數據包整體性 的英文怎麼說

中文拼音 [shǔbāozhěngxìng]
數據包整體性 英文
packet integrity
  • : 數副詞(屢次) frequently; repeatedly
  • : 據Ⅰ動詞1 (占據) occupy; seize 2 (憑借; 依靠) rely on; depend on Ⅱ介詞(按照; 依據) according...
  • : Ⅰ形容詞1 (全部在內; 完整) whole; all; complete 2 (整齊) neat; tidy; orderly Ⅱ動詞1 (整理; 整...
  • : 體構詞成分。
  • : Ⅰ名詞1 (性格) nature; character; disposition 2 (性能; 性質) property; quality 3 (性別) sex ...
  • 數據 : data; record; information
  • 整體性 : comprehensive
  • 整體 : ensemble; whole; entirety
  1. With the help of the electronic computers, engineers employ it to figure out nearly all kinds of engineering problems ranging from astronavigation, construction, waterpower projects, ship - building and mechanical engineering etc. owing to the strong power of finite element method, one kind of software pack which based on the method is exploited and named algor feas to resolve problems on structure analysis for trusses and shells. this paper also employ algor feas software pack to analyze and compute the cableway towers, giving the accurate result on stress and displacement both in location and whole. finally, we also bring out some advice on structure improving

    在此分析過程中:首先將物理模型簡化為力學模型,主要是將塔架結構按空間桿單元簡化為空間桁架結構,目的是將力學模型變換為學模型;這一過程主要是利用autocad2000建立塔架的計算模型;再者,利用algorfeas軟讀入autocad建立的塔架計算模型生成初始卡利用計算機進行編程進行風載計算,再將計算結論合入algorfeas產生的初始卡中,生成計算卡;接著,利用algorfeas軟計算塔架在不同載荷情況下的應力圖,位移圖,並且求出在不同載荷條件下的最大位移和最大應力等;然後,對塔架的穩定進行分析;最後;根計算結果提出改進建議。
  2. The article points out the importance and necessity of the information - security from its actuality in our country. the resources in the information system, for instance, hardware, software, data, document, operator, meterial and so on, are evaluated and gived safety grade firstly. and then, it analyses the menace including the nonauthorized access, the information leak, the refused sevice, the internal objection which the system will take. the following are the corresponding control police : confirm the users " rights and duties, including the mode of using account, the limit of accessing resource, the application of password, the building of backup ; confirm the administrators " right and duties, including physical safety, system configuration, account configuration and usufruct, password management, audit and control, backup and individual intimity ; run - of - mill measure of security defence, including access control, symbol and identification, integrality control, password technique, firewall system, audit and resumption, safety of operating system, safety of database system, defence of computers " virus and resisting - deny protocol. in the end, the article offers the strategies of disposing the safety - accident and analyse after ithow. to report it, how to solve it in phase, and how to avoid it happening again. in a word, the article presents a holistic resolvent about keeping away the information system ' s security, and supplies a essential frame for its configuration, management and application

    然後,對系統可能受到的威脅,括非授權訪問、信息泄漏、拒絕服務和內部缺陷等進行分析,並提出了相應的控制策略:確定用戶的權力和責任,括帳戶使用方式、資源訪問權限、口令應用以及建立備份等;確定系統管理員的權力和責任,括物理安全、系統配置、帳戶設置及使用權限、口令管理、審計和監控、備份以及個人隱私等方面;一般的安全防護措施:存取控制、標識和認證、完控制、密碼技術、防火墻系統、審計和恢復、操作系統安全、庫系統安全、計算機病毒防護和抗抵賴協議等。最後,對事故處理和事後分析提供策略,如何報告安全事故,如何協調解決安全事故,如何避免安全事故再次發生。總之,本文對信息系統安全防範工作給出一個的解決方案,為其在配置、管理和應用方面提供了基本的框架。
  3. According to experimental data and related standard, the finite element model of frame has been set based on its geometric model through simplified processing, selecting element, dividing mesh grids, load cases setting and putting characteristic etc. on the basis of this, the integrated finite element model of motorcycle has been established including frame, engine, suspension, wheel, rider and oil box etc. to understand the relationship and dynamic property of frame and integrated motorcycle, mode analysis and frequency response analysis have been done

    實驗測試和有關標準規范,以總設計階段得出的車架幾何模型為基礎,通過模型簡化、單元類型確定、網格劃分、工況設置、邊界處理、物理特賦予等,建立車架的有限元模型。並基於此,建立車的有限元模型,括車架、發動機、懸架、輪胎、乘員、油箱等。
  4. Round keys are taken from this expanded key in the following way : the first round key consists of the first nb nb block length words, the second one of the following nb words, and so on

    安全策略配置目標括控制對的原始訪問、保護內核和系統軟的完、防止有特權的進程執行危險的代碼,以及限制由有特權的進程缺陷所導致的傷害。
  5. Abstract : in this paper, the formal definition of composite objects was presented. semantics of composite object was specified and related to object - oriented concepts. then the semantics, creation and deletion of composite object were illustrated in terms of schema definition, which shows the integration of composite objects. meanwhile, the approach of implementing composite objects, including enforcement of the semantics of composite objects and its physical clustering, was also indicated

    文摘:把復合對象和面向對象的概念聯系起來,在復合對象的形式定義后,指定復合對象的語義,然後根模式定義來說明復合對象的語義,以及復合對象的創建和刪除.展示了復合對象.同時還指出了實現復合對象的方法,括復合對象語義的強制和物理聚集
  6. In the meanwhile, we build a complete simulation model of layered wireless self - organizing routing network and verify feasibility of network architecture and key technologies, including operating mode of wireless interface, addressing and routing in lwsrn we study the performance of wsrn in terms of routing overhead, packet delivery ratio, and the communication capability, and compare these result with that of ad hoc network

    同時,構造了完的分層結構的無線自組織路由網路模擬模型。驗證了網路系結構和關鍵技術的可行括無線通道工作方式、網路編址技術、網路路由過程。並通過模擬分析了分層結構的無線自組織路由網路的路由負載、網路到達率和網路通信容量。
  7. In appraisal items choosing, we divide the items into three categories : profits, risk adjustment, and fluidness. detailed appraisal items are also set up to mirror the funds achievement comprehensively. in appraisal method choosing, we adopt universality analysis and the common used data envelopment analysis ( dea ) together, i. e., analyze the score of the numbered items first, then use dea and the analyzing software ems to calculate the funds " relative validity and get a rank of fund comprehensive achievement, trying to reflect the funds items and performance objectively

    在基金的評價指標選擇方面:將基金的評價指標主要分為三大類:收益類、風險調類和流動類,並設定了細分評價指標,力求全面地反映基金的業績水平;在評價方法選擇方面:採用了一般分析和基金評價中目前較為流行的絡分析( dea )相結合的方法,即通過對指標的量化評分進行比較分析,通過絡分析法,利用ems分析軟計算基金的相對有效,從而進行綜合業績排名,力求客觀地評價基金的各項指標和綜合績效。
  8. The content of this paper is arranged as foll owing : chapter 1 introduces the concept of credit, credit risk and credit assessment, as well as the history and development of credit assessment ; chapter 2 introduces the history of ai technology, and the background of expert system and neural network. characters and disadvantages of expert system and neural network are presented respectively and the necessity of combining expert system and neural network is lightened ; chapter 3 shows the process of dealing with sample data, including the treatment of exceptional data and factor analysis, and puts forward the concrete framework of the mixed - expert credit assessment system ; chapter 4 introduces concept of object - oriented technology, and constructs object model and functional model after analyzing the whole system. it also illustrates the implementation of concrete classes by an example of rule class and the inference algorithm in the form of pseudocode ; chapter 5 introduces the structure of the whole system, the major functional models and their interfaces, and the characteristic of the system is also generalized ; chapter 6 summarizes the whole work, and points out the remaining deficiencies as well as the prospective of this method

    本文具內容安排如下:第一章介紹了信用、信用風險、信用評價的概念,回顧了信用評價的歷史、發展和現狀,並綜合各種信用評價模型,指出這些模型各自的優缺點:第二章簡單描述了人工智慧技術,著重介紹有關專家系統與神經網路的基礎知識,通過總結它們的優缺點,指出結合專家系統與神經網路構造混合型專家系統的必要;本章還介紹了神經網路子模塊的概念,提出了混合型專家系統的一般框架與設計步驟:第三章對樣本進行處理,括異常的剔除、因子分析等,提出了信用評價混合型專家系統的具框架結構,介紹了系統知識庫的主要部分、基於優先級的正向推理機制的流程、以及基於事實的自動解釋機制的具實現方法;第四章介紹了面向對象技術,進而採用面向對象對信用評價系統進行分析,建立了對象模型和功能模型,並在此基礎上,採用c + +語言以規則類為例說明系統中具類的實現,用偽代碼的形式描述了推理的演算法;第五章描述了個系統的結構,對系統主要功能模塊和界面進行了介紹,並總結系統的特點;第六章總結了全文,指出本文所構造系統存在的不足以及對將來的展望。
  9. For instance, a new property of network traffic ( self - similarity ) has been observed in diverse networking contexts. some old protocols, policies and evaluate methods which are based on previous markov network model are not suitable for this self - similar traffic. and when tcp data share bandwidth with udp data that is popular for multimedia applications over the internet, it also causes fairness problem

    多媒業務流會給個網路的能帶來極大的影響,如:多媒業務導致網路流自相似現象加重,使網路的原有的markov模型基礎上的協議、策略,及其評價方法不夠準確,導致丟失率上升,網路能下降;多媒業務中使用的大量udp與普通流tcp共存時對公平的影響等等。
  10. Some characteristics of the measured wind pressure field were discussed, including distributions of wind pressure, the effects of shape ratio on total wind force coefficients, auto - and cross - power spectral density ( psd ) distributions of fluctuating wind pressure, characteristics of the proper orthogonal decomposition ( pod ) results of the measured wind pressure field, effects of reynolds number on wind pressure distributions, etc

    測量結果對殼表面風壓場特進行了分析,括風壓系風力系、脈動風壓自功率譜及互功率譜、風壓場本徵正交分解特、雷諾對殼表面風壓分佈的影響等。
  11. Including the testing of the validity of sensor data and the adapting of the q matrix in reai - time, the kalman filter is researched to improve the real - time, precision and robust of navigation system. with this method, the disturbances resulted from the many uncertainties in non - structure agricultural environment can be overcome, the movement of road line can be followed in the image space so that the technology of visual window can be used, the current measured state of wheeled mobile robot can be substituted by the predicted state to increase the real - time of control system

    括傳感器有效檢驗、 q陣自適應實時調等內容,詳細地研究了利用擴展卡爾曼濾波理論改善導航系統實時、精確和可靠的具方法,以克服農田非結構化自然環境里存在的多種不確定因素給導航系統造成的干擾,跟蹤圖像空間中路徑目標的運動而便於有效地利用視覺窗口技術,提供輪式機器人狀態的預測值代替實測值進行導航控制來改善控制系統的實時
  12. The system has functions of disposing data, analyzing the cost of the production of electric power, economic dispatch, analyzing the economic of operational state, helping to make decisions for the bidding for pool purchase and so on

    論文主要構建了火力發電廠生產成本動態監測系統的框架,主要處理、發電成本分析、發電負荷經濟分配、運行狀態經濟分析、競價上網輔助決策等功能。
  13. Based on the former researches and aiming at the practical application and the software development ability, a set of dfd methods are put forward, including the disassembly sequence planning based on the engineering semanteme, the direction reasoning based on the assembly constraints, the assessment algorithm of disassembly ability based on the experiment data, and the redesign for disassembly based on feedback figures and tables

    論文基於前面的系統建模研究,以具有強的實際應用和軟開發能力為目標,論文提出了一套完的可拆卸設計方法,括基於工程語義的拆卸順序規劃、基於裝配約束的方向推理和基於實驗的可拆卸評價演算法,以及基於圖表反饋的可拆卸再設計方法。
  14. The remote sensing technologic on the acquiring and capturing and information and the gis technologic on the data management and spatial analysis will give into full play in the study of land resources as whole, seeking the application possibility of remote sensing and gis technologies in land suitability evaluation. the database in this study fully reflecting the land quality in the yeerqiang river valley has been set up, including spatial database and attribute database comes from various types of data collecting, processing, analysis and field observation

    在此基礎上,將遙感技術與gis技術相結合,充分發揮遙感在土地信息獲取和gis在管理和空間分析方面的優勢將土地資源視為一個有機的進行研究,探索遙感技術和gis在土地開發評價中的應用。建立了反映葉爾羌河流域土地質量的庫,括空間庫和屬庫。空間庫是利用遙感和gis技術完成的;屬是通過對收集的各種資料進行分析理、野外觀測和信息採集等建立的。
  15. And use relative fitting error to measure statistical data non - uniform error ; then introduce the method systematically of using the fuzzy comprehensive evaluation method to carry on the overall superior test of the government statistical data quality. includes the establishment of step level appraisal target system, target weight determination, calculates the factor weight in various levels, uniform test of judgment matrix, and built up the final fuzzy comprehensive evaluation model of the government statistical data quality according to the above - mentioned standard ; finally selects the partial main social economy total quantity target from chinese statistics yearbook 2003 to carry on the real diagnosis analysis : ( 1 ) confirm these social economy total quantity targets using the description statistics and the k - s inspection method to obey the lognormal normal distribution. ( 2 ) according to the two levels of inspection methods which this article proposed to carry on accuracy and the overall superior test for these social economy total quantity targets

    本文首先從統計及質量的涵義出發,全面系統的介紹了統計質量的概念;其次,從研究統計的分佈規律入手,對統計準確檢驗問題進行了探討,利用對正態分佈檢驗對反映研究對象規模大小的統計的質量及異常進行定量檢查和識別,並利用相對擬合誤差計量統計的非一致誤差;接著系統介紹了利用模糊綜合評價方法對政府統計質量進行優度檢驗的思路,具括建立遞階層次的評價指標系,指標權重的確定,計算各層次中因素的權重,判斷矩陣的一致檢驗,並根上述標準建立了最終的政府統計質量模糊綜合評價模型;然後通過從2003年中國統計年鑒資料中選取部分主要的社會經濟總量指標進行實證分析: ( 1 )利用描述統計和k - s檢驗法來驗證這些社會經濟總量指標服從對正態分佈的規律; ( 2 )按照本文提出的二級檢驗法來對這些社會經濟總量指標進行準確優度檢驗,從而達到綜合評價政府統計質量的目的;最後對這種二級檢驗法的優點和不足進行小結,提出今後應該努力改進的方向。
  16. In the main body of this paper, the database design process is introduced, in which the database relation schema, data integrity and fault recovery are emphasized, and, the communication protocol designed for remote data acquisition is discribed and validated by petri nets, the develop method of client application and resolvent to some problems are also discussed, including the design of communication component, the asynchronous data return, how to dynamically return image to the client navigator in web application etc. finally, an abbreviated evaluation about the finished system is given

    在論文的主部分,論文詳細介紹了庫的設計過程,其中主要涉及到關系模式的規范化、和故障恢復設計等,隨后,文章設計了一種用於遠程採集的通信協議,並使用petri網進行了描述和驗證,論文也介紹了如何進行客戶端應用程序的開發以及一些主要問題的解決,主要括通信控制項的設計、採集的異步返回、在web應用程序中如何動態為客戶端返回圖形等。最後,論文對個系統做了一個簡單的評估。
  17. Third, this paper introduce the security structure, security system and algorithm of the 3g system, discussing the security measure of 3g system in the aspect of wireless interface in detail, which including user identity confide ntiality, authentication integrality data, etc. finally, the author stress analyzing the 3g authentication, key agreement protocol and its security, finding the security hole and putting forward new authentication and key agreement protocol based on ecc

    介紹了第三代移動通信系統安全結構、安全制和演算法,詳細論述了3g系統在無線介面方面的各種安全措施括用戶身份保密、認證與等內容。重點分析了3g認證與密鑰分配協議及其安全,找出了其中的安全漏洞,提出了新的基於橢圓曲線密碼制的認證與密鑰分配協議。
  18. In view of the engineering practice of chmavc " s assistant materials management information system, this paper discusses some engineering problems relation to the design of a large database and to the application of database technology. exposition of two important aspects - - then design of a large database and improvement of database performance concerning practice is given. it includes the design of a data model, the compress technique of data, indexes set - up, optimization of inquiry, integrity check and security control

    從工程實踐的角度,論述了為實現系統功能而在庫設計和軟結構設計中所採用的方法和技術;並論述了為達到系統能而在實現中所採取的各項措施,重點討論了大型庫的設計和改善能這兩個重要方面,內容括設計模型、建立索引、查詢優化、完檢查和安全控制等。
  19. The dynamic bit rate allocation module receives relevant data from the loss rate of multi - media data packet, jitter, delay, and compares these data with predefined values to make one of these 3 decisions that : decrease the video bit rate ( stat = decrease ), or maintain current video bit rate ( stat = hold ), or increase video bit rate ( stat = inccease ). the video bit rate will be adjusted according to the decision and the total bit rate is changed accordingly. in this way the impact of network environmental variation is settled, and consequently the adaptability of videoconference systems in remote education area is improved

    個模型從rtcp協議獲得多媒丟失率( lossrate ) 、抖動( jitter ) 、延時( delay )的相關,這些與預先設定好的閥值作比較,得出減小視頻位速率( stat = dectease ) 、維持視頻位速率不變( stat = hold )或增大視頻位速率( stat = increase )的決定,模塊根這些決定對視頻位速率進行相應的調,從而總的位速率也相應變化,這樣可以減小由於網路環境變化而帶來的影響,從而提高視頻會議在遠程教育應用中的實用
  20. Data acquisition, analysis and processing are integrated in structural vibration measurement and analysis system including frequency spectrum, correlation and power spectrum analysis of time signals of testing positions. the total structural behavior is constructed and structural mode shapes, whose natural mode is known, are decomposed and monitored

    結構振動測試分析系統集採集、分析、處理為一,其中括對結構測點時域信號的頻譜分析、相關分析、功率譜分析,同時還由結構測點處時域信號構建了結構的態,在此基礎上對固有振型已知的結構進行振型分解並監測。
分享友人