結合網 的英文怎麼說

中文拼音 [jiēwǎng]
結合網 英文
integral mesh
  • : 結動詞(長出果實或種子) bear (fruit); form (seed)
  • : 合量詞(容量單位) ge, a unit of dry measure for grain (=1 decilitre)
  • : Ⅰ名詞1 (捕魚捉鳥的器具) net 2 (像網的東西) thing which looks like a net 3 (像網一樣的組織或...
  • 結合 : 1 (發生密切聯系; 聯合) combine; unite; integrate; link; binding; coalition; cohesion; connectio...
  1. Based on the principles of ncw discussed, the present study delved further into the c2 system analyze of aerial defence missile network - centric operation with the aerial anti - ballistic missile as the battle background. the main work of this study can be stated as follows : firstly, the author made a deep research on the concepts, the essence and the cardinal fundamentals of ncw, and then made a thorough study on the integrity fire control ability and agility of the network - centric operation requirements, then analyzed the three - layer logical networks structure of the aerial defence missile system in ncw

    本文以區域反彈道導彈為作戰背景,在對路中心戰原理剖析的基礎上,對防空導彈路化作戰指控系統(本文稱之c2系統)構進行了分析,主要工作有:首先,結合網路化作戰的概念、原理,研究了防空導彈系統路化作戰的一體化作戰和靈活適應能力,並分析了支持路化作戰能力需求的c2系統邏輯構,從整體上進行了三層邏輯劃分並分析了各層邏輯的功能和組成。
  2. Sweatshirts and tank tops are combined with sports clubs ' blazers, tennis skirts with white blousons or polo shirts with stripes

    運動衫及緊身短背心與運動俱樂部的運動夾克相球裙與白色夾克衫,球衣與條紋織物相
  3. In this paper, we study focus on building intrusion detection model based the technique of data mining ( dm ). firstly, the paper designed a scheme to modeling intrusion detection based dm and bright forward the idea of descriptive model and classified model to intrusion detection. secondly, we designed and implemented a net data collection system with high performance and a scheme to pretreat net data. thirdly, after studying the algorithms to mine association rule and sequence rule in net data, we extended and improved the algorithms according to the characteristic of net data and the field knowledge of intrusion detection

    首先設計了基於數據挖掘技術的入侵檢測建模方案,提出使用該技術建立入侵檢測描述性模型和分類模型的思想,並用分類判決樹建立了入侵檢測分類模型;其次,設計和實現了一個高性能的路數據採集系統和路數據預處理的方案;然後,在對關聯規則挖掘和序列規則挖掘演算法進行研究的基礎上,結合網路數據的特性和入侵檢測領域的知識對演算法進行了擴展和改進,挖掘出了路數據的關聯模式和序列模式;最後,研究了描述性模式的應用,並設計出基於模式匹配的入侵檢測引擎,該引擎具有誤用檢測和異常檢測功能。
  4. Firstly, this thesis discusses the requirements of chinese word segmentation. based on that, seven algorithms are proposed with grid characteristic

    本文首先研究了漢語分詞應用需求的多樣性,結合網格的特點設計了七個服務演算法。
  5. 3. based on the purchase of some hardware, the second research on contactless ic card has been carried out, combining with network database, regarding single - chip computer as a core and pertinent periphery circuit as affixation. this thesis achieves the design of toll - display and balustrade and presents the design process and circuit, also accomplishes the frame design of the no stop electronic toll collection system based upon contactless ic card

    ( 3 )在購買部分硬體的基礎上,對非接觸卡系統進行了二次研發,結合網路數據庫,以單片機為核心,附加相關的外圍電路,實現了收費額顯示和提桿機控制箱的設計,給出了具體的設計過程和設計電路,完成了基於非接觸ic卡的不停車收費系統架構設計。
  6. The key technology related includes website topological structure analysis, webpage content analysis and subject analysis and index. the research is launched for offering service of automatic searching websites. according to the above - mentioned research purposes, this thesis firstly analyzed the system architecture of intellectual website ' s retrieval

    基於主題標引的智能站檢索( themeindexingbasedwebsiteretrival , ttwr )便是以主題站( single - themewebsite )為檢索目標,結合網站拓撲構等特有的相關特徵,以主題分析標引技術為核心,為提供自動化的站檢索服務而開展的相關技術研究。
  7. L3ased on the organization rules of internet data, the distribution laws of hyperlinks and the name rules of url, a algorithm of tvm rebuilding is established, and satisfactory experiment results are obtained by applying this algorithm. furthermore, efforts are made by applying of tvm on browse navigation, web page classification and reinforcement learning algorithm

    結合網路資源的構建規則、鏈接分佈規律和url命名規則,論文提出了樹藤共生數據模型的重建演算法,實驗果驗證了樹藤共生模型的有效性與理性,在此基礎上初步討論了樹藤共生模型在瀏覽導航、頁分類和reinforcementlearning演算法中的應用。
  8. The purpose of this work is to use a single acoustic transducer to perform as a command master, which acts as several signal sources, to control the remote operation vehicle

    本文主要在探討如何利用簡易之水下聲學設備來創建一套可靠之水下通訊及遙控裝置,以供水下載具使用;再結合網路遙控方法,使得路的遙控與通訊的架構得以成型。
  9. Using the grid - type method to partition the space, regarding the modeling data as the antigen and the fuzzy rules as the antibody, this method determines the structure of t - s system with immune theory and adopts the least square method to estimate consequent parameters of the linear rule

    該方法結合網格空間劃分方法,以建模數據為抗原,模糊規則為抗體,採用人工免疫原理確定系統構,並應用最小二乘方法估計線性規則後件參數。
  10. Presented a scalable method of qos provisioning in the broadband residential ethernet - based access network that offers qos guarantees for voip, tv, vod, etc. the cbr encoding control scheme with fixed services promises predictable traffic characteristics, which simplifies qos mechanisms and network designs ; the differentiated approach promises a scalable qos architecture for the carrier - grade broadband residential access network ; combining network dimensioning, diffserv and pricing promises qos provisioning with effectiveness and operability

    cbr編碼控制機制和限定服務類型提供可預測的通信量特徵,簡化了路設計和服務質量方法的復雜度:採用區分服務方法,滿足了大規模寬帶社區的高擴展性要求;結合網路容量規劃、 diffserv框架和定價機制研究多業務的服務質量,確保了服務質量方法的有效性和可操作性。
  11. The whole design of on - line monitoring system is built in this subject, which system is based on data stream status, running characters, the requirements for in - situ monitor, communication technology and database knowledge. this system used graphic programming language labview for software developing tool and the production of rockwell for hardware

    根據高溫風機監測系統數據流量狀況、機組運行特點及現場監測要求,結合網路通訊技術和數據庫知識,以圖形化設計語言labview為開發平臺,以美國羅克韋爾自動化公司的硬體模塊為基礎,構建了在線監測系統的總體設計方案。
  12. The author argues that in network teaching receptive study and academic study should be combined organically into the course teaching ; that in network teaching the center should not be teachers, nor students, but communities of learners consisting of teachers, students, and the things to be learned ; that network teaching is not a learning activity that only happens in a virtual space, it happens in a condition which is a organic combination of virtual learning space and real learning space ; network teaching should be supported by technology conditions, and be rooted in teaching

    筆者認為,在路教學中接受式學習和研究性學習應當有機地在學科教學中;路教學不應以教師為中心,也不能以學生為中心,而是由教師、學生和學科內容組成的學習者共同體;路教學不僅僅是發生在虛擬空間中的學習活動,其環境應當是虛擬學習空間和真實學習空間的有機路教學應以技術環境為支撐,以教學為本位。
  13. Business strategy architecture includes business architecture and information architecture. technical architecture includes software architecture and hardware & network architecture

    並最終結合網格體系特點,得出企業未來體系構,和現階段整策略。
  14. In chapter 5 and chapter 6, the key researches on web - based geospatial service sharing architecture, and grid - based geospatial service sharing architecture, respectively. in chapter 5, a method to design a web - based regional geographical information sharing architecture using xml and

    其二,在基於web服務的地理信息共享與服務平臺基礎上,結合網格技術的發展,對空間信息格及地理信息共享的方法進行了深入的研究,設計了基於格的地理信息共享與服務模型框架,並實現了
  15. On the base of fatigue loading spectrum achievements, combining the characteristics of large - span grid structure with hanging cranes and the using - requirement on fatigue loading spectrum of grid structure with hanging cranes, this paper has firstly put forward the theoretic method for constructing fatigue loading spectrum of grid structure with hanging cranes, organized the relevant program - - gjfls. and elementally established the program loading spectrum

    在繼承疲勞載荷譜已有成果的基礎上,本文結合網架設置懸掛吊車的特點以及架疲勞載荷譜的使用要求,首次提出了架疲勞載荷譜編制的理論方法,並編制了相應的程序( gjfls ) ,初步建立了架程序載荷譜。
  16. This thesis concentrates its research mainly on the method of rule learning base on bp neural network which definition of rules are combined the web pages ’ features of path, left / right boundary and semantic

    本文的工作重點是基於bp神經路的規則學習方法,規則的表示結合網頁的路徑特徵、左右邊界特徵和語義特徵來定義。
  17. By the way this paper chooses the more effective dm algorithms by deep study in quite a few known algorithms employed in association rules, frequent episodes rules and trend analysis. to speed up producing association rule, this paper also introduces the aadd algorithm which is a upgrade algorithm from apriori

    同時本文通過對關聯規則、模式序列和趨勢分析的多種演算法的深入的分析和比較,結合網路攻擊檢測的需求,為檢測dos攻擊選擇適有效的演算法;並為加快關聯規則挖掘速度,提出apriori演算法的改進演算法? ? aadd演算法。
  18. This suit of algorithm constitutes two parts : one is the bandwidth allocation algorithm against t - cont, which is executed in olt ; the other is the bandwidth utilization algorithm against t - cont, which is executed in onu

    該套演算法由兩大部分組成:一是olt端針對t - cont的帶寬分配演算法,其功能是依據各個t - cont的擁塞報告,結合網路整體負載狀態,完成四種類型帶寬在不同類型、不同擁塞狀態的t - cont之間的分配;一是onu端針對t - cont的填充演算法。
  19. In this thesis, based on the management requirement of vpn network, the author made a description about her study in the field of the open computer network system combined with new network technology

    同時corba技術與snmp 、 web技術、 java技術的使得基於corba的路管理如虎添翼。本文針對vpn路的管理需求,結合網路新技術對開放的計算機路的管理進行了研究。
  20. This paper divides the web usage mining process into three main parts : data collecting consists of the three server logs - access, referer, and agent, the html files the make up the site, and registration data ; data preprocessing, includes data cleaning, user identification, session identification, path completion and transaction identification ; data analysis consists of mining frequent access paths and association rule. thinking about the amount of hits on homepage, this paper improves the algorithm of finding frequent items

    結合網頁特點,考慮到主頁的點擊率的影響,對生成頻繁訪問瀏覽頁的演算法做了改進;在web使用挖掘的基礎上引入部分web構挖掘,對挖掘瀏覽頁的關聯規則做了補充,在web構挖掘基礎上挖掘出的相關瀏覽頁也推薦給用戶,在一定程度上提高了關聯規則的精確度。
分享友人