規則網路 的英文怎麼說

中文拼音 [guīwǎng]
規則網路 英文
regular net
  • : Ⅰ名詞1 (畫圓形的工具) instrument for drawing circles 2 (規則; 成例) rule; regulation 3 [機械...
  • : Ⅰ名詞1 (規范) standard; norm; criterion 2 (規則) regulation; rule; law 3 (姓氏) a surname Ⅱ...
  • : Ⅰ名詞1 (捕魚捉鳥的器具) net 2 (像網的東西) thing which looks like a net 3 (像網一樣的組織或...
  • : 1 (道路) road; way; path 2 (路程) journey; distance 3 (途徑; 門路) way; means 4 (條理) se...
  • 規則 : 1. (規定的制度或章程) rule; regulation; ordination; prescribed procedure; rope 2. (整齊) regular
  • 網路 : 1. [電學] network; electric network2. (網) meshwork; system; graph (指一維復形); mesh
  1. The structure of this paper goes like this, the first chapter introduce the development of e - b / l in practice and in laws. and draw a conclution that the electrification of the b / l is a history tide. in the second chapter, on the basic of reseach the security trap in e - b / l running, 1 conclude six security elements of, e - b / l : the liability of the system, the authenticity of dealers ' identity. the integrity and secrecy of electronic data, and the validity and evidence effectiveness of electronic data. from the third chapter to the eighth, 1 reseach these elements one by one. the third chapter introduce the establishment of the e - b / l security system, and some related laws the fourth chapter introduce the certification authority of e - b / l. in the fifth chapter, 1 introduce the encrypt of electronic information and some countries ' control on use / import / export crytography. the sixth chapter introduce the concept and principle of digital signature, and reseach some related legal issues. the seventh chapter reseach the legal demand of validity, then come to a conclution that to establish a independent electronic information system is necessary. in the eighth chapter, 1 reseach some countries " regulation on the evidence effectiveness of electronic data

    第二章在分析電子提單運作中的安全隱患的基礎上,歸納出其六大安全要素,即系統的可靠性、交易者身份的真實性、數據電訊的機密性和完整性、數據電訊的合法有效性以及交易者行為的不可抵賴性。第三章到第八章分別對這六大要素進行分析:第三章介紹了電子提單安全體系的建立以及系統安全保護法,第四章介紹了電子提單的安全認證機構,第五章介紹了信息加密技術以及各國立法對密碼技術的進出口及使用的控制,第六章介紹了數字簽名的概念及原理,並以bolero為例介紹了數字簽名的技術方式,對有關法律問題作了論述;第七章首先論述了電子提單對有效性的法律需求,然後結合國內法和國際定論證了數據電訊制度產生的必然性;第八章通過對各國立法對電子證據的法律效力的定,論述了對電子交易至關重要的數據電訊的不可抵賴性。
  2. As a whole the system may compart three modules : ndis drivers in the kernel mode, the dll program in the user mode and the user application program, adopting the share memory technology three modules realize the data share of the control canal rule, the encapsulation data and the network neiborhood name and so on, so we can easily finis1 " the packet authentication by the control canal rule, improve the filtering efficiency of the system. whereas the current of firewall technology, the system has wide utily value and business value. this software is based on windows 2000 operating system, the programming language is chosen as visual c + + 6. 0 and win2000 ddk

    從總體上可以劃分為以下三個模塊:核心層的ndis驅動程序、應用層的動態鏈接庫程序以及用戶應用程序,這三個模塊之間通過內存共享技術完成對控管、封裝數據、上鄰居名字列表等數據的讀寫操作,從而很方便的根據控管實現了對封包的認證操作,提高了系統的過濾效率。鑒于目前防火墻技術的發展趨勢,本系統具有廣泛的實用價值和商業價值,因此具有一定的推廣前景。軟體的開發基於windows2000操作系統,開發語言採用visualc + + 6 . 0和win2000ddk 。
  3. The ids of the paper is network - based anomaly detection system. with the help of data mining technology, we bring forward a measure to describe the normal state of the network traffic and user behavior and extracting the useful rule from large network data. so we can establish the knowledge warehouse which describe the normal state of the network traffic and user behavior. the knowledge warehouse can be the standard in order to judge the normal state. we can find the dubitable connections according to account the state and anomly instances of connections

    論文在描述應用和用戶行為時採用數據挖掘技術從海量的數據中提取有用的,構建了一個描述正常狀態下的應用和用戶行為的集,這個集是用來判斷應用和用戶行為是否正常的標準,論文根據這個標準分析當前連接的異常情況,將可疑的連接找出來。
  4. The thesis presents a expert system for identifies power quality disturbance signal, after compare the artificial neural network, nearest neighbors, fuzzy decision, and expert system. we bring forward the project flexible rule - based expert system, according to the characteristic inspection and measure system, and has a deep research on the problem of this system. this project for disturbance classifies has lower mistake ratio and facility maintenance

    採用專家系統的方法進行模式識別,在對神經、最近鄰法、模糊邏輯和專家系統及一些交叉方法等模式識別方法進行比較分析的基礎上,根據電能質量信號故障分析的特點,提出了採用基專家系統的方法,該模式識別方法具有便於擴展、修改和識別率高等特點。
  5. According to this objective, drawing on the viewpoints of neo - institution economics, the first part of this thesis emphasizes on expatiating the meanings of institution and its evolution laws, the characters and habitudes of network economy, as well as the institution evolution in society, domain and enterprise arrangements ; the second part of this thesis analysis the infection and its mechanism of the before - mentioned institution evolution on enterprise competition while summing up the new principia, characters and patterns of enterprise competition in network economy ; the final part of this thesis argues the enterprise competing stratagem in different domain evolution phrases hi network economy as the conclude of whole paper

    有鑒於此,本文第一部分中吸收了新制度經濟學的理論觀點,著重闡述了制度的含義與變遷律,經濟的特點和性質,以及由於經濟所帶來的社會層次、產業層次和企業層次的制度變遷;在本文的第二部分分析了上述三個層次的制度的變遷對企業競爭行為分別產生的影響及其機制,歸納出經濟下企業競爭的新的特點,新的模式和新的競爭原;在文章的第三部分討論了經濟引發的不同演化階段的產業的特點,並分析了其中企業的競爭戰略。
  6. The technology, illation rule and parameter of neural network are supposed to be held in database and make a delicate database system

    知識和推理、神經參數都必須由數據庫保存,使數據庫系統實現知識數據的一體化存儲與管理。
  7. Online instant lottery uses computer and communication network system as its distribution carrier. the sale of the lottery tickets is concentrated in lottery - selling halls, using the betting card as the final accounts tool. it is an instant electronic lottery completing the whole lottery - buying, betting and identification process in the betting terminal according to a certain betting rules

    在線即開型彩票是以計算機和通信系統作為發行載體,通過彩票銷售廳集中銷售,使用投注卡作為結算工具,按照一定的玩法,在投注終端完成購票、投注和兌獎全過程的一種即開型電子彩票。
  8. 9. a mixed repository which based on rule and ann was studied. the method of reasoning, controlling and repository mange was discussed

    研究了基於和神經的混合專家知識庫,並對推理機制、控制策略和知識管理等問題進行了深入的討論。
  9. The capital ' s underground system, which seems unable to cope with either a hot day or a sudden downpour of rain, is beset by delays as a misconceived renovation plan goes wrong again and again

    而既無法抵擋熱浪的侵襲又無法應對不期而至的暴雨的地鐵由於一次又一次的錯誤劃,面臨著嚴重的列車晚點問題。
  10. Approach to rule extraction and generation using rough multilayer perceptron networks

    提取及生成方法研究
  11. First, it expatiates the reasons in theory why the private - owned enterprises have advantages in the international competition during the course of investing abroad. then, the article discusses about the content of private - owned enterprises " competition advantages broadly, including the perspicuity of the property relations, the flexibility of the management mechanism, the advantages of the small - scale technology, the cost advantages and the more perfect abroad market network system. at last, with a verifying survey on private - owned enterprises of zhe ' jiang province, by utilizing the analytical method of quantization, the article fully affirm the private - owned enterprises " ability to absorb the key elements, and the ability to combine, develop and manage resources

    本文第二部分著重分析了民營企業對外投資的優勢,首先從理論上闡述了民營企業具有何種國際競爭優勢;然後具體論述了民營企業的競爭優勢內容,包括產權關系明晰、經營機制靈活、小模技術優勢、成本優勢以及比較完善的海外市場體系等等;最後,結合對浙江民營企業的實證性調研,運用量化分析方法,對民營企業的要素吸附能力、整合開發能力以及資源運營能力給予了充分肯定,同時也發現了某些不足之處。
  12. In this paper, we study focus on building intrusion detection model based the technique of data mining ( dm ). firstly, the paper designed a scheme to modeling intrusion detection based dm and bright forward the idea of descriptive model and classified model to intrusion detection. secondly, we designed and implemented a net data collection system with high performance and a scheme to pretreat net data. thirdly, after studying the algorithms to mine association rule and sequence rule in net data, we extended and improved the algorithms according to the characteristic of net data and the field knowledge of intrusion detection

    首先設計了基於數據挖掘技術的入侵檢測建模方案,提出使用該技術建立入侵檢測描述性模型和分類模型的思想,並用分類判決樹建立了入侵檢測分類模型;其次,設計和實現了一個高性能的數據採集系統和數據預處理的方案;然後,在對關聯挖掘和序列挖掘演算法進行研究的基礎上,結合數據的特性和入侵檢測領域的知識對演算法進行了擴展和改進,挖掘出了數據的關聯模式和序列模式;最後,研究了描述性模式的應用,並設計出基於模式匹配的入侵檢測引擎,該引擎具有誤用檢測和異常檢測功能。
  13. When a query on the relational views is issued, it is repeatedly rewritten using the rules. this process generates number of navigation plans to compute the query ; the cost of these plans is then estimated based on a simple cost model that takes network accesses as the primary cost parameter. in this way, an efficient execution plan is selected for processing the query

    當根據關系視圖發出一個查詢時,它被重復的使用重寫來重寫,這個過程產生大量的導航方案來運算查詢。這些方案的代價是根據代價模型來評估的。代價模型是用訪問作為原始的代價參數。
  14. If accessing a patent on the internet were to constitute an infringement, this would go against the fundamental quid pro quo on which patent law is based, eisenberg contends

    艾森柏格斷言,如果在上儲存或取得專利標的就會構成侵權,無異將推翻目前專利法所依循的游戲
  15. Regularization of queuing network serviced by servers

    多服務器排隊行為
  16. Institution is the regulation aggregation, is a series of the regulation network that are composed of formal constraint and informal constraint

    制度是的集合,是一系列正式約束和非正式約束組成的規則網路
  17. The paper gave disperse pattern of laplace function under in - uniform grid, which fulfills acceptance character and error maximization theory. it also has fulfills the character of extreme value

    本文在一個不規則網路上離散拉普拉斯運算元的差分格式,不但能滿足相容性及極值原理,而且還具有誤差極少性質。
  18. The fluorescence intensity of tb observed in pt / tb sol was stronger than that in powders. the network made of o, ti, such as sol and noncrystalline powders, determined the fluorescence intensity of pb

    Pb離子的熒光與pb所處環境相關,既可出現在液相體系,又可出現在固相粉末體系中,也即處于o , ti等離子構成的無規則網路結構狀態下的溶膠、凝膠或非晶固態時。
  19. The main results are as follows : 1. dynamical behavior in coupled map lattices with regular topology are investigated by using lyapunov componet. 2. dynamical behavior in coupled map lattice with scale - free topology are investigated in detail. our strategy is to apply three feedback control methods, including constant feedback and two types of time - delayed feedback, to a small fraction of network nodes to reach desired synchronous state

    本論文正是對具有無標度拓撲結構的耦合映象格子的動力學行為進行了研究,主要內容和創新點如下: 1 .利用lyapunov指數對具有規則網路結構的耦合映象格子系統的動力學行為進行研究; 2 .對具有無標度結構的耦合映象格子系統的動力學行為進行了詳細研究;為了使系統達到同步,我們的策略是應用三種反饋方法(常數反饋和兩種時延反饋)對系統的部分節點進行控制以達到我們期望的狀態。
  20. In designing of the information security guarantee system of the telecom business enterprises, we need to follow the wooden pail principle of the network information security, the integrality principle of the network information security, security evaluation and balance principle, standardization and consistency principle, the principle of the combination of the technology and management, the principle of unified planning and separate implement, grade - classification principle and maneuverability principle

    然後,研究電信企業的信息安全保障體系的設計問題。在設計信息安全保障體系時,必須遵循信息安全木桶原信息安全整體性原、安全性評價與平衡原、標準化與一致性原、技術與管理相結合原、統一劃分步實施原、等級劃分原和可操作性原
分享友人