現用網路 的英文怎麼說

中文拼音 [xiànyòngwǎng]
現用網路 英文
activity network
  • : Ⅰ名詞1 (現在; 此刻) present; now; current; existing 2 (現款) cash; ready money Ⅱ副詞(臨時; ...
  • : Ⅰ動詞1 (使用) use; employ; apply 2 (多用於否定: 需要) need 3 (敬辭: 吃; 喝) eat; drink Ⅱ名...
  • : Ⅰ名詞1 (捕魚捉鳥的器具) net 2 (像網的東西) thing which looks like a net 3 (像網一樣的組織或...
  • : 1 (道路) road; way; path 2 (路程) journey; distance 3 (途徑; 門路) way; means 4 (條理) se...
  • 網路 : 1. [電學] network; electric network2. (網) meshwork; system; graph (指一維復形); mesh
  1. However, the volume of some room in the modern high building and large public construction are much larger than others, such as assembly room, so the calculation consequence of the software would be incorrect with the supposition

    然而代高層建築及大型公建築,有的受限空間體積相差很大,如會議室等與客房體積相差幾倍甚至上百倍,採模型的思想簡單視其為單一節點不可能獲得正確的預測結果。
  2. In special operation, jiangsu province was made clear " jiangsu of base oneself upon, face the whole nation, outside outspread condition " the fight is politic, to the clew of bawdy pornography crime that discovers on the net, no matter in churchyard open bawdy lubricious love net stands to still be outside the condition, hire network serves a space, organize picked troops strong will, check after all, destroy stoutly, eliminate a harm

    在專項行動中,江蘇省明確了「立足江蘇,面向全國,延伸境外」的斗爭策略,對上發的淫穢色情犯罪線索,無論在境內開辦淫穢色情站還是在境外租服務空間,都組織精兵強將,一查到底,果斷打掉,消除危害。
  3. By using network flow theory, the optimization problem of power conservation is transformed into the optimal bipartition problem of a flow network which can be partitioned by the max - flow mm - cut algorithm

    流理論,將節約電量的最優化問題轉化為一個流的最優分割問題,而後者可採最大流最小切割演算法實最優切分。
  4. Using the mode of ais network at sea for reference, relying on the background of " human first " navigation human culture, using the theory of modern logistic " bpr, and get the idea of " the core is information flowing ", then describer the seaman ' s work on board particularly. apply some modern technology, such as : network and digital communication, database, visual procedure, from network construction, database designing, database linking, to interaction windows designing, achieve the following functions step by step

    借鑒ais海上建設模式,依託以人為本的航海人文背景,利代物流理論的過程優化理念,代物流的核心為信息流的理念,對航海活動中船方工作內容予以細化,利與數據通信技術、數據庫技術、可視化編程技術等,分建設、數據庫設計、編程工具與數據庫的訪問方法、可視化界面的設計等若干步驟,逐步實系統如下方面的功能。
  5. Then the deficiencies of dfe ( dorp from end ) mechanism in a router ' s input queue are studied. after that, the thesis figure out that red ( random early detection ) active queue management mechanism can be used to prevent networks from congestion collapse

    接著,文章重點分析了節點中所採隊尾丟棄策略的不足,認為只有採隨機早期探測( randomearlydetection : red )這種動態隊列管理機制才能有效避免擁塞。
  6. Several efficient strategies such as reliability maintenance, flight personnel management, aviation materials management, and network alliance were proposed, with an overall aim to ensure flight safety and, furthermore, maximize the economic performance of aviation companies

    通過探討持續適航管理與經濟效益的關系,提出了優化持續適航維修成本管理、採航空安全新技術的投資合理度決策、提高機組的判斷和決策能力及運聯盟等方面的有效策略,從而在保證安全的前提下,提高航空公司經營效益,實利潤最大化。
  7. Aiming for the problem of accessing data on different flats, gives some research, limns the server / client system, and based on the transferring ftp net files, uses the method of windows " sockets network programming, devises and achieves the network function, fulfill data accessing using odbc technology

    針對實際中存在的跨平臺數據訪問的問題進行了研究。對客戶機/服務器體系作了描述,在ftp的文件傳輸的基礎上,利windowssockets編程方法,設計實功能。
  8. The development of fieldbus technology made lonworks field bus outstanding in all kinds of fieldbus. this paper simply introduces some kinds of common using fieldbus and the important position and influence of lonworks fieldbus in all kinds of fieldbus, carefully describes the technology core of lonworks technology, puts great emphasis on the introduction of the development and design of public security node of intelligent district which adopts computer, communication and control technology, carefully designs the interfaces of hardware circuits. the public security node of intelligent adopts 8031 single chip as its main processor to complete the application program of user, which mainly collects, process and control all kinds of field signal, and neuron chip 3150 as its slave processor to communicate with other nodes on field network, which works under parrel slave a mode

    場總線技術的發展使得lonworks技術脫穎而出,本文簡要介紹了常的幾種場總線的概況以及lonworks技術在場總線技術中的地位和影響,對lonworks技術的技術核心:神經元晶元、 lontalk協議、 lonworks收發器、 lonbuilder及nodebuilder進行詳盡的描述;重點介紹了集先進的計算機技術、通信技術、控制技術為一體的智能小區安防節點的開發與研製,對節點硬體電的各種介面進行了詳盡的設計。本文設計的智能小區安防節點採單片機8031作為主處理器來完成戶的應程序,主要負責對各種場信號進行採集、處理及控制,工作在并行從a方式下的神經元晶元mc3150作為從處理器,主要完成與上的各節點及中心控制室之間的通信工作。
  9. The main hardware is the collection equipment, the software is the windows dna framework, distribute calculate resolves the problem of data server down because of heave calculate mission. system provides the mis sub - system base on ie, which make data - query and report forms not limited by the special network. the new module, standard interlink module is aimed at the problem of not pluralize between different system, can make system utility in administrative levels

    系統有硬體和軟體組成,硬體的基礎是採集裝置;軟體採windowsdna構架,使分散式計算,解決了原來系統的計算任務過于繁重造成數據服務器不能承擔負荷的問題;服務方面提供基於ie的mis系統,使數據查詢和報表服務擺脫了原來的專的限制;新增加模塊「標準互連」模塊是針對目前各種自動化系統不兼容的問題而產生的,可以實電力自動化在更高層次上的實,在這個模塊中,有意識的採
  10. Client supplies complete graphic user interface, accomplishing the management of jobflow and system ; communication agent accomplishes complete communication between client and server by tcp / ip network communication protocol and platform independent data communication protocol ; server supplies full support of jobflow, the superstratum are the jobflow definition subsystem and jnwengine, which are responsible for the definition and execution of jobflow ; the understratum is the network queue system, which realized the schedule and execution of job, thus all kinds of sources in computer network system can be utilized in order to improve execution efficiency and reduce job cost

    客戶端提供完全的gui戶界面,完成戶對作業流的管理及對系統的管理功能;通訊代理採tcp ip通信協議以及與平臺無關的數據通訊協議來實客戶與服務器之間的完全通訊;服務器端提供對作業流的全面支持,上層由作業流定義子系統和作業流引擎負責完成對作業流的定義與執行,底層使隊列系統( nqs )來實對作業的調度與執行,使戶能夠最大限度地利計算機系統中的各種資源,以提高執行效率、降低作業成本。
  11. Server supplies full support of jobflow. the superstratums are the jobflow definition subsystem and jnwengine, which are responsible for the definition and execution of jobflow. the understratum is the network queue system ( nqs ), which realizes the schedule and execution of job, thus all kinds of resources in computer network system can be utilized in order to improve execution efficiency and reduce job cost

    客戶端提供完全的gui戶界面,完成戶對作業流的管理及對系統的管理功能;通訊代理採tcp ip通信協議以及與平臺無關的數據通訊協議來實客戶與服務器之間的完全通訊;服務器端提供對作業流的全面支持,上層由作業流定義子系統和作業流引擎負責完成對作業流的定義與執行,底層使隊列系統( nos )來實對作業的調度與執行,使戶能夠最大限度地利計算機系統中的各種資源,以提高執行效率、降低作業成本。
  12. The news group has produced a special cd to teach fellow practitioners important techniques for getting online in the cyber age. this cd is available free of charge while at the same time educational internet classes are being held at the hsihu center and other local centers around formosa in april of 2001. fellow practitioners are elated and encouraged to know that master is using the most rapid communication tool of our time to carry out god s will

    為了幫助同修掌握e時代的利器,新聞組特別製作了上教學cd片,於四月份,在西湖道場及各小中心同步舉辦教學及cd片贈送等活動,並讓同修知悉,師父也運這種代的快速傳輸工具,執行上帝的旨意。
  13. The modern technology give a chance for the pattern of transmitting knowledge with network, the course based on network have opened up it ' s way in china, our pursuer paid more attention to the mode, but in america, pursuer have studied the more width aspect, thereinto the investigation and design of the information in the course based on network is very important, for the design of the information decide the pattern how the student receive the information, which will effect the way of knowledge understanding and memory, and the way is related to the study pattern, so the design of the information in the course based on network is very important to the efficiency and effect. so the core of the paper is the investigation and design of the information in the course. i have the entropy from the information science as the analyse tool to analyse the information, these work tell us the efficient pattern to transmit information, based on the result, i design the net page, of course, study theory and the character of the net itself are also the factors i employ for design a good net page. then, links and navigation is constituted for students adapt to the course based on network

    當今技術的發展給知識以為媒介來傳播的學習方式帶來前所未有的機遇,課程在國內迅速開展起來,但是國內研究者的注意力主要集中在對課程模式的探索上,放眼國外,他們的研究觸角已經涉及到課程比較細致的方面,尤其是對課程信息的研究構成了國外課程研究中的比較重要的一個方面,而課程中信息的設計是重要的,因為信息的組織設計是為了接受者能對信息進行有效的信息加工,信息的呈模式影響著學習者對知識的理解和記憶方式,進而決定了學習者的學習模式,因此信息的設計在課程傳遞的效率和效果中就佔有很重要的位置。基於這個觀念,本文把信息的組織設計作為研究的重點,引入了信息科學作為研究的主要工具對中的信息作以量化分析研究,主要應了信息科學中信息熵的公式進行推導,得到學習內容信息組織的基本模式,並充分利自身特性和學習理論對知識信息進行細致的設計,此外還對鏈接和導航信息進行了設計,在課程的適應性方面作出了努力,把交互信息與輔助學習信息的分析設計與應和對頁面信息的總體調節優化作為主體信息設計部分的補充,最終形成了信息組織設計的方案,力求創設一個能夠有效傳遞知識信息,減少自身弊病,並帶有一定適應性的學習環境,也使更多的課程的設計者關注信息這個因素。
  14. A structure and supporting tools of asp are presented and some technical problems of providing services for sme with network are discussed. visual foxpro is used the as dbms of part library and visual interdev is used to setup the asp website - partlab in the paper. active server page technology is applied to visit web database

    提出了一個asp服務系統的框架及其支持工具,對有關在模式下為中小企業提供服務的有關技術問題進行探討,本文以visualfoxpro為數據庫管理系統開發了零件數據庫,以visualinterdev為工具開發了asp站partlab的戶界面,利動態頁服務器技術實數據庫的訪問,為戶提供了一個asp服務中心的原型。
  15. After the briefly present the origin and features of internet protocol version 6 ( ipv6 ), the paper detailedly introduced the conception, characters, security technologies of vpn, and main tunnel protocols used to implement and deploy vpns. after analyzing and comparing these technologies of realizing vpns, we choosed ipsec. then, the paper analyzed in the ipsec structure, function, work mode, and its components such as authentication header ( ah ), encapsulating security payload ( esp ), internet key exchange ( ike ), encryption and authentication algorithms, security association, security policy, and how they cooperate with each other in order to secure ip packages

    在簡要介紹ipv6協議的由來和優點之後,詳細闡述了虛擬專的概念、特點、安全技術及實的關鍵隧道協議,通過對實技術的分析比較,選了安全性強大的ipsec隧道技術,接著深入研究了ipv6安全協議ipsec的體系結構、操作模式,詳細論述了ipsec協議簇的各個組成部分,如認證報頭ah協議、封裝安全載荷esp協議、密鑰管理ike協議、加密認證演算法、安全聯盟和安全策略等,以及這些組件之間如何協作,來共同實層ip數據包的安全保護。
  16. Some existing topology - unaware collective operations algorithms do n ' t make use of the information about network topology. firstly, these approaches construct a model of network topology and make use of a set of parameters to describe the communication characteristics of a network model, then build the optimal trees based parameter values and their models to realize collective communication

    有的一些未知拓撲型集合通信演算法,並不利拓撲結構信息,都是首先對模型化,並且各種參數來描述該模型中通信的特點,然後基於此模型和其參數值為集合通信操作構造最優樹來實集合通信。
  17. The cad / cam process of the handle part was implemented, including constructing 3d entity modeler, creating tool path, computer simulating, postprocessing cutter location files into tape files for a specific machine tool, transferring machining information of the handle part by the network - based cad / cam prototype system, nc machining of the handle part at last

    化cad / cam原型系統實手柄零件cad / cam過程,包括手柄三維實體造型、刀位軌跡生成、計算機模擬檢驗,後置處理生成特定機床的g代碼,通過傳輸手柄零件加工信息,最後完成手柄零件的數控加工。
  18. To detect both known and unknown intrusion patterns, the system introduces a blended frame that makes use of both misuse detection approach and anomaly detection approach. the one of the highlight of the architecture is introduction of data mining technique, and the other is introduction of genetic algorithms. the ids uses data mining algorithms to abstract key features of system runtime status from security audit data, and it uses genetic algorithm to select the feature subset to reduce the amount of data that must be obtained from running processes and classified

    本文陳述了所研究系統的主要特點和技術:將智能體( agent )技術應於入侵檢測系統,解決了傳統入侵檢測系統的集中式解決方案的弊病,充分利資源協同完成入侵檢測任務;利基於主機和基於的數據源,形成一種完整的混合型的結構,從而能收集到更加全面的信息;使了異常檢測技術和誤檢測技術,採一種混合型的結構,既能檢測已知的攻擊模式,又能發新的攻擊模式。
  19. Network forensics is an important extension to present security infrastructure, and is becoming the research focus of forensic investigators and network security researchers. however many challenges still exist in conducting network forensics : the sheer amount of data generated by the network ; the comprehensibility of evidences extracted from collected data ; the efficiency of evidence analysis methods, etc. against above challenges, by taking the advantage of both the great learning capability and the comprehensibility of the analyzed results of decision tree technology and fuzzy logic, the researcher develops a fuzzy decision tree based network forensics system to aid an investigator in analyzing computer crime in network environments and automatically extract digital evidence. at the end of the paper, the experimental comparison results between our proposed method and other popular methods are presented. experimental results show that the system can classify most kinds of events ( 91. 16 ? correct classification rate on average ), provide analyzed and comprehensible information for a forensic expert and automate or semi - automate the process of forensic analysis

    取證是對安全體系的必要擴展,已日益成為研究的重點.但目前在進行取證時仍存在很多挑戰:如產生的海量數據;從已收集數據中提取的證據的可理解性;證據分析方法的有效性等.針對上述問題,利模糊決策樹技術強大的學習能力及其分析結果的易理解性,開發了一種基於模糊決策樹的取證分析系統,以協助取證人員在環境下對計算機犯罪事件進行取證分析.給出了該方法的實驗結果以及與有方法的對照分析結果.實驗結果表明,該系統可以對大多數事件進行識別(平均正確分類率為91 . 16 ? ) ,能為取證人員提供可理解的信息,協助取證人員進行快速高效的證據分析
  20. At the first part of the dissertation, the architecture and basic protocols of web services are analyzed and discussed. then the business data integration framework ( bdi framework ) is briefly introduced. the designing emphases of bdi system engine and management interface are particularly discussed in detail, especially on the topic of designing thinking, kernel constitution, various function adapters, web - based interface designing and tradition - based interface designing, which shows that the system has a prime adaptability and expansibility in information exchanging across various platforms and systems

    本論文首先對webservices的體系架構和構成它的基礎協議進行了分析和研究;然後對論文重點要討論的商業數據集成系統bdiframework作了簡單的介紹;接著從bdiframework的引擎設計、管理界面設計兩個方面進行了詳細的闡述,著重介紹了系統的設計思想、系統內核的組成、各種功能適配器的設計以及基於web的瀏覽器界面和基於form的傳統界面的設計,說明了採webservices技術的ibdiframework能實、跨平臺集成數據,適應能力強,可擴展性高,為將來進一步開發打下了堅實的基礎;最後介紹了系統整體測試的情況和下一步的工作要點。
分享友人