英语人>网络例句>arithmetic computer 相关的网络例句
arithmetic computer相关的网络例句

查询词典 arithmetic computer

与 arithmetic computer 相关的网络例句 [注:此内容来源于网络,仅供参考]

The first generation of computer was characterized by the most prominent feature of the ENIAC-vacuum tubes.Through 1950,several other notable computers were built,each contributing significant advancement,such as binary arithmetic,random access,and the concept of stored programs.These computer concepts are common in today's computers.

第一代计算机ENIAC以真空管为显著标志,到1950年又制造出了另外几台著名的计算机,而且每一台都取得了很大的进展,如像二进制运算、随机存取和存储程序的概念,这些概念在当今的计算机中仍是普遍使用的。

The speed of a computer is affected by the number of bits it can process at once. For example, a 32- bit computer can perform arithmetic and manipulations on 32-bit numbers, whereas a 16-bit computer must break large numbers into 16-bit quantities, making it slower.

电脑的运算速度会受到它一次可以处理位元多寡的影响,例如32 位元电脑一次可以进行32 位元的运算,而16 位元的电脑因为每次只能进行16 位元的运算,所以它必须将比较大的数打散成16 位元的量,所以这样会造成速度变慢。

This paper analyses the "hardware system"and"software system"of ancient Chinese mathematicalmechanization from the standpoint of Modern computer technique,putting stress on analysing that counting rod is thematerial base of ancient Chinese mathematical mechanization.S-uperior computting tool and decimal number system supply themathematical mechanization with particularly favourable n

论文关键词算筹/筹算/算法/数学机械化counting rod/rod—arithmetic/algorithm/mathematicalmechanization,论文来源大自然探索5,论文单位重庆,点击次数 27,论文页数 117~121页1998年1998月论文网 http://www.lw23.com/paper_104518381/本文从现代计算机技术的角度来分析中国传统数学机械化的"硬件系统"和"软件系统"。

The computer aid animation is a high and new technique; it is the thing that combines the art and the computer graphics together. Accompanying with the high speed devolvement of computer hardware and graphic arithmetic , it synthesize the computer science, art, mathematics, physics with the knowledge of the other and related course, the computer aid animation make abundance sequence virtual real images on the screen.

计算机动画是计算机图形学和艺术相结合的产物,是伴随着计算机硬件和图形算法高速发展起来的一门高新技术,它综合利用了计算机科学、艺术、数学、物理学和其它相关学科的知识,在计算机上生成绚丽多彩的连续的虚拟真实画面。

In this paper, the concept of network security and security structures of OSI and Internet is introduced, and various threats confronting the computer network are also discussed. Several kinds of network information security technologies, including firewall technology, virtual private network, intrusion detection system, data encryption technology, identity authentication and security protocol etc. are also examined. The security of internal network is the biggest problem in the construction of each network. The solution to this problem lies in setting up a firewall. The theory of a firewall and the approach to its actualization is studied. Intrusion detection system, an important part of the computer network security system, has gained extensive attention. IDS monitors the computer and network traffic for intrusion and suspicious activities. It not only detects the intrusion from the extranet hacker, but also the intranet users. The emergence of virtual private network paves the way for realizing secure connection of LAN quickly and at a relatively low cost. The concept, function, key techniques, including the tunnel technology, and the ways to realize VPN are expounded in this paper. Also introduced is the data encrypt network technology, which is called the soul of computer network security, such as digital digest, digital signature, digital certificate, digital encrypt arithmetic and so on. At the same time, the principle and the process of implementing network security by digital certificate and digital signature, the basic principle and characters of security protocols, and finally, three of the security protocols, concerning the security problems in network, IPsec, SLL and SET are analyzed in detail Computer network system should be a system of dynamic defence, both dynamic and static, passive as well as active, and even offensive, combined with management and technology.

本文系统地介绍了网络安全的概念、OSI及Internet的安全体系结构,并讨论了计算机网络面临的各种安全威胁;内部网络的安全问题是每个建网单位面临的最大问题,可以认为防火墙技术是解决网络安全的一个主要手段,本文研究了防火墙的原理及其实现手段;作为一种主动的防御措施,入侵检测系统作为网络系统安全的重要组成部分,得到了广泛的重视,TDS对计算机和网络资源上的恶意使用行为进行识别和响应,不仅检测来自外部的入侵行为,也监督内部用户的未授权活动;虚拟专用网技术的出现,为实现网络间的连接提供了快速安全但又相对便宜的手段,本文较深入的探讨了实现VPN的隧道技术,并对VPN的概念、功能、实现途径、基本构成、关键技术及发展前景等问题进行了全面论述;数据加密技术是网络安全核心技术之一,本文从数据加密算法、数字摘要、数字签名及数字证书等几方面简要介绍了数据加密技术,并分析用数字证书和数字签名实现网络安全的原理和过程;对安全协议的基本原理、主要特点进行了较为深入的研究,并就网络的安全性问题剖析了三种安全协议:IPsec协议、SLL协议和SET协议。

With the development of computer technology, the computer business has been based on a single arithmetic, document handling, based on the simple links to the internal network of internal processing, office automation, development of enterprises based on complex intranets, external network, the global Internet enterprise-class computer systems and the scope of information sharing and processing.

随着计算机技术的发展,在计算机上处理业务已由基于单机的数学运算、文件处理,基于简单连结的内部网络的内部业务处理、办公自动化等发展到基于企业复杂的内部网、企业外部网、全球互联网的企业级计算机处理系统和世界范围内的信息共享和业务处理。

With the development of computer technology, the computer business has been based on a single arithmetic, document handling, Based on the simple links to the internal network of internal processing, office automation, development of enterprises based on the complexity of the internal network, external network, the Global Internet enterprise-class computer systems and the worldwide information sharing and processing.

帮我翻译一下论文摘要嘛!谢谢了!随着计算机技术的发展,在计算机上处理业务已由基于单机的数学运算、文件处理,基于简单连结的内部网络的内部业务处理、办公自动化等发展到基于企业复杂的内部网、企业外部网、全球互联网的企业级计算机处理系统和世界范围内的信息共享和业务处理。

High precision format, unstructured dynamic mesh with a large displacement and multi-species gas flows were computationally expensive, the problem of resourceless and inefficient of single computer appeared. Parallel arithmetic based on PC-Cluster system for the oblique detonation wave flow and the muzzle flow include high speed projectile were discussed. The results proved that the rationality of parallel arithmetic provided a new method to simulate the complex chemical reaction flows. The present code represents a validated, efficient and versatile tool developed for the simulation of hypersonic multi-species chemical non-equilibrium flows.

高精度计算格式、化学反应源项的刚性和大位移的运动边界处理都给计算和存储带来了沉重的负担,单机资源不足和计算时间长的问题凸现,利用PC机和局域网资源建立分布存储式并行计算系统,并基于非结构动网格和分区算法开发了复杂化学反应流场数值模拟的并行计算程序,对高速飞行实验弹丸诱导的斜爆轰波流场和含有大位移动边界的膛口燃气射流场进行了并行模拟,有效地缩短了计算时间,扩展了计算规模,为复杂化学反应流数值模拟研究提供了新的手段。

In this paper, by using the method tO get the arithmetic solution and with the formula calcuatring the moving particle trace in magnetic field, corrected be computer, it is easy to get the arithmetic solution, in addition,the result of solving is giv...

本文用求数值解的方法,使用经过计算机修正后的计算磁场中粒子运动轨迹的公式,可以非常迅速、简单地得到带电粒子在磁场中运动轨迹的数值解,并以图像给出解的结果。

This paper first elaborated the principle of SINS, some interrelated information,and the affect of renewed arithmetic to the system"s precision. Then, we studied thequaternion in traditional renewed attitude arithmetic. The quaternion is simple, andwhen run it into computer, it"s time saving. So, this arithmetic is often adopted byengineering. However, the quaternion brought unexchangeable error inevitably. Whenthe carrying body moves in highly dynamic situation, the error would become larger.So we should take effective measure to get over it.

本文首先论述了捷联式惯性导航系统的工作原理及相关知识,捷联惯导系统姿态更新算法对系统精度的影响;其次研究了传统的姿态更新算法中四元数法,该算法简单,计算量小,因而在工程中经常被采用,但是在四元数法中不可避免的引入了不可交换性误差,特别是在载体处于高动态环境时,这种误差就会很大,必须采取有效措施加以克服。

第1/6页 1 2 3 4 5 6 > 尾页
推荐网络例句

Singer Leona Lewis and former Led Zeppelin guitarist Jimmy Page emerged as the bus transformed into a grass-covered carnival float, and the pair combined for a rendition of "Whole Lotta Love".

歌手leona刘易斯和前率领的飞艇的吉他手吉米页出现巴士转化为基层所涵盖的嘉年华花车,和一双合并为一移交&整个lotta爱&。

This is Kate, and that's Erin.

这是凯特,那个是爱朗。

Articulate the aims, objectives and key aspects of a strategic business plan.

明确的宗旨,目标和重点战略业务计划。