賴本庫 的英文怎麼說

中文拼音 [làiběn]
賴本庫 英文
rebenku
  • : i 動詞1 (依靠) rely on; depend on 2 (逗留不肯離去) hang on in a place; drag out one s stay in...
  • : i 名詞1 (草木的莖或根)stem or root of plants 2 (事物的根源)foundation; origin; basis 3 (本錢...
  1. The article points out the importance and necessity of the information - security from its actuality in our country. the resources in the information system, for instance, hardware, software, data, document, operator, meterial and so on, are evaluated and gived safety grade firstly. and then, it analyses the menace including the nonauthorized access, the information leak, the refused sevice, the internal objection which the system will take. the following are the corresponding control police : confirm the users " rights and duties, including the mode of using account, the limit of accessing resource, the application of password, the building of backup ; confirm the administrators " right and duties, including physical safety, system configuration, account configuration and usufruct, password management, audit and control, backup and individual intimity ; run - of - mill measure of security defence, including access control, symbol and identification, integrality control, password technique, firewall system, audit and resumption, safety of operating system, safety of database system, defence of computers " virus and resisting - deny protocol. in the end, the article offers the strategies of disposing the safety - accident and analyse after ithow. to report it, how to solve it in phase, and how to avoid it happening again. in a word, the article presents a holistic resolvent about keeping away the information system ' s security, and supplies a essential frame for its configuration, management and application

    然後,對系統可能受到的威脅,包括非授權訪問、信息泄漏、拒絕服務和內部缺陷等進行分析,並提出了相應的控制策略:確定用戶的權力和責任,包括帳戶使用方式、資源訪問權限、口令應用以及建立備份等;確定系統管理員的權力和責任,包括物理安全、系統配置、帳戶設置及使用權限、口令管理、審計和監控、備份以及個人隱私等方面;一般性的安全防護措施:存取控制、標識和認證、完整性控制、密碼技術、防火墻系統、審計和恢復、操作系統安全、數據系統安全、計算機病毒防護和抗抵協議等。最後,對事故處理和事後分析提供策略,如何報告安全事故,如何協調解決安全事故,如何避免安全事故再次發生。總之,文對信息系統安全防範工作給出一個整體的解決方案,為其在配置、管理和應用方面提供了基的框架。
  2. The paper, in order to support for alteration of enterprise data analysis requirements, provides a kind of adaptive online analysis processing and data mining model ( abbreviated dolam ), its logic structure, system frame and physical structure are presented, which enhances hominine direction and controlling mechanism, embodying in such aspects as query - driven, fuzzy data mining and dynamic interactive ability etc. the paper offers design and implementation blue print of the core of dolam - - data warehouse management tool, olap tool and summarysql tool, now, they are running in dalian international cooperation ( group ) stock ltd and have gained good effect

    四、決策敏捷依于dss的柔性,為增強dss的柔性,文提出一種具有可適應的聯機分析挖掘模型dolam ,設計了它的邏輯結構、體系結構和物理實現結構。該模型加強了人的導向和控制機制,體現在查詢驅動、模糊挖掘、動態交互方面。文給出了dolam的核心部分?數據倉管理工具、 olap工具、 summarysql模糊查詢挖掘工具的具體設計和實現方案,並運用它于大連國際合作(集團)股份有限公司的決策支持實踐中,取得了較好的應用效果。
  3. To solve the problem of report form depends on structure of database seriously at report output in information system, based on analysis and abstraction to contents of reports in information system, the concept of report templates was introduced and basic elements for common reports were defined, a framework of the generic report generation system for diagram & text combined contents was presented with object - oriented programming approach

    摘要為了解決信息系統的報表輸出過程中,報表格式嚴重地依于數據結構的問題,通過對多個信息系統的報表數據進行分析和抽象研究,引入「報表模板」的概念,並且為常見的報表定義了通用圖文報表基元素,採用面向對象的程序設計方法,開發了面向信息系統的通用圖文報表生成系統。
  4. If it is not good enough, optimal control module based on principle component analysis and clustering search will function for optimization. this algorithm makes no request for accurate analytical model and maintains search efficiency and self - adjusting performance by an optimal parameter set derived from process data, which is proved to be effective. by practical running of dcs, a prominent tracing performance is gained and variation of parameters is limited in a small range, which enhance stability and production benefit of sintering process obviously

    燒結過程是一個影響因素復雜、干擾嚴重、具有不確定性的工業過程,傳統的基於對象精確解析模型的優化策略難以奏效,因此在控制參數優化模塊中提出了一種基於主元分析和聚類搜索的優化匹配演算法,該演算法不要求對象的精確模型,其搜索效率和自校正性能依于從生產過程歷史數據中抽取的優化參數樣,充分利用了燒結生產過程積累的生產數據所包含的信息,取得了不錯的效果。
  5. This essay analyzes meinung anti - dam movement and kongliao anti - nuclear movement in order to construct two ideal types in political exchange, i. e., autonomy and dependency

    文分析美濃反水運動與貢寮反核四運動之個案,試圖創建政治交換關系的自主與依的理念類型。
  6. In this paper, a single product stochastic inventory model with a random input and a certain output was proposed, and moreover, given the maximum price the firm would be willing to pay to the end user, the critical value policy depending on the initial inventory level is optimal

    文採用價格對回收數量進行控制,基於一個具有可控隨機輸入、固定輸出的單產品隨機存模型,在給定最大回收價格的前提下,以單周期期望存費用最小為目標,證明了依于初始存的關鍵值策略結構為最優定價結構。
  7. The runtime uses this information to ensure that your component or application has the specified versions of everything it needs, which makes your code less likely to break because of some unmet dependency

    公共語言運行使用這些信息確保組件或應用程序具有它需要的所有內容的指定版,這樣就使代碼不太可能由於某些未滿足的依項而發生中斷。
  8. For satisfying the requirement of the data feature and the reliance degree on data for user, this paper establishes an information collecting and managing system based on web database for engineering experimentation

    文基於工程試驗數據的特徵和零件壽命對于用戶在開發產品,跟蹤產品質量和預測產品壽命過程中對工程試驗數據的依程度,建立了以計算機為核心的數據採集系統和基於web數據的數據信息管理系統。
  9. According to the deficiencies of current research in domain knowledge base, this paper classifies the knowledge in domain knowledge base on the basis of the book organization, brings forth a transferring computation method of relationships between knowledge points, which is based on the quantitative definition of relationships between knowledge points, and builds a quantitative representation mode of knowledge base. meanwhile, this paper proposes the navigating strategy, testing strategy and diagnosing strategy, which can provide method and foundation for the development of icai system

    針對當前領域知識研究中存在的不足,文按照書的組織對領域知識中的知識進行劃分,從知識的組織角度和依角度對知識點之間的關系進行定量定義,提出了知識點關系傳遞計算方法,建立了一個知識定量表示模型,並在此基礎上提出了基於組織關系和依關系的導航策略、測試策略和診斷策略,從而為智能計算機輔助教學系統的開發提供了方法和依據。
  10. Combinatorial chemistry strategies depend on the size and diversity of the library to be designed, the availability and cost of the reagents ( building blocks ), and the type of chemical syntheses being attempted

    組合化學策略依于欲構建文的大小、和多樣性,試劑的有效性和成和化學合成的類型。
  11. By propagating xml keys to relations as functional dependencies, we update xml data and it ' s storage over relational databases at the same time, we preserve the coincidence between them

    通過把xml鍵約束映射為關系數據中的函數依,在更新xml文檔時,不但保持了xml文檔身的鍵約束,還使關系數據和xml文檔保持了一致。
  12. An artifact is a physical unit, such as a file, executable, script, database, etc. only artifacts live on physical nodes ; classes and components do not have " location. " however, an artifact may manifest components and other classifiers i. e., classes

    一個產物是一個物理單位,象一個文件,可運行的程序,腳,數據等等。只有一種產物依于實際的節點;類和組件沒有「位置」 。然而,一個產物可能顯示組件和其他的分類器(例如類) 。
  13. It describes the principle and implement of lyx ' s each part, including : the method and steps of porting linux kernel and software to embedded device ; the dependencies between linux kernel and software or between software and software are described with xml, so that the dependency problems in the process of compiling and in the runtime system are resolved with the same mechanism ; the library reduction technology in existence is analyzed, and against its deficiency, a more efficient function - level library reduction scheme is introduced and implemented ; the implement of several file systems that lyx supports ; the workflow of lyx ' s each part

    文論述了lyx各部分的原理和具體實現,包括:將linux內核和軟體包移植到嵌入式設備上的具體方法和步驟:用xml描述內核與軟體包、軟體包與軟體包之間的依關系,統一地解決了編譯過程中和運行系統中的依關系問題;分析現有的共享裁剪技術,根據它的不足,提出和實現了一種更加有效的函數級裁剪技術; lyx支持的幾種文件系統類型及其實現; lyx各部分的工作流程。
分享友人