英语人>网络例句>a set of... 相关的网络例句
a set of...相关的网络例句

查询词典 a set of...

与 a set of... 相关的网络例句 [注:此内容来源于网络,仅供参考]

In terms of the minimum question of a positive definite quadratic function,a set of Newton directions in minimum points derived with an accurate single dimensional search are used to produce a set of conjugate direction ,and a proof of convergence is presented.

对正定二次函数极小问题,利用精确一维搜索所得极小点处的牛顿方向来生成一组共轭方向,并给出收敛性证明

Based upon all above-mentioned, a mathematical representation for multi-material structures is proposed by means of vector level sets, and the general structure topology optimization can be expressed by a constrained functional minimization problem of a set of level set functions.

同时,还提出了在有效约束切空间上构造的非线性映射技术,以改进向量水平集的演化方向,可提高计算效率2到3倍。

In this paper, the concept of network security and security structures of OSI and Internet is introduced, and various threats confronting the computer network are also discussed. Several kinds of network information security technologies, including firewall technology, virtual private network, intrusion detection system, data encryption technology, identity authentication and security protocol etc. are also examined. The security of internal network is the biggest problem in the construction of each network. The solution to this problem lies in setting up a firewall. The theory of a firewall and the approach to its actualization is studied. Intrusion detection system, an important part of the computer network security system, has gained extensive attention. IDS monitors the computer and network traffic for intrusion and suspicious activities. It not only detects the intrusion from the extranet hacker, but also the intranet users. The emergence of virtual private network paves the way for realizing secure connection of LAN quickly and at a relatively low cost. The concept, function, key techniques, including the tunnel technology, and the ways to realize VPN are expounded in this paper. Also introduced is the data encrypt network technology, which is called the soul of computer network security, such as digital digest, digital signature, digital certificate, digital encrypt arithmetic and so on. At the same time, the principle and the process of implementing network security by digital certificate and digital signature, the basic principle and characters of security protocols, and finally, three of the security protocols, concerning the security problems in network, IPsec, SLL and SET are analyzed in detail Computer network system should be a system of dynamic defence, both dynamic and static, passive as well as active, and even offensive, combined with management and technology.

本文系统地介绍了网络安全的概念、OSI及Internet的安全体系结构,并讨论了计算机网络面临的各种安全威胁;内部网络的安全问题是每个建网单位面临的最大问题,可以认为防火墙技术是解决网络安全的一个主要手段,本文研究了防火墙的原理及其实现手段;作为一种主动的防御措施,入侵检测系统作为网络系统安全的重要组成部分,得到了广泛的重视,TDS对计算机和网络资源上的恶意使用行为进行识别和响应,不仅检测来自外部的入侵行为,也监督内部用户的未授权活动;虚拟专用网技术的出现,为实现网络间的连接提供了快速安全但又相对便宜的手段,本文较深入的探讨了实现VPN的隧道技术,并对VPN的概念、功能、实现途径、基本构成、关键技术及发展前景等问题进行了全面论述;数据加密技术是网络安全核心技术之一,本文从数据加密算法、数字摘要、数字签名及数字证书等几方面简要介绍了数据加密技术,并分析用数字证书和数字签名实现网络安全的原理和过程;对安全协议的基本原理、主要特点进行了较为深入的研究,并就网络的安全性问题剖析了三种安全协议:IPsec协议、SLL协议和SET协议。

By finding a set of basis, we use matrices of transformation under a set of basis to describe the structure of the Galois group. If a normal extension has a normal basis, then it is simpler to describe the structure of Galois group in this method.

因此寻找一组基,我们利用线性变换在基下的矩阵来描述Galois群的结构,特别地,当正规扩张存在一组正规基时,用这种方式表示Galois群的更加简单。

He set the whole city flower of the long beans, to concentrate on the development of sophisticated dip豆花and technology, to create a set of their own "secret", forming a dip distinctive flavor, making it a must Fushun.

他集全城各豆花店之长,专心研制豆花和蘸水的精妙技术,创造了一套自己的"秘方",形成了风味与众不同的蘸水,使之成为富顺的一绝。

Finding the most cost-effective way to ship goods between a set of factories and a set of stores defines a network flow problem, as do resource-allocation problems in communications networks and a variety of scheduling problems.

找到最符合成本效益的方式之间运送货物的一系列工厂和商店的一套定义了网络流问题,因为这样做资源分配问题的通信网络和各种调度问题。

The method mainly adopts the projected gradient technique. Through calculating the fundus of the null space of matrix A in the constraint, the direction set becomes a positive spanning set of R~.

其中主要是采用投影梯度技术,通过计算约束条件中矩阵A的零空间的基底,使得实施过程中所选用的方向集是R~中的一个正跨越集。

Particularly,when A is positive,we give a detailed characterization of the set ∏={Q∈∏:R=S⊥,AQ=QA},where ∏ and S⊥ denote the set of all idempotents on H and the orthogonal complement of S,respectively.

特别地,当A是正算子时得出了集合∏={Q∈∏:R=S⊥,AQ=Q*A}非空的充要条件;并且对集合∏进行了详细的刻化,这里∏和S⊥分别表示一个复Hilbert空间上的所有幂等算子构成的集合和子空间S的正交补空间。

They first organize and analyze a set of data with the stem-and-leaf diagram. They point out that the diagram is used for a small number of data and the original data can be retained in the diagram. To compare two different set of data of the same nature, they propose the use of a back to back stem-and-leaf diagram.

导师首先做一组数据的处理和分析,干叶图可以用作表达小量的数据,同时原来的数据仍会保留在干叶图中;背靠背干叶图是用作比较两组数据之用,且所有数据仍会保留在背靠背干叶图中。

In the first part of this thesis, Stress relaxation method set up in the software of DMA was used to perform the aromatic and aliphalic (D2192-BAPP) PI film stretching process. To study the optical anisotropies property to the light leakage from the crossed polarizers, we put the stretched samples into one set of crossed polarizers and as expected, the stretched PI films could reduce the light leakage at view angle of ±45 deg, and exhibited a visually observed compensating property of an A-plate. No color shift wasobserved, and the birefringence was very uniform. These results prove a uniform birefringence can be obtained by a stretched process for PI films.

首先,我们以动态机械分析仪的应力缓和模式对芳香族FDA-BAPP PI及脂肪族D2192-BAPP PI薄膜进行拉伸实验,并将拉伸后的PI薄膜置於一组相互交差的偏光片中观察其光学异向性,发现拉伸后的PI薄膜试片可以降低在±45o视角的漏光的效果,展现出如同A-Plate的光学补偿特性,所显现的光学补偿效果相当的均匀而且没有色偏的情形发生,证实以拉伸方法可以造成PI薄膜很均匀的双折射效应。

第6/100页 首页 < ... 2 3 4 5 6 7 8 9 10 ... > 尾页
推荐网络例句

Were used by medieval physicians...

被中世纪的医师用来。。。

Article 19 Where the shareholders of a limited liability company or the directors and controlling shareholders of a joint stock company or the actual controllers of a company maliciously dispose of company properties and thus cause losses to any creditors after the company dissolution, or fail to make liquidation and cheat the company registration organ to deregister the legal person by means of a false liquidation report, if any creditors claim that the aforesaid shareholders, directors and controlling shareholders or actual controllers shall assume the corresponding civil liability for the debts of the company, the people' s court shall support the claim.

第十九条有限责任公司的股东、股份有限公司的董事和控股股东,以及公司的实际控制人在公司解散后,恶意处置公司财产给债权人造成损失,或者未经依法清算,以虚假的清算报告骗取公司登记机关办理法人注销登记,债权人主张其对公司债务承担相应赔偿责任的,人民法院应依法予以支持。

Now that he is absent ,you will have to do all the job by yourself.

既然他没来,你就只好自己干活了。