隱式計算機 的英文怎麼說

中文拼音 [yǐnshìsuàn]
隱式計算機 英文
hidden computer
  • : Ⅰ動詞(隱瞞; 隱藏) hide; conceal Ⅱ形容詞1 (隱藏不露) hidden from view; concealed 2 (潛伏的; ...
  • : 名詞1 (樣式) type; style 2 (格式) pattern; form 3 (儀式; 典禮) ceremony; ritual 4 (自然科...
  • : Ⅰ動詞1 (計算) count; compute; calculate; number 2 (設想; 打算) plan; plot Ⅱ名詞1 (測量或計算...
  • : Ⅰ動詞1 (計算數目) calculate; reckon; compute; figure 2 (計算進去) include; count 3 (謀劃;計...
  • : machineengine
  • 計算機 : computer; calculator; calculating machine; computing machinery; electronic wizard; processor; pro...
  • 計算 : 1 (求得未知數) count; compute; calculate; reckon; enumerate 2 (考慮; 籌劃) consideration; pla...
  1. In this thesis, used thermocouple to sense the temperature in the space of the hearth, attributed the thermocouple based on calorifics and scientific arithmetic, acquired data by data acquiring card, processed data according to the demand of setting up temperature model and drawing graphics and then caculated the coordinates of isothermal points and normals of isothermal facets, ascertained the order of connecting points and the model of construct, drawed the isothermal facet of temperature field with opengl at last

    通過數據採集板卡進行數據採集並與介面進行數據處理。然後,將處理后特殊點的溫度數據依據marchingcubes演法建立數學模型求取等溫面上的點的坐標及各點的法向量等。最後,確定的三維坐標點的連接順序和拓撲模型,利用opengl進行等溫面的繪制、消和模變換等工作。
  2. With the rapidly development of computer network technology and the widely use of network technology in every walk of life, people transmit data through computer network more and more frequently, including all kinds of secret information ( for example, military secret ; bussiness secret ; personal private information ). today, as a result of poor security of our network system, we can not prevent the transmittied information from stealing and modifying unlawful. thus, the computer network technology is applied to our daily life restrictedly. recently, many network applications with voip ( for example msn messenger ; dialpad ; distributed multipoint multimedia conferences ) take no measures to encrypt their data

    隨著網路技術的迅猛發展和網路技術在各行各業中的廣泛應用,人們通過網路傳輸數據日益增加,其中包含了各種密信息(例如軍事密信息、商業密信息、個人私信息等) 。由於目前的網路系統缺乏足夠的安全性,不能有效防止網路上所傳輸的信息被非法竊取和修改,因而極大地限制了網路技術在日常工作中的應用。當前,基於voip技術的各種網路應用,如msnmessenger , dialpad ,以及一些分散多媒體會議系統,竟然未採取任何加密措施
  3. The article points out the importance and necessity of the information - security from its actuality in our country. the resources in the information system, for instance, hardware, software, data, document, operator, meterial and so on, are evaluated and gived safety grade firstly. and then, it analyses the menace including the nonauthorized access, the information leak, the refused sevice, the internal objection which the system will take. the following are the corresponding control police : confirm the users " rights and duties, including the mode of using account, the limit of accessing resource, the application of password, the building of backup ; confirm the administrators " right and duties, including physical safety, system configuration, account configuration and usufruct, password management, audit and control, backup and individual intimity ; run - of - mill measure of security defence, including access control, symbol and identification, integrality control, password technique, firewall system, audit and resumption, safety of operating system, safety of database system, defence of computers " virus and resisting - deny protocol. in the end, the article offers the strategies of disposing the safety - accident and analyse after ithow. to report it, how to solve it in phase, and how to avoid it happening again. in a word, the article presents a holistic resolvent about keeping away the information system ' s security, and supplies a essential frame for its configuration, management and application

    然後,對系統可能受到的威脅,包括非授權訪問、信息泄漏、拒絕服務和內部缺陷等進行分析,並提出了相應的控制策略:確定用戶的權力和責任,包括帳戶使用方、資源訪問權限、口令應用以及建立備份等;確定系統管理員的權力和責任,包括物理安全、系統配置、帳戶設置及使用權限、口令管理、審和監控、備份以及個人私等方面;一般性的安全防護措施:存取控制、標識和認證、完整性控制、密碼技術、防火墻系統、審和恢復、操作系統安全、數據庫系統安全、病毒防護和抗抵賴協議等。最後,對事故處理和事後分析提供策略,如何報告安全事故,如何協調解決安全事故,如何避免安全事故再次發生。總之,本文對信息系統安全防範工作給出一個整體的解決方案,為其在配置、管理和應用方面提供了基本的框架。
  4. Edm has some remarkable advantages over traditional models, includes using implicit causal models, self - learning capacity, weak dependence on domain knowledge, wide applicability, robustness, self - adaptability, and population - based searching, etc. tracing back its intrinsical ideas, edm is just making use of the nature ' s decision making strategy, natural selection, to solve the decision making problems faced by human or the intelligent agents

    進化決策主要利用了進化演法與形模型相結合所具備的自動建模能力,它具有因果模型、自學習、弱知識依賴、應用廣泛、穩健性、自適應和群體搜索等優勢。追根溯源,進化決策的基本思想正是利用大自然的決策制(自然選擇)來解決客觀世界所提出的決策問題,而自然進化又是已知的能力最強的問題求解范型。
  5. Currently, the army is developping military network based oa project with effort among which military email transferring system is an essential application module. this paper proposed a data model of military email transferring as well as detailed design scheme according to the potential threat in email service system, practical condition of current military network and official model as well as document transferring process. it discussed the security requirement of military email transferring system in detail as well as analyzed and design relevent data model, mail exchange protocol and application requirement of cryptogram management

    該文針對電子郵件服務系統中存在的安全患,基於對目前國內外電子郵件安全技術的分析研究,立足於現有軍事網路的實際現狀,根據目前軍隊的辦公模、公文傳輸流程,提出了一種適合於軍隊辦公自動化中軍用電子郵件傳輸的數據模型及具體的設方案,詳細討論了軍用電子郵件傳輸系統的安全服務需求,對相關的數據模型、郵件交換協議、密碼管理的應用需求等進行了詳細的分析和設
  6. Parameter form becomes mainstream of geometric design because of characteristic such as : simple construction, easy computation, etc. while near 20 years research illustrates implicit form has advantage that parameter one has n ' t. in this paper only the application and properties of implicit curves in cagd have been researched

    參數形以其構造簡單,容易等特點而流行於世並成為幾何設的主流,然而近20年的研究與使用經驗表明也有參數形無法比擬的優點,本文僅就曲線在輔助幾何設中應用及性質進行了分析和研究。
  7. In this paper, river water quality prediction is integrated with water pollution control measures. two parameters, water environmental capacity and pollution index are selected for pollution control measures. the objective is achieved after the development of simulation model using one - dimensional advection dispersion equation. the model algorithm and computer program is an improvement over the existing water quality models, since the model solution involves four point implicit upwind schemes for water quality prediction and pollution control measures at each grid point. model simulation results the assessment of water environmental capacity that yield the acceptable and realistic pollutants concentration in order to maintain water quality objectives. the pollution and overall pollution index of the river is suggested for integrating number of contaminants variables into one index. study provides the mathematical and scientific procedure for water quality management. the new approach is helpful for the water pollution control and to study the impacts of waste effluents on the river system for strategic planning purposes

    本文將水質預測及水污染控制措施有地結合,選取水環境容量和污染指數作為水污染控制的參數.這樣,一維對流-擴散水質方程的求解除就是實現本研究目的的關鍵.本研究採用的模型在現有的水質模型基礎上有所改進,因為其採用四點對水質進行預測,推求可接納污染物的環境容量值及為保證水質而限定的污染物濃度值,從而制定相應的水污染控制措施.為整體考慮各種污染物的情況,建議採用河流的污染指數進而推求綜合污染指數.總之,本研究為水質保護提供了科學的方法,該法對水污染控制及污水對河道水質的影響是實用有效的
  8. Abstract : in this paper, river water quality prediction is integrated with water pollution control measures. two parameters, water environmental capacity and pollution index are selected for pollution control measures. the objective is achieved after the development of simulation model using one - dimensional advection dispersion equation. the model algorithm and computer program is an improvement over the existing water quality models, since the model solution involves four point implicit upwind schemes for water quality prediction and pollution control measures at each grid point. model simulation results the assessment of water environmental capacity that yield the acceptable and realistic pollutants concentration in order to maintain water quality objectives. the pollution and overall pollution index of the river is suggested for integrating number of contaminants variables into one index. study provides the mathematical and scientific procedure for water quality management. the new approach is helpful for the water pollution control and to study the impacts of waste effluents on the river system for strategic planning purposes

    文摘:本文將水質預測及水污染控制措施有地結合,選取水環境容量和污染指數作為水污染控制的參數.這樣,一維對流-擴散水質方程的求解除就是實現本研究目的的關鍵.本研究採用的模型在現有的水質模型基礎上有所改進,因為其採用四點對水質進行預測,推求可接納污染物的環境容量值及為保證水質而限定的污染物濃度值,從而制定相應的水污染控制措施.為整體考慮各種污染物的情況,建議採用河流的污染指數進而推求綜合污染指數.總之,本研究為水質保護提供了科學的方法,該法對水污染控制及污水對河道水質的影響是實用有效的
  9. This paper begins with the drawbacks of the traditional reading practice, emphasizes on the designing programs and principles of computers. such as " the discoloring design of characters " leaping - type ", " the hiding design of characters " leaping - type ", " the regulator ' s design of reading speed ", " the time - limited automatic page - turning design ", " sound - controlling design of characters " discoloration " etc. then makes further statements about the advantages of reading practice design with assistance of computer, namely, the arousal of students " reading interest using fresh reading materials with vital forms ; the efficient controls of reading procedure, the realization of reading individualization, the realization of sounds " visualization

    本文從分析傳統閱讀訓練的缺陷入手,重點介紹「文字躍進變色的設」 、 「文字躍進匿的設」 、 「閱讀速度調節器的設」 、 「限時自動翻頁的設」 、 「聲控文字變色的設」等設方案及其設原理,進而闡述輔助閱讀訓練的優勢,即用形活潑的閱讀材料激發學生的閱讀興趣,有效地控制學生的閱讀過程,實現閱讀的個性化,實現朗讀聲音的可視化。
  10. In this paper, it s applications were explained from seven different fields, the common zeros of two polynomials, the multiplicities of roots and the discrimination of a polynomial, searching the equations suitable for a algebraic number, implicating a rational curve over the plane, computing the zeros of a nonlinear algebraic equation and gathering the discrimination surface of the sas in automated theorem proving on inequalities

    本文從7個方面闡述了結的應用,包括判斷2個多項的公共零點,判定多項是否有重根,多項的判別,尋找代數數滿足的方程,平面有理曲線的化,非線性代數方程組求解和不等器證明中半代數系統邊界曲面的獲得等。
  11. ( 3 ) the methods of determining the degree of ii ? curves based on the boundary of objects and tightly fitting objects with ip curve are proposed. the algorithms would help to fit and describe objects automatically by computer

    這為自動選取適當次數的含多項曲線擬合與描述物體提供了依據,同時減少了圖像物體識別中人的參與。
  12. Check with your hardware vendor for any bios updates. disable bios memory options such as caching or shadowing. if you need to use safe mode to remove or disable components, restart your computer, press f8 to select advanced startup options, and then select safe mode

    與硬體商聯系確定是否因bios更新而使某些藏組件失效了.如果你使用安全模,那麼,重啟你的,按f8選高級啟動選項,接下來你就可以選取安全模
  13. Since conventional approaches were ineffectual, theoretical analysis and calculation were applied to find out the fault area and the reasons, and the fault was eliminated without affecting the safe operation of the unit

    由於常規的消缺辦法無法奏效,通過觀察總結出含規律,並依據理論分析和公找出故障范圍和原因,在不影響組安全運行的基礎上消除了缺陷。
  14. Based on the " application on faults diagnosis of rotating machine in hidden markov models " ( national nature science fund project, no : 50075079 ), the hidden markov models ( hmms ) dynamic pattern recognition theories and methods are studied, then proposed the applications in faults diagnosis of rotating machine by hmm methods and developed the faults diagnosis software based on hmm

    本文以國家自然科學基金項目「基於markov模型的旋轉械故障診斷新方法的研究」 (編號: 50075079 )為基礎,提出的博士學位論文題目為「 hmm動態模識別理論、方法以及在旋轉械故障診斷中的應用」 。本文以大型旋轉械為研究對象,研究了hmm動態模識別理論與方法在旋轉械故障診斷中的應用,開辟了旋轉輔助故障診斷的新途徑。
  15. The drawback of the password is that it is easily given away. therefore there are great security threats in the access to information and resource in computer, hi an effort to confront the threats biometrics ( such as fingerprints, keystroke dynamics, and so on ) combined with the traditional verification methods may greatly increase the system security

    傳統的系統登錄方為單一的口令認證,其弊端是口令易被泄露,帶來安全患,而採用人的生物特徵(如指紋和擊鍵模等)結合傳統認證方可增強系統的安全性。
  16. The portable, extensible toolkit for scientific computation, petsc, has become a model of the high performance numerical software which gains huge attention and wide use in commuting community throughout the world. our selection of petsc as the target model of studying is based on following reasons : petsc uses mpi for all parallel communication, which is most fittable for general scalable computing, especially on our pc - cluster platform. petsc is a general purpose suite : of tools for the scalable solution of partial differential equations and related problems, which is much in accord with our research focus

    可移植、可擴展科學軟體包petsc是近來在國際上很受關注、應用廣泛的高性能并行數值軟體開發典範之一,我們對它的重點學習與研究主要出於以下考慮: petsc基於mpi并行程序設平臺,適合於我們常用的并行尤其是群系統;它以偏微分方程、代數方程求解功能為實現重點,非常切合於我們的主要研究方向和應用需求;尤為重要的是,在其良好的軟體使用模和執行性能下含的先進軟體設思想和程序實現方案,對我們今後的數值軟體開發很有借鑒意義。
  17. Nowadays, 99 % web site organize their information to web paper by html which is a semi structure format, and provides no semantic, and data organized by it can not be understand by computer, so computer can not analyze those data - in order to help people to find the information they want, some filter systems based on keywords appears. and those systems have became a indispensable part of the filter techniche. on the base of researching those systems, we provide a arithmetic based on qa

    現在, 99的web站點的格都是採用html這種半結構化的數據格來表示,而html標記語言缺乏對語義的支持,無法讓理解信息所蘊涵的語義,從而也無法從這些數據中分析出含的信息。為了幫助用戶從基於html的文檔中查找有用信息,出現了很多基於關鍵詞的過濾系統,另一方面,形成了面向網際網路的過濾技術中不可或缺的一部分。
  18. A computer system that is used to control a larger system is termed an embedded system. reliability and real - time are primary attributes of embedded systems

    嵌入系統是藏在更大的系統中的系統,相對于普通的桌面系統,嵌入系統要求有更強的實時性,更高的可靠性。
  19. In computer security, a hidden software or hardware mechanism that permits system protection mechanisms to be circumvented. it is activated in some nonapparent manner

    安全學中,使系統保護制用陷阱藏起來的一種藏的軟體或硬體構。它通常以不透明方工作。
  20. In this paper , under the background of " digit fujian " electronic government affair network platform the means used by hackers to intrude computer network systems have been thoroughly discussed and analysed. and the primary causation of intruding into a network - the security leaks of a system was pointed the architecture of distributed vulnerability scanner is introduced

    本文在「數字福建」電子政務網路平臺的背景下,系統地討論了現有網路安全患,分析了黑客可能入侵電子政務平臺網路的常用手段,指出網路被入侵的根本原因在於系統安全漏洞的存在。並介紹漏洞掃描系統的工作原理及研究現況,指出傳統漏洞掃描系統的不足,提出基於分散漏洞掃描系統的模型。
分享友人