end of transmission 中文意思是什麼

end of transmission 解釋
傳輸結束
  • end : n 1 端,尖,末端,終點。2 邊緣;極點,極限。3 結局,結果。4 目的。5 最後,死。6 【紡織;印染】經...
  • of : OF =Old French 古法語。
  • transmission : n 遞送;傳遞;傳達;傳染;移轉;【機械工程】傳動;傳遞;變速器;聯動機件;【無線電】傳送;發射;...
  1. Anyhow, the tableware that has used to phthisical patient and articles for daily use should take corresponding alexipharmic step, insist to disinfect, disinfect strictly, put an end to the transmission that infects a source, only such ability prevent the generation of new n / med tuberculosis patient

    總之,對肺結核病人使用過的食具和生活用品要採取相應的消毒措施,堅持消毒,嚴格消毒,杜絕傳染源的傳播,只有這樣才能防止新的結核病人的產生。
  2. In japan, the first description of rice dwarf transmission dates back to the end of the nineteenth century.

    在日本,第一次描述水稻矮縮病傳播的日子要追逆到19世紀。
  3. On the internet, multimedia services such as streaming media, video / audio conference, voice over ip and video on demand, become more and more important, end - to - end data transmission or unicast ca n ' t be competent for the task which have the characteristic of one - to - many transmission. if we use unicast, the server has to offer the packet with same context for each connection, which will consume too much bandwidth. then the broadcast is alternative selection for us to deliver data in the lan, as we known, when broadcast technology used, all the pcs in the lan will receive the broadcast packets regardless that you would like to or not

    點對點傳輸的單播方式不能適應此業務的傳輸特性(單點發送多點接收) ,這使得服務器必須為每一個接收者提供一個相同內容的ip報文拷貝,並在網路上重復地傳輸相同內容的報文,這必然佔用大量網路資源。雖然ip廣播允許一個主機把一個1p報文發送給同一個網路的所有主機,但是由於不一定是所有的主機都需要這些報文,這又可能浪費大量網路資源。
  4. For the severe limitation that the selectivity of transient current protection will lose when the fault with small resistance or without resistance takes place at the end of transmission line, the basic reason for the selectivity loss of transient current protection was investigated

    摘要針對保護出口處發生金屬性或小電阻短路故障時,暫態電流保護完全失去選擇性的嚴重缺陷,利用時域分析方法,進行了詳細的故障暫態分析和模擬研究。
  5. As the intermittent asynchronous transmission of the internet is based on packets, a realtime av source or an av file stored is broken down into many packets in the course of transmission. and as the network is dynamic, each packet may be routed differently, resulting in different delay at the user end. the packets transmitted first may arrive later

    因為internet以包傳輸為基礎進行斷續的異步傳輸,對一個實時av源或存儲的av文件,在傳輸中它們要被分解為許多包,由於網路是動態變化的,各個包選擇的路由可能不盡相同,故到達客戶端的時間延遲也就不等,甚至先發的數據包還有可能後到。
  6. End - of - transmission - block character etb character

    傳輸塊末字元
  7. The end face harmonic gear drive of oscillating teeth contains the advantages of the common harmonic gear drive and the oscillating teeth drive, and it belongs to the three dimensional space oscillating teeth gear drive. the new kind of transmission theory introduced in this article has been applied for patent ( the application number is 200410012992. 6 ) some fundamental theory of the end face harmonic gear drive of oscillating teeth is investigated in this paper, which can benefit the design of the product and the popularization of the patent

    這種新型的傳動裝置屬于空間的活齒傳動機構,可以從根本上克服傳統的徑向諧波齒輪傳動中柔輪的變形與其承載能力之間的矛盾,並可增加同時嚙合的齒數,加大齒輪的模數,從而可以在保留徑向諧波齒輪傳動所有優點的基礎上,使其所傳遞的功率增加數十倍。
  8. On account of the ccd camera mounted on the spatial robot end possesses rather big random measured error, for this reason, a new model of error that includes random measurement error was rebuilt, and it takes the non - geometric parametric error - backlash of transmission links into consideration

    由於空間機器人末端安裝的ccd相機具有較大的隨機測量誤差,因此,重新建立了包含隨機測量噪聲在內的新的誤差模型,它考慮了機器人非幾何參數誤差傳動環節的回差。
  9. End of transmission character

    傳輸結束字元
  10. It reframes the traceback problem as a polynomial reconstruction problem, and uses techniques from algebraic coding theory to provide robust methods of transmission and restriction. the scheme is a new solution to the traceback problem during a dos attack ; the honeypot for ddos, which is a tool of traceback, lures the attacker to believe that he successfully compromised a slave for his needs, convincingly simulating the architecture of a potential ddos attack ; the source - based approach to ddos defense, which is a useful adjunt to traceback systems, deploys a ddos defense system at source - end networks. attacks are detected by monitoring two - way traffic flows, and the attacks originating from source networks are stopped by rate - limiting ; the routing mechanism based on pushback treats ddos attacks as a congestion - control problem

    最後,就有關ddos攻擊反向追蹤問題,從四個方面對其解決方案進行了研究:在分析比較幾種反向追蹤演算法的基礎上,著重研究了代數方法編碼反向追蹤信息的方案,該方案把追蹤重構問題當作多項式重構問題,使用代數編碼理論技術提供魯棒的傳送和重構方法,是dos攻擊過程中的反向追蹤問題的一種新的解決方法; ddos陷阱作為反向追蹤的工具,引誘攻擊者相信自己成功與所需的傀儡主機通話,令人信服地模擬出潛在ddos攻擊體系結構;基於源的ddos防禦方法作為反向追蹤有用的補充,將防禦系統部署在源網路,通過監控雙向流量檢測攻擊和限制速率終止來自源的攻擊;基於向後倒推的防禦ddos的路由機制把ddos攻擊看作擁塞控制問題,添加功能到每個路由器來檢測並優先丟棄可能屬于攻擊的包,通過向後倒推上級路由器也得到通知而把這樣的包丟棄。
  11. Contact tracing and monitoring has been carried out to ensure no further transmission of disease, and the extended contacts are coming to the end of their period of observation

    據此,該試驗室人員對該礦工接觸過的人進行了追蹤與監控,以保證疾病不會出現進一步的擴散,對這些接觸過礦工的人的觀察監控期也即將結束。
  12. Study on end bending moment of transmission line vibration induced by wind

    基於輸電線彎曲風激振動的端部彎矩分析
  13. The experience of development in decades has proved that the most effective interest rate risk management tool is the interest rate futures. the best carrying body of interest rate futures is bond futures. from the end of bond futures pilot the macroeconomic and financial market environment has been tremendous changes after the development for 10 years, basically has the reopening of the bond futures trading conditions. the introduction of treasury bonds futures is the general trend. interest rate futures have unique function, and its introduction is bound to affect our monetary policy transmission mechanism

    為了利率期貨市場的正常高效運行,更好地發揮疏通我國貨幣政策傳導機制的作用,應該在吸取以往教訓的基礎上,借鑒國際成熟的交易機制和監管體系,通過利率期貨交易形成金融市場的均衡價格和定價機制,促進貨幣市場與債券市場的聯通,穩步推進利率市場化,完善我國的期貨法律法規體系,大力發展機構投資者,加強風險管理,建立一個適合我國國情的利率期貨制度模式。
  14. End - of - transmission character eot character

    傳畢字元
  15. Founded in the end of 1996, sanban studio has been an entity set up for the transmission of engraving art works, academic communication, technical development, copy and sales of artwork

    三版工坊成立於一九九六年底,原是一個為著眼于版畫藝術品的傳播、學術交流、技術開發、製作、銷售等環節而開辦的實體。
  16. It is also of utmost importance that users ensure their counter party on the other end of the transmission treats security equally seriously and has put in place appropriate procedures to safeguard clients communications

    最重要的是,使用者應確保對應的接收者同樣重視訊息的防護,嚴謹地實行一些保護通訊的措施。
  17. With the increase of the electric power system capacity as well as the short lines, high currents will possibly occur in the transmission line when a fault happens at the end of the line. the iron core of the current transformer ( ct ) will become saturated easily because of the large current, or when the secondary load of the ct does n ' t match the 10 % error curve

    隨著電力系統容量增大以及短線的增加,在電力系統線路末端發生短路時,有可能出現很大的短路電流;在很大短路電流的作用下,或由於電流互感器二次側負載與10誤差曲線不匹配等原因,電流互感器鐵芯很容易飽和。
  18. After analyzing a common used ant colony routing algorithm, this thesis proposed a new fast adaptive routing algorithm to overcome the drawbacks of the ant - based algorithm. the new algorithm uses network delay information directly to choose path by probability. its application will minimize the delay for an end - to - end data transmission and optimize the distribution of network resources to avoid network congestion

    演算法能夠憑借路徑時延信息並結合網路中各路徑的利用率情況自適應的調整發送路徑,並以概率的形式選擇路徑,一方面盡可能地使端到端數據傳送過程時延最小化,另一方面使網路流量分佈均勻,以減少網路擁塞發生的概率。
  19. Demultiplexer is one of the key electronic components in optic - fiber transmission systems. it normally lies at the end of optic - fiber recerver, which recovery original low - speed signals from a high - speed signal. in this thesis, we discuss the circuit design techniques, the technology of the ic realization and principal of multiplexer and demultiplexer in transmission systems

    分接器是光纖通信網中的關鍵器件。它位於光纖接收機的末端,將接收到的一路高速信號重新恢復成多路的低速信號。本文簡要介紹了分接器的實現工藝和設計流程,以及復接和分接的原理。
  20. End - to - end encryption methodology is adopted to ensure data security and secrecy in the course of transmission to ird.

    有關系統採用點對點加密技術,以確保資料在傳送到稅務局途中的安全和保密。
分享友人