誤或單板故障等原因造成單板運行不正常。
  20. 1 debugging of hardware running when programs and data are uploaded successfully, all the single boards can run normally, but may cannot run normally because of data collocation errors, single board defaults or other defaults

    1硬體運行調試當程序和成功加載后,各單板應該可以正常運行,但也可能由於數據配置錯誤或單板故障等原因造成單板運行不正常。
分享友人