訪客統計 的英文怎麼說

中文拼音 [fǎngtǒng]
訪客統計 英文
the visitor counts
  • : 動詞1. (訪問) call on; interview; visit 2. (調查; 尋求) inquiry into; seek by inquiry [search]; try to get
  • : Ⅰ名詞1 (事物間連續的關系) interconnected system 2 (衣服等的筒狀部分) any tube shaped part of ...
  • : Ⅰ動詞1 (計算) count; compute; calculate; number 2 (設想; 打算) plan; plot Ⅱ名詞1 (測量或計算...
  • 訪客 : caller
  • 統計 : 1 (對有關數據的搜集、整理、計算和分析) statistics; census; numerical statement; vital statistic...
  1. This scheme integrates universual data accesss technology of microsoft, which plays a more and more important role in three - lay c / s ( client / server ) and uses the technology of ado ( active data access ), adopts the asp script language in display the results and uses stored procedure of sql server in databases design. in the system of b / s, client realizes a high efficient access to the server database through displaying diversified active controls in browser and using ado to access the data source. the disposing of data accures under the database not in the font of this system. this kind of scheme cannot only bring the system a higher real time response, but also decrease data runoff of the networks, lower the possibility that web server becomes bottleneck of the system and make the system more transplantable

    當前的web數據庫問技術正處于發展階段,針對這種情況,本文通過分析當前各種流行的web數據庫問方案的優缺點,結合在三層次的c / s系中扮演越來越重要的角色的中間件技術,採用了microsoft公司所提出的一致數據問技術,利用ado控制項,結合當前的asp語言,底層數據庫採用了sqlserver7 . 0的存儲過程技術,設了一種自己的web數據庫問方案,即在browser / server系當中,戶端通過顯示在瀏覽器中的各種activex控制項,通過了ado連接數據庫,數據的處理利用了存儲在數據庫內部執行,實現對後端數據庫的高效問,並且這種方案在給系帶來較高的實時響應性能的同時,減少了網路數據流量,降低了web服務器成為系瓶頸的可能性,也增強了系的可移植性。
  2. In the preprocessing stage the method of user and session identification often adopt heuristic algorithm for the being of cache and agent. this induce the uncertainty of data resource. the cppc algorithm avoid the limitation and has no use for complicated hash data structure. in this algorithm, by constructing a userld - url revelant matrix similar customer groups are discovered by measuring similarity between column vectors and relevant web pages are obtained by measuring similarity between row vectors ; frequent access paths can also be discovered by further processing of the latter. experiments show the effectiveness of the algorithm. in the fourth part, this thesis bring some key techniques of data mining into web usage mining, combine the characteristic of relation database design and implement a web usage mining system wlgms with function of visible. lt can provide the user with decision support, and has good practicability

    本文演算法避免了這個缺陷,且不需要復雜的hash數據結構,通過構造一個userid - uel關聯矩陣,對列向量進行相似性分析得到相似戶群體,對行向量進行相似性度量獲得相關web頁面,對後者再進一步處理得到頻繁問路徑。實驗結果表明了演算法的有效性。第四是本文將傳數據挖掘過程中的各種關鍵技術,引入到對web使用信息的挖掘活動中,結合關系數據庫的特點設並實現了一個具有可廣西人學頎士學位論義視化功能的web使用挖掘系wlgms 。
  3. The paper introduces a general design pattern of the foundation framework of advertisement inspecting system based on j2ee, and discusses the realization of data layer, business layer, web layer and application client of the system. it resolves the key problems as follows : the consistency of the way of business request expression, the reusability of application services and the security of the system, and make the systems based on this foundation framework easy to configure, and has excellent extensibility and applicability

    論文詳細敘述了基於j2ee的廣告監播系基礎架構的總體設方案,並著重討論了該系中數據問層、業務層、 web層、應用戶端的具體實現,解決了業務請求表達方式的一致性、應用服務的可復用性、系安全性等關鍵問題。
  4. In this thesis intrusion is a conception of broad sense. it includes that crackers acquire the system control right beyond legal scope, and some behavior harmful to systems such as collection of leak information, denial of service

    本文中的「入侵」 ( intrusion )是個廣義的概念,不僅包括被發起攻擊的人(如惡意的黑)取得超出合法范圍的系控制權,也包括收集漏洞信息,造成拒絕問( denialofservice )等對算機系造成危害的行為。
  5. Statistics show that more than half of our tourists were repeated visitors

    數字顯示,超過一半港遊均是舊地重遊。
  6. Develop a customer call cycle to ensure that customers are visited in a systematic and methodical manner, and ensure that effective call objectives exist for each visit

    制訂一套有系、有方法的戶拜周期劃,並確保每次拜都有效達到了拜目的。
  7. An online community connecting webmasters and programmers

    -提供免費數器與訪客統計
  8. This thesis tries to establish a new evaluation method, redesign evaluation table, use the test evaluation norms in the table and norm coefficient by specialists, as well as mathematical statistics etc, so as to make sure the new evaluation method is scientific and the results could show the teaching situation objectively

    摘要在已有研究的基礎上構建新的高校體育課堂教學質量評估方法,重新編制高校體育課堂教學質量評價量表,運用專家談法、 「特爾菲」法、數理法等多種科研方法對評價量表的評價指標和指標權重系數進行檢驗,力求使新的評估方法具有科學性,使測得的結果能觀地反映高校體育教師的教學情況。
  9. An access key provides exactly that - - access to ups systems, which hold the information you or your customers need to ship, track, or rate a package

    問密鑰提供的功能就是讓您進入ups系,這里有您與您的戶運輸、跟蹤或包裹運費算所需要的信息。
  10. We log these addresses and analyse them to understand where requests originate so that we can provide the most efficient service, enhance security, ensure appropriate usage and produce traffic volume statistics

    我們將記錄這些地址並對其進行分析,了解請求來自何處,以便提供最有效的服務、增加安全性、確保網站的適當使用,並量。
  11. In technological part, it begins with maintaining physical security, network security, system security, data security, application security and user security, and then takes proven actions, that include authentication, password checking, access control, anti - virus, firewall, leak scan, ids, security audit, anti - hacker, backup mechanism and etc. in organization sketch part, the different positions are arranged by insisting the rule of the minimum right. in management sketch part, a series of effective regulations are settled, according to the chinese governmental laws and the regulations of the agricultural bank of china. now, the plan has been preliminarily applied into the practice

    在技術層面上,從維護銀行網路信息系物理安全、網路安全、系安全、應用安全、用戶安全等方面出發,採用了成熟、適用的安全技術措施,包括;身份認證、密碼、問控制、防病毒、防火墻、漏洞掃描、入侵檢測、安全審、防黑入侵、同城災難備份等技術;在組織結構上,堅持權限最小化原則,設置不同的崗位,對每個崗位的安全職責進行了明確的界定;在管理體繫上,依據法律法規,制定了行之有效的規章制度。
  12. The analogy video real - time capturing, encoding, compressing and streaming transfer have been implemented at server end by utilizing windows media encoder sdk to program. the communication between client and server is built by programming with socket. accessing the server, the client can control the video - matrix - control remotely and distributively and real - time reappear the live video

    圍繞系的設和實現,深入分析了視頻矩陣切換器,實現了視頻通信服務器與視頻矩陣切換器的互聯;運用windowsmediaencodersdk編程實現了服務器對模擬監控視頻的實時採集、壓縮編碼和流式傳輸;運用socket編程實現了戶端和服務器端的通信,通過問服務器,戶端實現了對視頻矩陣切換器的遠程分散式控制和現場監控視頻的實時再現。
  13. In this research, the outline design of power engineering system is comprised of three aspects : system structure, wok pattern, and software implementation mode ; the implementation stage was separated into background database, front - end interface and report module, and lots of problems were brought forward. in the section of realizing the detailed design and implementation of the system, the thesis dissertated the above three aspects in emphasis. firstly, the design and implementation of background database : " sybase " database management system was adopted in this system to provide data service and database can be built through analyzing the construction operation flow ; data warehouse technology was introduced in this research as well

    接下來在系詳細設和方案實現中,論文主要從三個方面進行論述,即后臺數據庫設與實現:系採用sybase數據庫管理系作為后臺數據服務,通過對工程管理的流程整理和分析,給出了建庫的實施過程,同時採用了數據集市技術實現工程信息的管理,採取文件和數據庫結合的方法對文檔信息進行管理;前臺界面設與實現:在課題的研究中,應用先進的asp . net技術創建web應用程序,它結合了桌面程序強大的交互能力和web方便的信息發布能力,而在後臺數據問中採用ado . net技術來完成;報表模塊設與實現:論文在總結目前多種報表的優缺點后,提出了一種web報表解決方案,即通過戶端的軟體實現信息查詢並將返回數據導入excel中,藉助其強大和靈活的表格處理能力,在電力生產工程劃管理系中實現用戶定製報表功能,其中web服務技術起了關鍵作用。
  14. Thus, full attention to risk management, the establishment of large it projects risk management system and risk analysis theory methods comprehensive, in - depth and meticulous research and the success of the project will achieve its objectives and achieve the optimum allocation of resources play a role in guiding theory

    本文針對大型it項目的特點,立足於風險管理角度,對吉林電力服支持系項目進行項目風險管理方案設和實證研究。首先,在風險辨識中,針對大型it項目特點首先使用類推比較/歷史經驗法討論該項目主要風險,再用專家問法小范圍辨識。
  15. Also part of the trusted computing base of the distributed system, and they flow together on the wire whenever a client is required to gain access to a particular object

    產生並頒發的,它也是分散式系中可信算基礎的一部分)中,每當戶機被要求獲得對某個特定對象的問權限時,它們就會一起在線路上傳輸。
  16. The main research contents are as follovvs : after the analyzing of the process of making train diagram, according with its character, and take into account the trend of innovation, chooses the total solution based on the b / s architecture, 3 - tier operation distributed and 2 - tier data distributed to separate the data from operation and simplify the development and maintenance ; the e - r data model that is accord with the 3nf criterion is designed after analyzing the data structure of the train diagram system. emphasis on the permission security of the distributed system, take the view schema, coupled with the login authentication and permissions validation, to ensure the data accessing domination, and take the synchronization, error control, and restore capability to advance the data security ; on the basis of b / s solution architecture, after comparing the existing transportation technologies, b - isdn and adsl is selected as the major solution architecture based on the package - svvitched networks. furthermore, error control, firewall, and encryption techniques are introduced to prevent the hacker attack and ensure the networks safety

    論文的主要研究內容包括:對目前我國列車運行圖管理體制和編制流程進行詳細分析,根據其「幾上幾下」的特點,並結合未來「網運分離」體制改革的變化預測,選擇採用與之相適應的基於b s體系架構、三層業務分佈、二層數據分佈的整體方案,實現業務與數據的分離,降低開發與應用過程的復雜度和總體成本;對列車運行圖系的數據信息進行分析,設符合3nf規范的數據e - r關系模型,並著重研究處于分散式系中的列車運行圖數據信息的問權限和數據安全問題,提出以視圖模式結合用戶識別權限審定實現數據權限劃分,以並發處理、容錯技術、恢復技術提高系的數據安全性;在基於b s架構的系整體方案基礎上,對當前多種數據傳輸技術進行分析比較,採用b - isdn為主幹網、 adsl為接入端的基於公用數據網路分組交換技術的系網路體系結構,並針對網路自身安全性和黑攻擊與侵入問題,詳細討論綜合採用差錯控制、防火墻、數據加密解密等技術手段提高系的網路安全性能。
  17. The ogcio also sets up and maintains the gic services including web hosting, search engines and visitor statistics

    政府資訊科技總監辦公室也負責設立和維持政府資訊中心的服務,包括網頁儲存、電子郵件、搜尋程式及人數等。
  18. Through the researching of network job management system, the author found that the original client nscl can only use in lan environment. considering the high - speed development of the internet application and the requirement of the user, the author of the dissertation developed the web client and i - mode client for mobile telephone of this system. during the course of developing, he considered that the heavy load was a question of the www server

    筆者對這一系進行了大量的分析和研究,發現jms作業管理系的原有戶端nscl只能在局域網范圍內對該系進行問,鑒于目前internet應用的高速發展,以及戶的需求,設開發了該系的web戶端和用於i - mode手機瀏覽的web戶端。
  19. This means that it is stable, producing outputs within a controlled range ; it is predictable ; and outputs are satisfying customers. in addition to examining statistical data, the team interviews customers to seek feedback about the process. it compares the observed process to the diagrams and descriptions developed earlier

    圈確認流程在掌控之中,這意味著1流程穩定,產出在控制范圍2流程可預測3產出滿足顧需求,除了檢視資料外,圈也要談顧以獲得回應,比較所觀察的流程與之前所繪制或描述的流程,最後,檢視目前績效相較于附加的顧需求和附加的流程產能。
  20. Implements evaluation systems to monitor and evaluates the effectiveness of the training and development activities such as comparison of statistics, mystery caller, and survey testing to make sure that standards have been achieved

    利用學對比、神秘、意見調查等工具評估系監督、評估培訓與發展活動的效果確定標準已經達成。
分享友人