網標識碼 的英文怎麼說

中文拼音 [wǎngbiāozhì]
網標識碼 英文
inic isdn network identification code isdn
  • : Ⅰ名詞1 (捕魚捉鳥的器具) net 2 (像網的東西) thing which looks like a net 3 (像網一樣的組織或...
  • : Ⅰ名詞1 [書面語] (樹梢) treetop; the tip of a tree2 (枝節或表面) symptom; outside appearance; ...
  • : 識Ⅰ動詞[書面語] (記) remember; commit to memory Ⅱ名詞1. [書面語] (記號) mark; sign 2. (姓氏) a surname
  • : Ⅰ名詞(表示數目的符號或用具) a sign or object indicating number; code Ⅱ量詞1 (指一件事或一類的...
  • 標識 : [物理學] characteristic; identification; identifying標識碼 identification code; 標識位置 home position
  1. Attribute tables also can be used to identify application - defined areas of a mesh that are handled by custom code

    。屬性表還可用於應用程序定義的由自定義代處理的格區域。
  2. Data network identification code, dnic

    數據網標識碼
  3. Pseudo network identification code pnic

  4. Isdn network identification code

    網標識碼
  5. So some numbers dialed will be redialed by the mcu through the gsm modem according to customers " will, also the ip number can be added automatically, which not only reduce call fees but also make convenience and improve efficiency for customers : we design the hardware circuits first

    撥號時,在不改變使用習慣的前提下按用戶意願將部分所撥號從無線系統中旁路出去,在用戶端即可完成電信路的自動路由選擇。並可在撥號過程中自動加入,既節約費用,還方便用戶,提高效率。
  6. There is a coded fake - preventing identifier on all the products and clients can inquire genuine or fake by means of calling, mobile phone message and internet browse so as to avoid imitations and truly provide users with quality and safe products and carry out smaller, lighter and safer

    本廠產品均有電防偽,可通過電話手機簡訊上查詢真偽,以防假冒。真正為用戶提供優質安全產品,並真正做到「更小更輕更安全」 。
  7. In the border router, we design a new diffserv scheduler ( bswcs : bit - based weight time slot compensate scheduler ), which dynamically adjust the weighted quantum of service. combined with the error concealment technology in the video decoder, in case of severe congestion which cause losing a lot of ip packets, these algorithms have been proved effective, hence the delay, jitter and the perceived picture quality all meet requirement for real - time video transmission

    4建立了一個區分服務路模型,根據視頻編的特點,提出了一種針對視幀傳輸的新的服務優先等級演算法,即根據不同視頻幀解時的重要程度和路的傳輸狀況將不同視頻幀的數據包記為不同等級,賦予不同的質量保證。
  8. Mrs yau said, " in our digital 21 strategy promulgated last may, we have adopted strengthening the hong kong community for digital exploitation as a key result area, and have set out policies and measures to achieve our goal. " us $ 280 million has so far been spent on various initiatives to address digital divide in four specific fronts, namely, education and training ; technology diffusion in the community ; knowledge and awareness ; and access to online services

    尤曾家麗說:我們于去年五月公布的數21資訊科技策略中,把加強香港社群掌握數科技的能力列為主要工作范疇之一,並已制訂各項政策和措施,以達到我們的目。政府至今已動用2 . 8億美元推行在四方面,包括教育及培訓、社會上科技普及、知和認知、以及上服務的各項措施,以消除數隔膜。
  9. Comprehensive utilization of animal individual mark, one - dimension code, two - dimension code and rfid electron mark, and combination of network and database with pig breeding and slaughter processing were performed to construct a tracing system suitable to chinese situation for monitoring and controlling the safe quality of pig and pork, then a system for identifying individual pig automatically was completed

    摘要綜合應用動物個體、二維條、 rfid射頻電子和一維條簽技術,將路技術和數據庫技術與傳統的養豬業和屠宰加工業結合,構建了一種適合中國國情的肉用豬和豬肉安全質量監控的可追溯系統。
  10. The core algorithms in the candidate set creating function module are code pretreatment algorithm and candidate set creating algorithm. candidate list creating function module is the most important module, its core algorithms include candidate list adjusting algorithm, candidate matrix creating algorithm, original word lattice creating algorithm, language element node creating algorithm, optimal candidate words searching algorithm and candidate list creating without code algorithm which

    候選列表生成模塊是整個系統最主要的模塊,主要核心演算法包括候選字詞調整演算法、候選矩陣生成演算法、初步詞格生成演算法、語言元素結點的生成演算法、尋找最佳語句候選演算法以及無編候選列生成演算法,無編候選列生成演算法利用對用戶已輸入的漢字進行切分注,通過系統中的知庫信息在沒有輸入編的情況下預測后續的輸入。
  11. A smart card ' s microprocessor generates complex passwords that are difficult to decode and biometric markers such as fingerprints and retina patterns that are hard to forge

    而智慧卡的微處理器則能產生難以破解的復雜密,以及不易偽造的生物辨記,例如指紋、掌紋、聲紋和視膜圖紋。
  12. According to the standard of kddcup ' 99 and by adopting numeric mixed coding, 41 features of the captured network packets are extracted and transferred into numerical form which can be accepted by neural network in this paper, we present a misuse detection model based on hybrid neural network and decision tree

    根據第三屆國際知發現和數據挖掘競賽( kddcup ' 99 )準,對截獲的路數據包進行41維特徵抽取,並採用混合數值編方法,使這些特徵轉化為能被神經路處理的數值形式。
  13. When using isolated storage, applications save data to a unique data compartment that is associated with some aspect of the code s identity, such as its web site, publisher, or signature

    當使用獨立存儲時,應用程序將數據保存到一個與代的某些方面(例如站、發行者或簽名)相關聯的獨特數據艙。
  14. Linux has been more and more widely used today, but the secure degree of linux is low, so in this paper, we produce a linux - compatible secure operating system, named slinux. its design object is in accordance with the requirements of the fourth level, i. e. structured protection level, of gb17859. for this purpose, we introduce such mechanism, as identification & authentication, mac, least privilege manage, trusted path, password management. object reuse, covert and channel analysis. furthermore, we have some innovation, introduce the mechanism of network security and audit

    本論文的研究目的是對linux進行安全增強,設計一個新的安全操作系統,即slinux安全操作系統,其設計目是滿足gb17859第四級《結構化保護級》的需求,為此我們在原有linux操作系統的基礎上引入了與鑒別機制, mac機制,最小特權管理機制,可信通路機制,密處理機制,客體重用機制以及隱通道分析機制,同時還進行了創新,引入了路安全保護機制和審計機制。
  15. Your user account identifies your user name and password, the groups you ' re a member of, which network resources you have access to, and your personal files and settings

    用戶帳戶了您的用戶名和密、所在的工作組、可以訪問哪些路資源以及您的個人文件和設置。
  16. It solves payment issue through sharing pos and brush card. it solves info sharing and exchanging problem by enterprise application integration it adopts research method of software engineering and uses touch - screen, network, database technology and so on to carry through total design of the system and build the software : it uses user status identify and responsibility control to ensure database and application program ' s security ; it strengthen the code by coding optimize ; it captures and discards application runtime error to enhance the system ' s stability ; it uses multimedia voice and moving picture to show help information, thus makes the system easy to use ; it greatly reduces the maintenance work of the system by self - updating function ; it is an opening system by using star - model network top structure, supporting standard network communication protocol ? tcp / ip and offering standard software interfaced criterion

    論文採用軟體工程的研究方法,使用觸摸屏、路、數據庫等技術,進行了系統總體方案設計和軟體開發:通過對數據庫和應用程序的用戶身份別和權限控制,保證數據存取和應用程序的安全性;通過對代進行優化提高了代的健壯性;通過捕捉並拋出系統運行時的異常錯誤提高了系統的穩定性;通過多媒體語音、圖形和動畫提示幫助信息來增強系統的易用性;客戶端程序自動升級功能提高了系統的可維護性,有效地減少了維護工作量;系統採用星型的路拓撲結構,支持準的tcp ip路通訊協議和規范的軟體介面準,具有良好的開放性。
  17. Aiming at the disadvantage of bar code, this paper suggests the use of electronic label identify technology of wireless ; then it introduces the design of new pattern balance and payment system in supermarket, including the structure model, the net model and the security strategy

    摘要首先提出採用無線電感應式電子別技術來改善現代超市中因條形不足而帶來的超市結算支付速度低及管理不善等弊端;然後對新型的結算支付系統的設計進行描述,包括結構模型、路模型及系統的安全策略。
  18. An iso - sanctioned system for assigning numerically coded identifiers to network nodes and

    ( iso批準的為路節點分配數字編符的系統)和
  19. You can supply a specific user name and password for the web site s worker process identity as shown in

    您可以為站的輔助進程提供特定的用戶名和密(如
  20. Secondly, the implementation of detect algorism based on dsp is researched, including the driver design of input and output, the realization of jpeg code and network communication, and the accomplishment of bootloader and write flash

    本文在dsp系統上實現了運動目別跟蹤演算法,包括設計了圖像採集與顯示部分驅動程序,完成了圖像的jpeg壓縮編路傳輸功能,編寫了下載程序bootloader和flash讀寫程序。
分享友人