access by key 中文意思是什麼

access by key 解釋
鍵控存取
  • access : n. 1. 接近;會面。2. 捷徑,門路〈指方法、手段〉;檢查孔;進路,入口;【自動化】(存貯器的)存取。3. (病的)發作;(怒氣等的)爆發。4. 增加。
  • by : adv 1 在側,在旁,在附近。2 (擱)在一邊,(放)到旁邊,(存)在一旁;收著。3 (由旁邊)經過,過...
  • key : n 1 鑰匙。2 要害,關口,要沖。3 關鍵,線索,秘訣;解法。4 (外國書的)直譯本,圖例,題解,圖解,...
  1. In chapter 4, several key techniques used in the development of the software are introduced briefly, such as the setup of the development condition, dhtml technology, active server pages ( asp ) development technology, and the interface technology, by which web server can access the back - end database

    第4章對本系統開發過程中涉及的關鍵技術作了簡要說明,重點討論了開發環境設置、 dhtml技術、活動服務器頁面( asp )開發技術和數據庫訪問技術。
  2. In the preprocessing stage the method of user and session identification often adopt heuristic algorithm for the being of cache and agent. this induce the uncertainty of data resource. the cppc algorithm avoid the limitation and has no use for complicated hash data structure. in this algorithm, by constructing a userld - url revelant matrix similar customer groups are discovered by measuring similarity between column vectors and relevant web pages are obtained by measuring similarity between row vectors ; frequent access paths can also be discovered by further processing of the latter. experiments show the effectiveness of the algorithm. in the fourth part, this thesis bring some key techniques of data mining into web usage mining, combine the characteristic of relation database design and implement a web usage mining system wlgms with function of visible. lt can provide the user with decision support, and has good practicability

    本文演算法避免了這個缺陷,且不需要復雜的hash數據結構,通過構造一個userid - uel關聯矩陣,對列向量進行相似性分析得到相似客戶群體,對行向量進行相似性度量獲得相關web頁面,對後者再進一步處理得到頻繁訪問路徑。實驗結果表明了演算法的有效性。第四是本文將傳統數據挖掘過程中的各種關鍵技術,引入到對web使用信息的挖掘活動中,結合關系數據庫的特點設計並實現了一個具有可廣西人學頎士學位論義視化功能的web使用挖掘系統wlgms 。
  3. The essential intention of conditional access system ( cas ) is to achieve pay - tv of the digital broadcast system by means of subscriber management and authorization control. so cas is the key technology to realize the pay - tv and interact - tv. based on composite technology in transport layer, paper describes the production and structure of transport stream in mpeg - 2 standard, mpeg - 2 program special information and conditional access definition in service information from dvb standard

    有條件接收系統( conditionalaccesssystem , cas ) ,其基本目的是通過對用戶的授權控制和管理,實現數字廣播電視系統的有償服務,在為運營商帶來經濟上回報的同時,也能為用戶提供更多、更高質量的服務內容,它是實現付費電視、交互電視的關鍵技術。
  4. This constructor allows you to specify access rights for specific key containers identified by name ; use an asterisk to represent all the key containers

    使用此構造函數能為按名稱標識的特定密鑰容器指定訪問權限;使用星號( 「 * 」 )表示所有的密鑰容器。
  5. After strict formal analysis with ban logic, the result have proved that the authentication protocol is secure. the improved access control scheme is realized by the mode of single - key - lock - pair. under new access control scheme, user can own several kinds of access right upon one file under the new scheme without the supposition that the access rights is increase by degrees, and the possibility of overflow problem is significantly reduced by our new method

    作為對原雙向認證訪問控制方案的改進,改進后的雙向身份認證協議可以很好的抵抗中間人攻擊和重放攻擊,經過嚴密的ban邏輯形式分析和論證,結果表明該協議是安全的;改進后的訪問控制方案用單鑰-鎖對方案實現,除保持了一般單鑰-鎖對方案的良好動態特性外,在不需要訪問權限遞增假設下,實現了用戶對文件的多種訪問控制權限,並大大減小了溢出問題的發生可能
  6. By the i key, ready access to our goods column articles, the use of the mouse click, can switch items

    按「 i 」鍵,可以隨時查看自己物品欄中的物品,使用鼠標點擊,可以切換物品。
  7. The security environment of the router with ipsec is provided by the cooperation of access control system, key management system, audit system, security service strategy system, intelligent diagnosis system and ipsec implementation

    基於ipsec協議的路由器的安全保障由路由器中的訪問控制系統、密鑰管理系統、審計系統、安全服務策略系統、智能診斷系統以及ipsec實現共同提供。
  8. The theory of abstract data types will provide the key to this problem, by allowing programs to access data by external properties rather than physical implementation

    抽象數據類型的理論將會提供這個問題的答案,既允許程序用外部特性而非物理實現來存取數據
  9. This paper stresses on discussing the architecture, access protocol and implementation mechanism based on xml and web services technologies, researches key technologies of metadata information service and data uniform access and management in database grid, designs and implements distributed mis subsystem and das subsystem, which support multi - domain management. mis can provides metadata information for the whole system, such as das and clients, it uses domain name 、 logical name and internal name of data object to uniformly name database resources in grid and implements name mapping mechanism and user view metadata information service and provides virtual organization and management of database resources. das can provide a scalable uniform data access by virtual organization and management of storage resources and multi - mode data share access mechanism, thus integrate database resources in grid and shields distribution and heterogeneity of resources and achieves transparent access. system adopts data access mechanism based on user request mapping to flexibly implement data access across multi domains, and adopts distributed data cache mechanism 、 security mechanism based gsi to provide high - performance secure data service for grid users

    本文論述了griddaen - dai系統的邏輯結構、訪問協議、數據服務流程以及基於webservices 、 xml等技術的實現策略,重點研究數據庫網格中的元服務、數據統一訪問和管理等關鍵技術,設計和實現了支持多管理域的分散式元服務子系統和數據訪問服務子系統。其中元服務主要為整個系統提供各種元信息支持,它採用域名、數據對象的邏輯名稱、物理名稱和內部名稱對廣域環境下的數據庫數據進行了統一命名,實現了相應的名字映射機制和全局的用戶數據視圖服務,提供了數據庫資源的虛擬組織與管理方式;數據訪問服務通過提供可擴展的統一數據訪問和支持多種數據共享訪問模式,屏蔽了數據庫資源的分佈性和異構性,為用戶提供了統一透明的數據服務。
  10. First, the thesis constructs a object cache model based on asynchronous messaging model which can improve access efficiency of object by establishing duplicate locally for remote object, and studies a serious of key problem, and presents object duplication algorithm, object migration algorithm, duplicate consistency algorithm, etc. second, to keep up with the dynamic changes of performa

    一個是基於異步消息模型進一步構建了對象緩沖模型,通過在本地建立遠程對象的副本,提高對象的訪問效率,研究並解決了其中一系列的關鍵問題,提出了對象復制演算法、對象遷移演算法、副本一致性維護演算法等。
  11. Such as ha3999 telephone, hcd3999 telephone, hw3999 telephone and hl3999 telephone. they have been granted the network access license by the ministry of information industry hcd3999 calling display multi - function telephone is the first of its kind in china, which comes up to the international advanced level. it was authorized by the ministry of post and communication to become the first of its kind in china to be used on telecommunication public network, which has been considered as national - grade key new product and placed on province - grade, national - grade torch plan, and

    其中電纜接頭盒、 cdma直放站先後被評為泉州市科技進步一等獎、福建省科技進步三等獎、中國鄉鎮企業科技進步二等獎。主叫顯示號碼多功能電話機屬國內首創,達到國際先進水平,經原郵電部批準,成為全國首項在郵電公用網上使用的產品,列入省級、國家級火炬計劃,並獲得國家專利,同時還被確認為國家重點新產品,並獲得福建省科技進步三等獎等榮譽。
  12. Access your automap by pressing the # key, or from the game menu

    通過按#鍵進入你的自動地圖,或者通過游戲菜單來進入。
  13. Use medkits in your inventory to restore health. your inventory list is accessible from the game menu. access the game menu by pressing the 0 key

    在你的物品中使用醫療包來恢復生命值。你的物品清單可以在游戲菜單中進入。通過0鍵進入游戲菜單。
  14. Useful features include a key word search function and a direct link to the internet. users of the cd - rom are able to access hkma s website for the latest information by clicking a button

    光碟也具備關鍵字搜尋功能,此外,如光碟用戶已上網,只需選取指定圖示,就可直接接通國際電腦網路,進入金管局網址,查閱最新資料。
  15. In the code division multiple access ( cdma ) system, the multiple access interference ( mai ) mitigation capability as well as system capacity are determined, to a great extent, by the correlation properties of spreading sequences ; while adaptive modulation and coding ( amc ) with high spectral efficiency is the key technique to obtain high speed and low symbol error rate ( ser ) performance in mobile data transmission

    在碼分多址( cdma )系統中,擴頻序列的特性在很大程度上決定了抗多址干擾( mai )能力和系統容量,而高頻譜效率的自適應調制編碼( amc )技術則是獲得高速率和低誤碼率( ser )移動數據傳輸性能的關鍵因素。
  16. 4. the key technologies of developing system active web documents technology in client, asp and com technology in server, and unity data access such as ado, odbc / ole db are used in implementing the system and the system capability is improved by optimizing programming technology

    系統實現的關鍵技術系統的實現採用了客戶端的活動文檔技術(客戶端的activex ) 、服務器端的asp 、 com技術,以及數據層的統一數據訪問技術( ado 、 odbc oledb ) ,並通過程序化技術以改善應用程序的性能。
  17. The data is thus duly segregated, and secured by a complex secret key system prohibiting unauthorised access

    卡內的資料都是分隔儲存,並由一套先進的密匙系統保護,嚴防非法使用。
  18. Multi - user detector ( mud ) is one of the key techniques for these problems in cdma systems, which deals with multiple access interference as useful information and eliminates it by utilizing correlation characteristics between signature waves. mud techniques can dramatically relax " near - far " effects, significantly improve the system ' s performance and increase the capacity of cdma systems

    它將信號中的多址干擾看作一種有用信息,利用擴頻序列之間的互相關性來消除多址干擾,能減輕「遠-近」效應影響,改善系統的性能,提高系統的容量。
分享友人