操作管理數據 的英文怎麼說

中文拼音 [cāozuòguǎnshǔ]
操作管理數據 英文
function management data
  • : Ⅰ動詞1 (抓在手裡; 拿; 掌握) hold; grasp 2 (做; 從事) act; do; operate 3 (用某種語言、方言說...
  • : Ⅰ名詞1 (管子) pipe; tube 2 (吹奏的樂器) wind musical instrument 3 (形狀似管的電器件) valve;...
  • : Ⅰ名詞1 (物質組織的條紋) texture; grain (in wood skin etc ) 2 (道理;事理) reason; logic; tru...
  • : 數副詞(屢次) frequently; repeatedly
  • : 據Ⅰ動詞1 (占據) occupy; seize 2 (憑借; 依靠) rely on; depend on Ⅱ介詞(按照; 依據) according...
  • 操作 : 1 (按照一定的程序和技術要求進行活動) operate; manipulate; handle 2 (所進行的若干連續生產活動的...
  • 管理 : manage; run; administer; supervise; rule; administration; management; regulation
  • 數據 : data; record; information
  1. Secondly, there are so many same objects managed in the storage manage system and a greate deal of memory is occupied, and in order to access the resources between processes entry management library is presented. thirdly, this paper also researches the ag ( atomic group ) function, then implements an method to deal with the disater recovery in san and ag make users easier to operate than a volume

    另外,針對存儲系統中要保存諸多同類信息、佔用內存大的問題,同時考慮到能夠實現進程間的訪問,提出,設計並實現了entry庫,從而大大降低了內存的使用量。另外,本文還設計和實現了ag ( atomicgroup )功能,提供了一種解決災難恢復的方案,同時相對于單個volume的,以組為單位,簡化了用戶的
  2. Then this paper concerns about the network packet intercepting technology of linux os and gives a thoroughly overview of network hacking methods and some application protocol criterion, including http, ftp, telnet, nntp, pop3, smtp etc. then the system design scheme of the transparent proxy has been discussed, this system can be divided to 4 modules below : establishment of transparent charnel, implement of proxy service, gui configuration and management application, accessory filter functions ( such as url filter, command filter and logger etc ). we explain key techniques in all 4 main parts of this system, define the interfaces of each module, what is more the main data structures and software implements codes are all illustrated

    首先,論文陳述了防火墻的相關技術基礎,分析了透明代為一種先進易用的防火墻技術的原,闡述了linux系統網路包攔截技術和http 、 ftp 、 telnet 、 nntp 、 pop3 、 smtp等應用層協議的協議規范和具體的工流程。接著敘述了本透明代服務器的系統總體設計方案,將系統分為以下幾個部分:透明通道建立、代服務實現、 gui配置程序以及過濾功能(如url過濾、命令過濾和日誌審計等) 。論文然後分別介紹各個關鍵部分的具體實現要點,解釋了相互間的介面關系,列出了主要結構和實現流程。
  3. Multithreading and message drive mechanism is applied to simulate the intercurrent and schedule of the multitask in power distribution system, which builds the foundation of the development based on real - time operation of the project. at the same time, the software deals with the real - time data by the means of memory database and uses the thread security class to maintain the data ' s integrity

    利用windows的消息驅動和多線程機制模擬了配電系統中多任務的並發和調度過程,為課題在嵌入式實時系統下的開展打下了一定的基礎;同時,對系統中大量實時則採用內存方式,並利用線程安全類來保證讀取的完整性。
  4. The article points out the importance and necessity of the information - security from its actuality in our country. the resources in the information system, for instance, hardware, software, data, document, operator, meterial and so on, are evaluated and gived safety grade firstly. and then, it analyses the menace including the nonauthorized access, the information leak, the refused sevice, the internal objection which the system will take. the following are the corresponding control police : confirm the users " rights and duties, including the mode of using account, the limit of accessing resource, the application of password, the building of backup ; confirm the administrators " right and duties, including physical safety, system configuration, account configuration and usufruct, password management, audit and control, backup and individual intimity ; run - of - mill measure of security defence, including access control, symbol and identification, integrality control, password technique, firewall system, audit and resumption, safety of operating system, safety of database system, defence of computers " virus and resisting - deny protocol. in the end, the article offers the strategies of disposing the safety - accident and analyse after ithow. to report it, how to solve it in phase, and how to avoid it happening again. in a word, the article presents a holistic resolvent about keeping away the information system ' s security, and supplies a essential frame for its configuration, management and application

    然後,對系統可能受到的威脅,包括非授權訪問、信息泄漏、拒絕服務和內部缺陷等進行分析,並提出了相應的控制策略:確定用戶的權力和責任,包括帳戶使用方式、資源訪問權限、口令應用以及建立備份等;確定系統員的權力和責任,包括物安全、系統配置、帳戶設置及使用權限、口令、審計和監控、備份以及個人隱私等方面;一般性的安全防護措施:存取控制、標識和認證、完整性控制、密碼技術、防火墻系統、審計和恢復、系統安全、庫系統安全、計算機病毒防護和抗抵賴協議等。最後,對事故處和事後分析提供策略,如何報告安全事故,如何協調解決安全事故,如何避免安全事故再次發生。總之,本文對信息系統安全防範工給出一個整體的解決方案,為其在配置、和應用方面提供了基本的框架。
  5. The chip simulation network laboratory system this paper disguessed is a distribute network simulation system based on lan. the system ' s architecture is a c / s of three lays. the front platform are the chip simulation network system application program terminer ; the middle lay is a dcom server, it ' s duty is to deal with the communication and data transmission between the terminer and then database server, and to execute the logical operation. the application program just connect with the middle lay and get data from it, the connection and operation with database server will be managed by the dcom server. the duty of database server is to access and backup the final data

    具體是由位於網路各個終端的晶元模擬網路實驗系統應用程序為前臺;中間層為dcom應用程序服務器,負責處前臺應用程序與后臺庫的通信和傳輸,並執行業務邏輯,前臺應用程序只需要與應用程序服務器建立連接,在中間層即可,與后臺庫的連接和由應用程序服務器來統一。后臺庫只負責的存取。本論文實施的晶元模擬網路實驗系統模擬了主要的邏輯電路器件, 8088cpu ,存儲器,寄存器,總線,地址總線和控制總線,及其它相關晶元。
  6. When you request an operation for which change propagation is enabled, the source control plug - in changes your working copy of the source - controlled item, the master copy in the database, and the copies of other users when you check in the item and the other users retrieve it

    當您請求一個啟用了更改傳播的時,源代碼插件在您簽入該項和其他用戶獲取它時更改您受源代碼項的工副本、庫中的主控副本和其他用戶的副本。
  7. Design the software of compton back - scattering imaging scanner, point out the functions of this software. give out the program modules in which the directory and contents of this software is included. give out the interfaces of the main program modules and describe the meanings of operating elements on these program interfaces briefly

    指明了本應用軟體的功能,主要是控制三維掃描運動和源的工位置、採集和處以及文件和幫助等;給出了程序結構模塊,從中列出了軟體所含的主要目錄;給出了幾個主要的程序模塊的界面,簡要說明了界面中各對象的含義。
  8. With the characteristics of actual ship - board massmer having been duly considered, this lab - based massmer has been designed to have friendly interfaces, convenient operation and management, reliable performance and to be in conformity with the requirements of education and training. during the development of this system, a number of up - to - date technologies in the computer information area have been fully employed such as the technology in fieldbus, network, database, netdde and intouch etc. as a result, this system is characterized by the following points : 1

    在實驗室內建立的這套船舶機艙監測報警模擬系統,充分考慮並結合實際船舶機艙監測報警系統的特點,該系統具有良好的用戶界面,方便,工可靠,符合教學和訓練需要,系統在開發過程中,充分利用了目前計算機信息領域的許多最新技術,如現場總線技術、網路技術、庫技術、 netdde技術、 intouch技術等,使本系統具有以下主要特點: 1
  9. In sna, the layer within a half session that routes fmd requests and responses to particular nau services manager components and that provides session network services or session presentation services, depending on the type of session

    在系統網路體系結構( sna )中,部分話路內的服務層,負責把操作管理數據( fmd )請求和響應郵送給特定網路可尋址單元( nau )服務程序,並提供話路網路服務或話路表示服務,具體是哪種服務依話路類型而定。
  10. In communication module, we use usb1. 1and rs422, rs232 interface tech to guarantee real time communication. in pc module, we use vb and matalab to realize power quality measure, and build access database to manage power quality data

    在上位機模塊中,使用vb和matalab進行混合編程,設計了電能質量檢測系統平臺,實現了對電能質量參基本量的測量和對電網諧波的檢測、分析,並建立了access電能質量參庫對系統測量進行
  11. The article explains several kinds of databases in delphi language. database desktop is confirmed as the tools of establishing and managing database in the system, the method of establishing and managing the relative tables and the way of operating data are described, the application of the database storage technology also is introduced here in the system

    文章重點分析了delphi語言支持的幾種庫格式,確定了本系統中建立和庫所採用的工具一d8tsb8scdcsktop ,說明了本系統中相關表的建立和的方法,以及程序對途徑,介紹了庫存儲技術在系統中的應用。
  12. The connection forms of the lei administration database all have a new feature, an action called test connectivity

    Lei庫的連接表單都具有一個新增功能,一個稱為test connectivity的
  13. This software could be mainly divided into six parts, which are man - machine interface, date - base management, program control, data analysis, data communication and system supervising

    按功能可將其劃分為六部分,分別是人機部分、部分、程序控制部分、分析計算部分、通訊部分和系統部分。
  14. Based on the activex technology, electric component menus and toolbars are created in this paper, with which a net wiring diagram for power electronics system is drawn. take advantage of autocad events, it is easy to fully carry out the consistency between graphics and data, from which users can manage databases and visual operation on graphics. the graphics about short - circuit current distribution and protection coupling are auto - drawn by using the autocad entity and text objects

    本文採用activex技術,創建電氣元件菜單和工具欄,方便用戶繪制電力系統網路接線圖;利用autocad事件,實現圖形的一體化,從而可以使用戶在圖形上庫以及計算的可視化;利用autocad的圖形和文本對象來自動繪制短路電流分布圖和保護整定圖。
  15. The main thought is to introduce lcc managing subsystem in the general data - mining system architecture. the mining results, that is lcc, which were provided to the users directly in the past, are stored in the lcc database through which the users can carry on various operations and management. a consistent view of lcc is formed so as to improve the efficiency of sharing and mining cluster sowntown

    其主要思想是在一般的挖掘體系結構中引入lcc子系統,即將原來的直接提交給用戶的挖掘結果lcc保存在單元庫中,用戶利用關系庫成熟的介面技術可以方便地構造lcc訪問介面,通過介面完成對lcc的各種,達到在不同挖掘系統之間共享lcc的目的。
  16. In order to solve the problem that it is unable to control the storage of yarn and that in yarn factory as manual management, this paper designs a yarn manangement system for knitting dress enterprises with the fast and accurate information transmission of computer. the system realizes the addition, cancellation, amendment, inquiry and data auditing functions on the basis of user ' s security and limits of authority, and also provides the statistics and printing function, satisfying user ' s demand

    針對手工紗線無法及時準確掌握紗線庫存以及在織造廠的紗線存量情況,利用計算機信息傳播的快速性和準確性,設計實現了針織服裝企業紗線系統,該系統在實現了用戶安全與權限認證的基礎上完成了的增、刪、改、查詢和單審核等功能,滿足了用戶需求。
  17. It can supply the user with the data process interface and operation command directly, and can manage the data and do the print work centrally and unitedly. it can assemble the related calculation items in order that the user can calculate straightly and quickly to enhance the efficient of choosing object functions with different expression, which cause the system have widely application field

    整個系統具有較好的人機界面,能夠提供直接與用戶見面的界面和命令,能夠集中統一地和完成列印工,將相關的計算項目集合起來后,使用戶能夠直觀、快捷地進行計算,從而可以大大提高效率。
  18. At last the anti - seismic geographic information system for the buildings of baoding is developed. its database management system can realize the operation of data query, dynamic updating. graphic system can realize data visualization, data query, assistant decision during earthquake by kinds of operation to the map

    最後建立了基於gis的mapinfo此軟體平臺的保定市區房屋抗震防災地信息系統,其中系統,可以實現的查詢、動態更新;圖形系統可對地圖進行各種,完成顯示、查詢分析、地震輔助決策等。
  19. The jsp standard tag library jstl is a collection of custom tag libraries that implement general - purpose functionality common to web applications, including iteration and conditionalization, data management formatting, manipulation of xml, and database access

    Jsp標準標記庫( jsp standard tag library , jstl )是一個實現web應用程序中常見的通用功能的定製標記庫集,這些功能包括迭代和條件判斷、格式化、 xml以及庫訪問。
  20. This research also improves sa algorithm in application such as the building and management of packing component in system, the design of detection algorithm on interference between components, the control on packing component by algorithm, and the calculation of packing occupy space, as well as the design of input and output module and so on

    論述了利用autocad圖形系統進行布局實體造型、圖形,布局實體的干涉檢驗演算法的設計,布局優化演算法與布局實體的的實現,布局佔用空間的計算,以及系統輸入模塊、輸出模塊的設計等。
分享友人