網路應用 的英文怎麼說

中文拼音 [wǎngyīngyòng]
網路應用 英文
network application
  • : Ⅰ名詞1 (捕魚捉鳥的器具) net 2 (像網的東西) thing which looks like a net 3 (像網一樣的組織或...
  • : 1 (道路) road; way; path 2 (路程) journey; distance 3 (途徑; 門路) way; means 4 (條理) se...
  • : 應動詞1 (回答) answer; respond to; echo 2 (滿足要求) comply with; grant 3 (順應; 適應) suit...
  • : Ⅰ動詞1 (使用) use; employ; apply 2 (多用於否定: 需要) need 3 (敬辭: 吃; 喝) eat; drink Ⅱ名...
  • 網路 : 1. [電學] network; electric network2. (網) meshwork; system; graph (指一維復形); mesh
  1. We now specialize in the design and manufacture of motherboards, panel pcs, barebones, ( ia ) accessories and embedded systems, and our product portfolio is focused on embedded system which could be applied to the uses of internet appliance ( ia ), digital video recorder ( dvr ), network application storage ( nas ), network application devices ( nad ), kiosk, and point of sale ( pos )

    本公司致力於主機板,平板電腦及各類準系統產品的設計及製造,主打嵌入式系統的各項,以滿足客戶在,數字監控,存儲設備,網路應用,多媒體查詢終端, pos機和精簡型電腦等方面需求。
  2. With the rapidly development of computer network technology and the widely use of network technology in every walk of life, people transmit data through computer network more and more frequently, including all kinds of secret information ( for example, military secret ; bussiness secret ; personal private information ). today, as a result of poor security of our network system, we can not prevent the transmittied information from stealing and modifying unlawful. thus, the computer network technology is applied to our daily life restrictedly. recently, many network applications with voip ( for example msn messenger ; dialpad ; distributed multipoint multimedia conferences ) take no measures to encrypt their data

    隨著計算機技術的迅猛發展和技術在各行各業中的廣泛,人們通過計算機傳輸數據日益增加,其中包含了各種機密信息(例如軍事機密信息、商業機密信息、個人隱私信息等) 。由於目前的系統缺乏足夠的安全性,不能有效防止上所傳輸的信息被非法竊取和修改,因而極大地限制了計算機技術在日常工作中的。當前,基於voip技術的各種網路應用,如msnmessenger , dialpad ,以及一些分散式多媒體會議系統,竟然未採取任何加密措施
  3. The ids of the paper is network - based anomaly detection system. with the help of data mining technology, we bring forward a measure to describe the normal state of the network traffic and user behavior and extracting the useful rule from large network data. so we can establish the knowledge warehouse which describe the normal state of the network traffic and user behavior. the knowledge warehouse can be the standard in order to judge the normal state. we can find the dubitable connections according to account the state and anomly instances of connections

    論文在描述網路應用戶行為時採數據挖掘技術從海量的數據中提取有的規則,構建了一個描述正常狀態下的網路應用戶行為的規則集,這個規則集是來判斷網路應用戶行為是否正常的標準,論文根據這個標準分析當前連接的異常情況,將可疑的連接找出來。
  4. For the short of the hardware resources such as ram, the embedded system could not support the full of tcp / ip protocol and it must expurgate the tcp / ip protocol according to different network application

    因此,必須針對不同的網路應用對協議棧進行刪減,保留其基本功能,以滿足網路應用的需要。嵌入式tcp / ip的實現有硬體固化和軟體兩種方式。
  5. Solving plan of a practical network application fire wall

    一種網路應用層防火墻解決方案
  6. The foreign enterprise chosen is charles schwab, a famous online investment bank in usa and a doubtless model of electronizinig. our traditonal enterprises can learn much from charles schwab. this dissertation analyzed the electronizing moves it has taken in detail and the reason why it succeeded from 5 aspects, such as its management paid high recognition on internet and other information technologies, and implemented foresighted technology - development strategy

    國外案例選擇美國上證券銀行嘉信理財,嘉信理財堪稱e化轉型的典範,它的一些做法對我國傳統企業有很大的借鑒和啟發價值,本文較詳盡地分析了嘉信理財的各種e化舉措,從決策層對科技與網路應用的高度重視和執行具前瞻性的科技發展策略等5方面探討其成功原因。
  7. The design built the wireless lan application platform with the modes of switching in the wireless lan and bar - code scan technology of wireless hand terminal ; made ap switch in warehouse exchanger by lineate method to get in lineate lan of the corporation, and joined the wireless lan into lineate lan by the wireless hand terminal communication to ap with protocols

    整個硬體環境設計採了無線接入方式和無線手持終端、條碼掃描技術建立無線網路應用平臺, ap以有線方式接入立體倉庫交換機與企業有線接通,無線手持終端通過協議與ap通信實現無線與有線連通。
  8. First of all, this paper introduce the markov chain theory. after analying the specifications of http, smtp, ftp, telnet and tcp, we know the tcp session is fit for the markov process. in this paper, we analyze the transitions between states of the application layer with the normal tcp traffic, and build a protocol misusage detection model with the normal traffic in darpa data set

    本文採了馬爾可夫鏈理論,仔細分析了tcp協議規范,並研究分析了典型網路應用層協議http 、 smtp 、 ftp以及telnet ,驗證了基於tcp協議的會話過程就是一個馬爾可夫過程。
  9. Oas application oa circumstance based on internet application

    反映企業在網路應用基礎上辦公自動化狀況
  10. In chapter 3, the push / pull pattern is gived out for the system realtime alarm. and the file interface of the alarm data, the algorithm of alarm position based on mapping and the algorithm of alarm icon position on the topological graph are designed. after explaining the principle of network software development using the windows socket, the push technology based on csocket is adopted to push alarm event and the pull technology based on http to pull the alarm page

    第三章,給出了實時告警的push pull模式,設計了告警數據文件介面、基於映射的告警點定位新演算法和告警圖標拓撲圖上定位演算法,給出了基於windowssocket進行網路應用開發的原理,採基於csocket的push技術來實現告警事件的推送,利傳統的基於http的pull技術來實現告警頁面的拉取。
  11. After traditional computer network theory and technique has come through a few years of development and change, it has been more and more unconformable to today and future network application development. when face the problem of high outburst and self - similarity of the network flow, complexity and controllability of the cosmically network system, dependability of the network, it has been more and more disability

    傳統的計算機理論和技術在經歷了幾十年的發展變化之後,已經越來越不能適今天和未來網路應用發展的要求,在面臨流量的高突發性和自相似性、大規模系統的復雜性和可控性、可信性等問題面前顯得越來越無力。
  12. With the popularization of application of computer network and development of telecommunication and computer technology, authentication / accounting server of network access server ( nas ) becomes an important part of remote access device

    隨著計算機網路應用日益普及和通信技術、計算機技術的發展,接入服務器( nas )認證計費系統已經成為遠程接入設備的一個重要組成部分。
  13. Instruction detection technology is core in instruction detection system, it include abnormity instruction and abused instruction detection, on the basis of traditional network security model, ppdr model, instruction detection principle and instruction technology analysis, the author has brought forward instruction detection method based genetic neural networks, adopted genetic algometry and bp neural networks union method, and applied in instruction detection system, solve traditional bp algometry lie in absence about constringency rate slowly and immersion minim value

    入侵檢測分析技術是入侵檢測系統的核心,主要分為異常入侵檢測和誤入侵檢測。作者在對傳統安全模型、 ppdr模型、入侵檢測原理以及常入侵檢測技術進行比較分析的基礎上,提出了一個基於遺傳神經的入侵檢測方法,採遺傳演算法和bp神經相結合的方法?遺傳神經網路應用於入侵檢測系統中,解決了傳統的bp演算法的收斂速度慢、易陷入局部最小點的問題。
  14. With the rapid development of internet and network application technology, network multimedia application is an important application of internet, with the development of multimedia compress technology and abundance of media issue ' s method, vod is to be more and more attractable in kinds of fields

    隨著的發展以及網路應用技術的飛速發展,多媒體已經成為internet的重要一種,其中隨著多媒體文件壓縮技術的發展以及發布手段的豐富,視頻點播技術也越來越引起各方面的注意。
  15. Ibsc internet business solution center

    國際網路應用中心
  16. An evaluation that demonstrates a wsn application for car guiding with a sensor programming environment, spe, to exhibit the utilities of the novel framework is also conducted

    為了評估此架構,我們使無線感測器程式開發環境( spe )來撰寫無線感測網路應用程式以作為汽車導航的?例,在這?例展現出此新架構的效
  17. Applying multimedia network to construct computer laboratory

    多媒體網路應用計算機實驗室建設
  18. Along with the popularization of computer network applications, network security has become a concernful problem

    隨著計算機網路應用的普及,安全已經成為不容忽視的問題。
  19. Based on the dsp development board, the author finishes the hardware debug about the multi - channel buffered serial port ( mcbsp ) receiving the output signal from the gps if collector and resolves the software program of the receiving buffer of the multi - channel synchronous serial data, data integration, udp datagram encapsulation and network interface driver, etc. the real - time udp datagram receiving, data frame de - encapsulation and high speed data memory are implemented, and a friend application interface with windows message is developed on the pc

    基於dsp開發板,作者完成了dsp的多通道緩沖串口( mcbsp )接收gps中頻接收機輸出信號的硬體調試,並解決了多通道同步串口數據的接收緩沖、數據合併、 udp數據報裝幀及介面驅動等軟體編程。在pc端,通過mfc的網路應用開發類casyncsocket實現udp報的實時接收、數據解幀譯碼、高速存貯,利windows消息機制開發了程序友好界面。
  20. Little endian architectures require byte - swapping - a slight performance disadvantage for networked applications

    低位優先架構要求位元組交換對網路應用程序來說,這是一個輕微的性能弱點。
分享友人