日誌法 的英文怎麼說

中文拼音 [zhì]
日誌法 英文
diary method
  • : Ⅰ名詞1 (太陽) sun 2 (白天) daytime; day 3 (一晝夜; 天) day 4 (泛指某一段時間) time 5 (日...
  • : Ⅰ名詞1 (由國家制定或認可的行為規則的總稱) law 2 (方法; 方式) way; method; mode; means 3 (標...
  • 日誌 : daily record; journal
  1. Survey and ethnographic data were used to validate the time diaries by investigating differences in diary estimates between weekdays and weekends, overestimates from direct questions, and possible explanations for overestimates

    此比較著重在確定時間日誌法之有效性,直接詢問的高估情形,與高估現象的可能解釋。
  2. The author interviewed self - employed married women in the flower production industry to examine differences in estimates of unpaid labor time between time diaries and direct questions

    本文以已婚花農婦女為例,分別比較時間與兩種直接詢問,在估計無酬勞力時間的差異。
  3. This paper proposed a new proxy caching algorithm based on the distribution of user access preference in streaming media

    文章從實際用戶文件的分析出發,利用發現的用戶瀏覽流媒體對象時的行為分佈模型,提出了一種新的視頻流媒體緩存演算
  4. According to some problems existed in network security information analysis, such as lacking of security description, low information visualization, false - positives and false - negatives, this paper suggests implementing correlation in integrated analysis of network alerts and logs to improve the capability of network security information analysis

    摘要針對當前網路安全信息分析過程中出現的安全描述片面性、信息可視化程度低和誤報警、漏報警現象等問題,提出運用關聯方對網路中的報警和信息進行綜合分析,用於提高網路安全信息分析能力。
  5. Another highlight of the architecture is introduction of data mining technique. ids makes use of data mining algorithms to abstract key features of system runtime status from security audit data such as system log and network data stream, and then constructs classify engine of audit data

    本文提出的體系結構中還引入了數據挖掘思想,利用數據挖掘技術中的關聯分析、分類等演算從系統、系統調用序列、網路流等海量的安全審計數據中提取關鍵的系統特徵屬性,根據這些屬性生成安全審計數據的分類模型用於入侵檢測。
  6. With an audit trail, where the application or the job management software maintains a log of usage

    採用審計跟蹤的方,同時讓應用程序或作業管理軟體維護使用
  7. Different journaling approaches

    不同的記錄方
  8. In his paper, dr michael chau analysed the emergence of racists hate groups in blogs and identified their communication patterns and relationships by using web mining and social network analysis techniques

    周昭瀧博士論文題為從博客中尋找及分析仇恨團體,論文深入分析仇恨團體在博客網上的涌現,並用網路開采及社會網路分析方,剖析他們在網上的溝通模式和相互關系。
  9. The results generally support the idea that time - diaries - keeping is an appropriate means of measuring labor time

    面訪調查資料輔以深入訪談質化資料的分析結果顯示,時間日誌法適合於估計已婚花農婦女的農務與家務工作時間。
  10. Process mining : discovering direct successors in process logs. computers in industry, april 2004, 53 : 231 - 244

    這類演算主要根據引擎中記錄的活動間發生的順序關系來進行挖掘工作。
  11. We can do sth. such as teaching journal. teacher study audit, ideology critique to reflective

    再通過以下方進行反思,如教學、教師學習審計、思想批判等。
  12. The goal of this article is to identify the learning elements that are involved in small - group teaching so that they can be used to make such teaching more effective and more enjoyable

    研究者以教師即參予觀察者的研究,收集紀錄參予小組教學中的資料,包括小組交互過程、教師之教學,學生之學習心得。
  13. On core service, we implement an access control strategy based on role, digital signature and encryption / decryption of soap message by using usbkey hardware, stateful web service through extending simple object access protocol ( soap ), and a kind of log management based on rank. on transport adaptering, we implement mechanisms for priority - based transmitting and rules - based transmitting, and implement a transport adapter based on http request / response model. finally, on service adaptering, we discuss two service wrapper mechanisms : runtime wrapper mechanism and factory method wrapper mechanism, which can be used to encapsulate difference of various web service containers, and implement a service adapter

    在核心服務方面,通過擴展簡單對象訪問協議( simpleobjectaccessprotocol , soap )實現有狀態的web服務,然後討論了基於角色的訪問控制與基於usbkey盤的soap消息的數字簽名與加密的實現、基於分級的處理模型的實現;在傳輸適配方面,實現了基於優先級和基於規則的消息轉發機制,實現了基於http請求/響應模型的傳輸適配器;在服務適配方面,討論了兩種服務的封裝機制:運行時封裝機制與工廠方封裝機制,結合這兩種機制並對服務適配器做了實現。
  14. The winning blog began life as an online diary of the attempt by julie powell to cook the recipes in the 1961 cookbook by julia child, mastering the art of french cooking

    今年獲獎的部落格源自茱莉鮑爾試圖重現柴爾德女士在1961年出版的精通式料理藝術一書中的食譜,她把整個過程都記錄在網路中。
  15. If you d like to specify the data journaling method used for your root filesystem

    如果您願意指定用於根文件系統的數據記錄方
  16. Provide a means to limit a service to certain ranges of requesting addresses and to log requests

    提供了一種方,以將服務限制在特定范圍的請求地址內,並將請求記錄到
  17. It is good practice to not delete any of the system - created event logs, such as the application log

    不刪除任何由系統創建的事件(如application)是一個絕對可靠的做
  18. Has a hardcoded form of logging in which calls are directly made to

    具有硬編碼形式的記錄,其中的調用是直接針對
  19. As the name noarchivelog implies, there is no archiving of redo logs, and thus no rolling forward beyond the online redo logs

    正如名稱noarchivelog所暗示的那樣,沒有對重做進行歸檔,也就無像聯機重做那樣支持前滾。
  20. The study limitations point to a need for revising measures of social desirability, refining analytical models of overestimates, conducting more research on time diary reliability and validity, making comparative analyses of multiple methods for time data collection, and replicating past studies using a representative national sample and longitudinal design

    對未來研究的建議包括更改社會贊許性的測量方,重建對高估時間的模式分析,更多時問的信度與效度的研究,多元方綜合運用於時間測量方的比較分析,鼓勵對其他自營職業婦女與其他學科領域從事類似的時間運用研究,以及從事具代表性樣本與追蹤樣本的反覆檢驗。
分享友人