access algorithm 中文意思是什麼

access algorithm 解釋
存取演算法
  • access : n. 1. 接近;會面。2. 捷徑,門路〈指方法、手段〉;檢查孔;進路,入口;【自動化】(存貯器的)存取。3. (病的)發作;(怒氣等的)爆發。4. 增加。
  • algorithm : n. 【數學】演算法;規則系統;演段。
  1. In sequential pattern, we describe mfr and the algorithm on how to find frequent access paths. in mining association rules, we introduce famous apriori algorithm and propose the optimized dhp algorithm with hashing

    在關聯規則的挖掘中,深入的分析了經典的apriori演算法,並運用哈希技術改進它得到dhp演算法,其中詳細闡述了該演算法改進的思路。
  2. This paper proposed a new proxy caching algorithm based on the distribution of user access preference in streaming media

    文章從實際用戶日誌文件的分析出發,利用發現的用戶瀏覽流媒體對象時的行為分佈模型,提出了一種新的視頻流媒體緩存演算法。
  3. In the preprocessing stage the method of user and session identification often adopt heuristic algorithm for the being of cache and agent. this induce the uncertainty of data resource. the cppc algorithm avoid the limitation and has no use for complicated hash data structure. in this algorithm, by constructing a userld - url revelant matrix similar customer groups are discovered by measuring similarity between column vectors and relevant web pages are obtained by measuring similarity between row vectors ; frequent access paths can also be discovered by further processing of the latter. experiments show the effectiveness of the algorithm. in the fourth part, this thesis bring some key techniques of data mining into web usage mining, combine the characteristic of relation database design and implement a web usage mining system wlgms with function of visible. lt can provide the user with decision support, and has good practicability

    本文演算法避免了這個缺陷,且不需要復雜的hash數據結構,通過構造一個userid - uel關聯矩陣,對列向量進行相似性分析得到相似客戶群體,對行向量進行相似性度量獲得相關web頁面,對後者再進一步處理得到頻繁訪問路徑。實驗結果表明了演算法的有效性。第四是本文將傳統數據挖掘過程中的各種關鍵技術,引入到對web使用信息的挖掘活動中,結合關系數據庫的特點設計並實現了一個具有可廣西人學頎士學位論義視化功能的web使用挖掘系統wlgms 。
  4. Several authentication methods are discussed, and several vpn implementation protocols that include pptp / l2tp protocol, ipsec protocol, socks protocol and mpls protocol are discussed. to implement access vpn, this dissertation use socks protocol, kerberos protocol and domestic cryptographical algorithm

    針對遠程訪問vpn密碼系統的實現,我們採用socks協議做為vpn實現協議,使用kerberos協議來進行身份認證,使用國內專用密碼演算法來進行數據的加解密。
  5. The uplink access dynamic bandwidth allocation algorithm is a hotspot of the research at home and abroad now

    上行接入帶寬分配演算法是目前國內外研究的熱點。
  6. It is the key of realizing uplink access in epon that how to design a fair, high - performance and supporting different service qos dynamic bandwidth allocation algorithm

    如何設計一種公平、高效、支持不同業務qos的上行接入帶寬分配演算法是無源光網路實現綜合接入的關鍵。
  7. In the case of the maximal observing time model, the solving problem can be break up into small problem which is find the elevation having maximal observing time of every access. thus, a simple enumeration algorithm can be used to solve it

    對時間覆蓋率優先問題,通過對這類模型的求解問題的特點進行分析,將問題轉化成為求解單次訪問的時間最長觀測帶這一等價問題,實現了最優求解。
  8. In regard to the knowledge by learning, we present that the super - dimensional cube, which has the characteristic to integrate various knowledge representation conveniently, is used as the architecture of knowledge base. the speediness algorithm of knowledge access, the best matching cube selection algorithm, is discussed in this paper when the super - dimensional cube is used as the architecture of knowledge base. the time complexity of the algorithm is analyzed, and the parallel algorithm is discussed also

    在這篇文章中我們提出一種多智能體系統新的協商模型:基於「這是什麼」 (或「要做什麼」 )學習機制的協商而不是常規的「怎麼做」模型;學習得到的知識,為了方便集成多種知識表示方法,我們運用高維方體的知識庫體系結構,在此基礎上進行快速訪問演算法的設計,分析了演算法的復雜度,並討論了演算法的并行實現;在模型中,我們還根據功能的需要與環境的需要,提出了智能體的三維模型。
  9. First of all, we bring forward the basic project of tadil, which adapts to combined operations. it is suggested to use tdma ( the abbreviation of time division multiple access ) as the working pattern and utilize the concept of mobile ad hoc network to construct the data link network. aiming at the impact of time delay on data link and the characteristic of cooperative combat under the command of director aircraft, this thesis applies a kind of kalman filtering algorithm in polar coordinates to compensate the error of time delay, and then does the transformation of target motion parameters to obtain the current information of target

    本文結合空軍裝備部某「十五」預研課題,圍繞著戰術數據鏈、多機協同多目標攻擊、超機動攻擊、空對地攻擊這四個方面展開了一系列的研究工作:本文首先給出了適應三軍聯合作戰的戰術數據鏈系統的基本方案,建議採用時分多址的工作模式,並利用移動自組織網路的概念構建數據鏈網路,同時針對數據鏈傳輸信息的時間延遲特性和指揮機指揮下的多機協同作戰特點,應用一種極坐標系下的卡爾曼濾波演算法對該傳輸延遲誤差進行補償,並在此基礎上進行目標運動參數的轉換,以獲得目標相對于某無人機的當前運動信息,且利用模擬驗證了方法的有效性。
  10. The paper particularly analyzed the satellite resource management structure, satellite connect admission control and mac ( media access control ) protocol. then the proposed delay equalization algorithm was applied in this satellite network

    論文通過對衛星網路資源調度管理結構、衛星接入以及mac ( mediaaccesscontrol )協議的研究,將提出的基於時延均衡的調度演算法在衛星網路中實現。
  11. Aimed at tdrms ' s specialty, a storage system design method based on sequential access media is proposed, then an algorithm used for speech data file query is proposed too

    針對電話錄音監控系統應用的特點,提出了一種基於順序存儲介質磁帶的電話語音數據存儲系統設計方法,並給出了在該系統下進行語音數據文件查詢的演算法。
  12. In this dissertation, the pivotal points relating to conditional access system, including the framework of mpeg - 2 system layers, the de - multiplexing of mpeg - 2 system, the service information table of mpeg - 2 and dvb, the encryption and decryption method for digital tv conditional access system, are fully discussed according to the market requisition. there is also a probe into the feasibility and security aspect of the coherent descramble algorithm

    本論文結合市場需要,詳細研究探討了與數字電視有條件接收系統緊密相關的部分關鍵技術,包括mpeg - 2系統層結構分析、 mpeg - 2系統復接技術、 mpeg - 2與dvb中業務信息表分析、數字電視有條件接收加解擾技術
  13. For the real time performance need of the low speed speech compress algorithm and the asic implement of the transfer process between programs, the design is put forward in the paper, in which state registers control the cross access between operator and memory, register windows are used for the parameters transfer, and the technique of hardware controlling is used to avoid pipeline conflict, so that the main problems of the transfer process in tr600 are solved effectively

    摘要針對低速率語音壓縮演算法對處理器系統實時處理復雜運算的性能要求,就程序調用過程的asic實現問題進行了對比與分析,進而提出了用層次狀態寄存器控制存取運算元對存儲體交叉訪問的方法,並結合運用寄存器窗口傳遞參數的功能,以及利用空指令硬布線處理流水線沖突的方法,有效地解決了tr600晶元中調用過程存在的主要問題。
  14. Based on the analysis of above drawbacks, this paper proposes frequent access pattern tree algorithm ( fapt ). this algorithm includes two steps : access pattern tree method, through the pattern matching method it saves user ' s visit sequences with tree ; pruning method, it uses frequent degree to prune access pattern tree which is under the frequent degree

    在分析以上不足的基礎上,提出了頻繁訪問模式樹( fapt )演算法,該演算法包括以下兩個步驟:訪問模式樹的生成,通過模式匹配的方法將用戶訪問序列以樹形結構來存儲;修剪的策略,利用頻繁度對訪問模式樹進行修剪,修剪掉其中低於頻繁度的節點。
  15. The algorithm use access frequency information as well as time information, which suit for large, scale vod environment

    演算法是基於訪問頻率的,但又結合了訪問的時間信息。
  16. In order to reduce access frequency to the ntp time server, and efficiently relieve the over - load situation of server. a time synchronization algorithm based on frequency adjustment in distributed system was proposed. under the same accuracy requirement,

    為了降低internet上對ntp時間服務器的訪問頻率,有效緩解時間服務器資源負擔過重的狀況,提出了一套適用於分散式系統的基於頻率調節的時間同步演算法。
  17. First, it gives a snapshot of some typical self - organized routing protocols in manet. then the design of self - organized routing algorithm based on ktrp is elaborated as the main part of this dissertation, including the choosing of key nodes, the main algorithm modification of ktrp to accommodate with the interior routing in subnet, the access flow between two layers, primary packet formats, tables, and ip routing algorithm. at last, the simulation model of the self - organized routing algorithm

    本文首先分析了現有的manet自組織路由協議;然後針對本信息傳輸分系統的網路結構,詳細分析了基於ktrp的子網內部以及相鄰層間的自組織路由演算法的設計,包括對多個關鍵節點的選取、為適應本課題子網內路由通信而對ktrp做出的主要演算法更改、相鄰層間接入互連的流程、自組織路由演算法中涉及的主要報文格式和表,並且舉例說明了ip選路演算法;最後對所設計的自組織路由演算法進行了模擬,以驗證演算法的有效性。
  18. Furthermore, we present a locality - based least connection ( lblc ) scheduling algorithm, which is to improve the access locality on individual server when load on the servers is basically balanced

    並提出基於局部性最小連接( lblc )調度演算法,在服務器間負載基本平衡情況下,提高單個服務器的訪問局部性。
  19. Mupma protocol characterizes its access algorithm, which specifies a certain number of minislots at the end of each frame to accommodate access requests from activated users, and the number can be adjusted dynamically according to the degree of collisions

    Mupma協議採用一種高效的接入演算法:它在每一幀的最後保留適當數量的微時隙,供節點競爭接入,並且微時隙的個數隨著參加競爭的節點的多少而動態地調整。
  20. Based on mupma protocol, a qos - supporting upma protocol, qupma protocol, is present. qupma has a unique frame structure and a priority - based access algorithm, which guarantee both the access and the transmission of real - time traffic prior to those of non - real - time traffic

    以mupma協議為基礎,我們還提出了一種支持qos的upma協議( qupma協議) ,它採用一種獨特的幀結構和基於優先級的接入競爭演算法,保證實時業務能夠優先接入和優先傳輸。
分享友人