網路性交 的英文怎麼說

中文拼音 [wǎngxìngjiāo]
網路性交 英文
cybersex
  • : Ⅰ名詞1 (捕魚捉鳥的器具) net 2 (像網的東西) thing which looks like a net 3 (像網一樣的組織或...
  • : 1 (道路) road; way; path 2 (路程) journey; distance 3 (途徑; 門路) way; means 4 (條理) se...
  • : Ⅰ名詞1 (性格) nature; character; disposition 2 (性能; 性質) property; quality 3 (性別) sex ...
  • : Ⅰ動詞1 (把事物轉移給有關方面) hand over; give up; deliver 2 (到某一時辰或季節) reach (a cert...
  • 網路 : 1. [電學] network; electric network2. (網) meshwork; system; graph (指一維復形); mesh
  1. In algorithms, classification algorithms are divided into two cases : one for known statistical distribution model and the other for unknown statistical distribution model. four classification algorithms, the bata - prime statistic model fusing quadratic gamma classifier, based on sar image rcs reconstruction and space position mode, on the mixed double hint layers rbfn ( mdhrbfn ) model and on the self - adapt fuzzy rbfn ( afrbfn ) model, are derived. the problems, including how to further improving the class ratio of the bayes decision, decreasing the dependence on the statistical model and directly providing the adapted algorithm with samples, are solved

    提出了基於徑向基函數神經( rbfn )的雙隱層混合( mdhrbfn )模型,解決了標準神經在具體sar圖像地物分類中分類類別數目不夠和分類精度差的問題;提出了基於模糊推理系統的自適應模糊rbfn分類( afrbfn )模型,兼顧通用與精確,增強人機互能力,進一步提高了演算法分類率。
  2. The structure of this paper goes like this, the first chapter introduce the development of e - b / l in practice and in laws. and draw a conclution that the electrification of the b / l is a history tide. in the second chapter, on the basic of reseach the security trap in e - b / l running, 1 conclude six security elements of, e - b / l : the liability of the system, the authenticity of dealers ' identity. the integrity and secrecy of electronic data, and the validity and evidence effectiveness of electronic data. from the third chapter to the eighth, 1 reseach these elements one by one. the third chapter introduce the establishment of the e - b / l security system, and some related laws the fourth chapter introduce the certification authority of e - b / l. in the fifth chapter, 1 introduce the encrypt of electronic information and some countries ' control on use / import / export crytography. the sixth chapter introduce the concept and principle of digital signature, and reseach some related legal issues. the seventh chapter reseach the legal demand of validity, then come to a conclution that to establish a independent electronic information system is necessary. in the eighth chapter, 1 reseach some countries " regulation on the evidence effectiveness of electronic data

    第二章在分析電子提單運作中的安全隱患的基礎上,歸納出其六大安全要素,即系統的可靠易者身份的真實、數據電訊的機密和完整、數據電訊的合法有效以及易者行為的不可抵賴。第三章到第八章分別對這六大要素進行分析:第三章介紹了電子提單安全體系的建立以及系統安全保護法規,第四章則介紹了電子提單的安全認證機構,第五章介紹了信息加密技術以及各國立法對密碼技術的進出口及使用的控制,第六章介紹了數字簽名的概念及原理,並以bolero為例介紹了數字簽名的技術方式,對有關法律問題作了論述;第七章首先論述了電子提單對有效的法律需求,然後結合國內法和國際規則的規定論證了數據電訊制度產生的必然;第八章通過對各國立法對電子證據的法律效力的規定,論述了對電子易至關重要的數據電訊的不可抵賴
  3. The paper describes isn as a nonlinear dynamic complexity system, and with self - organization characteristics. next, the paper constructs the structural model of ecological industrial chain by imitating the producer, consumer and decomposer in natural ecological system, and analyses the resources flow from the viewpoint of value chain. based on the theory of byproduct exchange, the paper put forwards four kinds of operation model of isn, and analyze them hi detail by using of the case study

    模仿自然生態系統中的生產者、消費者和分解者構建生態產業鏈結構模型,從價值鏈角度分析了其中的資源流動;提出了生態產業鏈活因子的概念,並運用這一概念對生態產業鏈的形成機理進行分析;基於副產品換的特點,提出四種工業共生運作模式:依託型共生,平等型共生,嵌套型共生和虛擬型共生;通過對工業共生中資源流動的分析,揭示了副產品換規律。
  4. High - speed, muti - services and economy have become the major issues of the future ip backbone technology as far as thes poiflt is concerned, thes paper explores layer 3 switdrig technology which separates control component and forward compontal in the traditional roulers. two forwarding al gori thms - - - - d ata - driven mo d el and top olo gy driven model are also compared, a next generation ip backbone echno l o gy - - - - multiproto co l label switching is developed, with its operation and its deployinent in traffic engineering, c1ass - ofservce and virtual private network

    本文從未來ip骨幹技術所要求的高速化、多業務支持、經濟出發,介紹了在傳統由器基礎上將控制部件和轉發部件分離的第三層換技術,比較了數據驅動模型和控制驅動(拓撲驅動)模型兩種轉發演算法,並由此引出下一代ip骨幹技術? ?多協議標記換,闡述了其工作原理以及在流量工程、服務等級區分和虛擬專用中的應用。
  5. According to the analysis and identification of differential displayed proteome, two key enzymes, adp - l - glycerol - d - mannoheptose - 6 - epimerase and mannosyltransferase, were induced in different salt stress and salt shock for rt19, which commonly participate in the biosynthesis of l - glycerol - d - manno - heptose, a major component of lipopolysaccharide

    通過對rt19的鹽激和鹽脅迫誘導蛋白的比較分析,發現:其中12個蛋白在兩種不同的脅迫條件下都可被誘導表達。進一步證實: rt19應答不同鹽脅迫刺激採取了不同的反應機制,但這些機制存在共織成復雜的調控
  6. Includes animal facts, egyptian hieroglyphs, language arts, magic tricks, math, planets, preschool writing skills, and science experiments

    -非營利站,提供少兒科學教育信息,在線流平臺媒體及咨訊。
  7. According to the mean message traversal, the performance of leo / meo mobile satellite communication networks with intersatellite links ( isls ) is analyzed in this paper. three different traffic patterns are used in the analysis. if the isl number per satellite increases, the advantage of packet switch is more significant than that of circuit switch

    本文提出了一種基於信息平均傳輸距離的中/低軌衛星移動通信系統星際鏈能的分析方法.根據三種不同的業務分佈模型對繁/簡兩種的信息過時延和呼叫丟失率進行了分析.通過增加中每個節點星際鏈的數目可以改善能,而且這種改善對採用分組換的系統比採用電換的系統大
  8. In the first two chapters, the basic knowledge of traffic accident, its causes and the relationship between road sense and traffic accident are mainly analyzed. it introduces the application of present compute network in traffic management ; the deficiency in the training and it introduces the examination and background of developing this system too. policy foundation, academic basis, runnable environment of developing the system, urgency, necessity and feasibility are also presented in these parts

    全文共分五章,前二章主要分析了通事故的基礎知識,通事故發生的原因,機動車駕駛員駕駛技能與通事故的關系;介紹了我國現行計算機通管理工作中的應用情況,機動車駕駛員培訓考試的不足和開發此系統的背景,提出了開發研究該系統的政策依據、理論基礎、運行環境、緊迫、必要、可行
  9. To analyze some key technologies of optical network relative with rwa in detail, such as transmission, switching and internetworking ; to emphasize on the research of function, fabric and performance of optical cross - connection ; to carry out numerical simulations for crosstalk introduced by optical cross connect and to present measurements for suppressing it such as doubly filtering, fixing optimum decision threshold and appropriately choosing the number of multiplexed wavelengths ; 3. to research the fundamental principle and some problems relative with rwa, including the type of optical network, the type of traffic, the type of service, the survivability of optical network ; to classify and compare rwa algorithms and particularly research some dynamic rwa algorithms ; 4. to present reserved light - path and classify network resource such as used, unused and reserved status, to emulate establishment of all - optical connection in optical network through modified rwa algorithm and show effectively reducing setup time of all - optical connection utilizing reserved light - path ; to research rwa algorithms of multi - fiber network, to present new link weight functions dependent on node degree, unused fiber ( s ) per wavelength - layer and routing policies, to perform emulation of rwa based wavelength layer graph applying new link weight functions and show them make algorithms better performance and network lower blocking rate ; 5

    詳細分析了與rwa相關的光關鍵技術,包括傳輸、換、組等,重點研究了光叉連接的功能和結構、能,對其引入的串擾進行了詳細分析,選擇恰當的器件參數進行了數值模擬,並提出了抑制措施(如雙重濾波、優化判決門限、選擇恰當的復用波長數) ; 3 .研究了光的r認叭的基本原理、與r認叭的幾個相關問題(光類型、業務類型、流量類型、光生存) 、 r認人演算法的分類和比較,具體研究了幾種動態r場人演算法; 4 .研究了以全光連接建立時間為優化目標的r認認演算法,提出預置光的概念,對資源進行狀態分類(佔用、未佔用、預置) ,利用改進的r認叭演算法模擬,預置光可為部分新到的連接請求快速建立連接,從而提高能;研究了以多光纖連接阻塞率為優化目標的r認城演算法,提出了以節點度數、每個波長分層的空閑光纖數以及由策略決定的幾種鏈權重函數,利用基於波長分層圖模型的并行r場人演算法模擬,利用新的鏈權重函數使得演算法具有更優的能,使具有更低的連接阻塞率。
  10. Data transmision speed is approximate and depends on the traffic on the network. actual speeds will vary, and are often less than the maximum possible

    數據傳送速度僅為約數,並視乎通,真實速度將有所不同,並通常較最大可能較低。
  11. Data transmission speed is approximate and depends on the traffic on the network. actual speeds will vary, and are often less than the maximum possible

    數據傳送速度僅為約數,並視乎通,真實速度將有所不同,並通常較最大可能較低。
  12. Ansi ' s standard for telecommunications network performance standards, switched exchange access network transmission performance standard exchange carrier - tointerexchange carrier standards

    電信能標準、可換的換機訪問傳輸能標準以及長途電信公司的ansi標準。
  13. The software uses idea of configuration on automatization. the paper have designed management of system, and introduces realization way of management system, finally, the paper advances improvement and improvement to the xml - based software. the utility provides an environment where you can make, edit, release and manage network courseware, you can make network coursewares that are characteristic and communicative, that can fit with the authors " style and specialties, that can accord with the educational technology rules

    本論文介紹的課件製作系統提供一個製作、編輯、發布和管理課件的環境,能夠把、 xml 、多媒體相結合,充分發揮了、 xml組織數據的靈活、多媒體的形象和直觀,製作出具有個化和的、適合製作者風格和特點的、符合教育技術規范的課件。
  14. Ln these years the quick develop1nent of fabric com1nunication technology make the switch systeln becoini11g ti1e barrier of lnodern high speed communication network. so study, design and lllanulhcture high speed switch system are very important for modern high speed communication network

    這幾年光纖通訊技術的飛速發展使得目前高速通訊能的瓶頸集中在高速換系統,研究、設計和製造高速換系統對目前高速通訊有極其重要的意義。
  15. Information technology - telecommunications and information exchange between systems - private integrated services network - inter - exchange signalling protocol - route restriction class additional network feature

    信息技術.系統間通信和信息換.私人綜合服務換信號協議.常規限制級附件
  16. Cdn can be divided into three independent building blocks in addition to the network infrastructure : content routing, content delivery, and performance measurement. there are two different aspects to content routing. the first is the global routing ; the second addresses the local routing ( or content switching ), which is the main topic of this paper

    內容分送主要涉及的關鍵技術包括內容由、內容分發和能的測量,其中內容由包括全局由和局部由,局部由又稱內容換,是本文的研究對象。
  17. Nec is a type of community support services at neighbourhood level which provides a range of comprehensive services to cater for the psycho - social and developmental needs of both healthy and mildly frail elders, including, educational and developmental activities, volunteer development, carer support service, counseling service, reaching out and networking, social and recreation activities, meal service, drop - in service, information and referral centre on community resources

    長者鄰舍中心長者鄰舍中心是一種鄰舍層面的社區支援服務,提供一系列的全面服務,例如教育及發展活動、義工服務、護老者服務、輔導服務、外展及社區、社及康樂活動、飯堂膳食服務、偶到服務等,以滿足不論健康或身體有輕度殘缺的長者,在身心社及發展的需要。
  18. Consequently, a measurement - based cac scheme is presented. it does not require any models describing the statistic of the traffic. instead, in our scheme, network monitors and measures the incoming traffic statistics, and makes decisions to admit or reject based on the measured statistics, which enable it to overcome the drawbacks of the model - based cac schemes

    在此基礎上,提出了一種基於測量的vbr業務連接允許控制機制,該機制不需要用戶事先為業務源建立相應的業務模型並向其業務模型參數,而是通過對業務流的統計特進行實時測量來進行接納控制,從而能夠克服基於模型的vbr業務cac機制所固有的缺陷。
  19. Build data warehouse business model for mobile network operating analysis, its model consisting 4 subjects : wireless network performance theme, exchange network performance theme, network capacity and signaling theme, the above mentioned themes represent all the contents of gsm network performance

    建立移動運行分析的數據倉庫業務模型,該模型包括四個主題:無線能主題、能主題、容量主題和中繼、信令主題,上述主題體現了進行gsm能的全部內容。
  20. Meanwhile, the people have more and more urgent requirements on the bandwidth, performance and management of network. such requirements are challenging the core devices used for interconnecting the networks, such as the switches and routers.

    同時人們對帶寬,能和管理的要求也都愈來愈高,這些都對互連的核心設備? ?換機和由器的設計實現提出了新的挑戰。
分享友人