數據權 的英文怎麼說

中文拼音 [shǔquán]
數據權 英文
database right
  • : 數副詞(屢次) frequently; repeatedly
  • : 據Ⅰ動詞1 (占據) occupy; seize 2 (憑借; 依靠) rely on; depend on Ⅱ介詞(按照; 依據) according...
  • : Ⅰ名詞1 [書面語] (秤錘) counterpoise; weight (of a steelyard)2 (權力) power; authority 3 (...
  • 數據 : data; record; information
  1. The thesis design the specification of intrusion detection of the privileged program and network communication in the detail by asl specification

    本文用asl詳細的設計了特程序和網路包的入侵檢測的規范。
  2. As the development of underground space, it is necessary to manage the data using 3d cadastre

    摘要隨著地下空間的開發,迫切需要利用三維地籍對地下空間進行管理和空間確
  3. ( 3 ) distill the environmental geologic factors and analyzes their harmness and reasons mainly analyzes the status in quo, reason, distribution, harmness and defend for the falls, surface sink, mine suddenly water, landslip, castoff, etc. ( 4 ) evaluate the probability of the geology calamity take use of the method of factors and coverage union to evaluate the probability of the geology calamity, and then plot out the high, middle and low probabilit

    ( 3 )提取環境地質因素並進行分析其危害及成因利用提取的要素、字地面模型和屬性庫及常規資料重點分析了構造、塌陷、礦坑突水、崩塌、廢棄物、地下水疏干區等要素的現狀、分佈、成因、危害及防治。 ( 4 )為金礦區地質災害易發性做出評價利用重值和圖層疊加的方法對金礦區地質災害易發性做出評價,把金礦區劃分為高易發地區、中易發地區和低易發地區,針對這些地區提出治理措施。
  4. Study of adaptive weighted estimate algorithm of congeneric multi - sensor data fusion

    同類多傳感器自適應加估計的級融合演算法研究
  5. In conclusion, it is primarily described that the expectable social and economical benefits of this mis are great, and the design can be fulfilled smoothly. the difficulty of this thesis is : not only think about the coordination each other synthetically on workers, equipments, technologies, data and user ' s priorities, different project and different continuation day, but also must ensure that it is agility, controllable and safe when the data be transmitted on internet or intranet

    本管理信息系統強調是針對無形的信息產品( gis等海量)的生產管理信息系統,不是單純的統計計算,還要實施嚴密的控制,除需要綜合考慮人員、設備、技能技術、限、工程、工期在計劃調度統計方面的協調性外,還需要強調海量信息產品的原始、半成品、成品在網路上流動的靈活性、可控制性和安全性。
  6. Method of deal with data error by subsection curve fitting and discrete degree

    分段曲線擬合與離散度加誤差處理方法
  7. This paper recurred to the basic theory of rough set of data mining and under the direction of the frame of intelligent decision, the main theories include i ) the different methods of data mining on the base of rough set are used to deal with typical decision system namely consistent decision system and inconsistent decision system in order to carry through data reduction and rule distilment ; ii ) in the environment of dynamic increment database, the methods of data reduction to deal with the original data and increment data are discussed in the consistent and inconsistent decision system ; iii ) the method of data mining of rough set is analysized to treat with the attributes with priority ; iv ) on the base of basic rough set theory, the data analysis methods of amalgamation of rough set theory ; v ) and also the pre - disposal method to database is analysize

    本文從系統工程進行決策分析的角度出發,藉助挖掘技術中粗糙集的基本理論,在智能決策框架的指導下,研究了基於挖掘的智能決策理論及方法。主要理論包括:如何利用粗糙集對典型的決策系統即相容性決策系統和不相容性決策系統運用不同的挖掘方法進行有效的約減和規則提取;在增量動態的庫環境下討論了在典型決策系統中對原始和增量進行約減的方法;分析了帶有優先屬性的粗糙集挖掘方法;以基本粗糙集為基礎探討了粗糙集擴展模型的分析方法;研究了粗糙集預處理方法。
  8. During the calibration, a regress - analyse method is used to get the weight of the different channel based on equational coefficient, the weight represents the sensitivity of each channel

    為了提高測量的可靠性和精確性,對9通道同時採集,在測試標定時採用回歸分析方法,根靈敏度得到不同通道的值。
  9. In any case, each jurisdiction treats insanity claims in its own way, so they may well disagree over whether brain - image data are exculpatory

    無論如何,每個對待精神錯亂限的要求,用它自己的方法,因為他們也許在大腦成像是辯解無罪上有著一些不一致。
  10. Compared the equity structure and corporate governance of listed company of our country with countries such as u. s. a, japan and germany, and by game theory, this dissertation analyzes the influence mechanism of equity structure to corporate governance of a listed company from following main respects : stimulation, restriction, take - over by other company, and competition of dealership. by theoretical research, it comes to that a comparatively centralized equity structure helps to perfect corporate governance ; for its fierce competition and stability of performance, we choose the data of the industry of wholesale and retail trade listed companies of our country to analyze the influence that equity structure made to corporate governance by regression analysis, and approve it by real case. by the theory and real example, we draw the conclusion that a mode of comparatively centralized equity and main power is controlled by fictitious persons is ideal, and correspond measures are put forth to advance the economic development of our country

    本文通過對我國、美國、日本利德國等發達國家的上市公司的股結構利治理模式比較;通過採用博弈論等方法分析了上市公司股結構對公司治理的激勵機制、監督機制、外部接管市場和代理競爭四個方面的影響,從理論上得出相對集中的股結構有利於完善公司治理結構:通過選取了我國競爭比較激烈、業績相對穩定的批發與零售行業的上市公司的、採用回歸分析的方法對不同性質和集中度的股結構與公司業績的關系進行了實證分析,還進行了具體的案例分析,由理論利實證研究相結合得出股結構相對集中的法人控股模式為一種理想模式,並提出了促使我國上市公司股結構調整使治理結構合理化的相應建議。
  11. Using fumy cipher, transmission data are kept secret that can prevent others from reading or writing data without permit. it can ensure data security

    為了確保傳輸的安全性,運用流密碼對進行加密傳輸,防止外來者的攻擊,未經授進行非法讀寫操作。
  12. So we consider five financial indexes includes stock b / p, e / p, current stock size, current stock stru and financial levge by the international tradition, then descriptive statistical test method and cross section statistical test method proved that b / p and current stock size have marked effect on the securities yield besides coefficient b. in the third chapter, the article fut forward a risk factor model, estimates yield sequences of every risk factor by weight regression, and then estimates each risk factor coefficient of different stock by time sequence regression, at last we can reckon the portfolio risk o2p and yield rp which consists n stocks

    結合國際慣例,文章考慮了股票的凈值市價比( b p ) ,市盈率倒( e p ) ,流通規模( size ) ,流通比例( stru )和財務杠桿( levge )等五個財務指標,應用描述性統計檢驗和橫截面統計檢驗等多種方法,結果表明,除系以外,凈值市價比( b p )和流通規模( size )對證券收益率部有重要的影響。在論文的第三章,提出了一個基於多因素的風險因子模型,並用加回歸和時間序列回歸等方法估計出了不同證券的各風險因子系(類似於單指模型中的系) ,此,即可衡量出一個包括n只股票的組合的風險_ p ~ 2和收益率r _ p 。
  13. Audit database scope gdr event class occurs whenever a grant, revoke, or deny is issued for a statement permission by any user in microsoft sql server for database - only actions such as granting permissions on a database

    每當microsoft sql server中的用戶發出針對語句限的grant 、 revoke或deny時(僅限於庫操作,例如針對某個庫授予限) ,都會發生
  14. Besides, the general computer courses in the junior secondary curriculum already cover such issues as copyright of computer information, data privacy and data security

    此外,初中的普通電腦科課程已涵蓋電腦資料版私隱和安全等課題。
  15. Enables the grantee to access metadata

    允許被授者訪問元
  16. Process - oriented product data authority management

    面向過程的產品數據權限管理研究
  17. A database role can be granted administrator permissions, process object permissions, view object metadata permissions, and permissions to view or modify data at multiple levels within each analysis services database

    庫角色可以被授予管理員限、處理對象限、查看對象元數據權限以及在每個analysis services庫內查看或修改多個級別的限。
  18. The main research contents are as follovvs : after the analyzing of the process of making train diagram, according with its character, and take into account the trend of innovation, chooses the total solution based on the b / s architecture, 3 - tier operation distributed and 2 - tier data distributed to separate the data from operation and simplify the development and maintenance ; the e - r data model that is accord with the 3nf criterion is designed after analyzing the data structure of the train diagram system. emphasis on the permission security of the distributed system, take the view schema, coupled with the login authentication and permissions validation, to ensure the data accessing domination, and take the synchronization, error control, and restore capability to advance the data security ; on the basis of b / s solution architecture, after comparing the existing transportation technologies, b - isdn and adsl is selected as the major solution architecture based on the package - svvitched networks. furthermore, error control, firewall, and encryption techniques are introduced to prevent the hacker attack and ensure the networks safety

    論文的主要研究內容包括:對目前我國列車運行圖管理體制和編制流程進行詳細分析,根其「幾上幾下」的特點,並結合未來「網運分離」體制改革的變化預測,選擇採用與之相適應的基於b s體系架構、三層業務分佈、二層分佈的整體方案,實現業務與的分離,降低開發與應用過程的復雜度和總體成本;對列車運行圖系統的信息進行分析,設計符合3nf規范的e - r關系模型,並著重研究處于分散式系統中的列車運行圖信息的訪問限和安全問題,提出以視圖模式結合用戶識別限審定實現數據權限劃分,以並發處理、容錯技術、恢復技術提高系統的安全性;在基於b s架構的系統整體方案基礎上,對當前多種傳輸技術進行分析比較,採用b - isdn為主幹網、 adsl為接入端的基於公用網路分組交換技術的系統網路體系結構,並針對網路自身安全性和黑客攻擊與侵入問題,詳細討論綜合採用差錯控制、防火墻、加密解密等技術手段提高系統的網路安全性能。
  19. Tetra has the advantage of being spectrally efficient whilst also offering the end users improved voice quality, secure encrypted communication and comprehensive data capabilities

    Tetra具有強大的光譜選擇功能,同時還能提供給用戶更好的話音質量、加密的通訊及強大的數據權限。
  20. Proprietary information ” means the information, whether patenable or not, disclosed to the cjv by neither party or its affiliates or disclosed by the cjv to either party or its affiliates during the term of this contract, including technology, inventions, creations, know - how, formulations, recipes, specifications, designs, methods, processes, techniques, data, rights, devices, drawings, instructions, expertise, trade practices, trade secrets and such commercial, economic, financial or other information as is generally treated as confidential by the disclosing party, its affiliates, or the cjv, as the case may be ; provided that when such information is in unwritten or intangible form, the disclosing party, its affilates or the cjv shall, within one month of making the disclosure, provide the other party and / or the cjv with a written confirmation that such information constitues its proprietary information

    「專有信息」指在本合同期內,任何一方或其關聯公司向合作經營企業披露的、或合作經營企業向任何一方或其關聯公司披露的不論可否獲得專利的信息,包括技術、發明、創造、訣竅、配製、配方、規格、設計、方法、工序、工藝、利、裝置、圖樣、知識、專門知識、商業慣例、商業機密以及披露放,其關聯公司或合作經營企業(視情況而定)通常視為機密的商業、經濟、財務或其他信息;但是,如果該等信息不是以書面或有形形式披露的,披露方、其關聯公司或合作經營企業應在披露后一個月內,向另一方和/或合作經營企業提供該等信息系其專有信息的書面確認。
分享友人