英语人>网络例句>数据库 相关的搜索结果
网络例句

数据库

与 数据库 相关的网络例句 [注:此内容来源于网络,仅供参考]

It was credible and useful that SOTER database was established withSOTER methodology and Hainan reality.

经膻州示范点实测土壤侵蚀量的结果表明,利用SOTER数据库的方法论,并结合海南实际建立的SOTER数据库可靠、实用。

DATA SOURCES: A computer-based search were carried out in Medline database for related articles published between January 1999 and August 2004 using the key words of "nervi spinales,pain,therapy" with language of the text limited to English.

同时计算机检索中国期刊全文数据库、万方数据库1990-01/2004-12期间的相关文章,检索词&脊神经,疼痛,治疗&,限定文章语言种类为中文。

Stateful session beans can access the database but do not represent data in the database.

有状态会话Beans能访问数据库,但不能代表数据库中的数据。

The essence of EDID is to set up a normal behavior fuzzy sub collection A on the basis of watching the normal system transfer of the privilege process, and set up a fuzzy sub collection B with real time transfer array, then detect with the principle of minimum distance in fuzzy discernmethodThe innovation point of this paper is : Put forward the method of EDID, can not only reduce efficiently false positive rate and false negative rate, also make real time intrusion detection to become possibility; have independent and complete character database, according to the classification of monitoring program, design normal behavior and anomaly behavior etc., have raised the strongness of IDS; Use tree type structure to preservation the character database, have saved greatly stock space; in detection invade , carry out frequency prior principle, prior analysis and handling the behavior feature of high frequency in information table, have raised efficiency and the speed of detection, make real time intrusion detection to become possibility; have at the same time realized anomaly intrusion detection and misuse intrusion detection, have remedied deficiency of unitary detection method.

本文的创新点是:通过对特权进程的系统调用及参数序列的研究,提出了基于Euclidean距离的入侵检测方法EDID,不仅能有效降低漏报率和误报率,而且使实时入侵检测成为可能;设计有独立而完整的特征数据库,根据被监控程序的类别,分别设计正常行为、异常行为等,提高了检测系统的强健性和可伸缩性;特征数据库按树型结构存储,大大节省了存储空间;在检测入侵时,实行频度优先原则,优先分析和处理信息表中的高频度行为特征,提高检测的速度和效率,使实时入侵检测成为可能;同时实现了异常入侵检测和误用入侵检测,弥补了单一检测方法的不足。

Application need for analysis books management information system, design the theories according to the database one-step one-steply give outed the systemed the needed the manual, partial ered the diagram, overall situation ered the diagram, systemed the relationed the mode, son moded, and make use ofed the Access to establish the database.

第四章分析了图书管理信息系统的应用需求,按照数据库设计理论一步一步地给出了系统需求说明书、局部ER图、全局ER图、系统关系模式,子模式,利用Access建立了数据库

To ensure data loss cannot occur, the primary database shuts down if a fault prevents it from writing its redo stream to the standby redo log of at least one transactionally consistent standby database.

流到至少一个事务一致性备数据库的备重做日志时,主数据库会关闭。

The main features of this paper is: nothing to do with the platform, this system can be compatible with the majority of software and hardware used by the platform, as well as various database platform, shielding the differences of hardware and software platform such as network, operating systems, databases, application systems and so on, so that enterprises and institutions could achieve seamless, transparent data exchange through data exchange system; Java technology used to develop the system transplantability; using data exchange center to achieve centralized data processing, different data format conversion, increased system scalability; from data transmission, authentication, access control, encryption and more news content log-class areas enhanced data exchange system security; using DES and RSA algorithm , increased the confidentiality of data transmission; create WrapperTimer category achieved data transmission timing implementation and reduce the dependence on artificial.

设计的系统与平台无关,能兼容企业所用的大多数软硬件平台,以及各种数据库平台,屏蔽网络、操作系统、数据库、应用系统等软硬平台的差异,使企事业单位通过数据交换系统实现无缝的、透明的交换数据;采用数据交换中心来实现数据的集中处理、不同数据格式的转换,增加了系统的可扩展性;从数据传输、身份认证、权限控制、消息内容加密和多级日志等多方面增强数据交换系统的安全性;用DES和RSA算法对XML文件或XML文件中的元素进行加密,增加传输数据的保密性;创建WrapperTimer类实现了数据传输的定时执行,降低了对人工的依赖性。

Firstly, based on the requirement of CFD application in modern turbomachine and grasping FLUENT that is a commercial preprocess code, secondary exploiture, which is a complex coarse that is from designment and optimization of project to exporting result and database management, was finished by utilizing OOP and database technologies, Plentiful time for numerical simulation of centrifugal compressor was saved by using the parameterized program.

首先,本文主要根据CFD 参与现代透平机械的要求,在深刻理解、熟悉了大型商业软件FLUENT 的基础上,采用面向对象技术和数据库技术,针对离心压缩机从设计、优化到方案确定,再到结果输出并进行数据库管理的全过程,进行了二次开发。

The newcomers in this market, the likes of Unify, Uniface and most notably PowerSoft, produced application development tools that were database independent or more importantly, which could plug-and-play with multiple databases.

这个市场中的新来者们,象Unify, Uniface以及最著名的PowerSoft,提供的应用开发工具独立于数据库――或者说更重要的是它们可以在多种数据库上即插即用。

At the same time, with the improvement of large-scale relational database technology, GIS software is developing in the direction of the "centralization of management". That is to say, by making full use of the large-scale relational database technology, both spatial data and attribute data can be stored unitedly in database.

大型关系型数据库技术的日益完善,促使GIS软件都在向&集成管理&的方向发展,即充分利用关系数据库管理系统的优势,真正实现空间数据的一体化管理。

第53/100页 首页 < ... 49 50 51 52 53 54 55 56 57 ... > 尾页
推荐网络例句

What would he tell Judith and the children?

他将怎样告诉朱迪丝和孩子们呢?

I this is at that time, the opinion with peacockish true girl is full of in a heart.

这就是当时的我,一个心中布满虚荣的女孩子真实的想法。

Oh, and I bought myself a new laptop," he said."

哦,我还给我自己买了一个新笔记本"他说。"