終端分佈系統 的英文怎麼說

中文拼音 [zhōngduānfēntǒng]
終端分佈系統 英文
terminal distributed system
  • : Ⅰ名詞1 (最後; 末了) end; ending; finish 2 (指人死) death; end 3 (姓氏) a surname Ⅱ形容詞(...
  • : Ⅰ名詞1 (東西的頭) end; extremity 2 (事情的開頭) beginning 3 (門類; 方面) item; point 4 (原...
  • : 分Ⅰ名詞1. (成分) component 2. (職責和權利的限度) what is within one's duty or rights Ⅱ同 「份」Ⅲ動詞[書面語] (料想) judge
  • : 系動詞(打結; 扣) tie; fasten; do up; button up
  • : Ⅰ名詞1 (事物間連續的關系) interconnected system 2 (衣服等的筒狀部分) any tube shaped part of ...
  • 終端 : terminal; terminus; terminator; tag end; end; termination; trailing end; end point; terminating終...
  • 系統 : 1. (按一定關系組成的同類事物) system 2. (有條理的;有系統的) systematic
  1. So security and safeguarding of information on computer networks has become one of the most import problems, because of the diversity of network ' s connection, the asymmetry of terminal ' s distribution, the interconnection of computer and the attack of hacker, cracker and vicious software. it is more important for military ' s automation commanding network and banks whose network communicates sensitive data. thus we should apply sufficient safeguarding to these networks, otherwise the computer network will be useless, even jeopard the national security

    但由於計算機網路具有連接形式多樣性、不均勻性和網路的開放性、互連性等特徵,致使網路易受黑客、駭客、惡意軟體和其它不軌的攻擊,所以網上信息的安全和保密是一個至關重要的問題。對于軍用的自動化指揮網路和銀行等傳輸敏感數據的計算機網路而言,其網上信息的安全和保密尤為重要。因此,上述的網路必須有足夠強的安全措施,否則該網路將是個無用、甚至會危及國家安全的網路。
  2. ( 2 ). according to the system indices and requirements together with the technology characteristic, it researches the capture possibility of apt capturing system. then it introduces the common scan methods, such as raster, spiral, raster spiral, rose and lissajo. ( 3 ). it makes a detailed simulation analysis of the raster and spiral scan, analyze the connection between capture probability, capture time, system index at different capture resolution angle, capture range, vibration angle extent and terminal location distributing mean square deviation

    其中對幾個關鍵部進行了詳細析:計算了目標角反射器的激光雷達散射截面( lrcs )值,研究了qd與ccd對目標位置角度的計算方法和空間解析度; ( 2 )根據指標和要求並結合現有國內技術特點研究了apt捕獲掃描的捕獲概率問題,然後析了幾種常見的掃描方式:矩形( raster )掃描、螺旋( spiral )掃描,矩形螺旋( rasterspiral )掃描,玫瑰形( rose )掃描以及李薩如形( lissajo )掃描; ( 3 )對行掃描和螺旋掃描進行了詳細的模擬析,析了它們在不同捕獲辨角、捕獲范圍、振動角振幅和位置均方差時的捕獲概率、捕獲時間與常數之間的關
  3. Rms is composed of four parts : viewer, hoster, broker and relay. in this paper, the building of the communication tunnel among viewer, relay, hoster is presented. besides, the design and implementation of broker are described

    能有效應對企業pc數量和上的日益擴大化問題,幫助企業提高it方面的管理效率和管理質量,節約人力和時間成本,研究以上課題具有很大的理論和現實意義。
  4. We manfucture cdma, gsm, phs base station antennas ; 800mhz trunking repeater digital antenna and indoor antennas ; wireless public telephone antennas ; the band antennas and microwave antennas

    我公司生產天線(數字電視天線,車載娛樂天線,無線供話天線,網卡天線,手機天線) ; cdma , gsm , phs基站天線,室內信號天線;微波天線等。
  5. One windows nt server and one set of datum processors set up the real time achievement database server, the server adopts windows nt 4. 0 as operating system, ms sql 7. 0 as database management system, through tcp / ip achieving visit the server. visual basic 6. 0 was adopted to develop the terminal software, the system altogether includes affairs reminding subsystem, sportsmen dividing into groups subsystem, referee giving a mark subsystem, achievement calculate subsystem and achievement issue subsystem, 6 subsystems. at the same time, the systematic security divide into server operating systems security, database management system security, client terminal software security, and network security as well

    採用兩層的c s結構: windowsnt服務器、一臺數據處理機建立了處理實時成績信息的數據庫服務器,服務器windowsntserver4 . 0作為操作, mssqlserver7 . 0作為數據庫管理,並通過tcp ip協議實現對server的訪問;採用visualbasic6 . 0程序設計語言作為開發工具研製了軟體,共包括事務提醒子、運動員組管理子、裁判員評、成績計運算元、成績發布子、成績瀏覽子等6個子;同時將的安全機制為服務器操作的安全機制、數據庫管理的安全機制、 client應用程序的安全機制和網路的安全機制;由於c s中影響性能的因素主要包括client 、網路、 server 、數據庫和應用;在「花樣輪滑評」中充考慮了這些因素,從數據、數據庫配置等方面來提高的性能;並從運行、數據庫維護兩個方面考慮的維護問題。
分享友人