計數訪問 的英文怎麼說
中文拼音 [jìshǔfǎngwèn]
計數訪問
英文
numbered access- 計 : Ⅰ動詞1 (計算) count; compute; calculate; number 2 (設想; 打算) plan; plot Ⅱ名詞1 (測量或計算...
- 數 : 數副詞(屢次) frequently; repeatedly
- 訪 : 動詞1. (訪問) call on; interview; visit 2. (調查; 尋求) inquiry into; seek by inquiry [search]; try to get
- 問 : Ⅰ動詞1 (請人解答) ask; inquire 2 (詢問; 慰問) question; ask about [after]; inquire about [aft...
- 計數 : count; tally; counting計數卡 numbered card
- 訪問 : visit; call on; interview; access; addressing; reference to
-
Secondly, there are so many same objects managed in the storage manage system and a greate deal of memory is occupied, and in order to access the resources between processes entry management library is presented. thirdly, this paper also researches the ag ( atomic group ) function, then implements an method to deal with the disater recovery in san and ag make users easier to operate than a volume
另外,針對存儲管理系統中要保存諸多同類信息、佔用內存大的問題,同時考慮到能夠實現進程間的數據訪問,提出,設計並實現了entry管理庫,從而大大降低了內存的使用量。另外,本文還設計和實現了ag ( atomicgroup )功能,提供了一種解決災難恢復的方案,同時相對于單個volume的操作,以組為單位操作,簡化了用戶的操作。Receive details about printer, laser printers and data systems technology in addition to offers on electronic computers or computer systems on the homepage of ctv computer technik vertriebs gmbh zwickau
Ctv computer technik vertriebs gmbh zwickau是一家現代化的、可靠的產品供應商,這家供應商從事計算機,計算機系統,數據技術,印表機、印刷機,激光印表機的製造、銷售。請您訪問我們的主頁或者發送給我們電子郵件,垂詢當前的信息和服務。Using the mode of ais network at sea for reference, relying on the background of " human first " navigation human culture, using the theory of modern logistic " bpr, and get the idea of " the core is information flowing ", then describer the seaman ' s work on board particularly. apply some modern technology, such as : network and digital communication, database, visual procedure, from network construction, database designing, database linking, to interaction windows designing, achieve the following functions step by step
借鑒ais海上網路建設模式,依託以人為本的航海人文背景,利用現代物流理論的過程優化理念,現代物流的核心為信息流的理念,對航海活動中船方工作內容予以細化,利用現代網路與數據通信技術、數據庫技術、可視化編程技術等,分網路建設、數據庫設計、編程工具與數據庫的訪問方法、可視化界面的設計等若干步驟,逐步實現系統如下方面的功能。It implements web crawling through distributed technology, and builds index database through accidence analyzing chinese characters separating unuseful words deleting etyma extracting index words selecting and lexicon. the level system uses new model of web accessing and level computation to build web level system so that the requirement for computer resources is greatly reduced
該搜索引擎使用分散式技術實現網頁獲取模塊;通過詞法分析、中文分詞、無用詞匯刪除、詞干提取、索引詞條選擇和詞典等技術建立索引數據庫;該搜索引擎的級別系統使用了新的網路訪問模型和級別計算模型,大大降低了搜索引擎對于計算機資源的要求。The article points out the importance and necessity of the information - security from its actuality in our country. the resources in the information system, for instance, hardware, software, data, document, operator, meterial and so on, are evaluated and gived safety grade firstly. and then, it analyses the menace including the nonauthorized access, the information leak, the refused sevice, the internal objection which the system will take. the following are the corresponding control police : confirm the users " rights and duties, including the mode of using account, the limit of accessing resource, the application of password, the building of backup ; confirm the administrators " right and duties, including physical safety, system configuration, account configuration and usufruct, password management, audit and control, backup and individual intimity ; run - of - mill measure of security defence, including access control, symbol and identification, integrality control, password technique, firewall system, audit and resumption, safety of operating system, safety of database system, defence of computers " virus and resisting - deny protocol. in the end, the article offers the strategies of disposing the safety - accident and analyse after ithow. to report it, how to solve it in phase, and how to avoid it happening again. in a word, the article presents a holistic resolvent about keeping away the information system ' s security, and supplies a essential frame for its configuration, management and application
然後,對系統可能受到的威脅,包括非授權訪問、信息泄漏、拒絕服務和內部缺陷等進行分析,並提出了相應的控制策略:確定用戶的權力和責任,包括帳戶使用方式、資源訪問權限、口令應用以及建立備份等;確定系統管理員的權力和責任,包括物理安全、系統配置、帳戶設置及使用權限、口令管理、審計和監控、備份以及個人隱私等方面;一般性的安全防護措施:存取控制、標識和認證、完整性控制、密碼技術、防火墻系統、審計和恢復、操作系統安全、數據庫系統安全、計算機病毒防護和抗抵賴協議等。最後,對事故處理和事後分析提供策略,如何報告安全事故,如何協調解決安全事故,如何避免安全事故再次發生。總之,本文對信息系統安全防範工作給出一個整體的解決方案,為其在配置、管理和應用方面提供了基本的框架。Aiming for the problem of accessing data on different flats, gives some research, limns the server / client system, and based on the transferring ftp net files, uses the method of windows " sockets network programming, devises and achieves the network function, fulfill data accessing using odbc technology
針對實際中存在的跨平臺數據訪問的問題進行了研究。對客戶機/服務器體系作了描述,在ftp的網路文件傳輸的基礎上,利用windowssockets網路編程方法,設計實現了網路功能。At the same time, this article chooses the network framework of its system by analyzing several basic kinds of network system structure. it utilizes network data base programming principle to discuss the visit technology of data base odbc, web data base middle pieces technology cgi, and characteristic of the calculate mode of asp c / s b / s, proposes the topological structure of network data base used in this system
同時分析了幾種基本的網路體系結構,選擇了系統的網路構架,利用網路數據庫編程原理,討論了數據庫的訪問技術odbc 、 web數據庫中間件技術cgi和asp 、 c s及b s計算模式的特點,提出系統中應用的網路數據庫拓撲結構。Similarily, according to the dsp data access pattern and design philosophy of md32, a data memory combined data cache and data rani is proposed. in the md32 rtos, memory management system is one the most important part
同時,針對dsp中數據訪問的特點和md32同時兼顧dsp與risc特性的設計特點,設計了包含數據ram和數據cache的數據存儲系統,並對給出了數據存儲系統的訪問規則。( 2 ) aiming at the requirement of safe storage of the electronic documents on the information integrated platform in manufacturing enterprise, using encryption / decryption and compression / uncompression techniques and saving the electronic documents as some special attribute object of large database and managing the enterprise electronic documents effectively through database, a safe access mechanism of functional grant < wp = 7 > and recommendatory grant to decrease grant management maintenance cost is proposed and the storage mechanism of special database attribute object is studied and the method for saving, accessing and retrieving electronic document quickly is constructed. thus these methods can make the electronic documents of information integrated platform in manufacturing enterprises get safe, reliable and quick access. ( 3 ) according to this circumstance in which web pages are selected as the user interface of manufacturing application system, the safe measures of access control over web page resources are provided
( 2 )針對製造企業信息集成平臺中電子文檔安全存儲要求,採用加密和壓縮技術,將電子文檔作為大型數據庫中某種特殊屬性對象來存儲,以數據庫方式對企業電子文檔進行集成的、統一的管理,提出一種訪問控制的增強型安全設計原則,基於此原則建立了管理授權和推薦式授權的安全訪問機制,用以提高系統的訪問安全性,並大大減少授權管理維護量;研究了特殊屬性對象的數據庫存儲機理,從而構造一種快速存儲、訪問和檢索電子文檔的方法,使得企業信息集成平臺的電子文檔獲得安全、可靠、快速的訪問。The amount the timer increments varies across families, as do the spr numbers and instructions to access the timebase
各實現的計時器增量不同, spr數和訪問時基的指令也不同。In order to change situation and realize higher education evaluation online, with introducing the origin and the phylogeny of higher education evaluation as the starting point in the paper, analyzing the characteristic of higher education evaluation and comparing several typical evaluation methods each other, we put forward a synthetic evaluation method based on a combination of ahp and fuzzy estimation. then we have made a thorough and careful study in education evaluation work pattern and system structure, in which some related technique, such as active server page technology and web database access technology etc. are discussed
本文首先介紹高教評估的起源及其發展概況,並分析了高教評估的特點,在深入研究幾種經典的評估方法的基礎上,提出模糊評估與層次分析相結合的綜合評估方法;接著對網上評估系統的工作模式及其體系結構進行探討,並應用相關的理論、技術,如數據庫理論、動態網頁技術asp 、和基於asp的web數據庫訪問技術等,開發了一個基於計算機網路的高等教育評估系統。This scheme integrates universual data accesss technology of microsoft, which plays a more and more important role in three - lay c / s ( client / server ) and uses the technology of ado ( active data access ), adopts the asp script language in display the results and uses stored procedure of sql server in databases design. in the system of b / s, client realizes a high efficient access to the server database through displaying diversified active controls in browser and using ado to access the data source. the disposing of data accures under the database not in the font of this system. this kind of scheme cannot only bring the system a higher real time response, but also decrease data runoff of the networks, lower the possibility that web server becomes bottleneck of the system and make the system more transplantable
當前的web數據庫訪問技術正處于發展階段,針對這種情況,本文通過分析當前各種流行的web數據庫訪問方案的優缺點,結合在三層次的c / s系統中扮演越來越重要的角色的中間件技術,採用了microsoft公司所提出的一致數據訪問技術,利用ado控制項,結合當前的asp語言,底層數據庫採用了sqlserver7 . 0的存儲過程技術,設計了一種自己的web數據庫訪問方案,即在browser / server系統當中,客戶端通過顯示在瀏覽器中的各種activex控制項,通過了ado連接數據庫,數據的處理利用了存儲在數據庫內部執行,實現對後端數據庫的高效訪問,並且這種方案在給系統帶來較高的實時響應性能的同時,減少了網路數據流量,降低了web服務器成為系統瓶頸的可能性,也增強了系統的可移植性。The network information and control exchange ( nice ) protocol that enables various digital computers to access information and control facilities of remote nodes on the same network
網路信息和控制交換系統協議,能使各種數字式計算機訪問同一網路中遠程網點的信息和控制設備。In the preprocessing stage the method of user and session identification often adopt heuristic algorithm for the being of cache and agent. this induce the uncertainty of data resource. the cppc algorithm avoid the limitation and has no use for complicated hash data structure. in this algorithm, by constructing a userld - url revelant matrix similar customer groups are discovered by measuring similarity between column vectors and relevant web pages are obtained by measuring similarity between row vectors ; frequent access paths can also be discovered by further processing of the latter. experiments show the effectiveness of the algorithm. in the fourth part, this thesis bring some key techniques of data mining into web usage mining, combine the characteristic of relation database design and implement a web usage mining system wlgms with function of visible. lt can provide the user with decision support, and has good practicability
本文演算法避免了這個缺陷,且不需要復雜的hash數據結構,通過構造一個userid - uel關聯矩陣,對列向量進行相似性分析得到相似客戶群體,對行向量進行相似性度量獲得相關web頁面,對後者再進一步處理得到頻繁訪問路徑。實驗結果表明了演算法的有效性。第四是本文將傳統數據挖掘過程中的各種關鍵技術,引入到對web使用信息的挖掘活動中,結合關系數據庫的特點設計並實現了一個具有可廣西人學頎士學位論義視化功能的web使用挖掘系統wlgms 。First, the paper introduces the basic knowledge of the image processing technique, emphasizes the image processing method that is used in the measur - ement system, such as edge detection operator, curve fitting algorithm, espe - cially hough change in detail, etc. second, the paper introduces the vc + + 6. 0 program language, analyses its peculiarity and advantage, explains the form of the image in the computer and dib visiting functions
首先,介紹了圖像處理方法的基礎知識,特別重點講述了在本系統中將會應用到的一些圖像處理方法,如邊緣檢測運算元、曲線擬合演算法等等,尤其是對于哈夫變換的方法,進行了詳細闡述。其次,介紹了本系統所應用的編程語言vc + + 6 . 0 ,分析了其特點和優點,並說明了模擬圖像數字化后,在計算機里的存儲格式以及相應的設備無關位圖訪問函數。During the selecting of operating system, we find that there is an undirected, insufficient and complicated of the mysql + php under linux. so, we are planning to setup a database will be a convenient, fast tool for users who just can find out the related information from the internet. to design and apply software of the rnai medical information database analyzer
在數據庫操作系統選擇過程中, linux下mysql + php建立的數據庫存在不直觀,數據類型不足,且對數據庫的修改操作過程復雜等缺點,為了使用戶可以方便、快捷地使用本數據庫,軟體設計採用了動態數據庫交互結構,外部用戶通過網際網路使用通用的瀏覽器就可以訪問數據庫。Describes the various ways you can store and access data on the client computer and fetch data from remote sources
描述可以用於在客戶端計算機上存儲和訪問數據以及從遠程源獲取數據的各種方式。The paper introduces a general design pattern of the foundation framework of advertisement inspecting system based on j2ee, and discusses the realization of data layer, business layer, web layer and application client of the system. it resolves the key problems as follows : the consistency of the way of business request expression, the reusability of application services and the security of the system, and make the systems based on this foundation framework easy to configure, and has excellent extensibility and applicability
論文詳細敘述了基於j2ee的廣告監播系統基礎架構的總體設計方案,並著重討論了該系統中數據訪問層、業務層、 web層、應用客戶端的具體實現,解決了業務請求表達方式的一致性、應用服務的可復用性、系統安全性等關鍵問題。Allows access to the collection of data - binding expressions on a control at design time
允許在設計時訪問控制項的數據綁定表達式集合。The paper describes how to develop this network monitor and diagnose system. data acquisition based on pxi, design and accesses sql server database, network remote monitor based on asp. net and remote diagnose based on web service have been finished. a rlv healthy remote and diagnose system is developed and achieve prospective aim
論文對該網路化監測診斷系統實現的各個方面進行了詳細的介紹,完成了基於pxi的虛擬儀器採集、 sqlserver數據庫設計與訪問、基於asp . net的網路化遠程監測和基於網路服務( webservice )的遠程診斷部分程序設計,以航天器為對象,開發了rlv健康監控與遠程診斷系統,達到了預期的設計目的。分享友人