恢復方案 的英文怎麼說

中文拼音 [huīfāngàn]
恢復方案 英文
recovery scheme
  • : Ⅰ形容詞1 (重復) repeated; double; duplicate 2 (繁復) complex; compound Ⅱ動詞1 (轉過去或轉過...
  • : Ⅰ名詞1 (方形; 方體) square 2 [數學] (乘方) involution; power 3 (方向) direction 4 (方面) ...
  • : 名詞1 (長桌) table; desk 2 (案件) case; law [legal] case 3 (案卷; 記錄)record; file 4 (提...
  • 方案 : scheme; plan; programme; project; proposal; suggestion; formula; scenario; outline
  1. Secondly, there are so many same objects managed in the storage manage system and a greate deal of memory is occupied, and in order to access the resources between processes entry management library is presented. thirdly, this paper also researches the ag ( atomic group ) function, then implements an method to deal with the disater recovery in san and ag make users easier to operate than a volume

    另外,針對存儲管理系統中要保存諸多同類信息、佔用內存大的問題,同時考慮到能夠實現進程間的數據訪問,提出,設計並實現了entry管理庫,從而大大降低了內存的使用量。另外,本文還設計和實現了ag ( atomicgroup )功能,提供了一種解決災難,同時相對于單個volume的操作,以組為單位操作,簡化了用戶的操作。
  2. This paper mainly aims at the characteristics of the hardware and software structure of the parallel computer on satellite, and has fulfilled researches of fault tolerant technique in three aspects of control theories and engineering : the first research of the system level fault - tolerant module is based on the system structure of the parallel computer on satellite, a kind of cold backup module and a kind of hot backup module for multiprocessor computer have been put forward. then the research of software fault tolerant technique which is based on the operate system named rtems has been carried, the mission level fault - tolerate arithmetic and the system level fault - tolerate mechanism and strategies based on the check point technique have been put forward, at the same time the self - repair technique of software which has used the technique of system re - inject has been studied. finally the technique of components level fault - tolerant based on fpga has been studied, a kind of two level fault - tolerant project which aims at the fault - tolerant module of the parallel computer on satellite has been put forward, and the augmentative of circuit that project design realization need is little, this project can avoid any breakdown of any part logic circuit of the fpga

    本課題主要針對星載并行計算機體系結構及軟體結構的特點,從如下三個面進行了容錯控制理論研究和實踐工作:首先進行了基於星載多cpu并行計算機體系結構的系統級容錯模型研究,提出了一種多cpu冷備份容錯模型和一種多cpu熱備份容錯模型;然後進行了基於rtems操作系統的軟體容錯技術研究,提出了任務級容錯調度演算法以及基於檢查點技術的系統級容錯機制和策略,同時研究了利用系統重注入進行軟體在線自修的容錯技術;最後研究了基於fpga的部件級容錯技術,提出了對容錯模塊這一星載并行計算機關鍵部件的兩級容錯,實現該所需增加的電路少,可避免板級晶元以及fpga晶元內部任何邏輯發生單點故障。
  3. Therefore effective tools, for example, an expert system to guide users etc, should be offered. namely when data in hard disk has been destroyed, the software should offers a detailed method for user to complete data recovering breezily, according to causes, categories and appearances of faults

    即在硬盤存儲器發生問題,數據信息遭到破壞之後,根據發生問題的原因、種類以及發生問題時的表現等實際情況要能給用戶提供一個詳細的解決,用戶根據提供的這個可以輕松地完成硬盤的數據信息的工作。
  4. After s - cdma processing, the demodulated information and the original information of the same users are equally

    通過驗證每個用戶在模擬處理后均能夠原始信息,證明了的正確性和可行性。
  5. The article points out the importance and necessity of the information - security from its actuality in our country. the resources in the information system, for instance, hardware, software, data, document, operator, meterial and so on, are evaluated and gived safety grade firstly. and then, it analyses the menace including the nonauthorized access, the information leak, the refused sevice, the internal objection which the system will take. the following are the corresponding control police : confirm the users " rights and duties, including the mode of using account, the limit of accessing resource, the application of password, the building of backup ; confirm the administrators " right and duties, including physical safety, system configuration, account configuration and usufruct, password management, audit and control, backup and individual intimity ; run - of - mill measure of security defence, including access control, symbol and identification, integrality control, password technique, firewall system, audit and resumption, safety of operating system, safety of database system, defence of computers " virus and resisting - deny protocol. in the end, the article offers the strategies of disposing the safety - accident and analyse after ithow. to report it, how to solve it in phase, and how to avoid it happening again. in a word, the article presents a holistic resolvent about keeping away the information system ' s security, and supplies a essential frame for its configuration, management and application

    然後,對系統可能受到的威脅,包括非授權訪問、信息泄漏、拒絕服務和內部缺陷等進行分析,並提出了相應的控制策略:確定用戶的權力和責任,包括帳戶使用式、資源訪問權限、口令應用以及建立備份等;確定系統管理員的權力和責任,包括物理安全、系統配置、帳戶設置及使用權限、口令管理、審計和監控、備份以及個人隱私等面;一般性的安全防護措施:存取控制、標識和認證、完整性控制、密碼技術、防火墻系統、審計和、操作系統安全、數據庫系統安全、計算機病毒防護和抗抵賴協議等。最後,對事故處理和事後分析提供策略,如何報告安全事故,如何協調解決安全事故,如何避免安全事故再次發生。總之,本文對信息系統安全防範工作給出一個整體的解決,為其在配置、管理和應用面提供了基本的框架。
  6. Piecemeal restore scenario full recovery model

    段落還原(完整模式)
  7. Fault location techniques are used to pinpoint location of the fault on a tra - nsmission line. transmission line faults must be located accurately to allow maintena - nce crew to arrive at the scene and repair the faulted section as soon as possible, which can relief the burdens of patrol personnel and reduce the revenue losses due to power outage. the accurate fault location alogrithms play an important role in power system safety, economy and reliability. in this paper, diversified fault location algorithms are summarized. according to the principles of algorithms, they can be classified into two categories : impedence based algorithm and traveling wave based algorithm. based on the analysis and comparission of each algorithm, the corresponding merits and app - lication limitations are presented

    精確的故障定位為現場巡線工作人員及時提供準確、可靠的信息,減輕人工巡線的負擔,同時加快線路的供電,減少因停電造成的綜合經濟損失,為提高電力系統運行的安全性、經濟性和可靠性發揮重要的作用。本文總結了現有的各種測距法,根據測距的原理將其分為阻抗法和行波法兩大類,對各種演算法的優缺點及適用范圍進行了分析,在此基礎上提出了一種組合的測距,並對演算法進行了模擬分析。
  8. In the last part of this paper, simulation is given to show the performances of the clock recovery methods. the results prove the good jitter performances of the methods

    從模擬結果可以看出,同步時鐘統計法具有很好的抖動性能,可以作為gpon系統tdm接入的一種高效時鐘恢復方案
  9. In this paper, the design of a specific chip for circuit emulation based on ip is put forward and realized and the main functional modules and the key algorithms including an all - digital adaptive clock recovery method and a dynamic depth buffer algorithm are described in detail

    文章根據相關標準提出並實現了一種電路模擬專用晶元的設計,並對其中主要功能模塊和關鍵演算法作出了詳細說明,包括一種全數字的自適應時鐘法、動態深度緩沖演算法等。
  10. Because of the unique issues in the networks, including mobility - induced disconnection, network partition, high out - of - order delivery ratios and channel errors, the congestion control and the error recovery in the network is challenging. in this environment, the interaction between tcp and mac layer protocols, the affection of route protocols on the performance of tcp and the particular congestion control and error recovery mechanism are first discussed. then a particular transport layer protocol scheme based on the non - feedback mechanism is presented, with emphasis on the analysis and simulation of the key parameter

    文中主要討論了兩種不同網路結構中的無線tcp協議改進,其一在最後一跳為無線鏈路的網路環境中,針對基本tcp擁塞控制機制存在的缺陷,文中在現有解決的基礎上提出一綜合性的,其中包括無線鏈路的高誤碼率和連接斷開問題的解決,並重點對中出現的交叉層問題進行分析和模擬;其二,考慮的是分散式網路( adhoc ) ,在文中較為詳細的分析了tcp和mac層機制間的相互作用、路由協議中造成tcp性能降低的因素、 adhoc網路中應採取的特殊擁塞控制和差錯機制,在此基礎上提出了一種採用非反饋機制的解決,重點對中的關鍵參數進行分析和模擬,分析和模擬結果表明此機制可在很大程度上提高adhoc網路中tcp的性能。
  11. The system uses erasure codes as a means to recreate data in the event that one or more servers fail. the implementation described can tolerate failure rates that approach 33 %

    本系統使用一個erasurecode作為恢復方案,能夠在部分分片丟失的情況將數據文件,其容忍的失敗率可以達到33 。
  12. Database plays a vital role in nmis, therefore the quality of database effects directly on the success of nmis or not. the whole process of database " development is described in detail. meanwhile, we also deeply discuss the databases " performance optimization, backup and restore scheme, the strategy of safe control, data exchange in new and old central blood mis and so on

    數據庫是整個mis大廈的基石,其設計的好壞直接影響到mis設計的成敗,因此,如何設計一個性能優良的數據庫便顯得至關重要,本文詳細地描述了山西省采供血網路管理系統數據庫的設計以及對其進行規范化和非規范化處理的整個過程,此外,文章對數據庫的性能優化、備份與恢復方案、安全控制策略、中心血站新舊mis系統的數據交接等面也進行了較為詳盡的分析和討論。
  13. The results demonstrate that multiple faults of distribution power network can be solved by this approach successfully

    結果證明,配電網多重故障可以由本演算法得出準確的故障恢復方案
  14. According to the current actllality in our country the patients which were scorched and the other patients with the bone fracture that caused by the accident in the middle and anaphase period of medical treatment, in this paper we brings up a project about a machinery for body functional rehabilitation which is consisted of electrical - controlled appliance and control motor

    根據目前我國燒傷病人和其他意外性傷害造成的骨折病人治療中後期肢體功能面的現狀,提出了一種採用電控裝置控制電機來構成肢體運動康機的設計。該肢體運動康機主要由主機、電控裝置、減速器及功能件四個部分組成。
  15. Firstly, by analyzing former researches and visible watermark characteristics, a visible watermarking algorithm with feature of holding image content is realized. secondly, using redundant embedding technique to embed watermark and extracting watermark according to watermark content, a meaningful invisible watermarking scheme is proposed ; thirdly, combining with vision characteristics a resilient - prone scrambling algorithm and a restoring scheme of scrambled image with data loss are proposed, image scrambling technique of irregular region is discussed. based on the proposed algorithms, a digital watermarking system scheme is designed

    通過分析前人的研究進展,結合可見水印特性,在小波域實現了一種具有圖像內容保持特性的可見水印演算法;利用水印冗餘嵌入技術進行水印嵌入,根據水印遭破壞的情況進行水印提取,給出一種有意義水印的嵌入和提取;結合視覺冗餘特性提出並實現了一種易於的圖像置亂演算法和一種受損置亂圖像的恢復方案;探討了不規則區域的圖像置亂法,在此基礎上,設計了一種置亂演算法在數字水印演算法中的應用框架;最後整合本文所提出的演算法,實現了一個基於視覺特性的圖像水印系統。
  16. A general alternate path seeking algorithm of restoration schemes in wireless mesh network

    網路恢復方案的一種通用替代路徑演算法
  17. After comparing english legal system and continent legal system ' s diffirrent principal model and value inclination, analysing china principal model ' s rationation and drawback, the text think that law should adopt the principal model dominated by administration organism and subordinated by law court. law court only examine and execute those case that are important to the party to a lawsuit or difficult to renew

    在對英美模式及德奧模式兩種不同的主體模式及其價值取向進行比較,及對我國強制執行主體模式的合理與不足進行分析之後,認為我國應當採取行政機關自行執行為主導,法院審查執行為補充的主體模式,在劃分執行權限時,法院主要審查執行那些對相對權益影響較大或執行后難以件。
  18. Stuudy on the scheme of backup data and recovery in public health information system

    公共衛生信息系統中數據備份與恢復方案的探討
  19. Managing the encryption keys consists of creating a backup copy, and knowing when and how to restore, delete, or change the keys

    創建對稱密鑰的備份副本,並了解應何時以及如何在部署或恢復方案中使用備份副本至關重要。
  20. High - performance mode can be useful in a disaster - recovery scenario in which the principal and mirror servers are separated by a significant distance and where you do not want small errors to impact the principal server

    高性能模式在嚴重故障恢復方案中非常有用,在這種中,主體服務器和鏡像服務器之間的距離非常大,並且您不希望小錯誤影響主體服務器。
分享友人