這對多重網路 的英文怎麼說

中文拼音 [zhèduìduōzhòngwǎng]
這對多重網路 英文
multi-homed network
  • : 這代詞(常用在量詞或數量詞前) this
  • : Ⅰ動詞1 (回答) answer; reply 2 (對待; 對付) treat; cope with; counter 3 (朝; 向; 面對) be tr...
  • : 重Ⅰ名詞(重量; 分量) weight Ⅱ動詞(重視) lay [place put] stress on; place value upon; attach im...
  • : Ⅰ名詞1 (捕魚捉鳥的器具) net 2 (像網的東西) thing which looks like a net 3 (像網一樣的組織或...
  • : 1 (道路) road; way; path 2 (路程) journey; distance 3 (途徑; 門路) way; means 4 (條理) se...
  • 網路 : 1. [電學] network; electric network2. (網) meshwork; system; graph (指一維復形); mesh
  1. In tranditional ip network, only the “ best effort ” service is provided, but the quality of service can not be guaranteed. though the interserv, deffserv and mpls are presented afterward to guarantee the qos for the ip network. but as a layer network, the realization of the qos function need span different layers ( such as rsvp protocol ) in the ip network, which may result in the function iterance and chaos

    媒體和實時業務的出現要求能夠提供足夠的qos保證,在傳統的ip中只能提供「盡量傳輸」的服務而不能保證服務質量,后來提出的綜合服務模型( interserv )以及區分服務模型( deffserv )以及mpls技術保證了ip上的服務質量,但由於ip是層次結構的,因此qos的支持需要跨層(如rsvp協議) ,就可能引起功能的復和混亂,而微通信元系統是無層次結構的系統,就克服了些的問題,變得簡單,效率更高。
  2. The modern technology give a chance for the pattern of transmitting knowledge with network, the course based on network have opened up it ' s way in china, our pursuer paid more attention to the mode, but in america, pursuer have studied the more width aspect, thereinto the investigation and design of the information in the course based on network is very important, for the design of the information decide the pattern how the student receive the information, which will effect the way of knowledge understanding and memory, and the way is related to the study pattern, so the design of the information in the course based on network is very important to the efficiency and effect. so the core of the paper is the investigation and design of the information in the course. i have the entropy from the information science as the analyse tool to analyse the information, these work tell us the efficient pattern to transmit information, based on the result, i design the net page, of course, study theory and the character of the net itself are also the factors i employ for design a good net page. then, links and navigation is constituted for students adapt to the course based on network

    當今技術的發展給知識以為媒介來傳播的學習方式帶來前所未有的機遇,課程在國內迅速開展起來,但是國內研究者的注意力主要集中在課程模式的探索上,放眼國外,他們的研究觸角已經涉及到課程比較細致的方面,尤其是課程信息的研究構成了國外課程研究中的比較要的一個方面,而課程中信息的設計是要的,因為信息的組織設計是為了接受者能信息進行有效的信息加工,信息的呈現模式影響著學習者知識的理解和記憶方式,進而決定了學習者的學習模式,因此信息的設計在課程傳遞的效率和效果中就佔有很要的位置。基於個觀念,本文把信息的組織設計作為研究的點,引入了信息科學作為研究的主要工具中的信息作以量化分析研究,主要應用了信息科學中信息熵的公式進行推導,得到學習內容信息組織的基本模式,並充分利用自身特性和學習理論知識信息進行細致的設計,此外還鏈接和導航信息進行了設計,在課程的適應性方面作出了努力,把交互信息與輔助學習信息的分析設計與應用和頁面信息的總體調節優化作為主體信息設計部分的補充,最終形成了信息組織設計的方案,力求創設一個能夠有效傳遞知識信息,減少自身弊病,並帶有一定適應性的學習環境,也使更課程的設計者關注信息個因素。
  3. Along with the science and technology day by day progress, the computer internet technology increases day after day in the traveling service utilization, this as well as serves well regarding the travel agency account executive and the enterprise internal management automation and the modernization 旅游者, promotes our country traveling industry development, all has played the vital role

    隨著科學技術的日趨進步,計算機技術在旅遊業務中的運用日漸增于旅行社業務經營和企業內部管理的自動化和現代化以及更好地服務于旅遊者、促進我國的旅遊產業的發展,都發揮了要的作用。
  4. These raise the dog the person, more widespread saying is the person which raises the pet, the social relation more widespread and close, in the network, the streets and lanes, the middle class, all has the important influence, but they to injure the animal the manner to be extremely consistent, but does not like many questions has inthe disparity in age and the social stratum dashes with the difference, raises the pet the person is the noticeable strength

    些養狗的人,更廣泛的說是養寵物的人,社會聯系更為廣泛和密切,在,街頭巷尾,中產階層,都有著要的影響力,而他們傷害動物的態度非常一致,而不像很問題在不同年齡和階層都有沖撞和分歧,養寵物的人是不可忽視的力量。
  5. The article constructed the empirical framework of the relationship between the industrial cluster and the regional economy with past data. the theoretical and empirical study of this thesis revealed that regional development policy should endeavor to cultivate industrial milieu. this idea shed s a new light on making regional development policy when many local governments pay attention to attract investment only by preferential conditions, while ignore cultivating industrial milieu and local network

    本論文通過產業集群的理論分析和實證研究,揭示了區域經濟的持續發展依賴于創造有利於產業發展的競爭環境;競爭優勢不是靜態的而是動態的,區域決策必須注產業環境的營造和培育,為目前我國很地方片面以政策優惠吸引外資,而忽視自身產業環境、本地化的培育的區域發展政策提出了新的思考方向。
  6. Being a widely utilized public ip platform, it is susceptible to security attacks of all nature, as outlined in the following areas : the open nature of the ip internet systems - increase of foreign attacks, for example dos / ddos attacks ; the current weakness of the existing operating system ' s internet protocol ; mainframe, and lack of an evaluation standard for back office systems, the inevitable problem of illegal internal access, the lack of guidelines for record keeping and post attack documentation processes, hi addition, still in existence, are managerial problems including the lack of securit y knowledge amongst the workforce and the inexistence of a complete set of security guidelines. to guarantee china telecom ' s 163 / 169 system ' s reliable functions, to protect the user ' s interests, at the same time, insuring quality service, it is necessary to adapt p2dr model as a solution to the current security issues. supported by the modern secure theory and made the secure implementation abundant project practices, this paper gives the general secure design for the chongqing public ip network using p2dr secure model

    中國電信建設的公眾ip我國internet的發展起著決定性作用,慶電信163 / 169是國家骨幹在本地的延伸,擁有7個核心節點(採用cisco12012 、 2 * 2 . 5gdpt環) ,三十八個匯接節點,能提供寬帶,窄帶種接入方式的公眾ip,現擁有近20萬用戶,佔全市用戶四分之三以上,作為樣一個擁有眾用戶,開放的ip平臺,會受到各種各樣的安全威脅,主要表現在ip的開放性,來自外部的攻擊增,如dos / ddos攻擊;所使用的操作系統運行的協議自身的脆弱性;主機、設備的配置是否缺乏評估手段;不可避免的內部非法訪問;缺乏必要的攻擊審計作為犯罪取證,出此之外,還有管理上的一些問題,如人員安全意識不強,安全制度不夠健全等方面原因。
  7. On the internet, multimedia services such as streaming media, video / audio conference, voice over ip and video on demand, become more and more important, end - to - end data transmission or unicast ca n ' t be competent for the task which have the characteristic of one - to - many transmission. if we use unicast, the server has to offer the packet with same context for each connection, which will consume too much bandwidth. then the broadcast is alternative selection for us to deliver data in the lan, as we known, when broadcast technology used, all the pcs in the lan will receive the broadcast packets regardless that you would like to or not

    點傳輸的單播方式不能適應此業務的傳輸特性(單點發送點接收) ,使得服務器必須為每一個接收者提供一個相同內容的ip報文拷貝,並在復地傳輸相同內容的報文,必然佔用大量資源。雖然ip廣播允許一個主機把一個1p報文發送給同一個的所有主機,但是由於不一定是所有的主機都需要些報文,又可能浪費大量資源。
  8. The article illuminates mainly two segments color - separation model based on three dimensions, gives a model conception on a knowledge base of unification technology and analyse and design digital prepress system from the whole on the problem of systemic requirement analysis. second, the article brings forward new data compress method based on memory stream and sets up new data structure to realize undo and redo methods based on analyzing all kinds of datas referred to on systemic based construction. because printing and dyeing cad system deals with many arithmetics on graphics ans image and production technics, the article illuminates vector conception, expatiates gray graphic vectorization and brings forward to graphic component ' s conception to enhangce the systemic stability and manipulating speed and improve graphic transmission

    在印染cad系統的需求分析問題中,結合目前印染行業的發展和實際cad系統的整體構架,著闡述了基於三維空間的二段法分色模型,提出了一體化工藝知識庫個模型的概念,數字印前系統做了整體的分析、設計在系統的底層架構問題上,著分析了cad系統涉及到的各類數據,提出一種新型的基於內存流的數據壓縮方法,同時設計了自己的數據結構,用以實現系統的undo 、 redo操作,由於整個系統涉及眾的圖形圖像演算法和實際工藝,為了提高系統的穩定性和操作速度,以及增強圖像的傳輸功能,在部分演算法中採用了矢量的概念,著講解了灰度圖像矢量化,並且提出了圖像組件一嶄新的概念。
  9. The " collaboration " will become a main problem enterprise faced in the global digital economy. so along with this clue, some problems as following are studied in this paper : 1 ) collaborative manufacturing environment, collaborative manufacturing network and operation center are proposed, and base on these concepts, some problems relate to production control are identified ; 2 ) the framework for collaborative manufacturing environment is constructed by using agent and multi - agent, the framework conducts scheduling and controlling functions among production entities, as well as within them, using autonomous agent and weighted functions for distributed decision - making, while simple index values, instead of detailed data, are used for information exchange among agents ; 3 ) finally, resource promises model are proposed, based on the model, resource control collaborative mechanism is developed for collaborative manufacturing environment ; 4 ) collaborative contingency management is introduced

    本文沿著「協作」一線索以下問題進行了研究: 1 )提出了協作製造環境、協作製造及運營中心的概念,並以此為基礎進一步界定了協作製造環境下的生產控制問題; 2 )構建了協作製造環境下基於agent的生產控制框架,並在一框架基礎上,應用自治agent和分散式決策的權函數,建立了協作製造環境中製造實體間或實體內生產調度與控制模型; 3 )以資源承諾模型為基礎,建立了協作製造環境下的資源控制協作機制; 4 )給出了協作製造環境下緊急事件的管理策略。
  10. As the military and industry is developing dramatically, to enhance the low - contrast digital image has become one of the important areas in image processing. there are two traditional methods to enhance the low - contrast digital image : the methods based on frequency and the method based on time. the histogram enhancement, the most popular way to enhance, is representing the latter one ; while the methods based on frequency often uses wavelet transform, ft ( flourier transform ), dct ( discrete cosine transform ) to enhance

    隨著軍事和工業上的發展需要,低比度數字圖像的增強越來越成為數字圖像處理中的一個要領域,傳統的增強方法分為頻域法和空域法兩大類,其中空域法的代表為直方圖增強法,也是最為流行的增強方法,頻域法中用的較的是基於小波變換,傅立葉變換和離散餘弦變換的增強方法,本文介紹的是基於小波神經的頻域增強法。
  11. It has small diameter, strong expansibility, symmetrical structure and simple path searching algorithms, etc., what more, many interconnection networks with different topologies can be easily embedded in it. so it becomes one of the most important and attractive network models. in this thesis, based on the above two aspects, the fault - tolerance and routing algorithms of the hypercube are studied

    超立方體處理機系統中常見的一種互連拓撲結構由於具有直徑小、可擴展性強、結構稱、演算法簡單等優點,且種拓撲結構的互連都可以很容易的嵌入其中,因而成為最要和最具吸引力的模型之一。
  12. Sleep / waking cycle is a complex network modulation and many factors such as interleukin - 1 ( il - 1 ), tumor necrosis factor ( tnf ), growth hormone releasing hormone ( ghrh ), vasoactive intestina polypeptide ( vip ) and many conventional neurotransmitters such as serotonin ( 5 - ht ), acetylcholine ( ach ), norepinephrine ( ne ), dopamine ( da ) and gamma - aminobutyric acid ( gaba ) were involved in it. recent evidence has shown that no synthesized in neurons in several areas of the brain can induce the release of neurotransmitters. in the rat central nervous system, the anatomical distribution of nos - containing neurons is now well established, and it was reported that nos is co - localized with neurotransmitters well known for their involvement in sleep mechanisms, i. e. 5 - ht, ach, da and gaba

    鄭州大學2003屆碩士畢業論文gaba受體激動劑消除no合成酶抑制劑大鼠睡/醒周期的影響睡/醒周期的形成是一個復雜的調控的結果,體內許因子都參與了一調控些因子如白介素一1 ( il一1 ) 、腫瘤壞死因子( tnf ) 、生長激素釋放激素( ghrh ) 、血管活性腸膚( vip )以及經典的神經遞質如5一輕色氨( 5一ht ) 、乙酞膽堿( ach ) 、去甲腎上腺素( ne ) 、巴胺( da )和卜氨基丁酸( gaba )等,它們在睡眠的發生和調節中也發揮著要作用。
  13. Then, we analysis its performance, mainly discuss the effect of traffic load and different scheduling mechanisms under this model

    之後討論了在個模型下點實時通信的性能,著分析了不同調度方式和不同負荷實時數據的時延影響。
  14. The purpose of this paper is to exploit a new evaluating method to improve consistency, objectiveness and efficiency in supplier selection. gray theory is applied to filter the numerous item reflecting the suppliers ' qualities in order to control the few but important factors and simplify the task. a comprehensive evaluation method based on bp net works is provided to perfect the selecting process

    選擇合的適供應商是供應鏈使命成功實現的要保障,以提高供應商選擇過程中的客觀性、一致性等問題為出發點,通過灰色關聯法反映眾供應商品質的因素進行提煉,以便抓住關鍵因素,提高供應商遴選的效率,提出了一種改良的bp神經評價方法,試圖解決一現實問題。
  15. Besides, the electric power industry is a special industry, and some of its important sectors are in natural monopoly because of the characteristic of the network, which determines the government must supervise the electric power industry on price, entry, service and etc. because of the gradualness of the electric power reform and the limit of the inertia of original plan economy system, the new - type electric power supervisory system that meets the requirement of the market economy at present has not been set up yet in our country

    電力產業又是一個特殊的行業,它的一些要環節因特徵明顯而具有自然壟斷性,決定了政府必須電力產業進行監管。盡管經歷了20年開放和引入競爭的電力體制改革實踐,並於2003年3月成了國家電力監管委員會,但由於受電力體制改革的漸進性以及原有計劃經濟體制慣性的限制,監管改革進度緩慢,監管機構、監管職能、監管方式改進尚不明朗,我國目前符合市場經濟要求的新型電力監管體系尚未真正建立。
  16. With the evolution of network technologyjnternet takes more and more great part in our life. in the same time, the security of network become the focus of people. the traditonal method used for defence is adopt as strategy of prohibit, such as firewall, encrypt, access control, security system e. t. these methods all have some impact on defence, but from the view of system security management. but they are not enough only for defence. intrusion detection system can detect outside attack or misuse, it is an kind of logical compensation for defence

    隨著技術的迅速發展,日益成為人們生活的要部分,與此同時,黑客頻頻入侵安全問題成為人們關注的焦點,傳統安全方法是採用盡可能的禁止策略來進行防禦。目前採用的手段有防火墻、加密、身份認證、訪問控制、安全操作系統等,系統非法入侵都起到一定的作用。然而從系統安全管理角度來說,僅有防禦是不夠的,還應採取主動策略。
  17. It reframes the traceback problem as a polynomial reconstruction problem, and uses techniques from algebraic coding theory to provide robust methods of transmission and restriction. the scheme is a new solution to the traceback problem during a dos attack ; the honeypot for ddos, which is a tool of traceback, lures the attacker to believe that he successfully compromised a slave for his needs, convincingly simulating the architecture of a potential ddos attack ; the source - based approach to ddos defense, which is a useful adjunt to traceback systems, deploys a ddos defense system at source - end networks. attacks are detected by monitoring two - way traffic flows, and the attacks originating from source networks are stopped by rate - limiting ; the routing mechanism based on pushback treats ddos attacks as a congestion - control problem

    最後,就有關ddos攻擊反向追蹤問題,從四個方面其解決方案進行了研究:在分析比較幾種反向追蹤演算法的基礎上,著研究了代數方法編碼反向追蹤信息的方案,該方案把追蹤構問題當作項式構問題,使用代數編碼理論技術提供魯棒的傳送和構方法,是dos攻擊過程中的反向追蹤問題的一種新的解決方法; ddos陷阱作為反向追蹤的工具,引誘攻擊者相信自己成功與所需的傀儡主機通話,令人信服地模擬出潛在ddos攻擊體系結構;基於源的ddos防禦方法作為反向追蹤有用的補充,將防禦系統部署在源,通過監控雙向流量檢測攻擊和限制速率終止來自源的攻擊;基於向後倒推的防禦ddos的由機制把ddos攻擊看作擁塞控制問題,添加功能到每個由器來檢測並優先丟棄可能屬于攻擊的包,通過向後倒推上級由器也得到通知而把樣的包丟棄。
  18. If the technicians applied technology in the wrong, even achieving the business logic, but probably leading to many vices including low performance, low scalability, close coupling, low software duplication. so how to assemble the j2ee technology reasonable and achieve a system with high performance and high expansibility is my research emphasis in the thesis. in order to solve the problems and implement efficient web application, the paper put forward ejs _ mvc model according mvc pattern and we can assemble component by using ejs _ mvc model, it can solve many problems of web application and improving system with clear flow and clear function partition, in addition, due to controller is the most importance in the ejs _ mvc model, so the thesis also discuss some problems about controller design ; if the model is not designed accurately, system performance will encounter fatal influence, so the article lucubrate ejb technology from ejb choice, ejb optimized design, database access, design pattern etc and bring forward some strategies and methods about how to build efficient business tier ; finally based on ejs _ mvc model, a example that contains simple business logic is developed according to the object - orient software engineering thinking and some strategies and methods proposed by the thesis, in the process of achieving system function, the emphasis is probing into how t o assemble and apply technology reasonable and providing a new thinking thread and method contributing to build high effective and flexible j2ee application

    由於j2eeweb應用是由組件組成,因此為了解決上述問題,實現高效的應用,本文首先從如何合理組合組件入手,找到一種方法使各組件能具體分工而又緊密合作,在深入研究各組件基礎上,根據mvc模提出了ejs _ mvc模型概念,指出可按此模型組合各層組件,該模型可以解決傳統web開發中存在的問題,而且具有系統流程與系統功能劃分清晰,可擴展性、可維護性強等優點,另外由於控制器是ejsmvc模型的中之,它起到承上啟下的作用,它設計好壞直接關繫到整個應用的性能、伸縮性與擴展性,因此又探討了控制器設計的有關問題;另外如果模型設計不當的話,系統性能造成的影響可能是致命的,因此本文又從ejb組件選擇、 ejb調優設計、數據庫訪問和設計模式等方面ejb技術作了全面的分析研究,指出在業務層中如何避免太遠程調用和提高業務層性能,特別是根據前面的分析總結出了業務層的優化分層組合模型,個模型的使用無疑會使業務層具有較高的性能與伸縮性;最後選擇一個業務邏輯較簡單的系統,使注意力集中到運用的j2ee技術上來,按照ejs _ mvc模型與軟體工程流程以及本論文所提出的方法與策略實現業務邏輯,在實現過程中具體探討如何合理運用組合技術,就層j2ee體系結構的設計思想作深入的探討實踐,為實現高效、靈活的層j2ee應用提供一種新的思及方法。
  19. Through discussions with the fa experts, i present the application of nn ( neural network ) in the process of contending for dealership, that is, to establish b - p three - layer network so to simulate the expert ' s reasoning, and give the suggestions similar to the experts ". in consideration of the transport market ' s changes, the research also provides a forecast of the shipping capacity on several main lines of the world

    通過同貨運代理領域專家的次探討,本文提出了將神經技術應用於「攬取貨源決策」要環節,即建立攬貨決策神經,採用b - p三層結構,通過專家所提供的樣本的反復學習,使得系統能模擬貨代領域專家的思維進行推理,給出專家水平的建議。
  20. In this paper, we employ an approach of multifractal analysis to characterize the self - similar traffic in broadband networks. in comparison to the traditional statistical analysis, this approach possesses the capability of describing the long - tern fractal behavior as well as the shortterm behavior. by using this approach, we analyze the real traffic and the results prove the effectiveness of this approach. an important conclusion is obtained that traffic in broadbannd networks owns the multifractal property

    本文應用分形分析方法寬帶中自相似業務量的分形行為進行分析,與傳統的統計測量方法比較,種方法可以同時刻劃被觀察數據序列的短期和長期的分形行為.通過一些業務量模型以及真實業務量的分析,表明該方法可以比較細致地刻劃業務量的分形特性,得到的一個要的結論是寬帶中的業務量具有分形特性
分享友人