需求網路 的英文怎麼說

中文拼音 [qiúwǎng]
需求網路 英文
requirement network
  • : Ⅰ動詞(需要) need; want; require Ⅱ名詞1. (需用的東西) necessaries; needs 2. (姓氏) a surname
  • : Ⅰ動詞1 (請求; 要求) ask; beg; request; entreat; beseech : 求人幫忙 ask sb a favour; ask a favou...
  • : Ⅰ名詞1 (捕魚捉鳥的器具) net 2 (像網的東西) thing which looks like a net 3 (像網一樣的組織或...
  • : 1 (道路) road; way; path 2 (路程) journey; distance 3 (途徑; 門路) way; means 4 (條理) se...
  • 需求 : needs; need; demand; requirement
  • 網路 : 1. [電學] network; electric network2. (網) meshwork; system; graph (指一維復形); mesh
  1. Based on the principles of ncw discussed, the present study delved further into the c2 system analyze of aerial defence missile network - centric operation with the aerial anti - ballistic missile as the battle background. the main work of this study can be stated as follows : firstly, the author made a deep research on the concepts, the essence and the cardinal fundamentals of ncw, and then made a thorough study on the integrity fire control ability and agility of the network - centric operation requirements, then analyzed the three - layer logical networks structure of the aerial defence missile system in ncw

    本文以區域反彈道導彈為作戰背景,在對中心戰原理剖析的基礎上,對防空導彈化作戰指控系統(本文稱之c2系統)結構進行了分析,主要工作有:首先,結合化作戰的概念、原理,研究了防空導彈系統化作戰的一體化作戰和靈活適應能力,並分析了支持化作戰能力的c2系統邏輯結構,從整體上進行了三層邏輯劃分並分析了各層邏輯的功能和組成。
  2. We now specialize in the design and manufacture of motherboards, panel pcs, barebones, ( ia ) accessories and embedded systems, and our product portfolio is focused on embedded system which could be applied to the uses of internet appliance ( ia ), digital video recorder ( dvr ), network application storage ( nas ), network application devices ( nad ), kiosk, and point of sale ( pos )

    本公司致力於主機板,平板電腦及各類準系統產品的設計及製造,主打嵌入式系統的各項應用,以滿足客戶在,數字監控,存儲設備,應用,多媒體查詢終端, pos機和精簡型電腦等方面應用
  3. The structure of this paper goes like this, the first chapter introduce the development of e - b / l in practice and in laws. and draw a conclution that the electrification of the b / l is a history tide. in the second chapter, on the basic of reseach the security trap in e - b / l running, 1 conclude six security elements of, e - b / l : the liability of the system, the authenticity of dealers ' identity. the integrity and secrecy of electronic data, and the validity and evidence effectiveness of electronic data. from the third chapter to the eighth, 1 reseach these elements one by one. the third chapter introduce the establishment of the e - b / l security system, and some related laws the fourth chapter introduce the certification authority of e - b / l. in the fifth chapter, 1 introduce the encrypt of electronic information and some countries ' control on use / import / export crytography. the sixth chapter introduce the concept and principle of digital signature, and reseach some related legal issues. the seventh chapter reseach the legal demand of validity, then come to a conclution that to establish a independent electronic information system is necessary. in the eighth chapter, 1 reseach some countries " regulation on the evidence effectiveness of electronic data

    第二章在分析電子提單運作中的安全隱患的基礎上,歸納出其六大安全要素,即系統的可靠性、交易者身份的真實性、數據電訊的機密性和完整性、數據電訊的合法有效性以及交易者行為的不可抵賴性。第三章到第八章分別對這六大要素進行分析:第三章介紹了電子提單安全體系的建立以及系統安全保護法規,第四章則介紹了電子提單的安全認證機構,第五章介紹了信息加密技術以及各國立法對密碼技術的進出口及使用的控制,第六章介紹了數字簽名的概念及原理,並以bolero為例介紹了數字簽名的技術方式,對有關法律問題作了論述;第七章首先論述了電子提單對有效性的法律,然後結合國內法和國際規則的規定論證了數據電訊制度產生的必然性;第八章通過對各國立法對電子證據的法律效力的規定,論述了對電子交易至關重要的數據電訊的不可抵賴性。
  4. Moreover, because of the rising popularity of multimedia applications and potential commercial usage of manet, qos based mac protocols have become a key issue for manet

    另外,隨著多媒體信息傳送的廣泛和manet的潛在商業應用使得移動adhoc中基於qos的mac協議研究成為一個關鍵問題。
  5. At first, it will discuss the conditions and trend of current network optimization technology and pay much attention to the call quality test, then discuss the data mining algorithms and practical application forms, finally, integrated the algorithms and application forms, discussed how to apply data mining technology to network optimization and the steps to apply data mining in network optimization call quality test system base on the requirement of customer and pay much attention to the function of data mining technology in the system, the design detail of the data mining algorithms and the application result

    文中首先討論優化的現狀和發展並重點討論優化cqt測試的方法和流程,然後討論數據挖掘的各演算法和實際應用形式,最後將兩者結合,研究如何將數據挖掘應用到優化中,並根據客戶對優化cqt系統智能化的,討論具有數據挖掘功能的優化cqt系統的、設計和具體實現。在整個cqt系統的討論中,重點討論數據挖掘在cqt系統中的作用、具體演算法設計和應用結果。
  6. With the rapid increase of society, it has been become more and more anxious requirement of security for people " s life. how we use techniques of the modern cybernation, and computer networks, and manage of the information system, which build our new security automation system will come into view one of important and active area of research

    安全防範系統是智能建築的一個子系統,隨著社會的發展,人們對安全保障的也越來越高,如何利用現代控制技術、技術、計算機信息管理技術構築新一代的安全防範系統是人們關注的熱點之一。
  7. To adopt efficient methods, and realize servicing to the most of demanders with internet information, are the necessary tideway of the situation

    採取有效的措施,實現信息為大多數者服務,已勢在必行。
  8. Firstly, to accelerate the building and perfection of key networks ; for the network construction in 10 provinces in the north of china, the principles of competition first and benefit first will be applied and more emphasis will be placed on key regions and key businesses ; to speed up the construction and perfection of the emulative business network, make up for the deficiency, make the network complete and build telephone line network moderately ; according to market demand, to build and perfect broadband city network and residence access into the network

    第一,加快重點的建設和完善。北方10省建設總體上將本著競爭優先、效益優先的原則,向重點地區、重點業務傾斜。進一步加快建設和完善競爭性業務;搞好補缺配套,適度建設電話;根據市場,建設和完善寬帶城域和駐地接入
  9. Since entered 21 centuries, the customer elephant internet of the on - line bank is similar to become the geometric progression growth, trading the amount of money to amount to 60 renminbis in 2005. the on - line bank has all specific weight of business of bank more and more high, trade to act for the rate also at fly to increase soon. statistics according to the department concerned, the industry and business bank and canvass business the bargain of the bank network bank acts for the rate all already over 25 %, also is to say, have 1 / 4 of bank pay the business to pass the net to complete up

    上銀行是金融領域的一場革命,將引發金融業經營管理模式,業務運作方式,經營理念風險監管等一系列重大變革。同時,經濟特別是電子商務的迅速發展,為上銀行提供了極其廣闊的市場。本論文通過分析我國上銀行發展的現狀及郵政金融業務,探討郵政部門建設上銀行的和可行性,提出上銀行的業務功能及對系統實施、業務發展的幾點思考,建議郵政部門抓住時機建設上銀行,以促進郵政金融業務發展。
  10. As the most important undertaker in physical distribution, china post, in order to offer inexpensive but high - quality logistics services nowadays, needs to think how to make the full use of its advantages and how to intergrade and optimize the three network resources as practicality, information and finance

    中國郵政作為傳統物流的重要承擔者之一,如何在新形勢下充分利用已有優勢,進一步整合、優化和充實現有實物、信息、金融三大資源,向社會提供適應客戶的優質、經濟、高效的物流服務,是一個亟待解決的重要課題。
  11. In tranditional ip network, only the “ best effort ” service is provided, but the quality of service can not be guaranteed. though the interserv, deffserv and mpls are presented afterward to guarantee the qos for the ip network. but as a layer network, the realization of the qos function need span different layers ( such as rsvp protocol ) in the ip network, which may result in the function iterance and chaos

    多媒體和實時業務的出現要能夠提供足夠的qos保證,在傳統的ip中只能提供「盡量傳輸」的服務而不能保證服務質量,后來提出的綜合服務模型( interserv )以及區分服務模型( deffserv )以及mpls技術保證了ip上的服務質量,但由於ip是層次結構的,因此對qos的支持要跨層(如rsvp協議) ,這就可能引起功能的重復和混亂,而微通信元系統是無層次結構的系統,就克服了這些的問題,變得簡單,效率更高。
  12. Manual configuration of large amount of distributed firewalls, as the access control enforcement points, can not meet the global security requirements in the open and dynamic environment, and make such burden to the administrator ; a variety of multiple clients may need different restricted access rules according to their requirements of quite different security levels, and these rules need to be generated centralized

    作為訪問控制實施點的每個客戶端卡,如果採用人工配置,不僅會導致龐大的工作量而且不能滿足整個動態局域的安全要;上各個客戶端的安全級別不同,所以不同用戶的安全訪問策略規則要集中制定。
  13. Of data traffic, to determine whether the connection can be set up. five fuzzy sets for request bandwidth, average rate and c. v

    而有些演算法則是根據對徑條件的需求網路的狀態及相關的信息來判斷資料可傳輸與否。
  14. The instrument used in this research was a self - compiled questionnaire based on the evaluation form by yu - ling chang ( 1998 ) and jia - hsing yang ( 2001 )

    二、休?內在動機與休?無聊感之問有顯著負相關;又休?無聊感與使用行為、心理沈迷行為之問呈現正相關。
  15. According to the progress of networked manufacturing, a network - based reconfigurable manufacturing system ( nrms ) is needed. there are some difference between the nrms and the traditional ms such as the manufacturing resource ownership and the process distribution which led to the idea evolution of equipment maintenance

    通過上述的分析,得出了化製造模式的興起,化的可重構製造系統的支撐,由於化可重構製造系統和傳統的製造系統的差異對設備維護系統提出了新的
  16. In planning the modes and level of public transport services at penny s bay, we have taken into account the existing policy of having railways as the backbone of the transport system, the need for balanced competition within the transport market and for maintaining choice for passengers, the planned availability and carrying capacity of the drl which connects to the mtr network, the existing public transport network, the projected passenger demand to and from penny s bay, the recreational nature of the passenger demand, the road network capacity and the operating characteristics of different transport modes

    我們規劃竹篙灣公共交通服務的形式及水平時,已考慮現行以鐵為運輸系統骨幹的政策、保持交通服務市場上競爭均勢的要並維持乘客的選擇、與地鐵相連的迪士尼鐵線預定的服務水平及載客量、現有公共交通、預測往返竹篙灣的乘客、本質在於消閑游樂的乘客、道的容車量及各種不同類型交通工具的營運特式。
  17. To characterize a workload, you must sort through queries, organize them into families, and then determine their resource demands in terms of processing times, i o requests, memory demand, network data traffic if applicable, and so on

    為了刻畫工作負載,您必須整理查詢,將其組成家族,然後確定它們在處理時間、 i / o請、內存數據信息量(如果可適用)等方面的資源
  18. Optimal connection problem on information requirement networks

    信息需求網路上最優連接問題
  19. Mr gerstner stabilised the mainframe business, which today is expected to see modest growth thanks to greater openness to independent software vendors, clever pricing and demand from emerging economies, including india

    郭士納先生鞏固住了主機業務,依靠向獨立軟體銷售商開放業務、實惠的定價和包括印度在內的新興經濟體的主機已經成為了公司最富成長預期的業務了。
  20. For the applications which have real - time requirement such as live mobile video streaming, there could be issues encountered which seldom happened when designed on a desktop computer

    對于有即時需求網路影音串流,這些限制使得在實際開發應用與服務時,容易有一些在一般個人電腦開發時不易發生的問題出現。
分享友人