非擴展網路 的英文怎麼說

中文拼音 [fēikuòzhǎnwǎng]
非擴展網路 英文
nonextended network
  • : Ⅰ名詞1 (錯誤) mistake; wrong; errors 2 (指非洲) short for africa 3 (姓氏) a surname Ⅱ動詞1 ...
  • : 動詞(擴大) expand; enlarge; extend
  • : Ⅰ名詞1 (捕魚捉鳥的器具) net 2 (像網的東西) thing which looks like a net 3 (像網一樣的組織或...
  • : 1 (道路) road; way; path 2 (路程) journey; distance 3 (途徑; 門路) way; means 4 (條理) se...
  • 網路 : 1. [電學] network; electric network2. (網) meshwork; system; graph (指一維復形); mesh
  1. Fsmail adopts and implements the asynchronous event driven mechanism, with all those network i / o operations in the server working under the non - blocking style ; accomplishes object - oriented heap with the dynamic array, adapted to any type of data ; adopts the multi - queue scheduling mechanism based on a fsm, easily to fulfill the extentions of delivery funtions ; fulfills the non - blocking domain name resolvement mechanism and the caching of the resolved results ; implements the non - blocking user database management and the caching of the user data recently accessed ; uses the unified memory pool management, avoiding the memory leakage and improving the performance of the fsmail server ; lastly, implements the log management server based on the c / s mode, eliminating the inconsistency of the logging metadata and being adapted to any kind of application logging

    Fsmail採用並實現了異步事件驅動機制,所有i o的實現使用了阻塞方式;以動態數組實現了基於面向對象的堆隊列,屏蔽了堆數據的一致性;使用了基於有限狀態機的多隊列郵件調度機制,為后續版本的性提供了良好的介面機制;服務器內部實現了阻塞的域名解析機制,並實現域名地址緩存;實現了阻塞的用戶數據庫管理模塊,並實現用戶數據緩存;使用了統一的內存池管理機制,既防止了內存泄漏,又提高了服務器的性能;最後,還實現了基於c s模式的日誌管理服務器,屏蔽了日誌數據元的一致性。
  2. The architecture of management system of user network business which is realized finally is simple, the structure is legible and the efficiency is high. it is very congruous to be used by such units as universities and enterprises, because of the characteristics of good portability, extendibility, maintainability, easy - to - use, security

    基於以上關鍵技術,論文最終實現的「用戶業務管理系統」 ,架構簡潔合理、結構清晰、性能高效,具有較好的可移植性、可性、可維護性、易用性、安全性等特點,常適合應用於院校、企業等單位的園區
  3. To improve the accuracy of node trust evaluation in a distributed network, a trust model based on the experience of individuals is proposed, which establishes a new trust assessment system by introducing the experience factor and the comparative experience factor. the new evaluation system considers the differences between individuals and interactive histories between nodes, which solves the problem that nodes have inaccurate assessments due to the asymmetry of nodes to a certain extent. the algorithm analysis indicates that the new model uses different deviating values of tolerance evaluation for different individuals and uses different updating values embodying node individuation when updating feedback credibility of individuals, which evaluates the trust value more reasonably and more accurately. in addition, the proposed algorithm can be used in various trust models and has a good scalability

    為了提高分散式中各節點信任評價的準確度,提出了一種基於個體經驗的信任模型.該模型通過引入經驗因子和相對經驗因子的方法,建立了新的信任評價體系.這種新的信任評價體系考慮了個體節點的差異問題,在計算節點的信任值時考慮了節點間的交互歷史,這在一定程度上解決了由於節點的對稱性而導致的信任評價不準確的問題.演算法分析表明:新模型能夠針對不同的個體節點,採用不同的最大容忍評價偏差,並且對個體節點的反饋可信度進行更新時,採用不同的更新值,體現了節點的個性化特徵,使信任評價更加準確合理.此外,所提出的新演算法能夠運用到多種信任模型中,具有很好的可
  4. Finally, some simplification methods to the model were studied and a modified block elimination contraposing the features of the model ' s linear system was developed, which can greatly decrease the model ' s requirement to computer resources. in the second part, numerical methodology of hybrid techniques was developed, which uses dfn models developed in the fist part to build continuum approximations of fractured rock

    第三,本文將一種用離散的水?氣分界面模擬飽和滲流的數值模型到裂隙中,為用本文所構建的離散裂隙模型模擬裂隙巖體成富擁要柳廳錄飽和滲流提供了一個初步的框架。
  5. Non - linear dynamical systems and chaotic phenomena. random processes and diffusion. ising model and lattice gas. quantum systems and electronic structures. percolation, fractal and self - similarity. neural network and genetic algorithm

    線性動力系統與混沌現象、隨機過程和散現象、易幸模型與格子氣體的統計模擬、量子系統與電子結構、透、碎形與自我類似、類神經與基因演演算法。
  6. Snmp has been widely used in network management and has been practical standard, but it is too far away to be capable of desktop equipment management, which is strong point of dmi. consequently, it is important to solve the problem of mutual operation between snmp and dmi for enabling snmp management of dmi equipments, which has important practical meaning in extending the range of objects could be managed by snmp, in solving the problem of mutual operation between heterogeneous networks, in unified snmp management of network products abide by different protocols, and in securing client ' s investment on existed network equipment

    雖然snmp在管理中應用常廣泛,已經成為了事實的標準,但是它在對桌面設備的管理卻是鞭長莫及,而這正是dmi的特長所在,因此解決snmp和dmi之間的互操作,實現對dmi設備的snmp管理十分重要,這對于snmp可管理對象的范圍,解決異質管間的互操作,對不同協議的產品進行統一的snmp管理,保護用戶對現有設備的投資等都有重要的現實意義。
  7. In this solution, what we took into consider is not only the security of emails but also the system ' s stability, extensibility and efficiency, make full use of the " load balance " and " distribute computing ", it makes the system run more smoothly a nd efficient, and it also reduces the running cost for the email service providers and the development cost for us. now the system is running on the internet, it runs smoothly, very stable

    在方案中,我們不僅充分考慮到郵件的安全性問題,而且從系統的穩定性、可性和高效性方面入手,充分利用了負載均衡和的分散式計算的優勢,站在一個很高的高度上,對整個系統進行優化,不僅使系統運行的更穩定、更高效,而且有效的降低了郵件服務運營商的運營成本和軟體的開發成本,這些技術的應用在國際國內也是常先進的。
  8. Firstly, the paper, combining the characteristic of synchronous pulse bursts and inhibition with the modified pcnn model, presents a way of finding the foveation points in the images adaptively and effectively, and simulates the human vision system. secondly, pcnn is extended to pcnns, based on the properties of information couple and transmission, an algorithm that is used to fuse images of the same target got by several sensors to an image is presented to simulate the human vision system. thirdly, combining the properties of synchronous pulse bursts, capture, and transmission and competition of waves, the paper presents two ways of classification, one is an algorithm based on the properties of neuron to capture and inhibit to classify the data taking on any complex unlinear distribution robustly, the other is based on the restricted distance and modified of the former to remove the influence of inferior samples in classification ; fin ally, based on the accumulative difference pictures, and the forming and transmission of pcnn wave, selecting and controlling the direction of autowave by connecting the neighbouring neurons selectively, the paper presents a way to simulate the tracks of moving object and detect the moving direction

    首先結合pcnn的同步脈沖發放和側抑制特性,提出了基於改進型pcnn的圖像凹點檢測演算法,該演算法是一種自適應而有效的圖像凹點檢測方法,並且較好地模擬了人類視覺系統;然後,結合信息傳遞和信息耦合特性,將pcnn成pcnns ( pcnn群) ,提出了一種基於pcnns的圖像融合演算法,能夠將多個傳感器獲取的同一目標的圖像信息融合到一幅圖像中,有效模擬了人類視覺系統;另外,結合pcnn的同步脈沖發放特性、捕獲特性和波的傳播競爭特性,開拓地將pcnn用於模式分類中,提出了基於耦合神經元點火捕獲抑制特性的分類方法和改進的約束距離下的pcnn分類方法,前者可實現對樣本空間中任意復雜分佈訓練樣本的穩健線性分類,而後者能夠消除訓練樣本中刺點對分類的影響;最後,結合累積差分圖像思想、 pcnn波的形成與傳播特性,通過各神經元之間連接取向來選擇與控制自動波的流向,將pcnn用於運動視覺分析中的運動軌跡模擬及運動方向檢測。
  9. Office solutions that use managed code extensions add a custom security restriction of not accepting all code or zone - based evidence types, which means that microsoft office word 2003, microsoft office excel 2003, and microsoft office outlook 2003 will not run any assemblies that are on the local machine, the network, or the internet until the assembly is given permission granted trust in your security policy

    使用託管代碼的office解決方案中新增了一個自定義安全限制,它不接受基於「所有代碼」或「區域」的證據類型,這意味著除相應的程序集在您的安全策略中被授予了權限(授予信任) ,否則microsoft office word 2003 、 microsoft office excel 2003和microsoft office outlook 2003將不運行本地計算機、或internet上的任何程序集。
  10. It can not only cope with external attacks but also detect the misuse of the legitimate users

    它不僅幫助系統對付外來攻擊,還可以查知內部合法用戶的法操作,了系統管理員的安全管理能力。
  11. This paper starts with the current situation of china ' s financial computerization to grasp its developing trend, then analyzes the subsequent broad impacts on traditional financial risks and challenges to financial supervision, and at last puts forward a framework to effectively supervise financial computerizing risk and accelerate the financial development. this paper points out that, payment system modernizing, data centralizing, electronic banking applying, financial networking, and money electronicing are bound to boost financial innovation and cause fundamental changes to financial services, therefore affect strategic risk, operational risk, reputational risk, legal risk, and innovation risk greatly, which will bring about challenges to the principles, modes, measures, and contents of financial supervision

    本文研究認為,我國金融電子化將呈現電子支付體系現代化、數據高度集中化、電子銀行應用廣泛化、金融業務化和貨幣電子化五大趨勢,極大推動金融創新的發,金融業務模式發生根本變革,戰略風險、操作風險、信譽風險、法律風險等出現新的重大變化,金融風險的來源、范圍、結構、復雜性和影響程度極度大,傳統的監管原則已不再適應金融業發的需要,監管方式必須向現場監管和現場檢查的有機結合轉變,原有的監管手段失效,金融監管的內容也有了更廣泛的內涵。
  12. The world economy strids forward to be knowledge, to be information and to be service step by step under the promotion of sci - tech revolution since 1970 ", and structural contradiction is prominent in china ' s economic development ; the implementation of non - equilibrium development strategy of regional economy has promoted the east coastal areas made a leap economic development, while the economic development of west areas is relatively slow, and the gap between east and west is expanding continuosly

    20世紀70年代以來,在新科技革命的推動下,世界經濟逐步向信息化、化和服務化邁進,我國經濟發的結構性矛盾突出,在世界產業分工體系中處于不利地位,產業結構面臨優化升級的嚴峻考驗;區域經濟均衡發戰略的實施,推動東部沿海地區經濟跳躍式發,而中西部地區經濟發相對緩慢,東西部差距不斷大。
  13. A network based approach, called extended petri - nets that represents the design of the supply chain as an abstracted network with " and " and " or " nodes, is presented. based on their substantial disadvantages of linear programming, integer programming, nonlinear programming and genetic algorithm in dealing with a typical supply chain, a constraint based genetic algorithm as part of the extended petri - nets approach is introduced to search for improvements in the design that satisfies the constraints imposed on the system. a prototype testing system is constructed, which is followed by an example together with a description of the small automobile supply chain system implementation

    兩北丁業人學博十學位論義通過對鏈式供需鏈的結構分析,把鏈式供需鏈的設計優化轉化為多階段決策問題,在此基礎上建立了設計優化模型,並提出前向與後向兩種動態規劃求解演算法;鑒于線性規劃、整數規劃、線牲規劃以及遺傳演算法在解決狀供需鏈設計優化問題時皆存在著不足,本文對petri進行了改進,提出了petri的概念,用於把狀供需鏈抽象為一個具有「與」和「或」變遷節點的,並在前人工作的基礎上,把基於約束的遺傳演算法cbga與petri結合起來,用
  14. After studying ms - pptp protocol, we think that the security of a vpn is based on the security of its authentication and encryption protocols. if a vpn ' s cryptography is weak, then its security is no better than a non - private virtual network routed over the internet. since companies are relying upon vpns to extend trusted internal permiters to remote offices, breaking the security around such a tunnel is tantamount to defeating all of the security around the internal permiter

    本文對ms - pptp協議實現進行了深入的分析、研究,認為:認證和加密協議的安全決定了vpn的安全性,如果vpn認證和加密手段是脆弱的,那它的安全性並不比在internet上使用vpn傳輸數據高,因為一個組織依靠vpn其可信的內部邊界,允許外部分支訪問內部,破壞隧道的安全性等於破壞了所有內部
  15. The vigorous situation appears in our country in " third party logistics ", i will introduce the reason such as economy, politics, academy, technology, market why third party ' s logistics enterprises rise in our country briefly, several kinds of present main operation modes : it is not assets type " the logistics mode, basic logistics service mode, combine the mode, comprehensive logistics agency ' s mode, centralized logistics mode organically, and development strategy : according to the expansion type strategy, keeping type strategy, tightening type strategy that the developing direction divide ; manage according to business concentration that relevance divide into development strategy, diversification deal in the development strategy ; according to the comprehensive logistics strategy that range and function of the logistics enterprises service divide, systematized logistics strategy, strategic, differential and low cost logistics strategy of flexibility logistics ; make management strategy according to cooperative type longitudinal cooperative management strategy, horizontal cooperative management strategy, network compound that divide into of enterprise

    摘要「第三方物流」在我國呈現蓬勃發的態勢,文中我將簡要介紹了一下第三方物流企業在我國興起的諸如經濟、政治、學術、技術、市場方面的原因,目前的幾種主要運作模式:資產型物流模式、基礎物流服務模式、有機整合模式、綜合物流代理模式、集中物流模式,以及發戰略:按發方向分為張型戰略、維持型戰略、緊縮型戰略;按業務相關性分為集中經營發戰略、多樣化經營發戰略;按物流企業服務的范圍和機能整合性分為綜合物流戰略、系統化物流戰略、柔性化物流戰略、差別化和低成本化物流戰略;按企業間的合作類型分為縱向合作經營戰略、橫向合作經營戰略、化合作經營戰略。
  16. Differentiated servic ( diffserv ) is scalable for deployment in today ' s internet, and multiprotocol lable switching ( mpls ) provides fast packet switching and the opportunity for traffic engineering. thus, the combination of diffserv and mpls presents a very attractive strategy to backbone network providers. in fact, mpls is good at implementing qos, such diffserv, rsp and te

    實踐表明, diffserv是一種可性很強的組方法,而mpls可以快速進行分組交換並能很好的支持流量工程。如果將兩種技術有機的結合起來,從而為整個提供qos保證,對骨幹提供商來說將是一個常具有吸引力的組策略。
  17. In the paper the author analyzes stock price from linear model to non - linear model and builds three models : time series model, neural network model and gray neural network model. they improve precision one by one. case citing in the paper also proves the model ' s validity

    文中定量分析從線性分析到線性分析,通過建立時間序列模型、神經模型以及灰色神經模型,不斷提高預測精度,並最終實現了從對大盤指數預測到個股預測的有效運用,證明了股價預測模型的可行性及性。
  18. Peer - to - peer network that based on distributed hashing table is proposed, which not only could locate the resources well, but also solves the extensible problem of the structureless p2p network

    基於分散式哈希表( dht )的p2p的提出,不僅能較好地定位資源而且很好地解決了結構化p2p的可性問題。
  19. Following the fast development of communication industry, different factory develop the different tmn platform. it results in wasting development resource and greatly reducing productivity, and what ’ s more, it goes against extension in the long run. in order to overcome the above disadvantages, it become necessary to design and implement a kind of universal network performance management system based on tmn

    隨著通訊行業的迅猛發,不同廠商開發的基於tmn的電信管理平臺各不相同,這樣不僅降低了開發的效率而且浪費了大量的資源,最重要的是不利於相互之間信息傳遞以及,針對這種情況,設計並開發一種通用的性能管理系統變的常必要。
  20. Within a p2p network, a node is a client and a server at the same time. the service is provided by different nodes, not by one. this improves the use ratio of resources, bandwidth of network, etc. nodes within this network can communicate with each other directly and share resources

    P2p中的節點通常既是客戶機,又是服務器,服務提供是分散的而集中的,這樣大大提高了中信息,帶寬和其它資源的利用率;同時用戶之間可以直接通信、共享資源和協同工作,其可性和容錯性能較好。
分享友人