有效網路鏈 的英文怎麼說

中文拼音 [yǒuxiàowǎngliàn]
有效網路鏈 英文
effective network chain
  • : 有副詞[書面語] (表示整數之外再加零數): 30 有 5 thirty-five; 10 有 5年 fifteen years
  • : Ⅰ名詞(效果; 功用) effect; efficiency; result Ⅱ動詞1 (仿效) imitate; follow the example of 2 ...
  • : Ⅰ名詞1 (捕魚捉鳥的器具) net 2 (像網的東西) thing which looks like a net 3 (像網一樣的組織或...
  • : 1 (道路) road; way; path 2 (路程) journey; distance 3 (途徑; 門路) way; means 4 (條理) se...
  • : Ⅰ名詞1. (鏈子) chain Ⅱ動詞(用鏈栓住) chain; enchain Ⅲ量詞(計量海洋上距離的長度單位) cable length
  • 有效 : effective; valid; efficacious
  • 網路 : 1. [電學] network; electric network2. (網) meshwork; system; graph (指一維復形); mesh
  1. As a whole the system may compart three modules : ndis drivers in the kernel mode, the dll program in the user mode and the user application program, adopting the share memory technology three modules realize the data share of the control canal rule, the encapsulation data and the network neiborhood name and so on, so we can easily finis1 " the packet authentication by the control canal rule, improve the filtering efficiency of the system. whereas the current of firewall technology, the system has wide utily value and business value. this software is based on windows 2000 operating system, the programming language is chosen as visual c + + 6. 0 and win2000 ddk

    從總體上可以劃分為以下三個模塊:核心層的ndis驅動程序、應用層的動態接庫程序以及用戶應用程序,這三個模塊之間通過內存共享技術完成對控管規則、封裝數據、上鄰居名字列表等數據的讀寫操作,從而很方便的根據控管規則實現了對封包的認證操作,提高了系統的過濾率。鑒于目前防火墻技術的發展趨勢,本系統具廣泛的實用價值和商業價值,因此具一定的推廣前景。軟體的開發基於windows2000操作系統,開發語言採用visualc + + 6 . 0和win2000ddk 。
  2. Because of the interaction of urushiol chains and cus, the transformation temperature tg of hybrid - epu / cus was higher than that of epu. heat stability and solvent resistance were also improved. the interaction and network of urushiol chains were efficiency to inhibit the dimension of cus nanoparticles

    漆酚段與cus之間的作用,以及漆酚交聯的存在可阻止cus顆粒尺寸的增大,但漆酚交聯產生的空間位阻也在一定程度上降低了sz 」的擴散。
  3. The disquisition includes choice of algorithm, accomplish of algorithm, collection of learning sample, parameter of net, shortcoming of bp algorithm, extraction and reduction form line etc. referring to shortcoming of traditional bp algorithm, a modified learning factor with adaptation is introduced. because of every different font has robust, the way based chain coded and knaggy feature is used. a bizarre sample feature database is constructed for speeding up modified bp learning and classification

    本文對人工神經理論進行了研究,探討了形式及演算法的選擇、演算法的實現、學習樣本的收集、參數選擇、 bp演算法缺陷、表格線提取、還原、生成及字元識別、還原生成等問題,並針對bp演算法的缺陷提出了和實現了改進型bp演算法,使學習率提高,對不同人的不同字型字體較強的魯棒性,採用了基於碼特徵和凹凸分佈特徵的方法來抽取字元特徵。
  4. Then, the paper present a protocol misusage ids in application layer based on markov chain, and obtain the following results after test : the system can have good effection on detecting the probe packet, dos attack and novelty attack. the system can overcome part of disadvantages in traditional intrusion detection system, and adapt requirements with different network. the experiment shows that the system can improve the detection accuracy rate, reduce the false negatives probability

    通過對檢測系統的測試分析,系統對掃描探測報文、 dos攻擊報文和新的攻擊報文等較好的檢測率。基於馬爾可夫建立的異常檢測系統可以克服傳統入侵檢測系統的部分缺陷,能夠適應不同環境的要求,同時也提高了系統的檢測能力和檢測率,降低了誤報率。
  5. The modern technology give a chance for the pattern of transmitting knowledge with network, the course based on network have opened up it ' s way in china, our pursuer paid more attention to the mode, but in america, pursuer have studied the more width aspect, thereinto the investigation and design of the information in the course based on network is very important, for the design of the information decide the pattern how the student receive the information, which will effect the way of knowledge understanding and memory, and the way is related to the study pattern, so the design of the information in the course based on network is very important to the efficiency and effect. so the core of the paper is the investigation and design of the information in the course. i have the entropy from the information science as the analyse tool to analyse the information, these work tell us the efficient pattern to transmit information, based on the result, i design the net page, of course, study theory and the character of the net itself are also the factors i employ for design a good net page. then, links and navigation is constituted for students adapt to the course based on network

    當今技術的發展給知識以為媒介來傳播的學習方式帶來前所未的機遇,課程在國內迅速開展起來,但是國內研究者的注意力主要集中在對課程模式的探索上,放眼國外,他們的研究觸角已經涉及到課程比較細致的方面,尤其是對課程信息的研究構成了國外課程研究中的比較重要的一個方面,而課程中信息的設計是重要的,因為信息的組織設計是為了接受者能對信息進行的信息加工,信息的呈現模式影響著學習者對知識的理解和記憶方式,進而決定了學習者的學習模式,因此信息的設計在課程傳遞的率和果中就佔很重要的位置。基於這個觀念,本文把信息的組織設計作為研究的重點,引入了信息科學作為研究的主要工具對中的信息作以量化分析研究,主要應用了信息科學中信息熵的公式進行推導,得到學習內容信息組織的基本模式,並充分利用自身特性和學習理論對知識信息進行細致的設計,此外還對接和導航信息進行了設計,在課程的適應性方面作出了努力,把交互信息與輔助學習信息的分析設計與應用和對頁面信息的總體調節優化作為主體信息設計部分的補充,最終形成了信息組織設計的方案,力求創設一個能夠傳遞知識信息,減少自身弊病,並帶一定適應性的學習環境,也使更多的課程的設計者關注信息這個因素。
  6. The findings of the study were that the performance of the introduction of e - commerce would be affected by the management of the supply chain, the flexibility of a firm ' s management style, the value - added offerings of a firm through the internet, the eagerness of a firm ' s top management on the introduction of e - commerce, the constructivity of a firm to the introduction of e - commerce, etc

    研究結果發現,欲導入電子商務的公司,若其供應管理愈好、營運愈具彈性、透過提供給顧客的附加價值愈多、高階管理團隊態度愈積極、以及組織文化愈具建設性等等,則電子商務導入后的績愈好。
  7. Simulated results showed that the proposed algorithm is available to construct effectively and quickly, the multicast tree satisfying delay constraint and lowest link cost, with network load balance taken into account to pick out the cheaper idle route

    模擬結果表明,該演算法在考慮的負載均衡情況下,選擇代價較低的空閑徑,快速、地構建滿足時延要求,代價最小的組播樹。
  8. First of all, we bring forward the basic project of tadil, which adapts to combined operations. it is suggested to use tdma ( the abbreviation of time division multiple access ) as the working pattern and utilize the concept of mobile ad hoc network to construct the data link network. aiming at the impact of time delay on data link and the characteristic of cooperative combat under the command of director aircraft, this thesis applies a kind of kalman filtering algorithm in polar coordinates to compensate the error of time delay, and then does the transformation of target motion parameters to obtain the current information of target

    本文結合空軍裝備部某「十五」預研課題,圍繞著戰術數據、多機協同多目標攻擊、超機動攻擊、空對地攻擊這四個方面展開了一系列的研究工作:本文首先給出了適應三軍聯合作戰的戰術數據系統的基本方案,建議採用時分多址的工作模式,並利用移動自組織的概念構建數據,同時針對數據傳輸信息的時間延遲特性和指揮機指揮下的多機協同作戰特點,應用一種極坐標系下的卡爾曼濾波演算法對該傳輸延遲誤差進行補償,並在此基礎上進行目標運動參數的轉換,以獲得目標相對于某無人機的當前運動信息,且利用模擬驗證了方法的性。
  9. This article views firm ' s network as a kind of invisible resources which can decrease transaction cost and improve the enterprise performance

    本文認為供應是一種無形資源,能夠降低交易成本,對企業的績積極的影響。
  10. Firstly, to state that the study of scm optimization calls, i present the main problems when our home enterprises put scm in practice and the lack of present theoretics. then i divided all of the means of scm optimization into two classes - enterprise management methods and information technology methods, and i discussed every information technology method in detail : enterprise management methods i discussed cover mapping out manipulable plans, strengthening core ability and improving scale economic benefit, controlling sc ' s risk, and making use of the third party ' s logistics. in chapter 4 i discuss information technique methods in detail, which cover optimizing r & d of erp and scp, edi techniques, internet information technology, the other logistics techniques, advance planning system, and network technology

    最後詳細論述了優化供應管理的各種企業管理方式,主要包括:制定可行的優化實施計劃、加強企業核心能力提高企業規模經濟益、控制供應風險的措施、合理利用第三方物流等幾種方式,第四章主要論述了優化供應管理的信息技術手段,: erp和scp軟體開發的優化、使用edi技術優化供應籩管理、基於internet的供應管理信息技術支撐體系、其它物流技術手段、高級計劃排程系統以及技術方案等。
  11. The paper demonstrates the whole plan of the propagation model application software. with the delphi software, an application software including the function of the realtime calculating path loss value is compiled completely. the paper analyses the planning theory of the td - scdma network. its main aspects include the backbone of the network, the link budget report, the budget of the effective distance, the analyse of the link interference and the analyse of the system capacity

    論證了td - scdma傳播模型應用軟體整體方案,利用delphi軟體編寫了具校正功能和實時計算傳播衰耗值功能(與gps系統配合)的應用軟體。論文從理論的角度分析了td - scdma的規劃理論,主要從拓撲結構、上下行功率平衡預算報告、通信距離的估算、上下形干擾的分析和系統最大容量分析五個方面進行了論述。
  12. First of all, the paper introduces the overall structure of the mac protocol using the multi - hop communication mode, to fulfill the requirement of wsn in collision avoidance, energy efficiency and scalability to the change in network, bandwidth utilization, latency, throughout and fairness

    協議採用周期性睡醒機制、 rts / cts的握手機制、適應性偵聽以及消息傳輸等機制,在節省能量的總前提下,地減少了延遲、避免沖突,保證流量,與傳統的數據層協議相比,具明顯的優越性。
  13. L3ased on the organization rules of internet data, the distribution laws of hyperlinks and the name rules of url, a algorithm of tvm rebuilding is established, and satisfactory experiment results are obtained by applying this algorithm. furthermore, efforts are made by applying of tvm on browse navigation, web page classification and reinforcement learning algorithm

    結合資源的構建規則、接分佈規律和url命名規則,論文提出了樹藤共生數據模型的重建演算法,實驗結果驗證了樹藤共生模型的性與合理性,在此基礎上初步討論了樹藤共生模型在瀏覽導航、頁分類和reinforcementlearning演算法中的應用。
  14. In the paper, the following main factors are studied, such as developing the expert knowledge - base based on the special knowledge of the explosive demolition of frame building, designing the object - oriented expert system of the explosive demolition of frame building, developing the neural network training example base based on projects, developing the forecasting mode of blast effects with matlab 6. 1, developing the expert system of explosive demolition of frame building with visual b 6. 0, carrying out the connection of the expert system and forecast mode. the system consisted of eleven functional modules, such as the input of initial parameters module, the choice of the blasting method module, the choice of blast mode module, the design of blasting parameters module, the design of charge module, the verifying blasting safety module, the calculating safety of tumble module, the design of detonating net module, the blast effects forecasting module and the calculating volume module

    本文的研究內容:以框架結構樓房拆除爆破領域的專業知識為基礎製作專家系統知識庫;設計一般面向對象的框架結構樓房爆破拆除設計的專家系統;搜集相關爆破工程實例製作用於爆堆果預測神經訓練的樣本數據庫;選取適當的輸入輸出因素,用matlav6 . 1構建爆破果預測神經模型;用vb6 . 0編程開發出框架結構樓房拆除爆破專家系統,並實現爆破果預測神經模型和專家系統的接。該系統由初始參數輸入、倒塌方法選取、倒塌方案確定、孔參數設計、缺口形狀及參數、爆破安全校核、傾倒安全校核、爆破、爆破果預測、工程量計算、計算設計說明書等十一大功能模塊組成。
  15. The problem is addressed through mathematical programming approach, the linear integer formulation is developed for optimizing the network throughput, and then the similarity between the original problem and the graph edge coloring problem is shown through the conflict graph concept. a column generation solution is proposed and several enhancements are made in order to fasten its convergence. numerical results demonstrate that the theoretical limit of the throughput can be efficiently computed for networks of realistic sizes

    一個對tdma機制的改進方法是空分tdma機制,它將無線結點之間的物理距離考慮在內,規定互相不干擾的通訊可以在相同的時間片內傳輸,從而減少了所需時間片的總量,從而提高了單位時間內可傳輸數據包的數量,即提高了整個的吞吐量throughput 。
  16. To the primary contradiction of real - time interactive visual simulation, limited bandwidth of network and real time transmitting parameter of relative to move sight, the control mechanism of 3 - d visual object is discussed, under the direction of hla idea, the visual federal object model vfom is established to describe the visual data distributing ; the author designed a grammar of vfom context and a turing conversion mechanism, it will support exploitation of visual simulation in different field ; the author analyses and apply opengl to design a method of implement real - time interactive visual simulation on pc, in additional with object - oriented program technique network communication technique multithreading technique, implement pc - virsp. there are 7 chapters in this thesis. in chapter 1, the developments of virtual simulation is looked back, the aim and significance and the main search content is put forward

    論文針對實時交互視景模擬的主要矛盾,即限帶寬與視景運動交互參數實時傳輸矛盾,探討了三維視體運動控制機理,結合hla思想,建立視景聯邦對象模型( vfom - visualfederalobjectmodel )來描述視景數據分佈;並設計了模擬實體描述文本文法及其存儲轉換機制,支持多領域視景模擬系統開發;分析並應用圖形介面標準opengl ,設計了基於pc機的實時互操作視景生成方法;針對分佈環境下視景模擬實時交互需求,設計視景運動同步控制方案;並綜合應用了面向對象編程技術、通信技術、多線程技術,實現了基於pc機的視景實時互操作支撐平臺( pc - vrisp ? real - timeinteractivesupportingplatformforvirtualsimulationbasedonpersonalcomputer ) 。
  17. To analyze the factors of impacting load balancing of links, which is including the number of routes between source node and destination node, the number of routes through every link, the maximum flow between source node and destination node, the maximum flow through every link, the free bandwidth of every link and so on, we present the fast dynamic routing algorithm ( fdra ) and the critical link routing algorithm ( clra ). simulation results show presented algorithms in the paper are better than other algorithms in reject ratio of the traffic requests and performance of rerouting the traffic requests when a link is failure, especially in computing time cost

    通過分析影響負載均衡的因素,比如源-目的節點間的最大流,通過每條的最大流,源-目的節點間的徑數目,通過每條徑數目,以及的剩餘容量等,提出了快捷動態由演算法fdra和關鍵性由演算法clra ,通過模擬,與最小跳演算法( mha ) 、最寬最短徑( wsp )演算法、最小干擾由演算法( mira )相比較,提出的兩種演算法在業務阻塞率、資源利用率以及重由性能方面都很好的果。
  18. As a result, the slump stimulated the society to consider and explore the true value of the netstock. this paper mainly introduces the latest tendency of the global " ec ", illustrate the basic process of it and expose the realistic problem in china. moreover, it focuses on the principle of virtual value chain, and highly evaluate the earning model regarding the globalsources corporation

    本文簡介了國際電子商務的新發展,圖解了其基本流程和在我國發展面臨的現實問題;從微觀經濟學的角度,集中論述了國際電子商務中的虛擬價值原理,在價值創造、價值分解利價值轉移三個方面奠定了國際電子商務發展的價值基礎;通過對當今國際電子商務各種模式的綜述,探討了「環球資源」的盈利模式;最後,從我國的現實國情出發,搭建出我國國際貿易中ec的基本框架。
  19. And how to apply the core protocol of internet - tcp / ip to space satellite channel efficiently has also become one of the most concerned issues for operators

    因此如何將的核心協議tcp / ip的運用在衛星上這個問題,也隨之成為了當前衛星通信界的研究熱點之一。
  20. Address scopes link - local, site - local, and global scope determine where on the network an address is valid

    地址范圍(本地接、本地站點和全局范圍)確定地址在上的位置。
分享友人