網路上身 的英文怎麼說

中文拼音 [wǎngshàngshēn]
網路上身 英文
the net
  • : Ⅰ名詞1 (捕魚捉鳥的器具) net 2 (像網的東西) thing which looks like a net 3 (像網一樣的組織或...
  • : 1 (道路) road; way; path 2 (路程) journey; distance 3 (途徑; 門路) way; means 4 (條理) se...
  • : 上名詞[語言學] (指上聲) falling-rising tone
  • : Ⅰ名詞1 (身體) body 2 (生命) life 3 (自己; 本身) oneself; personally 4 (人的品格和修養) on...
  • 網路 : 1. [電學] network; electric network2. (網) meshwork; system; graph (指一維復形); mesh
  1. The modern technology give a chance for the pattern of transmitting knowledge with network, the course based on network have opened up it ' s way in china, our pursuer paid more attention to the mode, but in america, pursuer have studied the more width aspect, thereinto the investigation and design of the information in the course based on network is very important, for the design of the information decide the pattern how the student receive the information, which will effect the way of knowledge understanding and memory, and the way is related to the study pattern, so the design of the information in the course based on network is very important to the efficiency and effect. so the core of the paper is the investigation and design of the information in the course. i have the entropy from the information science as the analyse tool to analyse the information, these work tell us the efficient pattern to transmit information, based on the result, i design the net page, of course, study theory and the character of the net itself are also the factors i employ for design a good net page. then, links and navigation is constituted for students adapt to the course based on network

    當今技術的發展給知識以為媒介來傳播的學習方式帶來前所未有的機遇,課程在國內迅速開展起來,但是國內研究者的注意力主要集中在對課程模式的探索,放眼國外,他們的研究觸角已經涉及到課程比較細致的方面,尤其是對課程信息的研究構成了國外課程研究中的比較重要的一個方面,而課程中信息的設計是重要的,因為信息的組織設計是為了接受者能對信息進行有效的信息加工,信息的呈現模式影響著學習者對知識的理解和記憶方式,進而決定了學習者的學習模式,因此信息的設計在課程傳遞的效率和效果中就佔有很重要的位置。基於這個觀念,本文把信息的組織設計作為研究的重點,引入了信息科學作為研究的主要工具對中的信息作以量化分析研究,主要應用了信息科學中信息熵的公式進行推導,得到學習內容信息組織的基本模式,並充分利用特性和學習理論對知識信息進行細致的設計,此外還對鏈接和導航信息進行了設計,在課程的適應性方面作出了努力,把交互信息與輔助學習信息的分析設計與應用和對頁面信息的總體調節優化作為主體信息設計部分的補充,最終形成了信息組織設計的方案,力求創設一個能夠有效傳遞知識信息,減少弊病,並帶有一定適應性的學習環境,也使更多的課程的設計者關注信息這個因素。
  2. The evaluation criterion of the performance and the taxonomy for wireless sensor networks self - localization system and algorithms are described, the principles and characteristics of recent representative localization approaches are discussed and presented in detail. 3. based on the euclidean algorithm

    2 、綜述了無線傳感器定位演算法和系統的性能評價指標、分類方法,在研究和比較現有的典型演算法和系統的基礎,對現有的無限傳感器定位系統和演算法進行分析和總結。
  3. Today, numbers are on the wane thanks to the ease with which mobiles can store and retrieve names and the ubiquity of e - mail addresses and other internet - based identity tags, such as skype names

    現在,由於移動設備存取名字十分方便、再加無處不在的電子郵件地址及其它源自份標識,數字在生活中正變得越來越少見。
  4. Pki is a transparent and seamless platform for the network system provided the service of confidentiality, integrity, authentication and non - repudiation, while ca is a necessary and important component in pki, pki ' s modules, functions and its applications are firstly described in this dissertation, with specially emphases on the issuing certificates, issuance mechanisms of revoked certificates, message format and hierarchy of cas as well as the performance of the system

    Pki可以為的各種應用提供機密性、完整性、份鑒別和不可抵賴性的安全保障,簽證機關是pki系統中的重要組件。本文闡述了pki系統的模型、功能和應用,重點討論了簽證機關的證書發布、層次結構、消息格式、撤銷證書的發布機制等問題,以及它們對系統性能的影響。
  5. Across departments, we have also helped develop the infrastructure which includes, among others, a data communication network and a smart id card internet website

    我們協力推出了多項跨部門的基礎建設,例如數據溝通的智能份證站。
  6. It also published a prescribed form for data access requests and a variety of guidance materials in relation to identity card numbers, consumer credit data and privacy protection on the internet

    此外,公署亦制備查閱個人資料所用的指定表格,以及有關分證號碼、消費者信貸資料和私隱保障等一系列指南。
  7. In fact, it will be more effective for detecting and preventing congestion if the routers peilbini congestion control strategies, so ip congestion control strategies has been discussed widely in recent years. the ietf has proposed the solution by deploying active queue management in internet routers. in this paper, chapter one gives a general introduction to the network congestion control

    由於在由器中引入相應的擁塞控制機制,使參與資源的控制工作可以更有效地實現對擁塞的監測和預防,因此近幾年ip擁塞控制策略成為當前研究的一個熱點, ietf建議在internet由器採用主動隊列管理機製作為ip層參與擁塞控制的手段,隨機提前檢測( red )演算法是ietf推薦的一種主動隊列管理演算法。
  8. Vpn is the technology of building a intranet based on the public network with the support of tunneling technology, encapsulation and authentication methods

    虛擬專用( vpn )是採用隧道技術以及加密、份認證等方法,在公共構建企業的技術。
  9. The charges were issued out of polk county, florida, where investigators say doyle contacted a person he thought was a 14 - year - old girl whose profile was posted on the internet

    該郡的調查人員說,多伊爾與一名他以為是14歲少女的人聯系,這名少女的份介紹公布在
  10. Without client authentication, it would be possible for any application on the network to submit or retrieve messages from the websphere mq queue manager

    如果不進行客戶端份驗證,則的任何應用程序都可以從websphere mq隊列管理器中提交或接收消息。
  11. In the second charpter " internet and intellectual property law ", it is illustrated that the expression and dissemination of information on the internet are just the object of the copyright protection. internet, therefore, has natural ties with intellectual property law

    流通、傳播的信息載體本就是知識產權法特別是版權法的保護客體,可以說,與知識產權(法)有著天然的聯系。
  12. I now in abroad, when iheard my as the mysterious person put on the network, i wasshocked, but i think the first one is not my personal reputation, nor is it my parents, but that has been i support the fans, andhere i would like to say to you, i amsorry

    我現在處國外,當我聽到我的私房照被神秘人放到的時候,我很震驚,但我第一個想到的不是我個人的名聲,也不是我的父母,而是你們,一直支持我的粉絲們,在這里,我要鄭重地對你們說一聲,對不起。
  13. The information search agent through its inquiry agent connects internet search engines, not only realizes meta - search, but also makes self - search on the web, when the recalls could n ' t meet the needs of the user. the search algorithm starts its searching from the recalls of inquiry agent to reduce the range of searching and increase the speed of searching

    信息搜索agent通過查詢代理與internet搜索引擎連接,既可實現元搜索,又可以在返回的址較少或不滿足用戶的要求時,使用自搜索工具在自主搜索,而且搜索演算法從查詢代理返回的址出發進行搜索,減少了搜索的范圍,加快了搜索的速度。
  14. By observing the dynamic characteristics of network flows, some behavior characteristics in a high granularity can be concluded

    以流行為的動態變化過程作為研究對象可以在更高的粒度研究的行為特徵,是當前一個重要的研究方面。
  15. The main research contents are as follovvs : after the analyzing of the process of making train diagram, according with its character, and take into account the trend of innovation, chooses the total solution based on the b / s architecture, 3 - tier operation distributed and 2 - tier data distributed to separate the data from operation and simplify the development and maintenance ; the e - r data model that is accord with the 3nf criterion is designed after analyzing the data structure of the train diagram system. emphasis on the permission security of the distributed system, take the view schema, coupled with the login authentication and permissions validation, to ensure the data accessing domination, and take the synchronization, error control, and restore capability to advance the data security ; on the basis of b / s solution architecture, after comparing the existing transportation technologies, b - isdn and adsl is selected as the major solution architecture based on the package - svvitched networks. furthermore, error control, firewall, and encryption techniques are introduced to prevent the hacker attack and ensure the networks safety

    論文的主要研究內容包括:對目前我國列車運行圖管理體制和編制流程進行詳細分析,根據其「幾幾下」的特點,並結合未來「運分離」體制改革的變化預測,選擇採用與之相適應的基於b s體系架構、三層業務分佈、二層數據分佈的整體方案,實現業務與數據的分離,降低開發與應用過程的復雜度和總體成本;對列車運行圖系統的數據信息進行分析,設計符合3nf規范的數據e - r關系模型,並著重研究處于分散式系統中的列車運行圖數據信息的訪問權限和數據安全問題,提出以視圖模式結合用戶識別權限審定實現數據權限劃分,以並發處理、容錯技術、恢復技術提高系統的數據安全性;在基於b s架構的系統整體方案基礎,對當前多種數據傳輸技術進行分析比較,採用b - isdn為主幹、 adsl為接入端的基於公用數據分組交換技術的系統體系結構,並針對安全性和黑客攻擊與侵入問題,詳細討論綜合採用差錯控制、防火墻、數據加密解密等技術手段提高系統的安全性能。
  16. Whether it will consider, by making reference to the e - tax password system adopted by the inland revenue department, permitting members of the public, whose identity have been authenticated by a password of their choice, to access various government services on the internet ; and

    會否考慮參照稅務局所採用的"稅務易通行密碼"系統,準許市民在其份經自選的通行密碼核證后,使用的各種政府服務及
  17. As the experience of people with services on the internet improves and increases, and the availability of services within an organization improves, the opportunities for lines - of - business to help themselves and create new compositions of services that best fit their business needs will be an increasing demand on the it infrastructure

    隨著人們在提供服務的改進和增加、組織內部對服務可用性的改進、業務線幫助他們自和創建新的最適合其業務需要的服務組合的機會,這些都將越來越多地需要it基礎設施。
  18. For example, a gps locator, strapped to a sea turtle and sending out jxta messages wirelessly with location information, can become a peer on a jxta network

    例如,一個被綁在一隻海並以無線方式發送出帶有位置信息的jxta消息的gps定位器,就可以成為jxta的一個對等機。
  19. The thesis analyzes concerned hidden trouble of network security, common used method of network attack, the system structure of information system, hierarchy of network security, security evaluation rule of information system, and analyzes the problem of e - business which shall be solved

    本文分析了存在的安全隱患,常見的攻擊方法,信息系統的安全體系結構,安全的層次模型,信息系統的安全評估準則,在此基礎分析了電子商務要解決的難題。
  20. When the digital streaming video is transmitted on internet, it will be affected by the network, such as bandwidth, so the paper also deals with streaming video watermarking and its exclusive requirement. at the last chapter, an object - based watermarking algorithm has been presented. the watermarking algorithm for mpeg - 4 compression is devoted to address the influence from the rate scalability, based on static texture object in mpeg - 4 and watermarking in wavelet domain

    在此基礎針對視頻與圖像的異同點,分析比較了靜態圖像水印和視頻水印特點的異同,並且結合在internet傳輸視頻時,的特性(比如帶寬資源等)對視頻流產生的影響,以及這些影響對視頻流水印技術的特殊要求,結合基於對象的視頻編碼標準mpeg - 4的特性,提出了在視頻對象中利用基於小波變換的水印方案。
分享友人