正文數據庫 的英文怎麼說

中文拼音 [zhēngwénshǔ]
正文數據庫 英文
text database
  • : 正名詞(正月) the first month of the lunar year; the first moon
  • : Ⅰ名詞1 (字) character; script; writing 2 (文字) language 3 (文章) literary composition; wri...
  • : 數副詞(屢次) frequently; repeatedly
  • : 據Ⅰ動詞1 (占據) occupy; seize 2 (憑借; 依靠) rely on; depend on Ⅱ介詞(按照; 依據) according...
  • 正文 : main body; text
  • 數據庫 : data bank; data base; data pool; data library數據庫管理系統 data base management system; 數據庫計...
  • 數據 : data; record; information
  1. Finally, with the help of the program written in asp language, the 3d model of denture, added up with of the human faces, was compounded to provide the preview, in the ways of both fixed and motion pictures. [ results ] 3d digital model of human natural teeth and the corresponding rpd components were successfully developed. with the data base governing the 3d digital model files set up, the program of application written in asp languages was compiled and tested to run without errors, completing the initial foundation of 3d - preview system for clinical and educational practice in prosthodontics

    平臺開發是利用三維編輯軟體3dsmax製作了常天然牙列和口腔修復學中整鑄可摘局部義齒的各組成部件、精密附著體及其他的一些相關三維模型,建立了基於sql - server的管理系統,以供方便地調用各種三維模型,合成牙列和修復義齒三維模型,再引入人頭模型引擎,通過三維模型製作多角度平面渲染圖或四川大學碩士學位論三維動畫,作為素材上傳供二級用戶調用。
  2. This scheme integrates universual data accesss technology of microsoft, which plays a more and more important role in three - lay c / s ( client / server ) and uses the technology of ado ( active data access ), adopts the asp script language in display the results and uses stored procedure of sql server in databases design. in the system of b / s, client realizes a high efficient access to the server database through displaying diversified active controls in browser and using ado to access the data source. the disposing of data accures under the database not in the font of this system. this kind of scheme cannot only bring the system a higher real time response, but also decrease data runoff of the networks, lower the possibility that web server becomes bottleneck of the system and make the system more transplantable

    當前的web訪問技術處于發展階段,針對這種情況,本通過分析當前各種流行的web訪問方案的優缺點,結合在三層次的c / s系統中扮演越來越重要的角色的中間件技術,採用了microsoft公司所提出的一致訪問技術,利用ado控制項,結合當前的asp語言,底層採用了sqlserver7 . 0的存儲過程技術,設計了一種自己的web訪問方案,即在browser / server系統當中,客戶端通過顯示在瀏覽器中的各種activex控制項,通過了ado連接的處理利用了存儲在內部執行,實現對後端的高效訪問,並且這種方案在給系統帶來較高的實時響應性能的同時,減少了網路流量,降低了web服務器成為系統瓶頸的可能性,也增強了系統的可移植性。
  3. It includes symposia, monographs and reviews, statistics, optimal design of experiments and optimization methods, analytical signal processing, multivariate calibration, chemical pattern recognition, qsar, library searching and expert systems, chemometric education, with 168 references cited

    內容涉及統計學與統計方法、試驗設計與優化、分析信號處理、多元校、化學模式識別、定量構效關系( qsar ) 、及專家系統、化學計量學教學等方面,共引用獻168篇。
  4. The essence of edid is to set up a normal behavior fuzzy sub collection a on the basis of watching the normal system transfer of the privilege process, and set up a fuzzy sub collection b with real time transfer array, then detect with the principle of minimum distance in fuzzy discern method the innovation point of this paper is : put forward the method of edid, can not only reduce efficiently false positive rate and false negative rate, also make real time intrusion detection to become possibility ; have independent and complete character database, according to the classification of monitoring program, design normal behavior and anomaly behavior etc., have raised the strongness of ids ; use tree type structure to preservation the character database, have saved greatly stock space ; in detection invade, carry out frequency prior principle, prior analysis and handling the behavior feature of high frequency in information table, have raised efficiency and the speed of detection, make real time intrusion detection to become possibility ; have at the same time realized anomaly intrusion detection and misuse intrusion detection, have remedied deficiency of unitary detection method

    這種方法的實質是在監控特權進程的常系統調用基礎上建立常行為模糊子集a ,用檢測到的實時調用序列建立模糊子集b ,然後用模糊識別方法中的最小距離原則進行檢測。本的創新點是:通過對特權進程的系統調用及參序列的研究,提出了基於euclidean距離的入侵檢測方法edid ,不僅能有效降低漏報率和誤報率,而且使實時入侵檢測成為可能;設計有獨立而完整的特徵,根被監控程序的類別,分別設計常行為、異常行為等,提高了檢測系統的強健性和可伸縮性;特徵按樹型結構存儲,大大節省了存儲空間;在檢測入侵時,實行頻度優先原則,優先分析和處理信息表中的高頻度行為特徵,提高檢測的速度和效率,使實時入侵檢測成為可能;同時實現了異常入侵檢測和誤用入侵檢測,彌補了單一檢測方法的不足。
  5. So, this paper has put forward the principle that should be followed while establishing system of legal protection of database in our country : give consideration to efficiency and fair principle, maintain balance between copyright owner and interests of the public ; insist the principle that the china ' s actual conditions combine with international legislative trend ; insist the principle that extant laws be used synthetically, and set up a synthetic legal system in which the law of copyright for the main fact, law against competition by inappropriate means for the complement in our country

    所以,本提出了建立我國法律保護制度應遵循的原則:兼顧效率與公平的原則,維持著作權人與社會公眾的利益平衡; 』屠持中國國情與國際立法趨勢相結合的原則;堅持知識產權法律保護手段綜合運用的原則,在我國建立以版權法保護為主,反不當競爭法等法律保護為輔的綜合保護的法律體系。在建立我國法律保護體系的同時,大力建設自主知識產權的,積極發展我國產業。
  6. Customers ’ needs has become the leading power of market operation, which demands the operators to pay attention to changes of customers ’ needs and lay more emphasis on their interests and feelings constantly, and get in touch with them and listen to their feedback information, so as to take necessary measures and to improve products and services, to meet the ever - changing demands of customers and set up permanent and steady relationship with them

    分析了我國社會主義經濟發展現狀,論述了國內企業生產經營流程及營銷方式選擇,指出了企業建立營銷過程中存在的各種問題,並對這些問題的產生進行了系統的分析,找出了影響企業營銷成果的關鍵問題就是對消費者需求信息的理解和掌握,所謂「知己知彼,百戰百勝」 。
  7. It study carefully the distortion of the remote sensing imagery, the rectification of the radiant quantity, the rs image strengthen and the color fusion. based on these achievements above, we do experiment on the differential rectification, the rs image fusion, the object determining and the exchange for the different format data, propose the plan and flow chart of the terrain map rectification by the rs imagery. we demonstrate the method for the target location and the direction outside by the rs imagery and how to select the reference point and read the information of the rs imagery

    闡述了利用航天遙感影像進行1 : 25萬地形圖更新的必要性和可行性,在對spot和landsat遙感影像特性進行分析的基礎上,對航天遙感影像的系統變形、輻射量校和影像增強與彩色融合等內容進行了認真研究,並在此基礎上對航天遙感影像字微分糾、影像融合、地物判讀、格式轉換、基於遙感影像的地形圖修測等方法進行了具體試驗,提出了利用遙感影像進行地形圖修測的具體方法和作業流程。
  8. In order to ensure to process regularly the daily maintenance management, this paper is based on the theory and method of database design and the theory of pavement management system, combining the application environment and operation flow of the expressway maintenance system, bringing forward the four stages of the expressway maintenance system design which are the requirement analysis of consumers, conception framework design, logic framework design and physical framework design, scheming out an optimum database mode applied to all kinds of expressway maintenance systems, and establishing a common database application system, so that the expressway maintenance system can evaluate the pavement performance, forecast the pavement performance and make decisions of the pavement maintenance

    為了保證高速公路日常養護管理常有序的進行,本的設計原理、方法及路面管理系統原理,結合高速公路養護管理系統的實際應用環境和操作業務流程,提出了高速公路養護管理系統設計的4個階段? ?用戶實際需求分析、概念結構設計、邏輯結構設計和物理結構設計,設計出適用於各種高速公路養護管理系統最優的模式,並建立了通用的應用系統,使得養護管理系統能夠進行路面性能評價、性能預測和養護維修決策
  9. The paper ' s research of meilan airport mis has been accepted by caac. now it is running in haikou airport. it is helpful to give the passenger rapid x good -

    的研究成果?美蘭國際機場航班信息管理系統的設計已經通過國家民航總局的驗收,常運作在海口美蘭國際機場,為旅客提供了迅速、優質、及時和準確的服務。
  10. By combining the advanced modern mathematical modeling theory with the advanced database application and development tools and software engineering, this paper proposes the new mathematical model, and through programming realizes the 24 - hour data forecasting of punctual load, daily peak - to - valley load and daily average load in the area

    將現代先進的學建模理論與應用開發工具、軟體工程技術相結合,提出了適用該地區電網負荷預報的學模型,通過編程實現了該地區電網24小時的點負荷、日峰谷值負荷、日平均負荷等預報。
  11. When this parameter is 1, database mail sends the e - mail message and includes the query error message in the body of the e - mail message

    如果此參的值為1 ,則郵件會發送電子郵件,並電子郵件的中顯示查詢錯誤消息。
  12. Topographical maps are the principal frame form of gis, and realization map digitizing and offering gis basic spatial data is one of the important research fields in surveying and gis, which is also necessity of development of science and technology. based on building gis - oriented topographical mapping system theories, this themes apply the advanced objectarx technology, aim at topographical mapping and exporting to gis, and resolve several key problems, such as symbols analysis and building, dtm and contour line automatic drawing, topographical map adjoining, digital image rectifying etc. and it offers models and arithmetic, realizing the general functions of gis - oriented topographical mapping system

    以建設面向gis的測量繪圖平臺理論為基礎,以autocad平臺下objectarx開發技術為核心,圍繞地形圖的成圖和入( gis)這一課題,對其中的關鍵技術難題? ?符號的建立與實現、 dtm與等高線的自動繪制、地形圖接邊、字化柵格圖像的定向與糾、介面件的生成等進行了研究分析,提出了相應的模型和演算法,實現了面向gis的測量繪圖系統的基本功能。
  13. In the latter case, the design may be a formal document hundreds of pages long that contains every possible detail about the database

    對於後一種情況,設計可能是長百頁的檔,其中包含有關的各種可能細節。
  14. You simply copy back the physical database files into the right locations

    只需將物理件復制回確的位置即可。
  15. Offline backup is the backup of all the physical database files after a normal database shutdown

    脫機備份是常關閉之後,對所有物理件執行的備份。
  16. If you choose to connect to the existing file, then a connection is created just as if you were connecting to any remote database, and the database file is left in its original location

    如果選擇連接到現有件,則會創建一個連接,就如同連接到任何遠程一樣,並且該件保留在其原始位置。
  17. The problem you are in all likelihood experiencing with this error comes from the fact that for this particular fixpack, a new version of a bind file needs to be rebound to the database : the culprit is

    您很可能在經歷的這個問題的起因是,對于這個特定的fixpack ,需要將一個新版本的連接件重新綁定到:罪魁禍首就是
  18. Therefore, it is necessary to improve and develop it though vastly practical calculation. based on this, the paper deals with the numerical simulated calculating codes of ngsn, anisn, dot and the nuclear libraries of wu, fendl - 2 which have been frequently used on the field of particle physics and nuclear physics. it is through benchmark and development that the discrete ordinate particle transport calculating software kit is formed

    是從這個角度出發,對在粒子物理和核物理領域廣泛應用的值模擬計算程序ngsn , anisn , dot等程序和核uw , fendl - 2等作一系統的校核和發展,最終形成離散縱標粒子輸運計算軟體包,並初步探討了它們的應用,為粒子物理和核物理的研究和設計提供保障。
  19. Firstly, in this paper, we review the histories of xml and xml database, and all kinds of data models used widely now. then we review traditional access control policies and policies specially used on xml, and present a new expression method of access set on xml based on child tree of w3c data model. and we bring rbac model into xml database and present a new xml access model x - rbac. because the usage of data in databases has high frequency, we present an ids model based on access set density to logging the potential security threats. and then we introduce the design and implementation of a prototype of our native xml database nhx and its access control system. finally, we draw a conclusion for this paper and the future work

    首先回顧了xml及xml的歷史,並總結了目前廣泛使用的xml模型,在分析了各種傳統訪問控制策略,以及xml的專有訪問控制策略的優缺點后,基於w3c的xml模型,提出了一種基於子樹的具有高彈性的便於實現的的訪問區域表示法,並將rbac模型引入進來,提出了一種適用於xml的訪問控制模型x - rbac ,同時為了區分xml訪問中的合法訪問和合理訪問,我們根訪問具有頻繁性這一特徵,提出了一種基於區域訪問密度的入侵檢測模型( ids ) ,以對隱藏在常訪問中的潛在安全威脅進行報警和日誌。
  20. Analyse and monitor customer data to measure success and identify fluctuations / trends so as to decide on the relevant actions to be taken

    管理所有跟客戶拜訪、協議、服務條款等有關的件和,確保客戶的信息在客戶中得到確的維護。
分享友人