數據包應答 的英文怎麼說

中文拼音 [shǔbāoyīng]
數據包應答 英文
data packet acknowledgement
  • : 數副詞(屢次) frequently; repeatedly
  • : 據Ⅰ動詞1 (占據) occupy; seize 2 (憑借; 依靠) rely on; depend on Ⅱ介詞(按照; 依據) according...
  • : 應動詞1 (回答) answer; respond to; echo 2 (滿足要求) comply with; grant 3 (順應; 適應) suit...
  • : 答構詞成分。
  • 數據 : data; record; information
  1. Service assurance agent built into cisco ios release 12. 0 ( 5 ) t allows measuring response time, net resources, availability, jitter, connect time, packet loss and application performance

    該版本允許檢測時間、網路資源、有效性、跳動、連接時間、丟失和用程序工作情況。
  2. First, in virtual of identification of flaws is a typical of in - verse problems, proceeding from time - harmonic electromagnetic maxwell ' s equa - tion and helmholtz equation, the uniqueness and existence of direct scattering problems including the numerical algorithms of diverse of boundary conditions is given. second, the uniqueness and existence of inverse scattering problems and the theory of ill - posed integral equation are briefly looked back upon. finally, indicator function method for boundary identification is set up under all kinds of boundary conditions for inverse scattering of homogenous and inhomogenous objects, meanwhile, the proof of possibility for near - field measurements and nu - merical simulation are given

    由於缺陷的識別是一類典型的反問題,因而首先從時諧電磁maxwell方程和helmholz方程出發,具體地闡述了求解正散射問題的有關方法,括各種(夾雜)邊界條件下的值解法,就解的存在性唯一性給予了肯定的回;隨后對逆散射問題的理論作了簡短的回顧,括解的唯一性以及非線性不適定積分方程的處理等;然後對均勻介質和非均勻介質的逆散射問題建立了在各種邊界條件下的邊界識別的指示函方法,鑒于近場獲得的重要性,對近場測試時邊界識別的方法給予了相的證明,並且實現了值模擬。
  3. To completely avoid producing elements jointed at their corner nodes and checkerboard patterns, which frequently occur when the topology optimization of plane continuum is studied, the theory of topology analysis of plane continuum in topology optimization process and the simple algorithm for programming are studied. according to algebraic topology theory, the boundary of elements and plane continuum are operated as a one - dimensional complex. by use of the adjacency vector in graph theory, the structural topology is described and the topological operation is achieved on a computer. by above, the structural topological feature in the evolutionary process is gained. these methods are effcient and reliable. under topology constraints, according to the results of stress analysis, by deleting elements and moving nodes at the boundary, more satisfactory results can be gained by using a few numbers of elements and iterations. to demonstrate the efficiency of these methods, solutions including some well - known classical problems are presented

    避免目前平面連續體結構拓撲優化過程中經常出現的單元鉸接以及「棋盤格」等現象,研究了連續體結構拓撲優化過程的拓撲分析方法,以及在計算機上實現的簡便演算法.根拓撲理論,單元及連續體的邊界作為1 -復形進行運算.利用圖論中的鄰接向量概念,在計算機上實現了結構的拓撲描述及拓撲運算,得到了結構在拓撲演化過程中的拓撲特性,方法簡單、可靠.在一定的拓撲約束下,根力分析結果,採用刪除單元、單元退化、移動節點等方法,可以用較少單元得到更為滿意的結果,提高計算效率.為演示方法的有效性,給出幾個括常見經典問題的解
  4. This paper defines the sync objects and explains how to monitor and detect their changes. as to support various kinds of transmission ports, we add data check - up to improve slip agreement. at the same time the request - reply mechanism based on serial number is designed to retransmit the data which has mistakes or be lost

    本文闡述了同步對象的定義以及對其更新的監聽策略;為了向下兼容各種傳輸埠,改進slip協議,增添了校驗;同時採用基於流水號的機制,保證了出錯、丟失的重發。
  5. The main contents are as follows : 1. mode s extended squitter enhanced reception techniques, including preamble detection, re - triggering and data process, are investigated in detail

    主要內容為: 1 .詳細研究了模式s擴展信號的增強接收技術,括報頭檢測、重觸發和處理等。
  6. Wtp performs the reliability feature needed by wsp for requestresponse and reliable push operations so as to increase the reliability of datagram service. since it is based on messages, it can serve applications like browse relatively well

    Wtp執行wsp需要的可靠性特性,用以請求和可靠的push操作,主要用於提高服務的可靠性,是基於消息的,能較好地為瀏覽等用服務。
分享友人