查询词典 data-base
- 与 data-base 相关的网络例句 [注:此内容来源于网络,仅供参考]
-
The design includes many new technologies in data exchange and data security, they are: Converting non-XML data to XML in order to apply the XML security technology to more data types; Using the technology of XKMS and PKI to manage the public key in order to overcome the shortage of complexity and difficulty in using PKI and improve the efficiency of the public key management; Using Diffe-Hellman algorithm combining with the public key technology to exchange secret key in order to furthest increase the security of the key; Using the technology of XML digital signature algorithm to ensure the integrity, message authentication and signer authentication of the data; Using the technology of XML encryption to ensure confidentiality of the data; Defining delegable access rules on the structure and content of the XML documents to provide fine-grained access control. According to the XML security framework, a XML security library is designed and implemented.
在对XML及其安全技术主要包括XML加密技术、XML数字签名、公钥管理、密钥产生和交换进行研究的基础上,结合传统密码技术和XML安全技术提出了一种基于XML的数据安全模型,模型中包含了目前网络数据交换和安全领域的一系列最新技术,主要有:将非XML格式数据转换为XML格式数据的方法,以保证现有的大部分网络数据能够应用XML安全技术;使用XML公钥管理技术结合PKI技术管理公钥,以克服PKI技术实施和部署复杂、难度大等问题,提高公钥管理的效率;使用Diffie-Hellman算法结合公钥技术交换密钥,以最大限度保证密钥的安全;使用XML数字签名技术保证数据的完整性、不可否认性和发送方身份认证;使用XML加密技术保证数据的机密性;根据XML文档的内容和结构定义授权访问规则进行良好的访问控制。
-
Under the guidance of DPRIF integrating strategy, we set up an integreted SOFM-SVM model. Then we analyzed and optimized the model from the aspects of operating mechanism, data interface and function expandedness. The PCA method was introduced to reduce dimensionality and extract features, then to strengthen the clustering explanation; defined a CMI index, to ascertain the most effective or the best clustering number; A new Anti-NO algorithm was proposed to recognize and to filter the suspecious data in the sample; The medium result of SVM model was used to extract the borderline datas between two classified groups. This research compensated for the achievements of data recognition including pattern data, noises data and borderline data.
在DPRIF整合策略指导下构建了一个整合的SOFM-SVM模型,对该模型从运作机制、数据接口、功能扩展几个方面进行分析和改进:引入PCA方法进行数据降维和特征提取,用以加强聚类解释;结合统计聚类中的聚类误差概念定义一个聚类数有效性指标,利用SOFM算法中间结果进行指标求解,以筛选出有效或最佳聚类数;提出一种新的噪声识别算法用于对样本中的异常数据进行甄别和过滤;利用SVM模型的中间结果提取分类边界数据;进一步充实了包括模式类、噪声集和边界在内的模式识别成果。
-
Facing the rapid incensement of large data collection, enterprises should have potent data analysis tools to transform the "fluent data" into "valuable knowledge", otherwise, large data will become "fluent data without useful information", what we call "data grave".
面对快速增长的海量数据收集,企业必须要有有力的数据分析工具将&丰富的数据&转换成&有价值的知识&,否则大量的数据将成为&数据丰富,但信息贫乏&的&数据坟墓&。
-
Furthermore, it can not define indiscernibility relationship when default data is included in rough data. In this dissertation, a new rough set model, which can be used to process original data which include default data, fuzzy data, or incomplete data, is proposed based on clustering methods.
本文从实际应用中存在缺值、不完全和噪音数据等问题为出发点,结合人机交互技术中数据挖掘的应用,研究分析了数据挖掘中的一些理论与方法,取得了以下主要研究成果: 1。
-
So during the collection of fault sample data and checking data, the paper sets up the mathematics model of control system first. We cause all kinds of fault in the control system, then collects a variety of fault data. After unitarily dealing, the fault data server as the sample data of training neural network. At the same time, according to the collection of checking data, it examines whether the trained neural network have the function of fault diagnosis.
在故障样本数据及检验数据的采集过程中,首先建立了控制系统的数学模型,人为地让控制系统发生各种故障,从而采集到各种故障数据,经过归一化处理后,作为训练神经网络的样本数据;同时,也采集检验数据,用以检验训练出的神经网络是否能够起到故障诊断的作用。
-
Electric seal is a method to sign a document and it is a kind of electric signature, though a document has some difference compare to other kind of data like program, data of a database, according the speciality of a electric signature to a document, such as view what we signed , validate the signature in a document directly, how to archives a document which has been signed, how to read a document has been archived, it points out that a document is exactly some data with some format data, a document could be disparted as two parts, data and format data.
电子印章是应用层的数字签名,是电子签章的一种,由于文档签名与其他类型数据如程序,数据库数据等相比有其特殊性,本文针对文档签名的特殊性,如签名的可见与可证实性,文档的归档特性,文档阅读的方便性等进行了分析,指出文档实际上是一种格式化的数据,可以分为数据与格式两个部分,在此基础上提出了对文档进行签名的要求。
-
The modular design of printNet system is divided into several application part, such as data processing tools, design tools, products, Business card printing tools, and solutions to technical tools, of which the highest is a design tool over the actions that it printLayout from page formatting and setting variables, but also can be used by an operator in a transform tool programming, so that the contents of the variables in a database in output for operations, now produetion of mostly to one-dimensional bar codes and encrypted bit or anti-false, the party is a method in the bar code by addition, subtraction, multiplication, Division, opinins Mo, and so after the results or the results of data, or the result is converted to the data that corresponds to a location in one of the ntehs detection accuracy is valid, just make a bit of the inverse operation, the operation that results in comparison with the original data, such as the same as the data is valid, such as different then the data is not valid, this scenario is the most simple and most primitive anti-counterfeit. PrintNet software to complex product environment " interpuntion and output the integration of integrated management " solution possible.
printNet系统的模块式设计分为几个应用部分,如数据处理工具、设计工具、产品制卡工具以及方案解决工具,其中技术含量最高的是对设计工具printLayout的操作,它除了设计页面格式和设置变量外,还可由操作员在转换工具中编程,以便对数据库中的变量内容在输出时进行运算操作,现在生产中应用的大多是给一维条码加校验位或是防伪加密,其方一法是将条码中的数据经过加、减、乘、除、取莫等运算后,将结果或将结果中的几位至于数据后,或将结果转换成对应符号放在数据中的某个位置,如须检测某一数据是否准确有效,只要把校验位上的数进行逆运算,把运算结果与原数据比较,如相同则数据有效,如不同则数据无效,这种方案是最简单最原始的防伪加密的方法。printNet软件系统使得在复杂产品环境下的&排版与输出一体管理&的集成解决方案成为可能。
-
Electronic map of MapInfo is introduced into the environment of object oriented by the use of Map X 4.0 module. The operations such as dynamic add, delete and edit of objects can be done real-time dynamically by operators in the environment of object oriented on the present diagram of polder region. At the same time, the spatial-data and attribute-data of irrigation district are managed separately. The spatial-data is used by the file system, whereas, the attribute-data exist in the relevent database. The figures and database are related through the only ID number in order to realize two-way inquiry, so that, the polder region river system planning data are collected automatically. Moreover, this system make the great use of GIS advantage in storing and annalising data to automatically organize files needed in river network calculation , adopt one-dimensional unsteady flow model , so as to lay out height of river levee .
把GIS技术引入水系规划,通过MapX4.0组件把MapInfo电子地图调入面向对象编程环境,使操作人员能在面向对象环境中对圩区现状图进行实时动态操作,包括对操作对象的动态添加、动态删除、编辑等;同时,将空间数据和属性数据分开进行管理,空间数据用文件系统管理,属性数据采用数据库管理,通过建立唯一ID号进行数据联接,将图形与数据库进行关联,实现属性到图形或图形到属性的双向查询,从而实现了圩区水系规划部分数据的自动采集;另外,本系统充分利用GIS存储与分析数据的功能,自动生成河网水力计算所需的文件,采用一维非恒定流模型进行河网水力计算,为确定沟道堤顶高程提供依据。
-
In a method providing sub-code data to a host computer in an optical disc drive formed so that data from a pick-up is reproduced through a buffer, the method includes the operations of setting sub-code data whenever data of a predetermined unit is output from the buffer, and transmitting the set sub-code data to the host computer when the sub-code data is requested from the host computer during the reproduction mode.
用于在光盘驱动器中向主计算机提供子代码数据从而通过一个缓冲器将来自拾音器的数据重现而构成的方法中,该方法包括步骤:只要从缓冲器输出预定单元的数据,就设置子代码数据,以及在重现期间,当主计算机请求子代码数据时,将该设置的子代码数据传送给主计算机。
-
The method includes mapping sequence numbers of data packets to be transmitted to congestion window sizes during transmission of the data packets, determining whether there is a lost data packet or not, and if there is a lost data packet, retransmitting the lost data packet and adjusting a congestion window size to the congestion window size mapped to the sequence number of the lost data packet.
该方法包括:在数据包的传输期间,将待被发送的数据包的序列号映射为拥塞窗口大小,确定是否有丢失的数据包,以及如果有丢失的数据包,则重传该丢失的数据包并且将拥塞窗口大小调整为被映射为该丢失的数据包的序列号的拥塞窗口大小。
- 推荐网络例句
-
The split between the two groups can hardly be papered over.
这两个团体间的分歧难以掩饰。
-
This approach not only encourages a greater number of responses, but minimizes the likelihood of stale groupthink.
这种做法不仅鼓励了更多的反应,而且减少跟风的可能性。
-
The new PS20 solar power tower collected sunlight through mirrors known as "heliostats" to produce steam that is converted into electricity by a turbine in Sanlucar la Mayor, Spain, Wednesday.
聚光:照片上是建在西班牙桑路卡拉马尤城的一座新型PS20塔式太阳能电站。被称为&日光反射装置&的镜子将太阳光反射到主塔,然后用聚集的热量产生蒸汽进而通过涡轮机转化为电力