access structure 中文意思是什麼

access structure 解釋
存取結構
  • access : n. 1. 接近;會面。2. 捷徑,門路〈指方法、手段〉;檢查孔;進路,入口;【自動化】(存貯器的)存取。3. (病的)發作;(怒氣等的)爆發。4. 增加。
  • structure : n. 1. 構造,結構;組織;石理,石紋。2. 建造物。3. 【化學】化學結構。4. 【心理學】(直接經驗中顯現的)結構性,整體性;整體結構。adj. -d ,-less adj.
  1. In order to change situation and realize higher education evaluation online, with introducing the origin and the phylogeny of higher education evaluation as the starting point in the paper, analyzing the characteristic of higher education evaluation and comparing several typical evaluation methods each other, we put forward a synthetic evaluation method based on a combination of ahp and fuzzy estimation. then we have made a thorough and careful study in education evaluation work pattern and system structure, in which some related technique, such as active server page technology and web database access technology etc. are discussed

    本文首先介紹高教評估的起源及其發展概況,並分析了高教評估的特點,在深入研究幾種經典的評估方法的基礎上,提出模糊評估與層次分析相結合的綜合評估方法;接著對網上評估系統的工作模式及其體系結構進行探討,並應用相關的理論、技術,如數據庫理論、動態網頁技術asp 、和基於asp的web數據庫訪問技術等,開發了一個基於計算機網路的高等教育評估系統。
  2. As a perfect vehicle monitoring system, it is essential that the database with complete information supported. this paper designed database structure of vehicle monitoring system, and used ado access technology realization under vc + + 6. 0

    本文設計了車輛監控系統的數據庫結構,以實現路徑規劃、軌跡回放、信息查詢等功能,並在vc下使用ado數據存儲技術編程實現。
  3. In the preprocessing stage the method of user and session identification often adopt heuristic algorithm for the being of cache and agent. this induce the uncertainty of data resource. the cppc algorithm avoid the limitation and has no use for complicated hash data structure. in this algorithm, by constructing a userld - url revelant matrix similar customer groups are discovered by measuring similarity between column vectors and relevant web pages are obtained by measuring similarity between row vectors ; frequent access paths can also be discovered by further processing of the latter. experiments show the effectiveness of the algorithm. in the fourth part, this thesis bring some key techniques of data mining into web usage mining, combine the characteristic of relation database design and implement a web usage mining system wlgms with function of visible. lt can provide the user with decision support, and has good practicability

    本文演算法避免了這個缺陷,且不需要復雜的hash數據結構,通過構造一個userid - uel關聯矩陣,對列向量進行相似性分析得到相似客戶群體,對行向量進行相似性度量獲得相關web頁面,對後者再進一步處理得到頻繁訪問路徑。實驗結果表明了演算法的有效性。第四是本文將傳統數據挖掘過程中的各種關鍵技術,引入到對web使用信息的挖掘活動中,結合關系數據庫的特點設計並實現了一個具有可廣西人學頎士學位論義視化功能的web使用挖掘系統wlgms 。
  4. In the prototype, a middleware using xml technology is constructed between the client ( or browse ) and database server, the communication between database server and the middleware is based on the xml information and interface. by means of the jdbc interface, we can transporently access hetergeneous databases system. and using xml information that is expressed in a structure, text - based format, we can describe the database information more accuratetly in a general format. at the same time, in order to describe the structure of xml files more clearly, the transpormation from schema has been realized

    該模型在客戶端(或瀏覽器方)和數據庫服務器間利用xml技術構建了一中間件,在此模型中,中間件和數據庫服務器之間的通訊是建立在xml信息和jdbc介面之上的。通過jdbc ,可以透明地訪問異構數據庫;藉助于基於文本的結構化的xml信息,可以更精確地以一種通用的語言來描述數據庫信息。同時,為了更精確地描述xml文件自身結構信息,實現了從dtd到xmlschema的轉換。
  5. Abstract : in order to make an solution to modeling the image database system, this paper proposes an image data model idm, which decomposes the image object into the primary table of stable attributes and assistant tables of variable attributes and are temporarily organized to access the image data when making query and inference. it can model with unified mode each scheme of the image database system structure

    文摘:為解決圖象數據庫建模,提出一種新的圖象數據模型,將圖象對象分解為由穩定屬性組成的主表部分和若干個可變屬性組成的副表部分,查詢推理時對主表和副表臨時組織以完成圖象數據的存取管理等,它能對圖象數據庫5級模式結構的每級模式一致建模。
  6. Based on multimedia - instance model. we establish the data store structure, which can access multimedia information at high speed and show its applications through given examples

    基於提出的媒體實例模型,我們建立了能夠高效訪問媒體信息的數據存儲結構並通過所給出的實例說明了該數據存儲結構的應用。
  7. For the process of simulation, the databases are supposed to be provided with two sides : real - time access for the distributed memory data and intelligence simulation technology. because each site in this simulation database emulates the different position and function structure character, and comes down to multi - platform, multi - type data, the great amount of system parameters, models, model structure parameters and rules in simulation must be managed by distributed database for administration, rapid information query and dynamic storage modification

    由於該模擬系統的每一個模擬節點分別模擬了分佈在不同位置、不同功能結構特徵的模擬對象,而且,涉及到多平臺、不同形式和種類的數據,因此模擬過程中大量的系統參數、模型、模型結構參數和規則,都必須使用分散式數據庫技術來管理、進行高速的數據檢索和動態存儲修改,來支持模擬環境的動態維護與模擬環境之間的相互作用。
  8. Along with the development of computer network technology, it becomes an important program how to use gis ( geographic information system ) to internet / intranet, that - is webgis. webgis implements query online and job process with gis based information publication, data share and intercommunion in internet and makes enterprise users access gis data by web viewer directly, create thematic map and analyze gis data. webgis changes gis technology ' s structure from c / s to b / s

    Webgis是指在internet的信息發布、數據共享、交流協作基礎之上實現gis的在線查詢和業務處理等功能,使企業用戶能直接通過web瀏覽器對gis數據進行訪問,實現空間數據和業務數據的檢索查詢、專題圖輸出、編輯修改等gis功能,完成了gis技術從c s模式向b s模式的轉變。
  9. Secondly, the old case representation models are researched, and the ontology - based case representation model is proposed, which is domain independent and case structure independent. the flow of case knowledge access is analyzed, and is also designed and implemented in our framework

    其次,研究了已有的案例表達模型,提出了獨立於領域並獨立於案例模式的案例表達模型,分析了案例知識存取的流程,設計並實現了系統框架中案例知識存取管理。
  10. Verdu derives the ideal of multi - user detection in 1986. the multiple access interference, he deemed it has available information in certainly structure. adopted by the mlsd in the theoretical, it has many good abilities, such as its capability close with the single user ' s, near - far resistance, raised the capacity of the system. thereby come to operate the mud ' s research

    1986年, verdu提出了多用戶檢測思想,認為多址干擾是具有一定結構的有效信息,理論上證明了採用最大似然序列( mlsd )可以逼近單用戶接收性能,並有效地克服了遠近效應,大大提高了系統容量,從而開始了對多用戶檢測的研究。
  11. 3. in e - government security value orientation through the research government ' s organizational structure, the government movement process, withdraws the government activity which relatively stable role and the task as the key aspect for the access control

    3 .在電子政務安全的價值取向一節中通過研究政府的組織結構、政務的運行過程,提取政務活動中相對穩定的角色和任務作為訪問控制的關鍵因素。
  12. Abstract : the paper introduced the structure, functions and fault analysis of 112 testing system of access networks which has been used in the sixth district office of tianjin telecomm

    文摘:介紹了天津電信六區局已投入使用的接入網- 112測試系統的結構、功能及故障測試和分析等等。
  13. The paper particularly analyzed the satellite resource management structure, satellite connect admission control and mac ( media access control ) protocol. then the proposed delay equalization algorithm was applied in this satellite network

    論文通過對衛星網路資源調度管理結構、衛星接入以及mac ( mediaaccesscontrol )協議的研究,將提出的基於時延均衡的調度演算法在衛星網路中實現。
  14. Firstly, it makes the brief introduce about the disk development history, disk physical storage structure, and the disk i / o access mode in a simple way

    整篇論文以循序漸進的方式,由淺入深。首先概要地介紹了磁盤的發展歷史,磁盤的物理存儲結構和磁盤讀寫的尋址模式。
  15. This dissertation reviews the research advances of secret sharing schemes, designs secure threshold secret sharing schemes, and constructs secure and efficient secret sharing schemes based on vector space access structure

    本文闡述了秘密共享方案的研究現狀及背景,設計了安全門限秘密共享體制,並在此基礎之上構造安全有效基於矢量空間訪問結構的秘密共享體制。
  16. V interfaces at the digital local exchange - v5. 2 interface for the support of access network - part 3 : test suite structure and test purposes tss tp specification for the network layer an side endorsement of the english version en 300

    本標準適用於以漢語為交換語言的多語種敘詞不達意表的編制與修訂,不適用於符號化檢索語言如數字公式與化學式詞表自動標引抽詞系統以及不作規范處理的關鍵詞表。
  17. The software of the chief station is composed of monitoring module and communicating module. the monitoring module involves the use of pc - labcards, the method of a precise timer, the principle of pid autocontrol and how to use it in the project, the realization of all kinds of reports with the ole automation skill, while the communicating module discusses the way of communication between the chief station and the scheduler based on the c / s structure. both monitoring module and communicating module are established on the database, so this paper particularly describes the access methods to ms sql server and the advantage of database stored procedure

    論文先概要介紹了熱網微機監控系統的需求分析和總體設計,然後在此基礎上詳細地闡述了首站軟體實時監控模塊和通信模塊的實現細節,描述了工業採集卡的用法;提出了一種基於內核timer對象的精確定時方法;介紹了pid自動控制原理及其改進演算法和現場控制參數的整定方法;用ole自動化技術擴充了visualbasic6 . 0的報表功能;在c / s用模型的基礎上實現了首站和調度站的異步通信;討論了visualbasic6 . 0對mssqlserver的數據存取方法和數據源驅動原理,在此基礎上充分利用數據庫存儲過程完成了系統部分功能。
  18. When there is not a trusted share distribution center, this dissertation gives a solution how the group signature is realized for vector space access structure, or constructs a vector space secret sharing - multisignature scheme without trusted share distribution center, and analyzes its security. the generalized - multisignature scheme is proposed based

    在該方案中,參與者共享rsa簽名方案的秘密密鑰,能保證矢量空間訪問結構中參與者的授權子集產生有效的rsa群簽名,而參與者的非授權子集不能產生有效的rsa群簽名。
  19. A new method of using - threshold scheme to realize any access structure

    門限方案實現任意訪問結構的新方法
  20. This scheme can efficiently prevent adversaries from getting the secret or shares, and prevent some participants from cheating others. afterwards, the threshold secret sharing scheme with periodic renewing to identify cheaters is extended to the vector space access structure, and a vector space secret sharing scheme with periodic renewing to identify cheaters is proposed

    然後將定期更新防欺詐門限秘密共享方案加以推廣,使其適合於矢量空間訪問結構,得出定期更新防欺詐限矢量空間秘密共享方案,該方案包括門限方案作為其特殊情形,所以該方案具有更廣泛的適應性。
分享友人