接取網路 的英文怎麼說

中文拼音 [jiēwǎng]
接取網路 英文
access network
  • : Ⅰ動詞1 (靠近;接觸) come into contact with; come close to 2 (連接; 使連接) connect; join; put ...
  • : Ⅰ動詞1 (拿到身邊) take; get; fetch 2 (得到; 招致) aim at; seek 3 (採取; 選取) adopt; assume...
  • : Ⅰ名詞1 (捕魚捉鳥的器具) net 2 (像網的東西) thing which looks like a net 3 (像網一樣的組織或...
  • : 1 (道路) road; way; path 2 (路程) journey; distance 3 (途徑; 門路) way; means 4 (條理) se...
  • 接取 : bwa
  • 網路 : 1. [電學] network; electric network2. (網) meshwork; system; graph (指一維復形); mesh
  1. The ids of the paper is network - based anomaly detection system. with the help of data mining technology, we bring forward a measure to describe the normal state of the network traffic and user behavior and extracting the useful rule from large network data. so we can establish the knowledge warehouse which describe the normal state of the network traffic and user behavior. the knowledge warehouse can be the standard in order to judge the normal state. we can find the dubitable connections according to account the state and anomly instances of connections

    論文在描述應用和用戶行為時採用數據挖掘技術從海量的數據中提有用的規則,構建了一個描述正常狀態下的應用和用戶行為的規則集,這個規則集是用來判斷應用和用戶行為是否正常的標準,論文根據這個標準分析當前的異常情況,將可疑的連找出來。
  2. In addition, many other problems also exist in hardware neural network, including error problem, learning mode, parallel architecture, and also neural network inner linking problem, hidden layer and the realization of the multiplicator and etc. for instance, error problem : hardware neural network employs the limited precision, and will inevitably bring limited precision error

    另外,硬體實現神經還存在誤差問題,學習方式,并行結構等方面的問題,還有神經內部的連問題,隱層及乘法器的實現等等。如誤差問題,硬體實現神經使用的是有限精度,不可避免的會產生有限精度誤差,選合適的精度,才能既適合空間的要求,又避免對的實現產生一定的影響。
  3. The expert system gets most part of knowledge and ratiocinates by using ann, changes the result of the output of net into the form which the expert system can understand, gets the final result from the universal reasoning engine

    本文採用神經進行大部分的知識獲及推理功能,將輸出結果轉換成專家系統推理機能受的形式,由專家系統的推理機得到問題的最後結果。
  4. The chip simulation network laboratory system this paper disguessed is a distribute network simulation system based on lan. the system ' s architecture is a c / s of three lays. the front platform are the chip simulation network system application program terminer ; the middle lay is a dcom server, it ' s duty is to deal with the communication and data transmission between the terminer and then database server, and to execute the logical operation. the application program just connect with the middle lay and get data from it, the connection and operation with database server will be managed by the dcom server. the duty of database server is to access and backup the final data

    具體是由位於各個終端的晶元模擬實驗系統應用程序為前臺;中間層為dcom應用程序服務器,負責處理前臺應用程序與后臺數據庫的通信和數據傳輸,並執行業務邏輯,前臺應用程序只需要與應用程序服務器建立連,在中間層操作數據即可,與后臺數據庫的連和操作由應用程序服務器來統一管理操作。后臺數據庫只負責數據的存操作。本論文實施的晶元模擬實驗系統模擬了主要的邏輯電器件, 8088cpu ,存儲器,寄存器,數據總線,地址總線和控制總線,及其它相關晶元。
  5. Iap internet access provider

    提供者
  6. The rapid development of electronic commerce obliges us to join other countries in regulating electronic commerce contract activities and ensuring the security of electronic business. only by doing so can we reduce the blockage of the out - of - tune legal regulations towards electronic commerce. accelerate the combination between traditional laws and network age, and establish legal regulations about electronic commerce which accord with the traditional ones

    電子商務在我國迅猛的發展勢頭讓我們不得不盡快加入到規范電子商務合同行為,確保電子交易安全的隊伍中來,以減少不合拍的法律規范對電子商務的影響和阻礙,加快傳統法律與時代的對,實現建立與傳統民商事法律規范價值向一致的電子商務法律規范。
  7. Because of the unique issues in the networks, including mobility - induced disconnection, network partition, high out - of - order delivery ratios and channel errors, the congestion control and the error recovery in the network is challenging. in this environment, the interaction between tcp and mac layer protocols, the affection of route protocols on the performance of tcp and the particular congestion control and error recovery mechanism are first discussed. then a particular transport layer protocol scheme based on the non - feedback mechanism is presented, with emphasis on the analysis and simulation of the key parameter

    文中主要討論了兩種不同結構中的無線tcp協議改進方案,其一在最後一跳為無線鏈環境中,針對基本tcp擁塞控制機制存在的缺陷,文中在現有解決方案的基礎上提出一綜合性的方案,其中包括無線鏈的高誤碼率和連斷開問題的解決,並重點對方案中出現的交叉層問題進行分析和模擬;其二,考慮的是分散式( adhoc ) ,在文中較為詳細的分析了tcp和mac層機制間的相互作用、由協議中造成tcp性能降低的因素、 adhoc中應採的特殊擁塞控制和差錯恢復機制,在此基礎上提出了一種採用非反饋機制的解決方案,重點對方案中的關鍵參數進行分析和模擬,分析和模擬結果表明此機制可在很大程度上提高adhoc中tcp的性能。
  8. We have studied how to distill a connection matrix between two nodes in a generalized switched network ; using tarjan ’ s graph partition algorithm and nonseparable two - terminal graph concept, we proposed an effective algorithm

    對從廣義開關中提出兩點間連矩陣的方法進行了研究,利用tarjan的拓撲圖塊劃分演算法、開關中的不可分二端圖概念等設計了較有效的演算法。
  9. Therefore, the power department and users are concerned aboui harmonic and reactive compensation. the power department usually manage compute and measure the electric net " s harmonic condition and connected or new - connected harmonic load. and need to measure the harmonic vol tage current in some electric net " point. then, by manual making an in - depth analysis and statistics on measured - data, it can reduce harmonic harm on public not to take some effective measures

    電力部門通常在實際中,需要對電的諧波狀況、已入和新入系統的諧波源負荷進行管理、計算及測量,需要對電力各點的諧波電壓、電流實際水平進行測試,然後對測試數據進行人工分析統計,並以此採相應措施降低或減少諧波對電的危害。
  10. It includes chip selection, schematic circuit design, cpu selection and configuration, startup of the system, selection and configuration of embedded operation system, selection and configuration of tcp / ip software. it also describes some driver programming techniques of network controller. part 3 ( chapter 5 and 6 ) briefly introduces encryption technology and the ipsec protocol system, including architecture, mode, security association, security policy, implementation mode, processing of in / out packet, esp ( encapsulation security payload ), ah ( authentication header ), ike ( internet key exchange ) etc. the security requirements of embedded - networking is also analyzed

    本文首先探討了嵌入式的原理和設計要求,著介紹了本文所開發的嵌入式系統的硬體平臺的設計(包括處理器的選擇與配置、存儲器的選擇和io設備的選用等) ,系統的啟動(包括bios和dos的啟動以及嵌入式操作系統vrtx的配置和引導) ,及其安全服務的實現(包括嵌入式協議棧usnet的選、底層驅動程序的設計和安全協議ipsec的分析與實施) 。
  11. Being a widely utilized public ip platform, it is susceptible to security attacks of all nature, as outlined in the following areas : the open nature of the ip internet systems - increase of foreign attacks, for example dos / ddos attacks ; the current weakness of the existing operating system ' s internet protocol ; mainframe, and lack of an evaluation standard for back office systems, the inevitable problem of illegal internal access, the lack of guidelines for record keeping and post attack documentation processes, hi addition, still in existence, are managerial problems including the lack of securit y knowledge amongst the workforce and the inexistence of a complete set of security guidelines. to guarantee china telecom ' s 163 / 169 system ' s reliable functions, to protect the user ' s interests, at the same time, insuring quality service, it is necessary to adapt p2dr model as a solution to the current security issues. supported by the modern secure theory and made the secure implementation abundant project practices, this paper gives the general secure design for the chongqing public ip network using p2dr secure model

    中國電信建設的公眾ip對我國internet的發展起著決定性作用,重慶電信163 / 169是國家骨幹在本地的延伸,擁有7個核心節點(採用cisco12012 、 2 * 2 . 5gdpt環) ,三十八個匯節點,能提供寬帶,窄帶多種入方式的公眾ip,現擁有近20萬用戶,佔全市用戶四分之三以上,作為這樣一個擁有眾多用戶,開放的ip平臺,會受到各種各樣的安全威脅,主要表現在ip的開放性,來自外部的攻擊增多,如dos / ddos攻擊;所使用的操作系統運行的協議自身的脆弱性;主機、設備的配置是否缺乏評估手段;不可避免的內部非法訪問;缺乏必要的攻擊審計作為犯罪證,出此之外,還有管理上的一些問題,如人員安全意識不強,安全制度不夠健全等多方面原因。
  12. Test technique of acoustic excitation presented in this paper can discriminate if the adhesive structure is intensional enough to endure certainty draw strength, through a series of process, for example bringing draw strength to bear on adhesive structure. testing signal through microphone array, choosing signal ' s character, recognizing automatically through manual nerve network, and so on

    本文介紹的粘構件聲激勵檢測方法,通過對粘結結構施加微力、陣列傳聲器檢測信號、信號的特徵提、人工神經的分類識別等一系列過程,完成了粘結構承受拉脫力合格與否的無損預報。
  13. Learning through web has been an important way to get knowledge, and wbe ( web based education ) would be a main way of receiving education in the future with the development of network technology and the demand of learning socialization and life long learning

    通過進行學習已經成為人們獲知識的一種重要途徑。隨著技術的發展和學習社會化、終身化的要求,教育必將成為人們受教育的主要渠道。
  14. The method of automatic fuzzy rules extraction based on fuzzy bp net researches hidden key attributes through deleting redundant linking weight

    建立基於模糊bp的自動模糊規則提方法,它通過刪除冗餘連權的方法尋找到的隱含關鍵特徵。
  15. Enrollment on computer network is that the students " file are inputed into computer, and all works of enrollment are on comptuer and computer networks

    高校通過計算機收電子檔案,在計算機上進行預錄和預退檔,並將結果通過上載給省招辦。
  16. Parameter to get the new state of the network connection

    屬性來獲的新狀態。
  17. Since pc can be easily connected to the network and get all kinds of internal information, there exists information security hidden troubles in the system. aas can establish a hierarchical communication safeguard to enforce the strict authentication on those who want to connect into the network. this action insures that only those expected users will be connected into the network and avoid the illegal entry

    針對個人計算機可以很方便的而獲各種內部資源的信息安全隱患, aas入認證服務器可以構築一種分層次通信保護結構,對試圖的用戶進行嚴格的認證,保證只有系統期望的用戶才能,避免非法用戶的侵入。
  18. How to build the next generation access network from component, system, and service providers

    由組件提供者、系統提供者以及營運商來看,他們又是要怎樣去實現未來的接取網路架構?
  19. As high - bandwidth services such as interactive tv, video applications, on - line game, etc., being the future applications at office and home, evolution of access network becomes an absolutely imperative task

    摘要隨著高頻寬服務(例如交互電視、視訊、線上游戲等)的應用發展,為提供企業客戶與一般家庭客戶連結的接取網路面對著不得不變的重要挑戰。
  20. Gets the current operational state of the network connection

    的當前操作狀態。
分享友人