英语人>网络例句>arithmetic data 相关的网络例句
arithmetic data相关的网络例句

查询词典 arithmetic data

与 arithmetic data 相关的网络例句 [注:此内容来源于网络,仅供参考]

Due to hardware conditions of readers, it is imperative to have an effective arithmetic for data processing and data structure to improve real-time process capability of readers.

由于读写器的硬件条件限制,要提高读写器的实时数据处理能力,就必须有适合RFID应用的高效的数据处理算法及存储结构。

In this paper, the concept of network security and security structures of OSI and Internet is introduced, and various threats confronting the computer network are also discussed. Several kinds of network information security technologies, including firewall technology, virtual private network, intrusion detection system, data encryption technology, identity authentication and security protocol etc. are also examined. The security of internal network is the biggest problem in the construction of each network. The solution to this problem lies in setting up a firewall. The theory of a firewall and the approach to its actualization is studied. Intrusion detection system, an important part of the computer network security system, has gained extensive attention. IDS monitors the computer and network traffic for intrusion and suspicious activities. It not only detects the intrusion from the extranet hacker, but also the intranet users. The emergence of virtual private network paves the way for realizing secure connection of LAN quickly and at a relatively low cost. The concept, function, key techniques, including the tunnel technology, and the ways to realize VPN are expounded in this paper. Also introduced is the data encrypt network technology, which is called the soul of computer network security, such as digital digest, digital signature, digital certificate, digital encrypt arithmetic and so on. At the same time, the principle and the process of implementing network security by digital certificate and digital signature, the basic principle and characters of security protocols, and finally, three of the security protocols, concerning the security problems in network, IPsec, SLL and SET are analyzed in detail Computer network system should be a system of dynamic defence, both dynamic and static, passive as well as active, and even offensive, combined with management and technology.

本文系统地介绍了网络安全的概念、OSI及Internet的安全体系结构,并讨论了计算机网络面临的各种安全威胁;内部网络的安全问题是每个建网单位面临的最大问题,可以认为防火墙技术是解决网络安全的一个主要手段,本文研究了防火墙的原理及其实现手段;作为一种主动的防御措施,入侵检测系统作为网络系统安全的重要组成部分,得到了广泛的重视,TDS对计算机和网络资源上的恶意使用行为进行识别和响应,不仅检测来自外部的入侵行为,也监督内部用户的未授权活动;虚拟专用网技术的出现,为实现网络间的连接提供了快速安全但又相对便宜的手段,本文较深入的探讨了实现VPN的隧道技术,并对VPN的概念、功能、实现途径、基本构成、关键技术及发展前景等问题进行了全面论述;数据加密技术是网络安全核心技术之一,本文从数据加密算法、数字摘要、数字签名及数字证书等几方面简要介绍了数据加密技术,并分析用数字证书和数字签名实现网络安全的原理和过程;对安全协议的基本原理、主要特点进行了较为深入的研究,并就网络的安全性问题剖析了三种安全协议:IPsec协议、SLL协议和SET协议。

In this paper, a new method for data processing is presented based on amelioration of the traditional arithmetic,and the higher accuracy of measurement can be achieved in the larger axial distance. In the data processing ,the linear fitting method is adopted to process a series of discrete points.

文章介绍了一种新的数据处理方法,其先对各物点的轴向光强采样值进行线性拟合,再由拟合得到的直线确定最大光强所对应的轴截面位置,这样可以在较大的轴向采样间距下获得较高精度的三维轮廓信息。

According to actual condition, a model of wall thickness of rotary kiln is established. The constant coefficients in the model, including thermal conductivity, heat transfer coefficient, Fourier coefficient and contact resistance, are closely calculated. A formula of contact resistance is draw from a great deal of data of surface and inner temperature of rotary kiln. The wall thickness of rotary kiln is simulated by MATLAB. The simulation result is transmitted from MATLAB to DELPHI through a group of interface functions compiled by VC++. The basic graphs-circle and line are analyzed by the means of the technique of Visualization in Scientific Computing and the Bresenham arithmetic, and are realized the visualization of the wall thickness. The contents of communication between master computer and slaver computer are designed and the error control technique, the idea of multi-thread and the embedded assembly language are applied to realize the temperature data transmission and graph transmission, which largely improved the speed of transmission and the reliability and stability of system.

建立了符合现场实际的回转窑壁厚数学模型;结合现场采用红外测温仪测量所得的温度数据和回转窑的实际结构数据,确定出适合该模型的定常系数(包括导热系数、换热系数、傅立叶系数、接触热阻等),并得出与回转窑工况的相近的接触热阻公式ln=T~(0.5154)-36.7868;利用MATLAB软件仿真出回转窑壁厚,并将运算结果通过在VC++的编译环境下编译出MATLAB和DELPHI的接口函数传输到该监测系统中,实现了温度数据的转换和交换;运用科学计算可视化技术和Bresenham扫描转换算法对基本图形——圆和直线进行分析,从而实现了仿真后的壁厚数据可视化;在研究异步串行通信方式的基础上,设计了该系统上下位机功能和通信内容,并运用差错控制技术、多线程思想以及嵌入式汇编语言实现了温度数据和图形数据在上下位机之间的远程传输,提高了数据传输的速率和系统的可靠性、稳定性。

And then a struct model of security storage system and relative security mechanism is designed, in witch a grade-accessing control sheme and a data-encrypted key distributing arithmetic based on common module general linear congruent equation class are designed to realize that storage data is accessed safely and shared by grade.

在此基础上,详细给出了iSCSI-SAN存储系统安全机制的设计方案,重点设计了基于权限证书的访问控制机制和基于共模p的线性同余方程组的数据加密密钥分配算法,实现了存储数据的安全访问与分级共享。

Methods event-related potentials, Records of children's mental arithmetic adder listening behavior data and the accuracy of behavior data.

采用事件相关电位方法,记录儿童加法听心算时的反应时和行为数据的正确率。

So the arithmetic model delivers the data for the security or the portfolio and there's a risk preem that's associated with the data.

我们可以在算术模式内来研究性能赋值,算术模式传递了债券和证券的资料,并且关于这些资料在算术模式里可反映出风险的初步映象。

In this paper, the arithmetic theory of the parcel's average slope is presented concretely, and the data of relief map and land use updated survey on one county of Zhejiang Province are taken as benchmark data.

图斑的平均坡度是新一轮土地利用更新调查中确定土地利用是否合理的重要参数,但常用的图斑平均坡度获取方法均存在不同程度的不足。

In this dissertation, we analyzed the residual images of MSI, stored the residual images as 1-D data in spectral direction in order to enhance the correlation between neighbor data, and coded them by context-based arithmetic coding.

本文通过分析多光谱图象的残差图象的特点,将其残差图象按谱维方向重新排列成一维数据,增强相邻数据之间的相关性,建立上下文模型,再进行算术编码。

Coordinate sequence method is made up of the instruct information of polygon boundary x, y coordinate. It is the easiest polygon vector encoding method. The file structure of this method is easy, but because of the polygon boundary has stored two times, it will produce data redundancy, moreover, short of neighbor threshold information; Tree index encoding method make all the boundary points digitizing, store the coordinate sequence, connect the point index to boundary line, and then connect the line index to other polygons, so as to the tree index structure has came into being. It eliminates neighbor polygons boundary data redundancy problems; Topology structure encoding method is a method which by setting up a complete topology relationship structure, resolve the neighbor threshold and island information process problem. However, it makes arithmetic more complicated and makes database bigger.

坐标序列法是由多边形边界的x,y坐标对集合及说明信息组成,是最简单的一种多边形矢量编码法,文件结构简单,但多边形边界被存储两次产生数据冗余,而且缺少邻域信息;树状索引编码法是将所有边界点进行数字化,顺序存储坐标对,由点索引与边界线号相联系,以线索引与各多边形相联系,形成树状索引结构,消除了相邻多边形边界数据冗余问题;拓扑结构编码法是通过建立一个完整的拓扑关系结构,彻底解决邻域和岛状信息处理问题的方法,但增加了算法的复杂性和数据库的大小。

第4/15页 首页 < 1 2 3 4 5 6 7 8 9 ... > 尾页
推荐网络例句

Do you know, i need you to come back

你知道吗,我需要你回来

Yang yinshu、Wang xiangsheng、Li decang,The first discovery of haemaphysalis conicinna.

1〕 杨银书,王祥生,李德昌。安徽省首次发现嗜群血蜱。

Chapter Three: Type classification of DE structure in Sino-Tibetan languages.

第三章汉藏语&的&字结构的类型划分。