data set access 中文意思是什麼

data set access 解釋
數據集存取
  • data : n 1 資料,材料〈此詞系 datum 的復數。但 datum 罕用,一般即以 data 作為集合詞,在口語中往往用單數...
  • set : SET =safe electronic transaction 安全電子交易〈指用信用卡通過因特網支付款項的商業交易〉。n 【埃...
  • access : n. 1. 接近;會面。2. 捷徑,門路〈指方法、手段〉;檢查孔;進路,入口;【自動化】(存貯器的)存取。3. (病的)發作;(怒氣等的)爆發。4. 增加。
  1. Determine scrambler and unify data interface through the adapter layer, to enable different type of conditional access system to set the descrambler by retrieving the descrambler code

    通過適配層對加擾層進行判斷並統一數據介面,使不同的條件接收系統都能成功提取解擾字對解擾器進行設置。
  2. With the gprs wireless data business being widely applied in the areas of banking, lottery, and the oil or gas well monitoring, people set higher demand on the network management system which manages these devices access to the gprs network for wireless data transmission. they require the network management system to ensure the stable and reliable of data transmission by the devices of wireless data transmission, provide the more detail statistic report forms about the online status and online time of all the devices to users

    隨著gprs無線數據業務在銀行、彩票、油氣田監控等領域的廣泛應用,人們對管理接入gprs網路的無線數據傳輸設備的網管系統提出了更高的要求:要求網管系統能保證無線數據傳輸設備傳輸數據穩定、可靠以及能夠為用戶提供詳盡的關于設備在線狀態及時間的報表統計功能。
  3. In actual gis applications, both integrated gis platforms and specialized gis platforms are in demand. to satisfied with a special gis applications which has few spatial data, simple spatial objects, few demand for map ability, more demand for distance data access and more demand for multi - user cooperation ( i. e. : apply gis to telecomm resource management, electric power capital management, land property right management etc. ), a spatial data model based on constructed point set storage is presented

    針對空間信息數據量較小、空間對象相對簡單、圖形功能要求不高,但對遠程數據訪問、多用戶並發操作等功能要求較高的一類特殊應用(如電信資源管理、電力資產管理和宗地管理等) ,本文提出了一個基於構造點集(用於空間圖形對象構造的樣本點的集合,簡稱為構造點集)的全關系型空間數據模型,來滿足該類應用的特殊要求。
  4. Tree view is used in the web interface made the directory data looks more understandable. the function that implement are search entry, edit entry, delete entry, set group, set role, set access control and so on

    基於web的目錄服務客戶端實現的具體功能有:分類查詢、修改密碼、條目的添加、刪除、修改、設置組、設置角色和設置訪問控制等,前臺頁面使用了樹型結構,直觀的反映了目錄服務器中數據的拓撲結構。
  5. For example, sensitive data, such as a social registration number or a password, needs to be protected from access by any component that did not set it

    例如,身份證號或密碼這樣的敏感數據需要受到保護,以防止不設置它的其他組件訪問它。
  6. Concerns about the loss of privacy could be addressed by requiring the ccra and its users to comply with regulations designed to safeguard data privacy. such regulations may include limits on access to credit files, elimination of one s credit history after a set period of time, and the right to access, check and correct one s own file

    關于資料保密方面,可以規定商業信貸資料庫及使用者遵守資料保密的規例,其中包括限制查閱信貸檔案經過某指定時期即刪除信貸記錄,以及容許信貸申請人查閱與更正本身的信貸檔案等。
  7. This new method has the capability of calculating complicated 3d grain burning surface. dealing with evolving interface of complicated material and topology change ( splitting. breaking. merging ), based on level set method and burning surface process law. this technique can get accurate area of burning surface each moment and data of geometrical structure that provide access to examination of grain change in the srm working process. 2

    結合固體火箭發動機燃面推移規律,在等值面函數法基礎上開發的裝藥燃面演算法能夠成功計算任意復雜三維裝藥燃面,並且具有處理復雜物質邊界及其拓撲結構發生變化(如分裂、破碎、合併)的能力,能夠準確計算出發動機工作過程中各個時刻裝藥的燃燒面積,同時輸出裝藥幾何構形數據直觀地觀察裝藥的變化情況; 2
  8. When you set up your data warehouse, you must define the agent sites that the warehouse will use to access source and target databases

    在設置數據倉庫時,必須定義倉庫將用來訪問源數據庫和目標數據庫的代理站點。
  9. The set of security services offered includes access control, connectionless integrity, data origin authentication, protection against replays, confidentiality, and limited traffic flow confidentiality

    Ipsec協議提供的安全服務集包括存取控制、無連接的完整性、數據源鑒別、反重放攻擊、機密性和有限的通信量的機密性。
  10. The techniques of establishment and access for multidimensional dataset are discussed. we implement multidimensional query, including drill up / down, slicing etc, and the update of multidimensional data set by the technique of mdx, ado md and dso. the expression of operation by graphic is also implemented

    對多維數據集的生成和訪問技術作了討論,通過mdx 、 adomd和dso技術實現了olap多維查詢和多維數據集的更新,其中包括淺化、深化、切片等操作,並進一步實現了操作的圖形化顯示。
  11. Firstly, in this paper, we review the histories of xml and xml database, and all kinds of data models used widely now. then we review traditional access control policies and policies specially used on xml, and present a new expression method of access set on xml based on child tree of w3c data model. and we bring rbac model into xml database and present a new xml access model x - rbac. because the usage of data in databases has high frequency, we present an ids model based on access set density to logging the potential security threats. and then we introduce the design and implementation of a prototype of our native xml database nhx and its access control system. finally, we draw a conclusion for this paper and the future work

    本文首先回顧了xml及xml數據庫的歷史,並總結了目前廣泛使用的xml數據模型,在分析了各種傳統數據庫訪問控制策略,以及xml的專有訪問控制策略的優缺點后,基於w3c的xml數據模型,提出了一種基於子樹的具有高彈性的便於實現的的訪問區域表示法,並將rbac模型引入進來,提出了一種適用於xml數據庫的訪問控制模型x - rbac ,同時為了區分xml數據庫訪問中的合法訪問和合理訪問,我們根據數據庫訪問具有頻繁性這一特徵,提出了一種基於區域訪問密度的入侵檢測模型( ids ) ,以對隱藏在正常訪問中的潛在安全威脅進行報警和日誌。
  12. Enterprise information system framework provides a series of reusable groupware, such as persistence layer which introduces dynamic value object 、 value list hander and command pattern, it encapsulates the detail of accessing database and affords the interface of different persistence layer framework ; basing on asynchronous javascript and xml ( ajax for short ), we develops the client validity check engine 、 dynamic cascading menu and common 、 dynamic tree structure groupware, as well as a set of tag library which include query 、 pagination 、 cache an so on. they reduce the code redundancy and predigests the development of interface layer enormously ; the security subsystem which is based on secure socket layer ( ssl for short ) and role - based access control ( rbac for short ) ensures the data security transmission and privilege control. furthermore, the model of enterprise application integration ( eai for short ) which based on web services, it supply some helpful explore for the sake of system integration and data communion for the future

    企業信息系統框架提供了一系列可復用組件,例如採用動態vo 、值列表處理器以及命令模式的持久層組件,封裝了數據庫訪問細節,並為不同的持久層框架提供調用介面;基於ajax ( asynchronousjavascriptandxml )技術的客戶端校驗引擎、動態級聯菜單以及通用動態樹型結構組件,一系列查詢、分頁、緩存等標簽庫則減少了表示層的代碼冗餘,簡化了表示層開發;基於ssl登錄以及基於角色的訪問控制的安全子系統則初步實現了數據安全傳輸和權限控制;此外基於web服務的企業應用集成模型為今後系統集成、數據共享提供了有益探索。
  13. Analyze the systematic structure of the product data management system and study the object representation of the product data integration model, the product data attribute and operation, the product information modeling and the theory and method of access control modeling in order to set up the object model of the product data access control and describe the data base conversion of the object model and executive method

    分析產品數據管理系統的體系結構,研究產品數據的集成模型的對象表示,產品數據屬性和操作,產品信息建模和訪問控制建模的理論和方法;建立產品數據訪問控制的對象模型,並說明對象模型的數據庫轉換和實現方法。
  14. Discusses the capability available in the. net framework of synchronous access to both relational and hierarchical views of a single set of data, and shows how to create a synchronous relationship between a

    討論. net framework中提供的同步訪問單個數據集的關系和分層視圖的功能,並解釋如何在dataset和
  15. In tcp / ip protocol suite, the ipsec protocol provide interoperable, high quality, cryptographically - based security for ipv4 and ipv6. the set of security services offered includes access control, connectionless integrity, data origin authentication, protection against replays ( a form of partial sequence integrity ), confidentiality ( encryption ), and limited traffic flow confidentiality

    在tcp ip協議族中, ipsec ( internetprotocolsecurity )協議提供的安全服務保證數據在網路傳輸過程中的機密性、完整性和抗重放保護,以及對網路通信中的通信流分析攻擊提供有限的保護, ipsec協議還提供對網路的訪問控制能力。
  16. Three kinds of data access objects dao, rdo, ado and windows dna structure of three are discussed at length. integration mode of software system is summarized and a set of software is programmed on this basis to realize the database management of experiment data. in addition, another set of vod management system software is programmed to ensure its normal operation and effective management

    本文回顧了數據管理方式的發展歷史,對數據庫,特別是sqlserver2000進行了比較詳細的介紹,討論了三種數據訪問對象: dao 、 rdo 、 ado ,詳細討論了windowsdna三層結構,對軟體系統集成方法進行了概述,然後在此基礎上編制了一套針對實驗數據的數據庫管理軟體,實現了對實驗數據的數據庫管理,另外還在導師原有科研工作的基礎上,進行理論分析,並改進編制了一套視頻點播管理系統軟體,實際運行證明,可保證視頻點播系統的正常運轉和有效管理。
  17. The thesis use role based access control model, design a set of logical data model and propose the basic algorithm for access database

    在數據訪問控制方面採用了基於角色的安全策略,設計了數據訪問控制的邏輯模型和基本方法。
  18. Each guest room is well set up for business travelers, with fast internet access, a large movable work desk with ergonomic chair and dedicated data ports for lap top computer connection and e - mail capability

    酒店每間客房均為商旅客人提供方便,設有可移動式大型寫字臺,快速上網介面連接網際網路及電子郵件服務。
  19. A continuous space on a direct access storage volume, occupied by or reserved for a particular data set, data space, or file

    直接存取存儲卷中的一種連續空間,為一個特定的數據集、數據空間或文件所?據,或為其所保留。
  20. An index that is used by a control program to locate one or more blocks of data that are stored in separate areas of a data set in direct access storage

    由控製程序使用的一種索引,用來對一個或多個數據塊進行定位,這些數據塊存儲在直接存取存儲器中數據集的分離區域中。
分享友人