網路終止 的英文怎麼說
中文拼音 [wǎnglùzhōngzhǐ]
網路終止
英文
nt network termination- 網 : Ⅰ名詞1 (捕魚捉鳥的器具) net 2 (像網的東西) thing which looks like a net 3 (像網一樣的組織或...
- 路 : 1 (道路) road; way; path 2 (路程) journey; distance 3 (途徑; 門路) way; means 4 (條理) se...
- 終 : Ⅰ名詞1 (最後; 末了) end; ending; finish 2 (指人死) death; end 3 (姓氏) a surname Ⅱ形容詞(...
- 止 : Ⅰ動詞1. (停止; 攔阻) stop; cut out 2. (截止) close; end Ⅱ副詞(僅; 只) only; just Ⅲ名詞(姓氏) a surname
- 網路 : 1. [電學] network; electric network2. (網) meshwork; system; graph (指一維復形); mesh
- 終止 : 1 (結束) stop; end; suspend 2 (停止) termination; annulment; abrogation 3 [音樂] cadence; 終...
-
The scts ( simulated cable training system ) is a troubleshooting & training system for students that are learning about termination of network cables, using the 568a, 568b, & usoc wiring standards
被模仿的纜繩培訓系統)使用568a ,是得知網路纜繩終止, 568b的學生的查明故障培訓系統, usoc接線標準。25 reynolds r, chamberlin m j. parameters affecting transcription termination by escherichia coli rna. ii. construction and analysis of hybrid terminators
研究synechococcus sp . wh8102的不依賴終止子可促進對該菌基因調控網路的理解。Former ssb analyst jack b. grubman, in settlement of the charges against him, 1 which he neither admits nor denies, has agreed to pay 7. 5 million as disgorgement and an additional 7. 5 million in penalties which he may not treat as tax deductible or seek to recover from an insurance carrier or other third party
而其中三家銀行的一些明星分析師和銀行家則被指控本身簽發了欺詐性的研究報告。因此,美林前明星網際網路分析師grubman和henry blodget則雙雙個人被罰,前者罰款1500萬美元,後者罰款4萬美元,並終生禁止從事證券業務。Based on the single genetic algorithms and the features of the distribution network reconfiguration, this dissertation makes a further study on such aspects as selection operator, crossover operator, mutation operator, termination conditions and etc, thus, puts forward improved genetic algorithms. the dissertation makes certain study on the optimization reconfiguration model of distribution network. it puts forward a multi - objective model and according to the theory of variable weight coefficients transforms the multi - objective problem into a single - objective one
針對目前遺傳演算法在配電網路重構應用中的不足,論文著重從選擇運算元、交叉運算元、變異運算元和收斂準則等方面進行了改進,把最優保存策略和兩兩競爭相結合的方法作為新的選擇運算元,採用隨最優個體相對保留代數自適應變化的交叉和變異運算元,把最優個體最少保留代數作為演算法的終止條件。An end to the annoying and useless " fsf vs. linux " net discussion
網路上那些惱人且無謂地討論" fsf vs . linux "話題的終止。Inbound network traffic from outside must be terminated in the dmz
來自外部的入站網路傳輸必須終止在dmz中。Totalitarian regimes can filter content on the web and use it to track dissidents, but human ingenuity means that attempts to block the flow of information altogether are doomed to fail
極權主義的政體能夠對網路的內容進行過濾並使用它來追蹤那些持反對政見的團體,但是人類別出心裁的網路設計卻警示了我們任何試圖要阻止信息流的行為都終歸要遭受失敗。Of course, to recall keynes, eventually, we re all dead, but more than computational time is at stake, since we may want our neural net to make more than one cut in the space of possible inputs
當然,為了記起keynes ,最終我們都切斷了與外界的聯系,專心思考。但是在計算時間之外,我們仍瀕臨危險,因為我們需要自己的神經網路對可能輸入的空間進行不止一次的切割。The nm system needs to support the service system of the business department and link the attribute information of leased line users. to than end, summary statistics concerning the provisioning, termination and quality of leased lines may be provided in a qos report
網路管理系統要支持營業部門的業務系統,實現專線用戶屬性信息的關聯,可將專線開通、終止和質量信息進行匯總統計,提供服務質量報告。This paper provides security analysis of a mutual authentication and key establishing protocol based on elliptic curve cryptography for wireless communication, which can withstand the above attacks and can be used in wireless terminals
在結合橢圓曲線密碼體制優點的基礎上,提出一種適于無線通信網路中的相互認證和密鑰建立協議,不僅能有效防止上述攻擊,還適于在無線終端設備上應用。Furthermore, these organizing principles have significant implications for developing better drugs, defending the internet from hackers, and halting the spread of deadly epidemics, among other applications
另外,這些組織原則對于研發更好的藥物、防止駭客入侵網際網路、終止致命流行病的散播,以及其他的應用,也具有重要意涵。The following four conditions are allowed us to publish your information : in order to observe the relevant laws and regulations, obey the legal service procedures of jinjiang sansheng shoes material co., ltd in order to preserve the trademark property of jinjiang sansheng shoes material co., ltd in order to preserve user and social masses privacy security on our behalf in urgent case in order to conform to other relevant requirements members population analyse consultation rights are reserved by jinjiang sansheng shoes material co., ltd6
D用戶同意遵守中華人民共和國保守國家秘密法中華人民共和國計算機信息系統安全保護條例計算機軟體保護條例等有關計算機及網際網路規定的法律和法規實施辦法。在任何情況下,百絲達服裝材料有限公司合理地認為用戶的行為可能違反上述法律法規,金勵工藝網可以在任何時候,不經事先通知終止向該用戶提供服務。用戶應了解國際網際網路的無國界性,應特別注意遵守當地所有有關的法律和法規。It reframes the traceback problem as a polynomial reconstruction problem, and uses techniques from algebraic coding theory to provide robust methods of transmission and restriction. the scheme is a new solution to the traceback problem during a dos attack ; the honeypot for ddos, which is a tool of traceback, lures the attacker to believe that he successfully compromised a slave for his needs, convincingly simulating the architecture of a potential ddos attack ; the source - based approach to ddos defense, which is a useful adjunt to traceback systems, deploys a ddos defense system at source - end networks. attacks are detected by monitoring two - way traffic flows, and the attacks originating from source networks are stopped by rate - limiting ; the routing mechanism based on pushback treats ddos attacks as a congestion - control problem
最後,就有關ddos攻擊反向追蹤問題,從四個方面對其解決方案進行了研究:在分析比較幾種反向追蹤演算法的基礎上,著重研究了代數方法編碼反向追蹤信息的方案,該方案把追蹤重構問題當作多項式重構問題,使用代數編碼理論技術提供魯棒的傳送和重構方法,是dos攻擊過程中的反向追蹤問題的一種新的解決方法; ddos陷阱作為反向追蹤的工具,引誘攻擊者相信自己成功與所需的傀儡主機通話,令人信服地模擬出潛在ddos攻擊體系結構;基於源的ddos防禦方法作為反向追蹤有用的補充,將防禦系統部署在源網路,通過監控雙向流量檢測攻擊和限制速率終止來自源的攻擊;基於向後倒推的防禦ddos的路由機制把ddos攻擊看作擁塞控制問題,添加功能到每個路由器來檢測並優先丟棄可能屬于攻擊的包,通過向後倒推上級路由器也得到通知而把這樣的包丟棄。A free and very good network monitoring tools, in addition to common list all tcp / ip and udp connections, the list of open ports applications, and termination procedures, it provides very detailed information from the version that scheduling service, but also real - time show highlighted new and emerging procedures, and so on
一個免費又非常好的網路連接監測工具,除了常見的列出所有tcp / ip和udp連接,列出打開埠的應用程序,並將終止程序以外,它提供的信息十分詳細,從版本到調度的服務,還能實時高亮顯示新出現的程序等等。When you try to misuse easecredit banking system through hacking or attempts to destroy the security network system, with immediate effect your account would be closed and the appropriate juristic authorities would be notified
當用戶通過黑客行為不正確地使用易信銀行系統,或試圖破壞安全網路系統時,用戶的賬號將立刻被終止,易信將採取適當的法律行為。Much reference of the algorithms and models can be got from the performance results for the practical design and layout. system - level simulation of hsupa builds the integrated platform and key models to describe and simulate the common structure and features of the radio network, including cell layout, path gain, traffic model, power control, handover, etc., also the special ones of hsupa, including mac - es / e, node b controlled scheduling, harq, shorter tti, etc.
所謂hsupa系統級模擬就是要搭建系統級的模擬平臺,對無線網路的公共結構和特性(例如小區布局,傳播模型,衰落通道,天線模型,功率控制,切換, ue的分佈和移動,業務的建立終止和中斷等)和hsupa的專有結構和特性( mac - es / e , nodeb控制的調度, harq ,更短的tti )進行描述和建模。Recover the spectrums first. when analogue transmission had been switched off, then deploy more frequencies for additional multiplexes of sfn or mfn and allowing more capacity for programme providers and additional services
當模擬輸送終止后,騰空出的頻譜可為節目供應商及附加服務供應商提供更多頻譜容量,以推出額外的單頻網路或多頻網路數碼頻道。For reference types that consume fixed resources such as large amounts of memory, file handles, or network connections, it is sometimes desirable to employ deterministic finalization to ensure that the object is destroyed as soon as possible
對于佔用固定資源(例如大量內存、文件句柄或網路連接)的引用類型,有時需要使用確定性終止以確保對象被盡快銷毀。In no event will 2000fun be liable for any damages caused by subscriber s failure to perform subscriber s obligation or for any loss of use, loss of time, inconvenience, commercial loss, loss of profits or savings, costs or expenses or other incidental or consequential damages howsoever arising, whether in contract, or in tort and whether resulting from interference with transmission for any cause whatsoever, over - loading, negligence or strict liability in tort or by reason of any act, omission or default of 2000fun, it s employee, agent consultant or contractor
2嚴禁所有用戶利用2000fun的網路設備從事不法活動,包括派發傳送和刊登商業機密淫褻侵權物品,或其它法律上被評定為恐嚇性和淫褻不雅的物品,若違法,們將會立即終止服務協議,並不作另行通知,若因此對2000fun造成任何損失,客戶需負全部責任並賠償損失。 3嚴禁用戶利用2000fun的網路設備發放大量的宣傳電郵。Furthermore, the algorithm is faster than most of the existing algorithms such as girvan and newman s algorithm and its improved versions. also, the algorithm can help to visualize these community structures in network and provide a new approach to research on the evolving process of dynamic networks
首先,不能保證二分法產生的共體結構是最自然的其次,為終止二分過程,二分法須事先知道網路中的共體數目,而該先驗知識在未知網路中很難獲取。分享友人