恢復信息 的英文怎麼說

中文拼音 [huīxìn]
恢復信息 英文
retrieval
  • : Ⅰ形容詞1 (重復) repeated; double; duplicate 2 (繁復) complex; compound Ⅱ動詞1 (轉過去或轉過...
  • : Ⅰ名詞1 (呼吸時進出的氣) breath 2 (消息) news 3 (利錢; 利息) interest 4 [書面語] (子女) on...
  1. Secondly, there are so many same objects managed in the storage manage system and a greate deal of memory is occupied, and in order to access the resources between processes entry management library is presented. thirdly, this paper also researches the ag ( atomic group ) function, then implements an method to deal with the disater recovery in san and ag make users easier to operate than a volume

    另外,針對存儲管理系統中要保存諸多同類、佔用內存大的問題,同時考慮到能夠實現進程間的數據訪問,提出,設計並實現了entry管理庫,從而大大降低了內存的使用量。另外,本文還設計和實現了ag ( atomicgroup )功能,提供了一種解決災難的方案,同時相對于單個volume的操作,以組為單位操作,簡化了用戶的操作。
  2. Therefore effective tools, for example, an expert system to guide users etc, should be offered. namely when data in hard disk has been destroyed, the software should offers a detailed method for user to complete data recovering breezily, according to causes, categories and appearances of faults

    即在硬盤存儲器發生問題,數據遭到破壞之後,根據發生問題的原因、種類以及發生問題時的表現等實際情況要能給用戶提供一個詳細的解決方案,用戶根據提供的這個方案可以輕松地完成硬盤的數據工作。
  3. After s - cdma processing, the demodulated information and the original information of the same users are equally

    通過驗證每個用戶在模擬處理后均能夠原始,證明了方案的正確性和可行性。
  4. The article points out the importance and necessity of the information - security from its actuality in our country. the resources in the information system, for instance, hardware, software, data, document, operator, meterial and so on, are evaluated and gived safety grade firstly. and then, it analyses the menace including the nonauthorized access, the information leak, the refused sevice, the internal objection which the system will take. the following are the corresponding control police : confirm the users " rights and duties, including the mode of using account, the limit of accessing resource, the application of password, the building of backup ; confirm the administrators " right and duties, including physical safety, system configuration, account configuration and usufruct, password management, audit and control, backup and individual intimity ; run - of - mill measure of security defence, including access control, symbol and identification, integrality control, password technique, firewall system, audit and resumption, safety of operating system, safety of database system, defence of computers " virus and resisting - deny protocol. in the end, the article offers the strategies of disposing the safety - accident and analyse after ithow. to report it, how to solve it in phase, and how to avoid it happening again. in a word, the article presents a holistic resolvent about keeping away the information system ' s security, and supplies a essential frame for its configuration, management and application

    然後,對系統可能受到的威脅,包括非授權訪問、泄漏、拒絕服務和內部缺陷等進行分析,並提出了相應的控制策略:確定用戶的權力和責任,包括帳戶使用方式、資源訪問權限、口令應用以及建立備份等;確定系統管理員的權力和責任,包括物理安全、系統配置、帳戶設置及使用權限、口令管理、審計和監控、備份以及個人隱私等方面;一般性的安全防護措施:存取控制、標識和認證、完整性控制、密碼技術、防火墻系統、審計和、操作系統安全、數據庫系統安全、計算機病毒防護和抗抵賴協議等。最後,對事故處理和事後分析提供策略,如何報告安全事故,如何協調解決安全事故,如何避免安全事故再次發生。總之,本文對系統安全防範工作給出一個整體的解決方案,為其在配置、管理和應用方面提供了基本的框架。
  5. Information that is encrypted only by an irretrievable key will be lost

    僅由不可密鑰加密的將會丟失。
  6. The site provides information resources focusing on limnology , lake management and freshwater benthic ecology , as well as the domain of sustainable development of freshwater and marine eco - systems , including knowledge of limnology, eutrophication, pollutants, lake restoration, as well as other related information

    該網站重點提供有關湖沼學、湖泊管理和淡水底層生態學以及淡水和海洋生態系統可持續發展領域的資源,內容包括湖沼學、富營養化、污染物、湖泊的知識以及其他有關的
  7. When the user is performing the recovery process using the rcd set, the following error message could be seen

    當用戶使用cd組件操作過程時,會出現下面報錯
  8. The architecture of client / server based on transaction middleware is a typical kind of the distributed on - line transaction processing, becoming a major platform of enterprise information system, which offers communication of striding platform, loading balance, fault - tolerant and resumable ability, and strengthens a new generation middleware in common with 3 - layer architecture provided with the strong security, excellent management and high availability in common. numerous distributed system, different database and different network environment are closely linked up among an enterprise, offering the function of mutual operation on application layer

    基於交易中間件的c s結構是一種典型的分散式事務處理系統,成為構築企業系統的主流平臺,它提供了強大的跨平臺通訊、負載平衡、容錯及其故障能力,並在這個基礎上進一步強化了安全性、可管理性和高可用性的新一代通用型三層結構平臺的中間件,把企業中眾多的異構系統、異構數據庫、不同網路環境緊密的聯系起來,並在應用層提供了互操作性的功能。
  9. Fault location techniques are used to pinpoint location of the fault on a tra - nsmission line. transmission line faults must be located accurately to allow maintena - nce crew to arrive at the scene and repair the faulted section as soon as possible, which can relief the burdens of patrol personnel and reduce the revenue losses due to power outage. the accurate fault location alogrithms play an important role in power system safety, economy and reliability. in this paper, diversified fault location algorithms are summarized. according to the principles of algorithms, they can be classified into two categories : impedence based algorithm and traveling wave based algorithm. based on the analysis and comparission of each algorithm, the corresponding merits and app - lication limitations are presented

    精確的故障定位為現場巡線工作人員及時提供準確、可靠的,減輕人工巡線的負擔,同時加快線路的供電,減少因停電造成的綜合經濟損失,為提高電力系統運行的安全性、經濟性和可靠性發揮重要的作用。本文總結了現有的各種測距方法,根據測距的原理將其分為阻抗法和行波法兩大類,對各種演算法的優缺點及適用范圍進行了分析,在此基礎上提出了一種組合的測距方案,並對演算法進行了模擬分析。
  10. In the receive site, we operate non - chaos synchronization in reverse and resume binary message sequence by the correlated rule of the sender

    接收端根據發送端的相關規則,進行非混沌同步的逆運算,出二進制序列。
  11. How to restore the blurred image in this case

    如何在不足的情況下模糊圖像?
  12. Abstract : the restoration of the riparian vegetation disturbed by human activities is one of the hotspots of watershed ecology. through interpreting the images of remote sensing in 1985 and 1999, the basic information of forest resources of lushuihe forest bureau, which is a typical forest area of changbai mountain, was obtained with support of gis. by dividing land covers of lushuihe area into 10 types ( water body, residential land, stump land, farming land, wetland, mature conifer forest, midlife conifer forest, mature broadleaf forest, midlife broadleaf forest, and man - made young forest ) and dividing the riparian zone into four buffers ( in turn, 1000, 2000, 3000, 4000 m away from the river ), the changes of riparian forest resources during 1985 - 1999 were analyzed. the results showed that the deforestation intension has obviously decreased and the whole environment has been evidently improved, but the riparian ecosystem was still flimsy. in buffer 1, 2, 3, the area of midlife conifer forest increased largely, but the areas of other types of land covers all decreased. midlife conifer forest had a comparatively good status in the three buffers. in buffer 4, midlife conifer forest, mature conifer forest, and mature broadleaf forest formed a forest - age rank that is helpful to stabilize the forest ecosystem and exert its functions. area percentage of wetland decreased in buffer 1, buffer 2, and buffer 3, even in buffer 4 in which forest ecosystem rehabilitated comparatively well, so protecting and rehabilitating wetland is a very difficult task

    文摘:本文對兩期遙感圖像進行解譯,並在gis支持下提取露水河林業局主要河流兩岸各緩沖區森林資源,經分析得到各類地物在1985年及1999年的變化趨勢.結果表明:在河流沿岸對森林的採伐強度1999年較1985年明顯減小,整體生態環境較1985年有所改善.在緩沖區1 , 2 , 3除中齡針葉林大幅度增加外,其它地物類型面積均減少,由此可以看出,在這三個緩沖區內針葉林得到了較好的.在緩沖區4內,中齡針葉林、成熟針葉林、成熟闊葉林形成一個林齡梯隊,有利於森林生態系統的穩定與功能的發揮,十五年間緩沖區4受到的干擾相對較小.濕地數量在四個緩沖區內均有所減少,雖然在緩沖區4內森林生態系統的較好,但濕地面積仍有所減少,說明保護及濕地資源是一件非常艱巨的任務,必須引起高度重視.圖5表2參12
  13. The restoration of the riparian vegetation disturbed by human activities is one of the hotspots of watershed ecology. through interpreting the images of remote sensing in 1985 and 1999, the basic information of forest resources of lushuihe forest bureau, which is a typical forest area of changbai mountain, was obtained with support of gis. by dividing land covers of lushuihe area into 10 types ( water body, residential land, stump land, farming land, wetland, mature conifer forest, midlife conifer forest, mature broadleaf forest, midlife broadleaf forest, and man - made young forest ) and dividing the riparian zone into four buffers ( in turn, 1000, 2000, 3000, 4000 m away from the river ), the changes of riparian forest resources during 1985 - 1999 were analyzed. the results showed that the deforestation intension has obviously decreased and the whole environment has been evidently improved, but the riparian ecosystem was still flimsy. in buffer 1, 2, 3, the area of midlife conifer forest increased largely, but the areas of other types of land covers all decreased. midlife conifer forest had a comparatively good status in the three buffers. in buffer 4, midlife conifer forest, mature conifer forest, and mature broadleaf forest formed a forest - age rank that is helpful to stabilize the forest ecosystem and exert its functions. area percentage of wetland decreased in buffer 1, buffer 2, and buffer 3, even in buffer 4 in which forest ecosystem rehabilitated comparatively well, so protecting and rehabilitating wetland is a very difficult task

    本文對兩期遙感圖像進行解譯,並在gis支持下提取露水河林業局主要河流兩岸各緩沖區森林資源,經分析得到各類地物在1985年及1999年的變化趨勢.結果表明:在河流沿岸對森林的採伐強度1999年較1985年明顯減小,整體生態環境較1985年有所改善.在緩沖區1 , 2 , 3除中齡針葉林大幅度增加外,其它地物類型面積均減少,由此可以看出,在這三個緩沖區內針葉林得到了較好的.在緩沖區4內,中齡針葉林、成熟針葉林、成熟闊葉林形成一個林齡梯隊,有利於森林生態系統的穩定與功能的發揮,十五年間緩沖區4受到的干擾相對較小.濕地數量在四個緩沖區內均有所減少,雖然在緩沖區4內森林生態系統的較好,但濕地面積仍有所減少,說明保護及濕地資源是一件非常艱巨的任務,必須引起高度重視.圖5表2參12
  14. Crystal skulls work with consciousness. they can restore balance to your subtle bodies. many store information and are called recorder crystals

    水晶頭骨與意識一同工作。它們可以你精細身體的平衡。多數保存,它們被稱之為記錄水晶。
  15. Regisration subsystem is mainly used to complete the user - related operations such as the information input, cerificate application, information checkup, information upgrade, information abolishment, information recovery and information frozen and thawing

    用戶注冊子系統用戶注冊子系統主要完成用戶的錄入、證書申請、審核、更新、廢除、、凍結、解凍等一系列與用戶直接相關的操作。
  16. A stereo matching approach based on edge feature is proposed. the procedure of the correspondence is fulfilled through the edge - detection, the similarity check and the consistence check. rebuild 3d image for disperse data and achieve depth information

    提出基於邊緣特徵的立體匹配方法,通過邊緣檢測、相似性檢驗和相容性檢驗完成了匹配的全過程,並對得到的離散數據進行了三維重建,深度
  17. Based on perspective model, it was proposed that drawing camera inner parameters with physics method ; in image processing, especially the particularity of robot object localization and tracking, it was proposed that several effective methods of image smoothing and sharpening, edge detection, boundary tracking ; at the same time, in order to complete object recognition, we introduced the methods of drawing object character parameters ; in object image matching, two kinds of effective object matching arithmetic was proposed ; based on the principle of object 3d information restoration, we proposed two kinds of arithmetic of 3d coordinate restoration of object feature points, and completed object movement parameters estimate and object tracking and prediction, and presented experimental result

    以透視成像模型為基礎,提出了用物理方法來提取攝像機內部參數;從圖像處理角度出發,針對機器人目標定位與跟蹤的特殊性,提出了幾種行之有效的圖像平滑、銳化、邊緣提取以及邊界跟蹤的方法;同時,為了完成目標的識別,介紹了目標特徵參數的提取方法;在目標圖像匹配上,提出了兩種快速有效的目標匹配演算法;基於目標深度原理,提出兩種目標特徵點三維坐標的方法,同時完成了目標運動參數估計和目標的跟蹤與預報,並最後給出了實驗結果。
  18. Gets the recovery information of an enlistment

    獲取登記的恢復信息
  19. I am also interested in knowing in particular if anyone had it done by dr

    除了解除蹼狀粘連外,最好還有嚴重的關節攣縮(伸不直)的
  20. Then, when you want to restore the information, use the

    然後,當您想恢復信息時,可使用
分享友人