計數訪問 的英文怎麼說

中文拼音 [shǔfǎngwèn]
計數訪問 英文
numbered access
  • : Ⅰ動詞1 (計算) count; compute; calculate; number 2 (設想; 打算) plan; plot Ⅱ名詞1 (測量或計算...
  • : 數副詞(屢次) frequently; repeatedly
  • : 動詞1. (訪問) call on; interview; visit 2. (調查; 尋求) inquiry into; seek by inquiry [search]; try to get
  • : Ⅰ動詞1 (請人解答) ask; inquire 2 (詢問; 慰問) question; ask about [after]; inquire about [aft...
  • 計數 : count; tally; counting計數卡 numbered card
  • 訪問 : visit; call on; interview; access; addressing; reference to
  1. Secondly, there are so many same objects managed in the storage manage system and a greate deal of memory is occupied, and in order to access the resources between processes entry management library is presented. thirdly, this paper also researches the ag ( atomic group ) function, then implements an method to deal with the disater recovery in san and ag make users easier to operate than a volume

    另外,針對存儲管理系統中要保存諸多同類信息、佔用內存大的題,同時考慮到能夠實現進程間的,提出,設並實現了entry管理庫,從而大大降低了內存的使用量。另外,本文還設和實現了ag ( atomicgroup )功能,提供了一種解決災難恢復的方案,同時相對于單個volume的操作,以組為單位操作,簡化了用戶的操作。
  2. Receive details about printer, laser printers and data systems technology in addition to offers on electronic computers or computer systems on the homepage of ctv computer technik vertriebs gmbh zwickau

    Ctv computer technik vertriebs gmbh zwickau是一家現代化的、可靠的產品供應商,這家供應商從事算機,算機系統,據技術,印表機、印刷機,激光印表機的製造、銷售。請您我們的主頁或者發送給我們電子郵件,垂詢當前的信息和服務。
  3. Using the mode of ais network at sea for reference, relying on the background of " human first " navigation human culture, using the theory of modern logistic " bpr, and get the idea of " the core is information flowing ", then describer the seaman ' s work on board particularly. apply some modern technology, such as : network and digital communication, database, visual procedure, from network construction, database designing, database linking, to interaction windows designing, achieve the following functions step by step

    借鑒ais海上網路建設模式,依託以人為本的航海人文背景,利用現代物流理論的過程優化理念,現代物流的核心為信息流的理念,對航海活動中船方工作內容予以細化,利用現代網路與據通信技術、據庫技術、可視化編程技術等,分網路建設、據庫設、編程工具與據庫的方法、可視化界面的設等若干步驟,逐步實現系統如下方面的功能。
  4. It implements web crawling through distributed technology, and builds index database through accidence analyzing chinese characters separating unuseful words deleting etyma extracting index words selecting and lexicon. the level system uses new model of web accessing and level computation to build web level system so that the requirement for computer resources is greatly reduced

    該搜索引擎使用分散式技術實現網頁獲取模塊;通過詞法分析、中文分詞、無用詞匯刪除、詞干提取、索引詞條選擇和詞典等技術建立索引據庫;該搜索引擎的級別系統使用了新的網路模型和級別算模型,大大降低了搜索引擎對于算機資源的要求。
  5. The article points out the importance and necessity of the information - security from its actuality in our country. the resources in the information system, for instance, hardware, software, data, document, operator, meterial and so on, are evaluated and gived safety grade firstly. and then, it analyses the menace including the nonauthorized access, the information leak, the refused sevice, the internal objection which the system will take. the following are the corresponding control police : confirm the users " rights and duties, including the mode of using account, the limit of accessing resource, the application of password, the building of backup ; confirm the administrators " right and duties, including physical safety, system configuration, account configuration and usufruct, password management, audit and control, backup and individual intimity ; run - of - mill measure of security defence, including access control, symbol and identification, integrality control, password technique, firewall system, audit and resumption, safety of operating system, safety of database system, defence of computers " virus and resisting - deny protocol. in the end, the article offers the strategies of disposing the safety - accident and analyse after ithow. to report it, how to solve it in phase, and how to avoid it happening again. in a word, the article presents a holistic resolvent about keeping away the information system ' s security, and supplies a essential frame for its configuration, management and application

    然後,對系統可能受到的威脅,包括非授權、信息泄漏、拒絕服務和內部缺陷等進行分析,並提出了相應的控制策略:確定用戶的權力和責任,包括帳戶使用方式、資源權限、口令應用以及建立備份等;確定系統管理員的權力和責任,包括物理安全、系統配置、帳戶設置及使用權限、口令管理、審和監控、備份以及個人隱私等方面;一般性的安全防護措施:存取控制、標識和認證、完整性控制、密碼技術、防火墻系統、審和恢復、操作系統安全、據庫系統安全、算機病毒防護和抗抵賴協議等。最後,對事故處理和事後分析提供策略,如何報告安全事故,如何協調解決安全事故,如何避免安全事故再次發生。總之,本文對信息系統安全防範工作給出一個整體的解決方案,為其在配置、管理和應用方面提供了基本的框架。
  6. Aiming for the problem of accessing data on different flats, gives some research, limns the server / client system, and based on the transferring ftp net files, uses the method of windows " sockets network programming, devises and achieves the network function, fulfill data accessing using odbc technology

    針對實際中存在的跨平臺題進行了研究。對客戶機/服務器體系作了描述,在ftp的網路文件傳輸的基礎上,利用windowssockets網路編程方法,設實現了網路功能。
  7. At the same time, this article chooses the network framework of its system by analyzing several basic kinds of network system structure. it utilizes network data base programming principle to discuss the visit technology of data base odbc, web data base middle pieces technology cgi, and characteristic of the calculate mode of asp c / s b / s, proposes the topological structure of network data base used in this system

    同時分析了幾種基本的網路體系結構,選擇了系統的網路構架,利用網路據庫編程原理,討論了據庫的技術odbc 、 web據庫中間件技術cgi和asp 、 c s及b s算模式的特點,提出系統中應用的網路據庫拓撲結構。
  8. Similarily, according to the dsp data access pattern and design philosophy of md32, a data memory combined data cache and data rani is proposed. in the md32 rtos, memory management system is one the most important part

    同時,針對dsp中的特點和md32同時兼顧dsp與risc特性的設特點,設了包含據ram和據cache的據存儲系統,並對給出了據存儲系統的規則。
  9. ( 2 ) aiming at the requirement of safe storage of the electronic documents on the information integrated platform in manufacturing enterprise, using encryption / decryption and compression / uncompression techniques and saving the electronic documents as some special attribute object of large database and managing the enterprise electronic documents effectively through database, a safe access mechanism of functional grant < wp = 7 > and recommendatory grant to decrease grant management maintenance cost is proposed and the storage mechanism of special database attribute object is studied and the method for saving, accessing and retrieving electronic document quickly is constructed. thus these methods can make the electronic documents of information integrated platform in manufacturing enterprises get safe, reliable and quick access. ( 3 ) according to this circumstance in which web pages are selected as the user interface of manufacturing application system, the safe measures of access control over web page resources are provided

    ( 2 )針對製造企業信息集成平臺中電子文檔安全存儲要求,採用加密和壓縮技術,將電子文檔作為大型據庫中某種特殊屬性對象來存儲,以據庫方式對企業電子文檔進行集成的、統一的管理,提出一種控制的增強型安全設原則,基於此原則建立了管理授權和推薦式授權的安全機制,用以提高系統的安全性,並大大減少授權管理維護量;研究了特殊屬性對象的據庫存儲機理,從而構造一種快速存儲、和檢索電子文檔的方法,使得企業信息集成平臺的電子文檔獲得安全、可靠、快速的
  10. The amount the timer increments varies across families, as do the spr numbers and instructions to access the timebase

    各實現的時器增量不同, spr時基的指令也不同。
  11. In order to change situation and realize higher education evaluation online, with introducing the origin and the phylogeny of higher education evaluation as the starting point in the paper, analyzing the characteristic of higher education evaluation and comparing several typical evaluation methods each other, we put forward a synthetic evaluation method based on a combination of ahp and fuzzy estimation. then we have made a thorough and careful study in education evaluation work pattern and system structure, in which some related technique, such as active server page technology and web database access technology etc. are discussed

    本文首先介紹高教評估的起源及其發展概況,並分析了高教評估的特點,在深入研究幾種經典的評估方法的基礎上,提出模糊評估與層次分析相結合的綜合評估方法;接著對網上評估系統的工作模式及其體系結構進行探討,並應用相關的理論、技術,如據庫理論、動態網頁技術asp 、和基於asp的web據庫技術等,開發了一個基於算機網路的高等教育評估系統。
  12. This scheme integrates universual data accesss technology of microsoft, which plays a more and more important role in three - lay c / s ( client / server ) and uses the technology of ado ( active data access ), adopts the asp script language in display the results and uses stored procedure of sql server in databases design. in the system of b / s, client realizes a high efficient access to the server database through displaying diversified active controls in browser and using ado to access the data source. the disposing of data accures under the database not in the font of this system. this kind of scheme cannot only bring the system a higher real time response, but also decrease data runoff of the networks, lower the possibility that web server becomes bottleneck of the system and make the system more transplantable

    當前的web據庫技術正處于發展階段,針對這種情況,本文通過分析當前各種流行的web據庫方案的優缺點,結合在三層次的c / s系統中扮演越來越重要的角色的中間件技術,採用了microsoft公司所提出的一致技術,利用ado控制項,結合當前的asp語言,底層據庫採用了sqlserver7 . 0的存儲過程技術,設了一種自己的web據庫方案,即在browser / server系統當中,客戶端通過顯示在瀏覽器中的各種activex控制項,通過了ado連接據庫,據的處理利用了存儲在據庫內部執行,實現對後端據庫的高效,並且這種方案在給系統帶來較高的實時響應性能的同時,減少了網路據流量,降低了web服務器成為系統瓶頸的可能性,也增強了系統的可移植性。
  13. The network information and control exchange ( nice ) protocol that enables various digital computers to access information and control facilities of remote nodes on the same network

    網路信息和控制交換系統協議,能使各種字式算機同一網路中遠程網點的信息和控制設備。
  14. In the preprocessing stage the method of user and session identification often adopt heuristic algorithm for the being of cache and agent. this induce the uncertainty of data resource. the cppc algorithm avoid the limitation and has no use for complicated hash data structure. in this algorithm, by constructing a userld - url revelant matrix similar customer groups are discovered by measuring similarity between column vectors and relevant web pages are obtained by measuring similarity between row vectors ; frequent access paths can also be discovered by further processing of the latter. experiments show the effectiveness of the algorithm. in the fourth part, this thesis bring some key techniques of data mining into web usage mining, combine the characteristic of relation database design and implement a web usage mining system wlgms with function of visible. lt can provide the user with decision support, and has good practicability

    本文演算法避免了這個缺陷,且不需要復雜的hash據結構,通過構造一個userid - uel關聯矩陣,對列向量進行相似性分析得到相似客戶群體,對行向量進行相似性度量獲得相關web頁面,對後者再進一步處理得到頻繁路徑。實驗結果表明了演算法的有效性。第四是本文將傳統據挖掘過程中的各種關鍵技術,引入到對web使用信息的挖掘活動中,結合關系據庫的特點設並實現了一個具有可廣西人學頎士學位論義視化功能的web使用挖掘系統wlgms 。
  15. First, the paper introduces the basic knowledge of the image processing technique, emphasizes the image processing method that is used in the measur - ement system, such as edge detection operator, curve fitting algorithm, espe - cially hough change in detail, etc. second, the paper introduces the vc + + 6. 0 program language, analyses its peculiarity and advantage, explains the form of the image in the computer and dib visiting functions

    首先,介紹了圖像處理方法的基礎知識,特別重點講述了在本系統中將會應用到的一些圖像處理方法,如邊緣檢測運算元、曲線擬合演算法等等,尤其是對于哈夫變換的方法,進行了詳細闡述。其次,介紹了本系統所應用的編程語言vc + + 6 . 0 ,分析了其特點和優點,並說明了模擬圖像字化后,在算機里的存儲格式以及相應的設備無關位圖
  16. During the selecting of operating system, we find that there is an undirected, insufficient and complicated of the mysql + php under linux. so, we are planning to setup a database will be a convenient, fast tool for users who just can find out the related information from the internet. to design and apply software of the rnai medical information database analyzer

    據庫操作系統選擇過程中, linux下mysql + php建立的據庫存在不直觀,據類型不足,且對據庫的修改操作過程復雜等缺點,為了使用戶可以方便、快捷地使用本據庫,軟體設採用了動態據庫交互結構,外部用戶通過網際網路使用通用的瀏覽器就可以據庫。
  17. Describes the various ways you can store and access data on the client computer and fetch data from remote sources

    描述可以用於在客戶端算機上存儲和據以及從遠程源獲取據的各種方式。
  18. The paper introduces a general design pattern of the foundation framework of advertisement inspecting system based on j2ee, and discusses the realization of data layer, business layer, web layer and application client of the system. it resolves the key problems as follows : the consistency of the way of business request expression, the reusability of application services and the security of the system, and make the systems based on this foundation framework easy to configure, and has excellent extensibility and applicability

    論文詳細敘述了基於j2ee的廣告監播系統基礎架構的總體設方案,並著重討論了該系統中層、業務層、 web層、應用客戶端的具體實現,解決了業務請求表達方式的一致性、應用服務的可復用性、系統安全性等關鍵題。
  19. Allows access to the collection of data - binding expressions on a control at design time

    允許在設控制項的據綁定表達式集合。
  20. The paper describes how to develop this network monitor and diagnose system. data acquisition based on pxi, design and accesses sql server database, network remote monitor based on asp. net and remote diagnose based on web service have been finished. a rlv healthy remote and diagnose system is developed and achieve prospective aim

    論文對該網路化監測診斷系統實現的各個方面進行了詳細的介紹,完成了基於pxi的虛擬儀器採集、 sqlserver據庫設、基於asp . net的網路化遠程監測和基於網路服務( webservice )的遠程診斷部分程序設,以航天器為對象,開發了rlv健康監控與遠程診斷系統,達到了預期的設目的。
分享友人