- 更多网络例句与建网相关的网络例句 [注:此内容来源于网络,仅供参考]
-
As the graph of Bayesian network is required to be a directed acyclic graph, which was changed during the constructing process, checking for cycle is need in the interaction.
由于贝叶斯网的网络结构要求为一有向无环图,并且此图在交互建网过程中时刻变化,所以要在交互过程中反复检测环路是否存在。
-
The commercial extension in a central nic domain name is already well established.
商业中心扩建网卡域名已经确立。
-
The solution is to build an overlay network and make a one-time cutover without any impact on the running of the existing network.
该方案采用叠加建网然后一次性割接的方法,不影响现网运行,并可以及时回退,能极大地简化搬迁割接工作,降低网络风险。
-
Traditionally, when a radio network site is moved, it is necessary to interrupt existing services and perform a step-by-step serial cutover, which involves complex arrangements and huge resource investments. Therefore, there is an urgent need to discuss a low-risk and fast solution to site moving and cutover.
传统的无线网络站点搬迁,需要中断现网服务,而且只能串行逐片割接,组织工作复杂,资源投入巨大,因此亟需探讨一种低风险、快速建网的搬迁割接方案。
-
The solution is to build an overlay network and make a one-time cutover without any impact on the running of the existing network. Moreover, it supports timely fallback, and can considerably simplify the site moving and cutover operation and lower the network risk.
该方案采用叠加建网然后一次性割接的方法,不影响现网运行,并可以及时回退,能极大地简化搬迁割接工作,降低网络风险。
-
Traditionally, when a radio network site is moved, it is necessary to interrupt existing services and perform a step-by-step serial cutover , which involves complex arrangements and huge resource investments.
传统的无线网络站点搬迁,需要中断现网服务,而且只能串行逐片割接,组织工作复杂,资源投入巨大,因此亟需探讨一种低风险、快速建网的搬迁割接方案。
-
In this paper, the concept of network security and security structures of OSI and Internet is introduced, and various threats confronting the computer network are also discussed. Several kinds of network information security technologies, including firewall technology, virtual private network, intrusion detection system, data encryption technology, identity authentication and security protocol etc. are also examined. The security of internal network is the biggest problem in the construction of each network. The solution to this problem lies in setting up a firewall. The theory of a firewall and the approach to its actualization is studied. Intrusion detection system, an important part of the computer network security system, has gained extensive attention. IDS monitors the computer and network traffic for intrusion and suspicious activities. It not only detects the intrusion from the extranet hacker, but also the intranet users. The emergence of virtual private network paves the way for realizing secure connection of LAN quickly and at a relatively low cost. The concept, function, key techniques, including the tunnel technology, and the ways to realize VPN are expounded in this paper. Also introduced is the data encrypt network technology, which is called the soul of computer network security, such as digital digest, digital signature, digital certificate, digital encrypt arithmetic and so on. At the same time, the principle and the process of implementing network security by digital certificate and digital signature, the basic principle and characters of security protocols, and finally, three of the security protocols, concerning the security problems in network, IPsec, SLL and SET are analyzed in detail Computer network system should be a system of dynamic defence, both dynamic and static, passive as well as active, and even offensive, combined with management and technology.
本文系统地介绍了网络安全的概念、OSI及Internet的安全体系结构,并讨论了计算机网络面临的各种安全威胁;内部网络的安全问题是每个建网单位面临的最大问题,可以认为防火墙技术是解决网络安全的一个主要手段,本文研究了防火墙的原理及其实现手段;作为一种主动的防御措施,入侵检测系统作为网络系统安全的重要组成部分,得到了广泛的重视,TDS对计算机和网络资源上的恶意使用行为进行识别和响应,不仅检测来自外部的入侵行为,也监督内部用户的未授权活动;虚拟专用网技术的出现,为实现网络间的连接提供了快速安全但又相对便宜的手段,本文较深入的探讨了实现VPN的隧道技术,并对VPN的概念、功能、实现途径、基本构成、关键技术及发展前景等问题进行了全面论述;数据加密技术是网络安全核心技术之一,本文从数据加密算法、数字摘要、数字签名及数字证书等几方面简要介绍了数据加密技术,并分析用数字证书和数字签名实现网络安全的原理和过程;对安全协议的基本原理、主要特点进行了较为深入的研究,并就网络的安全性问题剖析了三种安全协议:IPsec协议、SLL协议和SET协议。
-
Chinese shift is right 3 period the demand that builds a network is centered at utmost and 2G common the network resource such as the fundamental network, core net, business net, net that prop up; Want those who consider future and TD-LTE to join at the same time, want to ensure TD is crossed to the smooth glide of prospective TD-LTE.
中国移动对三期建网的要求集中于最大限度与2G共用基础网、核心网、业务网、支撑网等网络资源;同时要考虑未来与TD-LTE的衔接,要确保TD向未来TD-LTE的平滑过渡。
-
The meshwork results are obtained from the later pictures. They clearly show the structure of four-dimension reseau and some meshwork results of shell data. The reason why the whole results are not achieved is that there are too many circumstances in which five or more dots share the same orb. In this case, the principle Delaunay is not in point any more, then the process of establishing meshwork will be intermitted.
后面的4幅图是后来所作的工作,得到了1个正方体4顶点以及其中心点的建网结果,从这里能清楚地看到4面体网格的结构,还有对贝壳数据点云的部分建网结果,之所以没有完成整个贝壳数据的建网是因为数据中存在较多的5点或5点以上共球的情况,这种情况下Delaunay准则不再适用,建网会中断,所以只完成了1个部分。
-
The meshwork results are obtained from the later pictures. They clearly show the structure of four-dimension reseau and some meshwork results of shell data. The reason why the whole results are not achieved is that there are too many circumstances in which five or more dots share the same orb. In this case, the principle Delaunay is not in point any more, then the process of establishing meshwork will be intermitted.
后面的四幅图是后来所作的工作,得到了一个正方体四顶点以及其中心点的建网结果,从这里能清楚地看到四面体网格的结构,还有对贝壳数据点云的部分建网结果,之所以没有完成整个贝壳数据的建网是因为数据中存在较多的五点或五点以上共球的情况,这种情况下Delaunay准则不再适用,建网会中断,所以只完成了一个部分。
- 更多网络解释与建网相关的网络解释 [注:此内容来源于网络,仅供参考]
-
bumble bee:桁泄网渔船
圆锥形灯笼网 bully net | 桁泄网渔船 bumble bee | 建网捕鱼部 bung end
-
Iceman:abbr. integrated computing environment mainframe and networking; 集成计算环境大型机及建网
-
ICEMAN IntegratedComputingEnvironmentMainframeandNetworking:集成计算环境大型机及建网
ICEM InternationalCouncilforEducationalMedia 教育媒体国际理事... | ICEMAN IntegratedComputingEnvironmentMainframeandNetworking 集成计算环境大型机及建网 | ICF InstallationandCheckoutFacility 安装与校验设...
-
insecurity:不安全 无保障
13, Odd 奇数的 单数的 临时的 奇怪的,古怪的 | 14, Insecurity 不安全 无保障 | 15, Network 网状物,建网
-
network creation:建网
network control%[]%网络控制% | network creation%[]%建网% | network database%[]%网络数据库%
-
Time to Live,TTL:存活时间
该命令是通过设置待发送分组的存活时间(Time to live TTL)来工作的. 4网络接口(NET)提供对许多建网标准及网络硬件的访问. 5进程间通信(IPC)子系统为进程间的通信提供了一些机制. 这些子系统功能相对独立,存在较强的依赖性.
-
bottom trawl:底曳网
bottom set-net; bottom fixed set-net 底建网 | bottom trawl 底曳网 | bow head 脊美鲸{美洲北太平洋产}
-
Connect in Serial, Cascade Connection:串联
串口线 Serial Port Line | 串联 Connect in Serial, Cascade Connection | 创建网元 create the NE
-
seven-gilled shark:油鲨
set net 定置网;建网 | seven-gilled shark 油鲨 | sex ratio 性比