獨立網路系統 的英文怎麼說

中文拼音 [wǎngtǒng]
獨立網路系統 英文
network stand-alone system
  • : Ⅰ形容詞(一個) single; only; sole Ⅱ副詞1 (獨自) alone; by oneself; in solitude 2 (唯獨) only...
  • : 動1 (站) stand; remain in an erect position 2 (使豎立; 使物件的上端向上) erect; stand; set up...
  • : Ⅰ名詞1 (捕魚捉鳥的器具) net 2 (像網的東西) thing which looks like a net 3 (像網一樣的組織或...
  • : 1 (道路) road; way; path 2 (路程) journey; distance 3 (途徑; 門路) way; means 4 (條理) se...
  • : 系動詞(打結; 扣) tie; fasten; do up; button up
  • : Ⅰ名詞1 (事物間連續的關系) interconnected system 2 (衣服等的筒狀部分) any tube shaped part of ...
  • 獨立 : 1. (單獨站立) stand alone 2. (自主自立; 不受人支配) independence 3. (不依靠他人) independent; on one's own
  • 網路 : 1. [電學] network; electric network2. (網) meshwork; system; graph (指一維復形); mesh
  • 系統 : 1. (按一定關系組成的同類事物) system 2. (有條理的;有系統的) systematic
  1. To prevent and suppress terrorist network, it is essential to treat symptoms and to understand and to terrorist networks ; improve legislation and responsibilities ; protection targets ; strengthening international cooperation ; with advanced technology and unique autonomous intellectual property rights ; establish a monitoring system and rapid reaction force ; train a large number of outstanding reserve talent

    預防和制止恐怖主義,必須標本兼治:要認識和重視恐怖主義;完善法和責任落實;保護重點目標;加強國際合作;擁有先進特的技術和自主的知識產權;建監測和快速反應隊伍;培養大量的優秀后備人才。
  2. The new district has independent public utility systems of water supply, drainage, heating supply, gas, wideband network ( wbn ), cable tv, independent sewage and garbage disposal facilities

    新區內有的供水、排水、供熱、供電、燃氣、寬帶、有線電視等公用設施設置污水處理及垃圾處理設施。
  3. ( ) i1 t [ lo basi s of " that, we make systemic rosoarcl1 ( ) n l f1o s ( ) cllr i ty ilrct1 i t. cc 1. ljre, dcs i gn out the securi ty so. l ut io11 ; 1l1t ] s l. ci ) i n i, rilc t. i cc ( ) f. s1 ) t } ( t i ; l l network according to the security archi tec turc fr ; tn1e, wi1 icl1 silt i si ! y the need of confidentia1 ity, integri ty, avai 1 abi l i ty, authentj cat ion, authorization and accountable of specia1 network information system

    特別是,論文作者在安全建設的過程中,承擔了中心子防火墻、入侵檢測、病毒防護體的安裝及管理工作,在詳細了解了ddn鏈加密、 pki ca體的建設和使用原理的基礎上,參與了基礎設施的安裝調試以及各類服務器的配置管理,擬定了《計算機信息安全管理規定》 、 《ip地址規范》 ,為本單位安全建設規劃提出了意見和建議。
  4. To add " there are many loopholes in the operation and sales practices of telecommunications service providers, " after " that, as " ; to add " and such complaints from the public are often not followed up effectively by government departments, " after " in recent years, " ; to add " stipulate corresponding penalties " after " to cover pay television, " ; and to add " ; furthermore, as the hong kong housing authority has signed agreements with pay television operators, these operators can enter the buildings to set up and maintain communal aerial systems and can deploy front - line promoters to approach the residents to sell other various commercial services, using the provision of exclusive maintenance and supply services as a selling point and adopting unscrupulous means to entice or mislead the residents into signing an agreement with them, causing great disturbance to the residents ; in this connection, the government must adopt measures to combat such sales malpractices, take the initiative to inform public rental housing tenants of the rights and responsibilities of the operators and, when the operators resort to malpractices or malpractices are reported by residents, take immediate action to investigate the matter and issue warning to and penalize the operators concerned ; the government must also review the problem of inequity in accessing system information by consumers and the telecommunications service providers, whereby consumers have no means or right to obtain true and accurate information about the systems that they are using and can only pay the fees according to the volume, system and time slots of their calls shown on the records provided unilaterally by the service providers, and in case of queries about such information, the decision of the service providers prevails and there is no channel for the consumers to dispute or verify ; to this end, the government should expeditiously study how to ensure that consumers have the rights to know, choose, verify, appeal and claim for compensation in the provision of telecommunications services including pay television, local and cross - boundary telecommunications and internet services " after " in the contracts "

    在"鑒于"之後加上"各電訊服務提供者的營運和銷售存在不少漏洞, "在"不斷增加, "之後加上"而市民的投訴又往往得不到政府部門的有效跟進處理, "在"收費電視, "之後加上"訂定相應的罰則, "及在"標準合約條款"之後加上"此外,由於香港房屋委員會與收費電視營辦商簽訂協議,該等營辦商可進入大廈鋪設及維修公共天線,並調派前線銷售人員,以家提供維修及供應服務作為招徠,向住戶推銷其他各種商業服務,以不當手法誘使或誤導住戶與他們簽約,對居民造成很大困擾就此,政府必須採取措施打擊上述違規營銷的手法,並主動告知公屋住戶該等營辦商的權責范圍,遇有營辦商作出違規的行為或居民舉報營辦商的違規行為時,須即追查,並向有關營辦商發出警告及作出處分政府亦須檢討現時消費者與電訊服務供應商所獲資訊並不對等的問題,即消費者無從及無權得知他們所選用的真實資料,令他們只能按服務供應商單方面提供有關通話量通話及通話時段的記錄繳交費用,遇有消費者質疑上述資料時,往往只由服務供應商作最終決定,消費者無從申辯或查證就此,本會促請政府盡快研究如何就各類電訊服務包括收費電視本地及跨境電訊等的提供,確保消費者享有知情權選擇權覆核權投訴權及索償權" 。
  5. 1, q 3, and at last prove the exisitence of ( q, m + n, n, m ) resilient functions when n > q ? 1. intelligentized ids methods, which can make the system more adaptability and self - studying, are important research directions of ids so far. in order to make the ids systems have better identifying ability and efficiency against new intrusions, we propose the intrusion feature extra - ction algorithm based on ikpca by studying the different kinds of intrusion detection feature extraction algorithm based on unsupervised learning, and then theoretically analysis the conver - gence of the algorithm. in addition, we validate the validity of the algorithm by means of experim - ents ; at the same time, through studying ica and neural networks, we propose fastica - nn ids, and then test the kddcup99 10 % date set to make comparison of kpca 、 ikpca and fastica algorithms in intrusion detection advantages and disadvantages

    為了使入侵檢測對新的入侵行為有更好的識別能力和識別效率,本文在研究了各種基於無監督學習的入侵檢測特徵提取方法的基礎上,提出了基於增量核主成份分析( ikpca )的入侵檢測特徵提取方法,並對該方法進行了收斂性分析,同時結合模擬試驗對其正確性進行了驗證;另外,本文通過研究成份分析和神經,提出了基於快速成份分析和神經的入侵檢測方法( fastica - nnids ) ,並通過對kddcup99的10 %數據集的檢測比較了核主成份分析( kpca ) 、增量核主成份分析( ikpca )和快速成份分析( fastica )在入侵檢測特徵提取方面的優缺點。
  6. Device management assembles every individual hardware module into an uniform one, which ensures the other software modules running effectively ; forwarding is a process in which the data package is switched by mac, routed through ip address and forwarded by mpls label ; the control of forwarding is the core of this system, which effectively manages the forwarding path of the data package by every kinds of network protocol

    設備管理把各個的模塊有機的組合成一的整體,是其它模塊的有效運行的保證;轉發主要是數據包在交換機中進行二層交換、 ip由和mpls標簽交換的過程;轉發控制是的核心,通過各種協議有效的管理數據包的轉發徑。
  7. At present, the overall tendency of software development is constructing object - oriented, network based, distributed and heterogonous application system using distributed component technologies, and dividing the software system into independent components with different functions, which can be platform and programming language independent, and can communicate with each other for collaboration, handwriting - based identification recognition is an important research field of biometric identification, and also an active topic in computer vision and pattern recognition

    目前,軟體開發的整體趨勢是採用分散式組件技術建面向對象的、基於的、分佈的和異構的大規模應用,把整個軟體劃分為一個個相互的組件,每個組件完成特定的功能,可以跨越多種操作平臺,於程序設計語言,並且相互通信,協同完成工作。筆跡鑒別是人體生物特徵識別中的一個重要研究領域,也是計算機視覺和模式識別領域研究的熱點問題。
  8. The information is distributed in different places. each independent online education system will produce a lot of useful learning information

    這些學習信息分散在不同的地方,每一個教育在應用中都會生成許多學習信息。
  9. Active directory application mode adam is a new mode of the active directory directory service that is designed to meet the needs of line - of - business applications that require a dedicated lightweight directory access protocol ldap data store, e - commerce applications that require simple ldap authentication support, and enterprise environments that require an application directory that is separate from their network operating system infrastructure directory

    Active directory應用程序模式( adam )是active directory目錄服務的新模式,設計用於滿足以下應用程序或環境的需要:需要專用輕型目錄訪問協議( ldap )數據存儲的行業應用程序,需要簡單ldap身份驗證支持的電子商務應用程序,以及需要操作( nos )結構目錄的應用程序目錄的企業環境。
  10. In the information times of network, such phenomena as the conflict of cultures, the collision of views, the mutual infitration of thoughts and values exist and develop at the same time, the patriotism education in colleges and universities must get hold of the pulse of the times, to deal with the problems between the independence and the opening, the national self - esteem and the national anxiety, the national responsitibility and self development in a fully new opinion and strategy, meanwhile, we should strengthen the reform of the teaching of the political theory, establish colorful campus culture and network culture, establish and amplify the educational network system and make full use of the network technique to construct the platform of triotism eucation

    信息時代,整個世界范圍內文化的沖突、觀念的碰撞、思想的互滲、價值的并行,高校愛國主義教育必須緊緊把握住時代的脈搏,以一種全新的觀念和策略去處理好性與開放性、民族自尊與民族憂患、民族責任與自我發展的關問題,並加強政治理論課教學的改革、創建豐富多彩的校園文化和文化,建、健全教育,充分利用技術搭建愛國主義教育平臺。
  11. In this paper, based on the method of boolean manipulation and minimization algorithm in the independence minimal path sets, and applied reliability engineering theory, a new method is proposed for calculating reliability of mine ventilation network system

    摘要運用可靠性工程理論及不交型積之和定律,在大型可靠度計算的基礎上,提出了礦井通風最大線性無關最小集予以真子集滌除的不交化可靠度計算的實現方法。
  12. The living example analysis shows that the two results are not only equal according to the full probability formula and deleting truth subsets in the calculation of system reliability for mine ventilation network based on boolean manipulation and minimization algorithm in the independence minimal path sets, but also it is fewer to possess boolean manipulations in the calculation and the calculating program is simplified greatly to the method of boolean manipulation and minimization algorithm in the independence minimal path sets

    實例分析表明:採用升序排列的最小集並按不交型積之和定理予以真子集滌除的不交化處理后,不僅計算值等同於一般分析中用全概率公式計算的礦井通風可靠度,而且,計算工作量大為簡化。
  13. As a separate system, the system of statistics and analysis for the reliability of low - voltage user records reliability datum of every low - voltage user by gathering terminals, collects and deals with these datum with the technique of low - voltage power line carrier by lumped instrument. last, the datum in the lumped instrument are read in the database of the master station computer by telephone network

    低壓用戶可靠性計與分析作為,以低壓臺區為單位,通過採集終端記錄每個低壓用戶的可靠性數據,再採用低壓載波由集中裝置對這些數據進行集中並處理,主站計算機以電話撥號的方式將集中器中的數據讀入數據庫。
  14. Among all, author has finished research and design the structure of security guarantee of public information network system independently, designed and carried out the technology scheme of receiving an alarm and giving an alarm in pre - alarm subsystem

    其中作者完成了公共信息安全保障體結構的研究和設計工作,以及該體結構中的預警子中接警、報警平臺技術方案的設計和實現。
  15. The program of data processing in determination of percent released of pharmaceutical preparation was developed ; two modules included in this program are connected but independence each other, one module calculate percent released, one module regress equation ; determination of percent released of pharmaceutical preparation, comparison of released curve in one reference frame and modeling mathematics model were realized by running this program. the program of formulation optimization based on artificial neural network was compiled to solve the nonlinear problem in formulation optimization. provided parameters were used to predict the released amount of a set of formulations

    簡便,其計算結果與現有其他程序計算結果基本一致:開發固體制劑體外溶出試驗數據處理程序,程序運行時分為計算累積釋放百分率和優選最佳數學模型兩個相互連接又各自的環節,實現了累積釋放百分率的自動計算,同一坐標下釋放曲線的直觀比較,常用數學模型的擬合;開發基於人工神經的處方優化,解訣處方優化這一多目標、非線性優化問題,利用符合擬合精度的訓練結果預測給定處方的釋放度,預測結果與實驗結果基本相近。
  16. The most used technique is the encryption decipher technology, others include the identity authentication, firewall technology, router security, intrusion detection, emergency responds and restores technical, the honeypot technology and so on. while these technologies is under development, some of them is only single function, mutually independent, and difficult for the system administration. they cannot be trusted completely as the solutions to network intrusion behavior which emerges one after another increasly in the reality

    目前,解決安全問題的主要技術手段有加密解密技術、身份認證、防火墻技術、安全由器、入侵檢測、應急響應與恢復技術、蜜罐技術等,這些技術在發展的同時,也存在著功能單一,相互,難于管理的不足,不能應對現實中層出不窮的入侵行為,所以單純依靠這些技術不可能滿足全部的安全要求。
  17. This paper also established two kinds of expansion mode : structural inheritance and interface inheritance, which are called parallel expansion and additional expansion and are all based on character inheritance. through introducing the advantages of network calculation and great - volume storage, local cnc monitoring and diagnosis is expanded to lan, intranet and internet, and a multi - layer network activating monitoring and controlling model is established to realize the reasonable configuring and credible sharing of long - distance resources. to make re - development process more easy and friendly, a structural description language of cnc function character based on data library is designed for the target of inductive re - development mode

    論文還提出了以基本cnc層+擴展cnc層為配置策略的開放式結構,通過區分平行擴展和補充擴展兩種形式,實現了開放cnc結構性繼承和介面性繼承的兩種新型擴展方案;探究將分佈計算和大容量存儲的技術優勢引入到現場監控應用中的具體方法,提出了本機監控、群控監控、企業車間監控和遠程監控為主體的四層監控診斷體創性地建了一種分層激活的運轉機制,實現了資源的合理配置和可靠共享;建的cnc二次開發環境,開創性地設計了一種以數控幾何工藝數據庫為基礎,以結構化的數控特徵語言描述為交互形式的引導型擴展配置方案。
  18. The proliferation of spc exchanges in telecommunication operator ( telco ) networks forced the centralization of supplementary services in special network nodes in order to facilitate the update and introduction of such these services

    無線電通訊操作中存儲控製程序交互的增多,促進了各點的附加服務的集中化,以便於這些服務的更新和介紹。
  19. ( 2 ) proposed a new udp congestion control scheme based on explicit rate. in the new scheme, the end - systems get the fair bandwidth of the bottleneck link in the connection, with the support of the routers in networks. then the sender regulates the send - rate to this fair bandwidth smoothly

    基於流體流理論,從數據傳輸的角度,根據設備情況將分浙江大學博士學位論文解為各個的子對象,通過建子對象的模型來構造ip的數學解析模型; 4 .運用混雜來描述tcp擁塞控制策略的數據傳輸過程。
  20. Since establishment, the network department of the company has undertaken more than 20 unisystem projects independently, including mainly the information management network of yunnan metallurgy group co., and the information management network of huize lead & zinc mines, and software ' s developed in commercial use such as metallurgical production management software, professional sanitation file management system etc

    公司部自成以來,已承擔集成項目二十多項,主要有「雲南冶金集團總公司信息管理,會澤鉛鋅礦信息管理等,完成並投入應用的軟體項目有:冶金生產管理軟體、職業衛生檔案管理等。
分享友人