網路終止 的英文怎麼說

中文拼音 [wǎngzhōngzhǐ]
網路終止 英文
nt network termination
  • : Ⅰ名詞1 (捕魚捉鳥的器具) net 2 (像網的東西) thing which looks like a net 3 (像網一樣的組織或...
  • : 1 (道路) road; way; path 2 (路程) journey; distance 3 (途徑; 門路) way; means 4 (條理) se...
  • : Ⅰ名詞1 (最後; 末了) end; ending; finish 2 (指人死) death; end 3 (姓氏) a surname Ⅱ形容詞(...
  • : Ⅰ動詞1. (停止; 攔阻) stop; cut out 2. (截止) close; end Ⅱ副詞(僅; 只) only; just Ⅲ名詞(姓氏) a surname
  • 網路 : 1. [電學] network; electric network2. (網) meshwork; system; graph (指一維復形); mesh
  • 終止 : 1 (結束) stop; end; suspend 2 (停止) termination; annulment; abrogation 3 [音樂] cadence; 終...
  1. The scts ( simulated cable training system ) is a troubleshooting & training system for students that are learning about termination of network cables, using the 568a, 568b, & usoc wiring standards

    被模仿的纜繩培訓系統)使用568a ,是得知纜繩, 568b的學生的查明故障培訓系統, usoc接線標準。
  2. 25 reynolds r, chamberlin m j. parameters affecting transcription termination by escherichia coli rna. ii. construction and analysis of hybrid terminators

    研究synechococcus sp . wh8102的不依賴子可促進對該菌基因調控的理解。
  3. Former ssb analyst jack b. grubman, in settlement of the charges against him, 1 which he neither admits nor denies, has agreed to pay 7. 5 million as disgorgement and an additional 7. 5 million in penalties which he may not treat as tax deductible or seek to recover from an insurance carrier or other third party

    而其中三家銀行的一些明星分析師和銀行家則被指控本身簽發了欺詐性的研究報告。因此,美林前明星分析師grubman和henry blodget則雙雙個人被罰,前者罰款1500萬美元,後者罰款4萬美元,並生禁從事證券業務。
  4. Based on the single genetic algorithms and the features of the distribution network reconfiguration, this dissertation makes a further study on such aspects as selection operator, crossover operator, mutation operator, termination conditions and etc, thus, puts forward improved genetic algorithms. the dissertation makes certain study on the optimization reconfiguration model of distribution network. it puts forward a multi - objective model and according to the theory of variable weight coefficients transforms the multi - objective problem into a single - objective one

    針對目前遺傳演算法在配電重構應用中的不足,論文著重從選擇運算元、交叉運算元、變異運算元和收斂準則等方面進行了改進,把最優保存策略和兩兩競爭相結合的方法作為新的選擇運算元,採用隨最優個體相對保留代數自適應變化的交叉和變異運算元,把最優個體最少保留代數作為演算法的條件。
  5. An end to the annoying and useless " fsf vs. linux " net discussion

    上那些惱人且無謂地討論" fsf vs . linux "話題的
  6. Inbound network traffic from outside must be terminated in the dmz

    來自外部的入站傳輸必須在dmz中。
  7. Totalitarian regimes can filter content on the web and use it to track dissidents, but human ingenuity means that attempts to block the flow of information altogether are doomed to fail

    極權主義的政體能夠對的內容進行過濾並使用它來追蹤那些持反對政見的團體,但是人類別出心裁的設計卻警示了我們任何試圖要阻信息流的行為都歸要遭受失敗。
  8. Of course, to recall keynes, eventually, we re all dead, but more than computational time is at stake, since we may want our neural net to make more than one cut in the space of possible inputs

    當然,為了記起keynes ,最我們都切斷了與外界的聯系,專心思考。但是在計算時間之外,我們仍瀕臨危險,因為我們需要自己的神經對可能輸入的空間進行不一次的切割。
  9. The nm system needs to support the service system of the business department and link the attribute information of leased line users. to than end, summary statistics concerning the provisioning, termination and quality of leased lines may be provided in a qos report

    管理系統要支持營業部門的業務系統,實現專線用戶屬性信息的關聯,可將專線開通、和質量信息進行匯總統計,提供服務質量報告。
  10. This paper provides security analysis of a mutual authentication and key establishing protocol based on elliptic curve cryptography for wireless communication, which can withstand the above attacks and can be used in wireless terminals

    在結合橢圓曲線密碼體制優點的基礎上,提出一種適于無線通信中的相互認證和密鑰建立協議,不僅能有效防上述攻擊,還適于在無線端設備上應用。
  11. Furthermore, these organizing principles have significant implications for developing better drugs, defending the internet from hackers, and halting the spread of deadly epidemics, among other applications

    另外,這些組織原則對于研發更好的藥物、防駭客入侵致命流行病的散播,以及其他的應用,也具有重要意涵。
  12. The following four conditions are allowed us to publish your information : in order to observe the relevant laws and regulations, obey the legal service procedures of jinjiang sansheng shoes material co., ltd in order to preserve the trademark property of jinjiang sansheng shoes material co., ltd in order to preserve user and social masses privacy security on our behalf in urgent case in order to conform to other relevant requirements members population analyse consultation rights are reserved by jinjiang sansheng shoes material co., ltd6

    D用戶同意遵守中華人民共和國保守國家秘密法中華人民共和國計算機信息系統安全保護條例計算機軟體保護條例等有關計算機及規定的法律和法規實施辦法。在任何情況下,百絲達服裝材料有限公司合理地認為用戶的行為可能違反上述法律法規,金勵工藝可以在任何時候,不經事先通知向該用戶提供服務。用戶應了解國際的無國界性,應特別注意遵守當地所有有關的法律和法規。
  13. It reframes the traceback problem as a polynomial reconstruction problem, and uses techniques from algebraic coding theory to provide robust methods of transmission and restriction. the scheme is a new solution to the traceback problem during a dos attack ; the honeypot for ddos, which is a tool of traceback, lures the attacker to believe that he successfully compromised a slave for his needs, convincingly simulating the architecture of a potential ddos attack ; the source - based approach to ddos defense, which is a useful adjunt to traceback systems, deploys a ddos defense system at source - end networks. attacks are detected by monitoring two - way traffic flows, and the attacks originating from source networks are stopped by rate - limiting ; the routing mechanism based on pushback treats ddos attacks as a congestion - control problem

    最後,就有關ddos攻擊反向追蹤問題,從四個方面對其解決方案進行了研究:在分析比較幾種反向追蹤演算法的基礎上,著重研究了代數方法編碼反向追蹤信息的方案,該方案把追蹤重構問題當作多項式重構問題,使用代數編碼理論技術提供魯棒的傳送和重構方法,是dos攻擊過程中的反向追蹤問題的一種新的解決方法; ddos陷阱作為反向追蹤的工具,引誘攻擊者相信自己成功與所需的傀儡主機通話,令人信服地模擬出潛在ddos攻擊體系結構;基於源的ddos防禦方法作為反向追蹤有用的補充,將防禦系統部署在源,通過監控雙向流量檢測攻擊和限制速率來自源的攻擊;基於向後倒推的防禦ddos的由機制把ddos攻擊看作擁塞控制問題,添加功能到每個由器來檢測並優先丟棄可能屬于攻擊的包,通過向後倒推上級由器也得到通知而把這樣的包丟棄。
  14. A free and very good network monitoring tools, in addition to common list all tcp / ip and udp connections, the list of open ports applications, and termination procedures, it provides very detailed information from the version that scheduling service, but also real - time show highlighted new and emerging procedures, and so on

    一個免費又非常好的連接監測工具,除了常見的列出所有tcp / ip和udp連接,列出打開埠的應用程序,並將程序以外,它提供的信息十分詳細,從版本到調度的服務,還能實時高亮顯示新出現的程序等等。
  15. When you try to misuse easecredit banking system through hacking or attempts to destroy the security network system, with immediate effect your account would be closed and the appropriate juristic authorities would be notified

    當用戶通過黑客行為不正確地使用易信銀行系統,或試圖破壞安全系統時,用戶的賬號將立刻被,易信將採取適當的法律行為。
  16. Much reference of the algorithms and models can be got from the performance results for the practical design and layout. system - level simulation of hsupa builds the integrated platform and key models to describe and simulate the common structure and features of the radio network, including cell layout, path gain, traffic model, power control, handover, etc., also the special ones of hsupa, including mac - es / e, node b controlled scheduling, harq, shorter tti, etc.

    所謂hsupa系統級模擬就是要搭建系統級的模擬平臺,對無線的公共結構和特性(例如小區布局,傳播模型,衰落通道,天線模型,功率控制,切換, ue的分佈和移動,業務的建立和中斷等)和hsupa的專有結構和特性( mac - es / e , nodeb控制的調度, harq ,更短的tti )進行描述和建模。
  17. Recover the spectrums first. when analogue transmission had been switched off, then deploy more frequencies for additional multiplexes of sfn or mfn and allowing more capacity for programme providers and additional services

    當模擬輸送后,騰空出的頻譜可為節目供應商及附加服務供應商提供更多頻譜容量,以推出額外的單頻或多頻數碼頻道。
  18. For reference types that consume fixed resources such as large amounts of memory, file handles, or network connections, it is sometimes desirable to employ deterministic finalization to ensure that the object is destroyed as soon as possible

    對于佔用固定資源(例如大量內存、文件句柄或連接)的引用類型,有時需要使用確定性以確保對象被盡快銷毀。
  19. In no event will 2000fun be liable for any damages caused by subscriber s failure to perform subscriber s obligation or for any loss of use, loss of time, inconvenience, commercial loss, loss of profits or savings, costs or expenses or other incidental or consequential damages howsoever arising, whether in contract, or in tort and whether resulting from interference with transmission for any cause whatsoever, over - loading, negligence or strict liability in tort or by reason of any act, omission or default of 2000fun, it s employee, agent consultant or contractor

    2嚴禁所有用戶利用2000fun的設備從事不法活動,包括派發傳送和刊登商業機密淫褻侵權物品,或其它法律上被評定為恐嚇性和淫褻不雅的物品,若違法,們將會立即服務協議,並不作另行通知,若因此對2000fun造成任何損失,客戶需負全部責任並賠償損失。 3嚴禁用戶利用2000fun的設備發放大量的宣傳電郵。
  20. Furthermore, the algorithm is faster than most of the existing algorithms such as girvan and newman s algorithm and its improved versions. also, the algorithm can help to visualize these community structures in network and provide a new approach to research on the evolving process of dynamic networks

    首先,不能保證二分法產生的共體結構是最自然的其次,為二分過程,二分法須事先知道中的共體數目,而該先驗知識在未知中很難獲取。
分享友人