網路拓撲 的英文怎麼說

中文拼音 [wǎng]
網路拓撲 英文
network topology
  • : Ⅰ名詞1 (捕魚捉鳥的器具) net 2 (像網的東西) thing which looks like a net 3 (像網一樣的組織或...
  • : 1 (道路) road; way; path 2 (路程) journey; distance 3 (途徑; 門路) way; means 4 (條理) se...
  • : 拓動詞(把碑刻、銅器等的形狀和上面的文字、圖形印下來; 拓印) make rubbings from inscriptions pict...
  • 網路 : 1. [電學] network; electric network2. (網) meshwork; system; graph (指一維復形); mesh
  1. Disposes the switch in the network is decided to the network performance improvement by the network analysis situs and the size, and the serviceable wave length number and uses rwa algorithm

    中配置轉換器對性能的改善取決于網路拓撲和大小,及可用波長數和所用的rwa演算法。
  2. Firstly, bottle of topology discovey speed is discussed, then asynchronism and multi - thread are used to quicken discovery process

    首先,本文討論了網路拓撲發現速度的瓶頸,提出了一套行之有效的方法。
  3. According to the design demands of cad network system for chongqing caff automotive products co. ltd, cad applied to enterprises has been researched deeply and widely. research and practice works have been done in the following aspects : cad network system ' s layout, network topology structure, network devices selection, parameterized design and development based on cad application software, management of network system and design drawings, and etc. engineering practice attained anticipative effect and some useful reference ideas have been provided for construction of cad network system in caff co. ltd

    論文根據重慶卡福汽車零部件有限責任公司cad系統的設計要求,對cad在企業中的應用進行了深入而廣泛的研究,在以下幾個方面進行了研究與實踐工作: cad系統的規劃,網路拓撲結構、設備的選擇, cad應用軟體的選擇, cad應用軟體的參數化設計和二次開發,系統和設計圖紙的管理等。
  4. A new model of distribution system is presented, whereby, the feeder switches are regarded as the vertcxes of a graph and the feeder lines are regarded as the arcs. the method to model distribution networks by adjacent table is put forward. therefore, storage size is reduced and calculation is speeded up

    建立了配電的簡化模型,即將饋線開關當作圖的頂點、將饋線當作弧,採用等長鄰接表的數據結構來描述配電,大大減少了佔用空間和提高了查詢速度,並建立了基於等長鄰接表的配電網路拓撲演算法。
  5. Key technologies of topology discovering in incontrollable network

    不可控網路拓撲發現關鍵技術
  6. For the reason of the restriction of the indefiniteness of network topology and the limitation of wireless medium bandwidth, the research in router protocols in manet is important and significant

    由於網路拓撲結構的不確定性、無線介質帶寬有限等因素的制約, manet中的由協議是其研究的一個熱點和難點。
  7. To verify the analysis results, a simulation tool for network reliablity - nrs is designed and implemented. the simulator can be used to model reliability of several network topologies referred above and the reliability of layer network

    為驗證解析結果的正確性,設計並實現了針對可靠性的模擬器nrs ( networkreliabilitysimulator ) ,它可以對上述多種的可靠性進行模擬,而且可以對以典型網路拓撲結構為骨幹的層次進行模擬。
  8. It is composed of three mian protocols : call synchronization protocol, control frame transmission protocol based on arq mechanism and data transmisstion protocol based on slot precontract mechanism. one scan channel table is shared in the hfmanet. the nodes in the same dwell group work in the same scan channel, and the nodes in the different dwell group work in the different scan channel

    該協議的網路拓撲結構採用分散式分群結構,協議不同於傳統的短波點到點及需要中心節點轉發的組方式,而是初步實現了短波電臺之間多跳組功能,其協議內容主要包括同步呼叫協議、基於arq的控制幀傳輸協議和基於虛電及時隙預約方式的數據幀傳輸協議。
  9. This dissertation constructs the ods pattern for the web - olap, presents the realtime alarm technologies of fiber optic breakdown based on push / pull pattern, solves the realization and optimization problems for the topological graph of fiber optic network, realizes the system integration among the three layer architecture patterns

    本文建立了用於即時web - olap的ods模式,提出了基於push pull模式的光纜故障實時告警技術,解決了光纜網路拓撲圖的實現和優化問題,實現了三層體系結構的監管系統集成。
  10. In chapter 3, the push / pull pattern is gived out for the system realtime alarm. and the file interface of the alarm data, the algorithm of alarm position based on mapping and the algorithm of alarm icon position on the topological graph are designed. after explaining the principle of network software development using the windows socket, the push technology based on csocket is adopted to push alarm event and the pull technology based on http to pull the alarm page

    第三章,給出了實時告警的push pull模式,設計了告警數據文件介面、基於映射的告警點定位新演算法和告警圖標網路拓撲圖上定位演算法,給出了基於windowssocket進行應用開發的原理,採用基於csocket的push技術來實現告警事件的推送,利用傳統的基於http的pull技術來實現告警頁面的拉取。
  11. In verifying of relay protection sensitivities, a network portioning method combining with graphic interface is proposed. it can online track the varieties of network, accordingly it can satisfy real - time and emulation analysis of topological configuration. with the real - time network configuration and nodal admittance matrix analyzed, the short - circuit calculation is carried out ; by means of an expert system, the verification of protection sensitivities has been achieved

    網路拓撲在線快速跟蹤基礎上,進行實時結線分析並形成導納矩陣,同時將短計算的理論運用於在線,將獲得的在線短計算的結果同專家系統相結合進行保護靈敏度的在線校驗,最後通過友好的人機交互界面提供整個城市電全部投運保護裝置的保護靈敏度狀況。
  12. A general graphical user interface based on object - oriented technique, database and visualization in scientific computing has been conducted. we can draw electrical components of the distribution network and fill the components data easily. background programs analyze topology automatically and constitute node admittance matrix, node impedance matrix

    它使用圖形元件直接繪成系統接線圖,在屏幕上輸入元件參數,后臺程序自動進行網路拓撲分析,然後基於稀疏技術,利用支掃描法形成節點導納陣,連續回代法形成節點阻抗陣。
  13. Some existing topology - unaware collective operations algorithms do n ' t make use of the information about network topology. firstly, these approaches construct a model of network topology and make use of a set of parameters to describe the communication characteristics of a network model, then build the optimal trees based parameter values and their models to realize collective communication

    現有的一些未知型集合通信演算法,並不利用網路拓撲結構信息,都是首先對模型化,並且用各種參數來描述該模型中通信的特點,然後基於此模型和其參數值為集合通信操作構造最優樹來實現集合通信。
  14. We investigate finer time scale statistical properties of this traffic, including burstiness, periodicity, and synchronization. utilizing the data gathered by our simulator, we compared the results with our prediction, after that, we investigated the root cause of a specific networking traffic pattern, under various network configuration and policies. the importance of our work is not only analyzing the cause of each traffic pattern, but also providing a beneficial formal method for future research

    在實驗結果的分析過程中,我們根據當前流行的網路拓撲建立了模擬由試驗環境,特別針對lsa的突發性、周期性和同步流量的時域特徵進行了觀察,不僅探究了三種重要lsa流量的發生機理以及這些流量的變化對整體由效率的影響,比對了我們的預測與最終的實驗結果,深入研究了統計圖表裡各種異常情況的成因和由協議採用不同演算法和策略以後對整體由環境的影響。
  15. Therefore, it is really necessary to improve the anti - jamming ability of cmts ( cable modem termination system ) based on current docsis protocol. this paper firstly investigates the topology, architecture, key devices and channel features of hfc network, then points out its inherent disadvantages of this kind of topology

    本論文首先對hfc結構、體系結構、關鍵設備、通道特點等方面進行了充分的研究,指出這種網路拓撲結構固有的缺點,那就是上行是多點到一點的信號匯聚。
  16. Characteristic analysis is static characteristic analysis primarily. the suction characteristic solution bases the magnetic circuit computation via network analysis. the result indicated that, using network topology analysis to solve complex magnetic circuit the computation can achieve very good effect

    特性分析以靜態特性分析為主,其中吸力特性的求解基於磁計算的網路拓撲法,結果表明,應用網路拓撲法求解復雜磁可以達到很好的效果。
  17. Based on this kind of relations between the topological structures and the content distributions we study the web modelling, community identification and some related application problems in detail : first, after some existed characteristics of the web topology are verified, some new characteristics are discovered : the high clustering property in micro - topology ( high average gathering coefficient ), the obvious mapping relation between the topological struture and the content in micro - level 、 linear irrelevant between the degree distribution of network nodes and the relative degree distribution of contents etc. then after analysis the topology of the complex network and the network modeling, the muti - scale determinism is proposed, especially for the information network a web evolvement model ( prcp model ) that fused the node authority and the node correlation is proposed. the model deduction, evolving learning verification and large scale experiment proof indicate that the model can explain the micro - topology centralizing phenomena, can imitate the mapping relation between the network connecting distribution and network content relative distribution and also can predict the mapping relation between the topology clustering and content clustering

    本文在詳細觀察了web結構特徵以及結構與內容分佈相互關系的基礎上,以信息的物理連接結構與節點內容相關度分佈之間的相互關系為主線,從特徵、建模、社區分析及相關應用方面問題進行了深入細致地探討:首先在驗證了前人提出的web網路拓撲結構特徵基礎上,進一步發現了信息所具有的一些新特徵: 1 )微觀顆粒度的結構聚團與內容聚團存在明顯的映射關系,具體包括節點之間的物理連邊概率與節點之間的內容相關度成指數比例關系、節點形成三角形結構的概率與節點內容相關緊密程度之間同樣具有一種指數比例關系; 2 )節點連接度整體分佈與節點內容相關度整體分佈是線性無關的; 3 )微觀結構中的存在很強的集聚性(平均聚團系數很高) 。
  18. The approach can reduce total communication costs by minimizing the communication across slower channels ( e. g. a wide - area network )

    該演算法利用網路拓撲信息可以使通過慢連接(如廣域)的通信最少,從而可以減少總的通信開銷。
  19. Through ( multi - level ) bordered block partition of the power system topology matrix, a bbdf coefficient matrix which is suitable for above decomposition is formed. when the equation is solved with parallel iterative method, convergence acceleration is achieved through damping newton method

    通過採用(多重)對角加邊的方法進行電力網路拓撲分割,以形成適合以上分解法求解的對角加邊形式的系數矩陣,并行求解后並對迭代過程進行阻尼牛頓法修正,以達到加速收斂的作用。
  20. Furthermore, this paper introduces three different network architectures which are single system, bastion firewall screening subnet and the net work with dmz ( demilitarized zone ) defending network, elaboratess theories of nat ( network address translation ) and dmz ( demilitarized zone ), with the practical examples based on dns ( domain name service )

    文中針對單系統、堡壘防火墻屏蔽子、帶dmz (非軍事化區)防禦帶三種不同網路拓撲結構加以說明,闡述nat (地址轉換)的原理和dmz工作原理以及它們的相應網路拓撲結構。同時給出基於dns服務的相關腳本。
分享友人