identification of user 中文意思是什麼

identification of user 解釋
用戶標識
  • identification : n. 1. 認出,識別,鑒定,驗明(罪人正身等)。2. 【心理學】自居作用。3. 身分證。4. 【數學】黏合,同化。
  • of : OF =Old French 古法語。
  • user : n. 1. 使用者,用戶。2. 吸毒成癮者。n. 【法律】(財產等的)使用(權),行使(權),享受(權),享有(權)。
  1. In the preprocessing stage the method of user and session identification often adopt heuristic algorithm for the being of cache and agent. this induce the uncertainty of data resource. the cppc algorithm avoid the limitation and has no use for complicated hash data structure. in this algorithm, by constructing a userld - url revelant matrix similar customer groups are discovered by measuring similarity between column vectors and relevant web pages are obtained by measuring similarity between row vectors ; frequent access paths can also be discovered by further processing of the latter. experiments show the effectiveness of the algorithm. in the fourth part, this thesis bring some key techniques of data mining into web usage mining, combine the characteristic of relation database design and implement a web usage mining system wlgms with function of visible. lt can provide the user with decision support, and has good practicability

    本文演算法避免了這個缺陷,且不需要復雜的hash數據結構,通過構造一個userid - uel關聯矩陣,對列向量進行相似性分析得到相似客戶群體,對行向量進行相似性度量獲得相關web頁面,對後者再進一步處理得到頻繁訪問路徑。實驗結果表明了演算法的有效性。第四是本文將傳統數據挖掘過程中的各種關鍵技術,引入到對web使用信息的挖掘活動中,結合關系數據庫的特點設計並實現了一個具有可廣西人學頎士學位論義視化功能的web使用挖掘系統wlgms 。
  2. This thesis includes four parts in which the technologies of web usage mininig are systematically researched. in the first part we summarize the techniques of data mining and web usage mining, present the significance of the research on web usage mininig, the status of research and the problem which web usage mininig will face with. in the second part we discuss the web usage mininig according to the process of web mining. in the stage of data preparing and preprocessing we discuss the algorithm of data cleaning, user and session identification in detail, and present a data model of association rules and sequential patterns in the stage of pattern discovery, discuss the useful method of pattern analysis in last stage. a synthesis clustering algorithm cppc is proposed in the third part of this thesis

    本文分主要從以下四個方面對web使用挖掘進行了系統的分析和研究。第一是對數據挖掘和web挖掘進行了概述,闡述了web挖掘的意義、研究的現狀、面臨的問題。第二是討論了web使用挖掘的三個階段:在數據準備和預處理階段重點討論了數據清洗及用戶和會話識別演算法;在模式發現階段定義了關聯規則和序列模式的數據模型;模式分析階段則討論了現行的幾種分析方法。
  3. The editing system interface of media asset management system integrates the user authority identification, the module of downloading and uploading, the selection of programs and advertisements, the configuration of transferring data information, the display of downloading stuff information, the restriction of system requirement, audio formats ’ selectivity conversion and other functions

    媒體資產管理系統的編輯系統介面里,集成了用戶權限識別、導入導出模塊、節目廣告分選、上傳素材信息設置、下載素材信息顯示、系統要求限定、音頻格式可選擇性轉換等功能。
  4. Safety inspectors, meter readers, and fee collectors of a power supply enterprise shall present proper identification when entering user ' s house to conduct safety inspections, read the meters, or collect the fees

    供電企業查電人員和抄表收費人員進入用戶,進行用電安全檢查或者抄表收費時,應當出示有關證件。
  5. Returns the login identification name of the user

    返回用戶的登錄標識名。
  6. In addition, qcode also makes use of cantonese, pin yin and zu yin phonetic input methods, user defined phrase functions, a dictionary and the identification of similar pronunciation of words as secondary input tools

    此外,快碼亦集合廣東拼音及注音輸入法,加入用家片語功能鍵及字典,還有以同音字輸入所需文字的功能。
  7. Whether damages - produces are the liability subjects shall be examined by fault liability and no feult liability. while the subject of fault liability is determined by the standard " fault ", that of no fault liability is decided by the transportation interests. using the two standards : fault and transportation interests, the author specifically analyze the identification of liability subjects under such circumstance as the drive by a thief or unorthorized person, a lease - holder, a borrower, a purely transferee, or a employee, nominal user, or by a nominal remainder

    第二部分:機動車交通事故損害賠償責任主體的認定考慮到機動車交通事故的致害人可能不只一人,致害人是否為責任主體,須經過輔責任和無過錯責任兩個原則的撿驗,本部分詳細分析了無過錯責任之責任主體的認定標準,並具體分析了盜竊駕駛和擅自駕駛、租賃和借用、單純轉移機動車佔有、雇員為僱主駕駛、名義貸與和名義殘留場合下的損害賠償責任主體。
  8. The identification of the individual by someone known to the data user

    由資料使用者認識的其他人識辨該人的身分。
  9. Pcd advanced the state - of - the - art with a series of innovations ranging from the very first laptop computers to the latest high - security technologies, such as the built - in " air - bag that protects data, and biometric identification that protects user identity

    其目的為使電腦運算技術更在家庭與工作使用應用上更為便利,因而促成ibm個人電腦部門pcd成立,專門研發並推展個人電腦應用。
  10. The purs can attain the automatic identification of user interests, the automatic formation of user model and meanwhile the system can assist users in the construction of retrieval request, the inquiry of information and the acceptance of pushed information

    Piirs系統實現自動識別用戶興趣,自動生成用戶角色模型,幫助用戶生成檢索請求,向用戶推送信息等。
  11. Mapping table of user and role is established through their relevance, and authorizing table of role and table is obtained in terms of map relevance among role, database, database table. by the role ' s flag number, certification server dynamically applies different secure identification technique to give identification to users, and gives authorization decision according to result of identification. the method realizes authorization through program, and is not dependent on concrete database

    根據用戶與角色的映射關聯來獲得用戶和角色的映射表,根據角色、數據庫和數據庫表映射關聯來獲得角色和數據庫表的授權表,通過角色的標識數字,認證服務器動態採用不同安全級別的認證技術對用戶進行認證,並能根據認證結果作出授權判斷,這種方法使用應用程序來實現授權而不需依賴于具體數據庫。
  12. Returns the login identification number of the user

    返回用戶的登錄標識號。
  13. Is the login identification number of the user

    用戶的登錄標識號。
  14. The following example returns the login identification name of the user with a login identification number of

    以下示例將返回登錄標識號為
  15. This essay first dicussed the key steps of preprocessing in web log mining, which include data abstract, data cleaning, user and session identification and path completion etc. especialy we proposed the algorithm of the web log data preprocessing include frame page. and secondly we discussed the technology of building an adaptive web site, include log data cluster mining, user visiting pattern learning, site structure transformation and presentation etc. ; and we proposed indual user log visiting pattern, user model onling learning algorithm, index pages synthesising algorithm, site structure transformation and presentation algorithm and so on

    本論文首先討論了web日誌挖掘預處理中的各步驟:數據抽象、數據清洗、用戶與會話識別、訪問路徑補全,給出了每一步驟的演算法實現;並特別討論了含有frame頁的日誌數據預處理過濾演算法。其次討論了構建自適應站點技術,包括日誌數據聚類挖掘、用戶訪問模式學習、站點結構轉化與呈現等;提出了單用戶日誌訪問模型,給出了用戶模型在線學習演算法、索引頁面綜合演算法、站點結構轉化及呈現演算法等。
  16. Security identification number of the logged - in user

    登錄用戶的安全標識號sid 。
  17. In recent years, some new concepts of information security have been proposed, especially in the application of intellectual property right protection, copyright protection and tamper - proofing. information hiding and digital watermarking are new measures of digital media protection, which are processes of embedding hidden messages within digital media such as text, images, video and audio. the hidden messages could be copyright information, user distributor identification number, company logo, personal signature, control bits, or any information considered useful for a specific application

    信息隱藏與數字水印技術就是一種新的數字媒體保護措施,它是將特定的信息(如版權信息、秘密消息等)嵌入到圖像、語音、視頻及文本文件等各種數字媒體中,以達到標識、注釋及版權保護等目的,同時,這種信息對宿主媒體的影響不足以引起人們的注意且具有特定的恢復方法,此信息對非法接收者應該是不可見、不可察覺的。
  18. User identification and message authentication are two important aspects of network security. an interactive /. cro knowledge proofs based user identification and also a cross - domain message authentication scheme are proposed in the paper

    本文還設計了一個跨域的信息認證系統,給出了協同產品開發中的跨域信息模型,並提出了相應的跨域認證方案。
  19. As well as preserving the current advantages of otp, otpap also patches up some faults successfully : it can be used not only for the identification of users, but also for preventing effectively the fake login. besides, it can construct a reliable security information channel between the users and login nodes, and otpap also supports the remote modification of secret pass - phrases and iterative values even if the user ' s secret pass - phrase has been leaked or the iterative value has been zero

    Otpap除了保持otp現有的優點外,還成功地彌補了otp的這些缺陷: otpap不但可用於鑒別用戶,也可以有效地防範假冒的登錄節點,並能在用戶和登錄節點之間建立可靠的保密通道; otpap還支持遠程修改秘密通行短語和迭代值,即使用戶的秘密通行短語已經泄密了或者用戶的迭代值已經為0 。
  20. " user monitor system " will confirm the identification of a certain operator by different entry cards and than confirm the operation he or she can do

    用戶管理功能系統可根據不同的登錄卡片確定當前操作員的身份,從而確定該操作員能進行的操作
分享友人