樹型結構 的英文怎麼說

中文拼音 [shùxíngjiēgòu]
樹型結構 英文
ctreectrl
  • : Ⅰ名詞1 (木本植物的通稱) tree 2 (姓氏) a surname Ⅱ動詞1 (種植; 栽培) plant; cultivate 2 (樹...
  • : 結動詞(長出果實或種子) bear (fruit); form (seed)
  • : Ⅰ動詞1 (構造; 組合) construct; form; compose 2 (結成) fabricate; make up 3 (建造; 架屋) bui...
  • 結構 : 1 (各組成部分的搭配形式) structure; composition; construction; formation; constitution; fabric;...
  1. In oilfield, feeder line of 6kv often has many branches. the pole high voltage automotive capacitor compensation system controlled by single chip computer is designed for this situation. in the system, we separate the measure position and compensation position and realize the supervision of reactive load in local area

    文章以油田6kv輸配電線路為例,針對多分支線路的特點,研製出由單片機系統控制的戶外術上高壓電容器自動補償系統。
  2. The essence of edid is to set up a normal behavior fuzzy sub collection a on the basis of watching the normal system transfer of the privilege process, and set up a fuzzy sub collection b with real time transfer array, then detect with the principle of minimum distance in fuzzy discern method the innovation point of this paper is : put forward the method of edid, can not only reduce efficiently false positive rate and false negative rate, also make real time intrusion detection to become possibility ; have independent and complete character database, according to the classification of monitoring program, design normal behavior and anomaly behavior etc., have raised the strongness of ids ; use tree type structure to preservation the character database, have saved greatly stock space ; in detection invade, carry out frequency prior principle, prior analysis and handling the behavior feature of high frequency in information table, have raised efficiency and the speed of detection, make real time intrusion detection to become possibility ; have at the same time realized anomaly intrusion detection and misuse intrusion detection, have remedied deficiency of unitary detection method

    這種方法的實質是在監控特權進程的正常系統調用基礎上建立正常行為模糊子集a ,用檢測到的實時調用序列建立模糊子集b ,然後用模糊識別方法中的最小距離原則進行檢測。本文的創新點是:通過對特權進程的系統調用及參數序列的研究,提出了基於euclidean距離的入侵檢測方法edid ,不僅能有效降低漏報率和誤報率,而且使實時入侵檢測成為可能;設計有獨立而完整的特徵數據庫,根據被監控程序的類別,分別設計正常行為、異常行為等,提高了檢測系統的強健性和可伸縮性;特徵數據庫按樹型結構存儲,大大節省了存儲空間;在檢測入侵時,實行頻度優先原則,優先分析和處理信息表中的高頻度行為特徵,提高檢測的速度和效率,使實時入侵檢測成為可能;同時實現了異常入侵檢測和誤用入侵檢測,彌補了單一檢測方法的不足。
  3. Its landscape pattern and structure of tree populations are adapting to its functions, which is faver to decrease the disturb from people

    其不同類綠地斑塊分佈格局與分佈與其各自功能相適應,有利於分散干擾危險。
  4. Lastly, the article points out that solutions to the problems existing in management patterns of university rear service are to establish scientific ideas of rear service management, to adjust structure, to appropriate system, to establish scientific ideas is to renew sense of nature, sense of value, sense of quality and sense of profiteers ; to adjust structure is to enforce sole administration of one service agency ; to appropriate system is to establish proper leader system, executive system, inquiry system and control - and - feed back system ; to improve administration is to clarify mechanism of guidance, encouragement and restriction

    最後,本文針對後勤管理模式中存在的問題進行了對策思考,指出高校後勤管理模式改革應從立科學的後勤管理觀念,調整現行的後勤管理,建立合理的後勤管理體制、健全高效的後勤管理機制等四個方面入手。具體來說,立科學的後勤管理觀念就是要更新本質觀、價值觀、質量觀和對象觀,調整後勤管理就是要採用獨立經營的服務公司,建立合理的後勤管理體制,就是要建立合理的領導體制、執行體制、咨詢體制和監督反饋體制,健全高效的後勤管理機制就是要明確導向機制、激勵機制、制約機制。
  5. In order to adapting to the challenge of new military revolution oriented from the information technique, speed up our army information - based construction, the thesis make a design of the conducting and controlling network in the armor mechanization troops. included in the “ group army information - based experiment for military revolution ”, according to the basic regulation of the information processing, the network breaks the original tree - scheme network structure and sets up a principle grid architecture, which realizes the platform of vehicle - to - vehicle, crossing organization or arms of services, and meets the command of synthesizing function unit, integrating system and sharing the information and network construction in the transformation period of army constructing, by the means of obtaining, delivering, processing, utilizing and feed - backing information

    為適應以信息技術為核心的世界新軍事革命的挑戰,加快我軍信息化建設,本課題就適應轉期的陸軍指揮控制網路建設的需求,在集團軍小試驗群架下,對裝甲機械化部隊野戰指揮控制網路進行設計,旨在打破原有的樹型結構,按照信息流程的基本規律,建一個縱向到單車、橫向跨建制與兵種,具備信息獲取、信息傳輸、信息處理、信息使用和信息反饋功能的原理性區域柵格狀的新指揮控制網路,實現功能綜合化、系統一體化、信息共享化的要求。
  6. Design and implementation of dynamic tree structure based on b s

    的動態樹型結構的設計與實現
  7. An implementation of operation of bom with tree structure using recursive strategy

    展開的樹型結構操作
  8. An outline is a common name given to a tree - shaped hierarchy in a document

    大綱是對文檔中樹型結構的通稱。
  9. Simulation of reciprocal community organization and personalized recommendation algorithm

    基於樹型結構的在線逆向組合拍賣模
  10. In this algorithm, we represent the chromosomes of the multicast tree by tree structure coding

    本演算法利用樹型結構的編碼來表示組播的染色體。
  11. The document object model is a specific tree - structured programming model of an xml document described as a standard by the w3c

    「文檔對象模」是xml文檔的一種特殊樹型結構編程模, w3c將它描述成一個標準。
  12. Three basic strctures for demultiplexer, i. e. serial, parallel and tree. their working principal, advantages and disadvantages will be discussed in the thesis. according to their characteristics and the design objective. the tree architecture was selected

    根據三種的各自特點和設計目標,選用樹型結構作為分接器的基本。電路設計是分接器設計的基礎。
  13. The in - memory data structure had a sort of tree structure, as shown in listing 1, rooted at the home pages of the various sites being crawled, so the visitor pattern was ideal for searching it or extracting data from it

    內存中的數據是一種樹型結構,如清單1所示,它的根是快速搜索過的各個網站的主頁,因此visitor模式是搜索這些主頁或者從中提取數據的理想模式。
  14. Tree view is used in the web interface made the directory data looks more understandable. the function that implement are search entry, edit entry, delete entry, set group, set role, set access control and so on

    基於web的目錄服務客戶端實現的具體功能有:分類查詢、修改密碼、條目的添加、刪除、修改、設置組、設置角色和設置訪問控制等,前臺頁面使用了樹型結構,直觀的反映了目錄服務器中數據的拓撲
  15. This paper presents the integration of the linux ip processing with the outbound and inbound policy through the linux netfilter, proposes the use of radix tree for organizing the security policy database, the use of hash table for organizing the security association database

    使用linux下的netfilter機制將ipsec的進入和外出策略處理與linux自身的ip層處理緊密合,使用radix樹型結構來實現安全策略庫,使用哈希表來實現安全聯盟庫。
  16. To the problem that finding rules in enormous data is very time - consumable and the expansibility of existed algorithms is not very good, the thesis proposes a new method to discompose large data table based on the concepts of positive region and the importance of attribute in rough set theory. existed algorithms of rule deduction can be applied directly on the tree structure obtained by partition and the times for computation will be reduced observably. validation of information entropy on the partition structure shows that the partition of data table will not lead to the loss of information, while the computing speed increases at the same time, which reflects the practicability and rationality about the partition of large data table

    針對海量數據處理起來極為耗時,現有演算法拓展性較差的問題,基於rough集理論中的集合正域概念以及由此定義的屬性重要性概念,提出一種大數據表分解演算法,現有的規則歸納演算法可直接在分解得到的樹型結構上應用,將大大降低知識發現的時間,並從信息理論的角度利用信息熵概念對該分解進行了驗證,分析了這種分解的實用性及合理性,揭示了這種分解在提高計算速度的同時不會損失信息量。
  17. Enterprise information system framework provides a series of reusable groupware, such as persistence layer which introduces dynamic value object 、 value list hander and command pattern, it encapsulates the detail of accessing database and affords the interface of different persistence layer framework ; basing on asynchronous javascript and xml ( ajax for short ), we develops the client validity check engine 、 dynamic cascading menu and common 、 dynamic tree structure groupware, as well as a set of tag library which include query 、 pagination 、 cache an so on. they reduce the code redundancy and predigests the development of interface layer enormously ; the security subsystem which is based on secure socket layer ( ssl for short ) and role - based access control ( rbac for short ) ensures the data security transmission and privilege control. furthermore, the model of enterprise application integration ( eai for short ) which based on web services, it supply some helpful explore for the sake of system integration and data communion for the future

    企業信息系統框架提供了一系列可復用組件,例如採用動態vo 、值列表處理器以及命令模式的持久層組件,封裝了數據庫訪問細節,並為不同的持久層框架提供調用介面;基於ajax ( asynchronousjavascriptandxml )技術的客戶端校驗引擎、動態級聯菜單以及通用動態樹型結構組件,一系列查詢、分頁、緩存等標簽庫則減少了表示層的代碼冗餘,簡化了表示層開發;基於ssl登錄以及基於角色的訪問控制的安全子系統則初步實現了數據安全傳輸和權限控制;此外基於web服務的企業應用集成模為今後系統集成、數據共享提供了有益探索。
  18. The author designed the state diagram which based on the event driven which is suit for e - government affairs architecture which is cited from state diagram and the finite state machine theory. thus, the limitation of the present modeling methods which is unable to describe complex operation process can be gotten over. the uniflow ' s organization architecture adopts new matrix organization architecture and combined with the static department tree structure and the dynamic workgroup pattern

    在uniflow工作流管理系統的集成設計中,作者從狀態圖及有限狀態機理論中引申設計出了適合於電子政務架基礎的基於事件驅動的狀態圖( statediagram )模,克服現有的建模方法不能描述復雜業務過程處理的缺陷; uniflow的組織架採用新的矩陣制組織,將政務部門的靜態部門樹型結構和動態工作組模式相合,使組織模和過程模靈活地集成起來,克服了傳統組織模的單一、缺乏彈性等缺陷。
  19. In the ip core ’ s data management, we construct ip data - base tree structure, take the ip function as main search factor, warpping the ip cores having same function in the same xml file, and set up the accessing popedom, avoid the redundancy information, advance the search

    在事務級ip核數據管理中,為了高效的搜索ip核,建了事務級ip庫的樹型結構,以ip的功能為主要搜索要素,功能相同的ip核被封裝在同一個xml文件中,並設立訪問權限,避免冗餘信息,提高搜索效率,並且實現知識產權保護。
  20. Because the events sequences getting from the tfg only including a series of the events which can cause the transition of the state, and not containing the interactive information among all types of objects and other events which can ’ t cause the transition of the state, we can add the detailed interactive information in the events sequence of transition of the state and described it as uml sequence ; then, it is difficulty for analyzing the interactive events in uml sequence and may not fully cover the test

    接著使用uml順序圖描述所得到的測試序列,並在uml順序圖中加入詳細的對象交互信息;然後,使用具有獨特的樹型結構並且容易實現分支或路徑覆蓋的ircfg圖描述uml順序圖中的消息事件交互信息,造與uml順序等價的ircfg圖。最後,通過本文提出的測試覆蓋標準覆蓋ircfg圖得到最終的測試用例。我們在文中還通過一個實例系統?飲料銷售機系統來進一步說明該測試模的有效性。
分享友人