數據存權 的英文怎麼說

中文拼音 [shǔcúnquán]
數據存權 英文
data access method
  • : 數副詞(屢次) frequently; repeatedly
  • : 據Ⅰ動詞1 (占據) occupy; seize 2 (憑借; 依靠) rely on; depend on Ⅱ介詞(按照; 依據) according...
  • : 動詞1 (存在; 生存) exist; live; survive 2 (儲存; 保存) store; keep 3 (蓄積; 聚集) accumulat...
  • : Ⅰ名詞1 [書面語] (秤錘) counterpoise; weight (of a steelyard)2 (權力) power; authority 3 (...
  • 數據 : data; record; information
  1. For the purpose of these conditions, securities shall include but not be limited to the following investments shares in companies incorporated in any jurisdiction ; debenture stock, loan stock, bonds, notes, certificates of deposit, commercial paper or other debt instruments, including government, public agency, municipal and corporate issues ; warrants to subscribe for the above investments ; depositary receipts or other types of instruments relating to the above investments ; unit trusts, mutual funds and similar schemes established in any jurisdiction, options, whether on any investment herein described, on currencies, precious metals or other assets, or an option on an option ; contracts for the purchase or sale at a pre - agreed price and at a future date of any investment herein described or any currency, precious metal or similar asset ; viii contracts for differences or contracts on indices ; investments which are similar or related to any of the foregoing ; and unless otherwise expressly agreed, documents of title or documents evidencing title to investments previously deposited by the customer with the bank in connection with the provision by the bank of custody of investments and provision of securities services

    此等條件所指的證券包括但不限於以下投資項目i在任何司法管轄區注冊成立之公司之股份ii包括由政府公共機構市政府及企業所發行的債股證貸款股額債券票款證商業票或其他債務票iii以上投資項目之認購證iv有關上述投資項目之款收或其他種類之票v在任何司法管轄區成立之單位信託互惠基金及類似計劃vi上述之任何投資項目貨幣貴金屬或其他資產之期或期之期vii按預先協定價格及在將來日期買賣任何此等投資項目或任何貨幣貴金屬或類似資產之合約viii差價合約或指合約ix類似或有關上述任何一項之投資項目及x除非已另有明確的協定,客戶先前放在本行之投資項目之所有文件或可證明該等項目的所有的其他文件。
  2. Based on the investigation of information resource digitization projects both in domestic and abroad libraries, the authors conclude that this kind of project is a complicated and systematic project, which is composed of main elements such as project planning, source material selection, digitization work flow preparation, digital file storage, metadata extraction, intellection property right management and project management

    摘要在對國內外圖書館信息資源字化項目考察的基礎上,指出這類項目的實施是一個比較復雜的系統工程,其中所包括的主要要素有項目規劃、字化內容選擇、字化流程準備、字文檔保、元析取、知識產管理和項目管理。
  3. The article points out the importance and necessity of the information - security from its actuality in our country. the resources in the information system, for instance, hardware, software, data, document, operator, meterial and so on, are evaluated and gived safety grade firstly. and then, it analyses the menace including the nonauthorized access, the information leak, the refused sevice, the internal objection which the system will take. the following are the corresponding control police : confirm the users " rights and duties, including the mode of using account, the limit of accessing resource, the application of password, the building of backup ; confirm the administrators " right and duties, including physical safety, system configuration, account configuration and usufruct, password management, audit and control, backup and individual intimity ; run - of - mill measure of security defence, including access control, symbol and identification, integrality control, password technique, firewall system, audit and resumption, safety of operating system, safety of database system, defence of computers " virus and resisting - deny protocol. in the end, the article offers the strategies of disposing the safety - accident and analyse after ithow. to report it, how to solve it in phase, and how to avoid it happening again. in a word, the article presents a holistic resolvent about keeping away the information system ' s security, and supplies a essential frame for its configuration, management and application

    然後,對系統可能受到的威脅,包括非授訪問、信息泄漏、拒絕服務和內部缺陷等進行分析,並提出了相應的控制策略:確定用戶的力和責任,包括帳戶使用方式、資源訪問限、口令應用以及建立備份等;確定系統管理員的力和責任,包括物理安全、系統配置、帳戶設置及使用限、口令管理、審計和監控、備份以及個人隱私等方面;一般性的安全防護措施:取控制、標識和認證、完整性控制、密碼技術、防火墻系統、審計和恢復、操作系統安全、庫系統安全、計算機病毒防護和抗抵賴協議等。最後,對事故處理和事後分析提供策略,如何報告安全事故,如何協調解決安全事故,如何避免安全事故再次發生。總之,本文對信息系統安全防範工作給出一個整體的解決方案,為其在配置、管理和應用方面提供了基本的框架。
  4. Involuntarily, questions of these engineering datas " management appear, datas " persistance only depending relational model and rdbms is greatly insufficient, so this paper carefully studies object - relational mapping based on rdbms based on the analyse of home & overseas actualities, correlative theories and realizing methods of object - relational mapping, we find opl based on rdbms is the most suitable for object relatinoal mapping of clera. based on the engineering application analyse of opl in clera, function requirements, database modes, interface criterions and functions, running modes of opl have being detailedly described. with the framework of microsoft dna, a kind of realizing method of opl based on com / dcom / activex component technology has being brought forward, and this paper describes realizing keys from base tables " definition, object id and class hx class and inheritance of class, object storage, parallel control and affair, object query, object nesting, relations between objects, support of complex data types, right control of object and buffer management of object

    本文在分析對象?關系映射技術的國內外現狀、相關理論及實現方法的基礎上,研究發現基於rdbms的opl是目前最適合clera的對象?關系映射方法;在clera的opl應用分析的基礎上,詳細描述了opl的功能要求、庫模式、介面規范與功能、運行方式等內容;結合microsoftdna開發框架,提出了一種基於com dcom activex組件技術的opl實現思路,並從基本表定義、對象標識與類標識、類與類繼承、對象儲、並發控制與事務、對象查詢、對象嵌套、對象間聯系、復雜類型的支持、對象級限控制及對象緩沖管理等幾方面概述了實現要點。
  5. ( 2 ) aiming at the requirement of safe storage of the electronic documents on the information integrated platform in manufacturing enterprise, using encryption / decryption and compression / uncompression techniques and saving the electronic documents as some special attribute object of large database and managing the enterprise electronic documents effectively through database, a safe access mechanism of functional grant < wp = 7 > and recommendatory grant to decrease grant management maintenance cost is proposed and the storage mechanism of special database attribute object is studied and the method for saving, accessing and retrieving electronic document quickly is constructed. thus these methods can make the electronic documents of information integrated platform in manufacturing enterprises get safe, reliable and quick access. ( 3 ) according to this circumstance in which web pages are selected as the user interface of manufacturing application system, the safe measures of access control over web page resources are provided

    ( 2 )針對製造企業信息集成平臺中電子文檔安全儲要求,採用加密和壓縮技術,將電子文檔作為大型庫中某種特殊屬性對象來儲,以庫方式對企業電子文檔進行集成的、統一的管理,提出一種訪問控制的增強型安全設計原則,基於此原則建立了管理授和推薦式授的安全訪問機制,用以提高系統的訪問安全性,並大大減少授管理維護量;研究了特殊屬性對象的儲機理,從而構造一種快速儲、訪問和檢索電子文檔的方法,使得企業信息集成平臺的電子文檔獲得安全、可靠、快速的訪問。
  6. The essence of edid is to set up a normal behavior fuzzy sub collection a on the basis of watching the normal system transfer of the privilege process, and set up a fuzzy sub collection b with real time transfer array, then detect with the principle of minimum distance in fuzzy discern method the innovation point of this paper is : put forward the method of edid, can not only reduce efficiently false positive rate and false negative rate, also make real time intrusion detection to become possibility ; have independent and complete character database, according to the classification of monitoring program, design normal behavior and anomaly behavior etc., have raised the strongness of ids ; use tree type structure to preservation the character database, have saved greatly stock space ; in detection invade, carry out frequency prior principle, prior analysis and handling the behavior feature of high frequency in information table, have raised efficiency and the speed of detection, make real time intrusion detection to become possibility ; have at the same time realized anomaly intrusion detection and misuse intrusion detection, have remedied deficiency of unitary detection method

    這種方法的實質是在監控特進程的正常系統調用基礎上建立正常行為模糊子集a ,用檢測到的實時調用序列建立模糊子集b ,然後用模糊識別方法中的最小距離原則進行檢測。本文的創新點是:通過對特進程的系統調用及參序列的研究,提出了基於euclidean距離的入侵檢測方法edid ,不僅能有效降低漏報率和誤報率,而且使實時入侵檢測成為可能;設計有獨立而完整的特徵庫,根被監控程序的類別,分別設計正常行為、異常行為等,提高了檢測系統的強健性和可伸縮性;特徵庫按樹型結構儲,大大節省了儲空間;在檢測入侵時,實行頻度優先原則,優先分析和處理信息表中的高頻度行為特徵,提高檢測的速度和效率,使實時入侵檢測成為可能;同時實現了異常入侵檢測和誤用入侵檢測,彌補了單一檢測方法的不足。
  7. It is very important to estimate the basic parameters in helicopter preliminary design. neural network ( nn ) has the advantages in estimating accuracy and generalization over traditional methods. however, there are some difficulties in using nn, e. g., how to select a proper network structure and the number of hidden layers. in this paper, structure and connection weight of a three - layer nn are optimized by genetic algorithm, and the optimized network is applied to helicopter sizing. the proposed method can not only give an optimal nn structure and connection weight, but also reduce the prediction error and has the capability of self - learning when the latest data are available. furthermore, this method can be easily applied to helicopter design systems

    在直升機初步設計階段估算其基本參是很重要的.神經網路的通用性和精度比傳統的估算方法有更多的優勢,但是在應用神經網路時在如何選擇合適的網路結構和隱層節點目等一些困難.應用遺傳演算法優化三層神經網路結構和連接重,並將優化得到的網路應用於直升機參選擇中.該方法不但可以給出一個最優的神經網路結構和連接重,而且降低了估算誤差,具有及時應用最新學習的能力.此外,該方法易於在直升機設計系統中得到應用
  8. The train of thought is : on the basis of the different factors and importance which effect the land use intensive level, economic benefit and environmental benefit, it determines the evaluation index system and the weight value. based on the standardized firsthand data, it defines weighted sum to found a composite index. thus arranging the composite index in mathematical order, it fixes quantitatively the land use intensive level, economic benefit and environmental benefit to demonstrate quantity, structure, scale, benefit and distribution on land use in small - towns of chongqing

    其評價思路為:根影響小城鎮土地集約利用水平、土地利用經濟效益、環境效益的各因子及其重要程度的不同,確定評價指標體系及指標重,在對原始標準化的基礎上,按照指標重,將各指標值加求和,得到小城鎮土地集約利用、土地利用經濟效益、環境效益的綜合指,按綜合指從大到小的順序對各評價單元進行排序,定量地確定小城鎮土地集約利用水平、土地利用經濟效益、環境效益,從而找出重慶市小城鎮土地利用的量、結構、規模、效益特徵及布局特點,根小城鎮土地利用與區域社會經濟發展的互動關系,分析在的問題及原因,為小城鎮土地利用優化配置、小城鎮建設用地指標管理提供借鑒。
  9. Adding momentum item while correcting weight and limiting range of input value reduce error and improve diagnosis correctness greatly. while normalizing the input value, a new way is put forward that normalization is performed item by item according to its sort. in this way error training can avoid going into the flat field that is caused by existing of 0 or 1 of the input value

    本文首先分析了故障診斷和神經網路的基本理論,並在此基礎上提出了神經網路對于變壓器故障診斷系統的適用性;文中將bp神經網路演算法用計算機實現;並針對其本身在的一些缺點提出了一系列改進措施,通過在修正值的時候增加動量項,並且限制輸入值范圍來減小誤差、提高系統的診斷正確率;在對輸入進行歸一化處理的時候,採取按類逐項歸一化的方法,避免了輸入出現0或者1而使訓練進入平坦區。
  10. The table will write down all about the electronic records during their life period. the content noted in the table will be the only basis on original and reality " testing of electronic records ". the major task of the second levels is to build the tight filing rules, moreover, combined the " life cycle table ", to build the test system to assure the original and the reality of the information during filing ; the assignment of the third level is to build testing and restoring measures of the original and the reality. by maintaining the media of electronic archives or building information file of electronic archives etc, electronic archives can maintain their available ^ visuak understandable during their deadline ; meanwhile, to build the safe control of the system through the workers dispersed authorization and deterring skills, to formulate the standards of the protective system, such as the standard of the basic structure of united electronic records ^ electronic archives. all of this is important to protect the original and the reality of electronic records and electronic archives

    「生命周期表」所記錄的內容將作為電子文件歸檔時檢驗原始性、真實性的唯一依;電子文件歸檔管理層中的主要任務是要建立起嚴密的歸檔制度,同時結合「文件生命同期表」建立檢驗措施保證電子文件在歸檔過程中信息內容的原始性、真實性;電子檔案保管層中主要任務是建立電子檔案原始性、真實性檢驗及原始恢復管理措施,通過對電子檔案載體的維護、建立電子檔案維護管理的信息文檔等工作,確保在保管期限中的電子檔案保持其可用性、可取性、可理解性:建立電子文件與電子檔案原始性、真實性保護體系安全控制,通過對系統工作人員授分散化、建立用戶標識與認證技術等措施確保「保護體系」安全運行;加強「保護體系」涉及的標準與規范的制定工作,如建立統一的歸檔電于文件、電子檔案基本結構等標準對保護電子文件、電子檔案信息原始性、真實性有著重要意義。
  11. It ' s well known that the project documentations " storage and management have an very important effect on the development of all kinds of project, and as the information age is coming, network technology has been applied to this procedure gradually. this article mainly introduces the study and realization of a internet - based project documentation storage and management system which application programming frame is built with delphi6. 0 and sql server2000. based on the tcp / ip protocol, the system try to establish a c / s model with connection - oriented, dependable stream sockets and multithread technology to complete some especial data communications by networks, such as the files of project, directory of user, all self - defined commands or messages and their parameters, and so on

    本文所研究的《基於internet的項目文檔儲管理系統》通過delphi6 . 0和visualc + + 6 . 0相結合的開發平臺,結合sqlserver2000 ,將client server模式的庫技術和windowssocket網路通信技術進行集成,遵循tcp ip協議,同樣採用c s結構運行於internet ,通過服務器將處于各個不同物理位置的客戶機連接起來,形成一個交流平臺;其中,引入了目前國際上流行的先進的安全管理控制方法? ?角色控制理論對用戶進行限分配,使擁有相應角色的人具有相應限;然後系統自動根組織部門或用戶的設立在服務器端生成相應的網路「虛擬文件櫃」 ,使擁有相應限的人可以對相應文件櫃中的文檔進行整理;再通過多線程技術和windows套接字通信機制在tcp ip協議上實現了單個文件及目錄的傳輸。
  12. According to the army operational readiness training management stipulation and the present standard, the unified subject design, the unification ascend the statistical system, the unification analysis examination and approval principle, the strict all levels of jurisdiction, facilitates each kind of information gathering, at the same time adapts the different user object information need ; depends on the army local area network, the armed forces net, realizes, between horizontally the vertical units to operation and so on data long - distance input, inquiry, report form, printing, achieves internal information true sharing ; the strict internal supervising and managing system, strengthens the information management, promptly realizes internal data automatically to report, the higher authority department can to report the information to carry on compiles, the merge and the analysis, promptly grasps each kind of resources for the correlation leader the memory, the assignment, the

    部隊戰備訓練管理規定和現行標準,統一科目設計、統一登統計制度、統一分析審批原則、嚴格各級限,方便各種信息採集,同時適應不同用戶對象的信息需求;依託部隊局域網、軍網,實現橫、縱向單位間對的遠程錄入、查詢、報表、列印等操作,達到內部信息的真正共享;嚴格內部監管制度,強化信息管理,實現內部的及時自動上報,上級部門能對上報信息進行匯總、合併與分析,為相關領導及時掌握各種資源的儲、分配、使用狀況提供依,全面提高部隊作戰、戰備、訓練和保障的應變能力;加強對新舊、橫縱向的管理,全面分析和挖掘間的聯系,充分利用的潛在價值,為資源管理者提供快速有效的決策支持。
  13. Finally, studies the instruction system of cos upon a dedicated instruction of smartcos - xc. chapter 4 discusses the smartcos - xc and gives the design and implementing of a smart card file system framework. based on this, this paper gives a simulation of head - end encryption of entitlement control message ( ecm ) and entitlement management message ( emm ), and implements the decryption of ecm and emm in the smart card

    在對通用cos的研究的基礎上,首先簡單分析了smartcos - xc ,結合該cos ,論文針對有條件接收系統,按不同用途、不同類型分別設計並實現了儲用戶授及智能卡應用的文件體系結構,通過該cos的指令系統,設計並實現了模擬前端授控制信息( entitlementcontrolmessage , ecm ) 、授管理信息( entitlementmanagementmessage , emm )生成模塊及用戶端ecm 、 emm解密模塊。
  14. It can use an alternative database to store the access tables

    可以在另一個庫中保限表單。
  15. The process repository holds process diagrams and all process related information ( resources metadata, access rights, workflow actions )

    流程知識庫用以保流程圖表和全部與流程相關的信息(資源、訪問限、工作流) 。
  16. Q we are company that pays close attention to intellectual property, part of our e - waste products are data storage equipment. how can fortune group ensure the safety of intellectual property and business data during the whole recycling process

    Q :我們是非常關注知識產的公司,我們的電子廢棄物中部分是儲設備,富勤在整個再生循環過程中是如何保證知識產以及商業的安全?
  17. Q we are a company that pays close attention to intellectual property, part of our e - waste products are data storage equipment. how can fortune group ensure the safety of intellectual property and business data during the whole recycling process

    Q :我們是非常關注知識產的公司,我們的電子廢棄物中部分是儲設備,富勤在整個再生循環過程中是如何保證知識產以及商業的安全?
  18. It solves payment issue through sharing pos and brush card. it solves info sharing and exchanging problem by enterprise application integration it adopts research method of software engineering and uses touch - screen, network, database technology and so on to carry through total design of the system and build the software : it uses user status identify and responsibility control to ensure database and application program ' s security ; it strengthen the code by coding optimize ; it captures and discards application runtime error to enhance the system ' s stability ; it uses multimedia voice and moving picture to show help information, thus makes the system easy to use ; it greatly reduces the maintenance work of the system by self - updating function ; it is an opening system by using star - model network top structure, supporting standard network communication protocol ? tcp / ip and offering standard software interfaced criterion

    論文採用軟體工程的研究方法,使用觸摸屏、網路、庫等技術,進行了系統總體方案設計和軟體開發:通過對庫和應用程序的用戶身份識別和限控制,保證取和應用程序的安全性;通過對代碼進行優化提高了代碼的健壯性;通過捕捉並拋出系統運行時的異常錯誤提高了系統的穩定性;通過多媒體語音、圖形和動畫提示幫助信息來增強系統的易用性;客戶端程序自動升級功能提高了系統的可維護性,有效地減少了維護工作量;系統採用星型的網路拓撲結構,支持標準的tcp ip網路通訊協議和規范的軟體介面標準,具有良好的開放性。
  19. What ' s more, with fundamental research, the following solutions were put forward : database connectivity technology, which can help to implement this system which works in client / server mode, the way of using ole ( object linking and embedding ) to solve the storage and retrieval problems of blob ( binary large object block ) data type and the method of directly giving the database system ' s operating purviews to right users with the application of dbms ' s authentication mechanism, which help to control database ' s access

    這些關鍵技術包括庫連接技術,以實現客戶/服務器模式下的庫開發;用ole技術解決大文本取問題;結合dbms自身鑒別機制,將庫系統限賦予用戶,以控制用戶對的訪問。最後,本文對南京物流公司管理信息系統的開發工作進行了總結,並展望了開發運輸類公司mis的發展方向。
  20. Depending on the currently executing user s rights, this broadly applicable data can also be modified and saved back to the data store

    這種通用還可以進行修改並保儲區,具體取決于當前執行用戶的限。
分享友人