查询词典 computer aided engineering
- 与 computer aided engineering 相关的网络例句 [注:此内容来源于网络,仅供参考]
-
The computer aid animation is a high and new technique; it is the thing that combines the art and the computer graphics together. Accompanying with the high speed devolvement of computer hardware and graphic arithmetic , it synthesize the computer science, art, mathematics, physics with the knowledge of the other and related course, the computer aid animation make abundance sequence virtual real images on the screen.
计算机动画是计算机图形学和艺术相结合的产物,是伴随着计算机硬件和图形算法高速发展起来的一门高新技术,它综合利用了计算机科学、艺术、数学、物理学和其它相关学科的知识,在计算机上生成绚丽多彩的连续的虚拟真实画面。
-
In this paper, the concept of network security and security structures of OSI and Internet is introduced, and various threats confronting the computer network are also discussed. Several kinds of network information security technologies, including firewall technology, virtual private network, intrusion detection system, data encryption technology, identity authentication and security protocol etc. are also examined. The security of internal network is the biggest problem in the construction of each network. The solution to this problem lies in setting up a firewall. The theory of a firewall and the approach to its actualization is studied. Intrusion detection system, an important part of the computer network security system, has gained extensive attention. IDS monitors the computer and network traffic for intrusion and suspicious activities. It not only detects the intrusion from the extranet hacker, but also the intranet users. The emergence of virtual private network paves the way for realizing secure connection of LAN quickly and at a relatively low cost. The concept, function, key techniques, including the tunnel technology, and the ways to realize VPN are expounded in this paper. Also introduced is the data encrypt network technology, which is called the soul of computer network security, such as digital digest, digital signature, digital certificate, digital encrypt arithmetic and so on. At the same time, the principle and the process of implementing network security by digital certificate and digital signature, the basic principle and characters of security protocols, and finally, three of the security protocols, concerning the security problems in network, IPsec, SLL and SET are analyzed in detail Computer network system should be a system of dynamic defence, both dynamic and static, passive as well as active, and even offensive, combined with management and technology.
本文系统地介绍了网络安全的概念、OSI及Internet的安全体系结构,并讨论了计算机网络面临的各种安全威胁;内部网络的安全问题是每个建网单位面临的最大问题,可以认为防火墙技术是解决网络安全的一个主要手段,本文研究了防火墙的原理及其实现手段;作为一种主动的防御措施,入侵检测系统作为网络系统安全的重要组成部分,得到了广泛的重视,TDS对计算机和网络资源上的恶意使用行为进行识别和响应,不仅检测来自外部的入侵行为,也监督内部用户的未授权活动;虚拟专用网技术的出现,为实现网络间的连接提供了快速安全但又相对便宜的手段,本文较深入的探讨了实现VPN的隧道技术,并对VPN的概念、功能、实现途径、基本构成、关键技术及发展前景等问题进行了全面论述;数据加密技术是网络安全核心技术之一,本文从数据加密算法、数字摘要、数字签名及数字证书等几方面简要介绍了数据加密技术,并分析用数字证书和数字签名实现网络安全的原理和过程;对安全协议的基本原理、主要特点进行了较为深入的研究,并就网络的安全性问题剖析了三种安全协议:IPsec协议、SLL协议和SET协议。
-
This paper introduces the development process of wastewater disposal,it's auto control system,the level of nowadays and several new techniques of China and foreign countries. The immanent structure,control rules,main features and design methods of auto control systems in wastewater disposal process are studied in this paper. Aiming at four typical parameters,such as temperature,dissolved oxygen,PH and the planes of water,the Distributed Control System is designed,composed by PC called epigyny computer and SCM 8098 called hypogyny computer,and some sensors,shift deliver utensils and related meet orifices of parameters gathering and figures communication. The idea and work processes of some program modules are also introduced here. The programs in epigyny computer include the program of mutual interface between operator and computer,figure disposal program and chart output program,which are exploited with Visual Basic 6.0. And the programs in hypogyny computer are composed by figure gathering program,the progr am of supervision and control of system,communication program and meet orifice program between assemble language and VB,which are designed with assemble language.
本文介绍了国内外污水处理及其自动控制系统的发展过程、当今水平和提高自动化程度的若干新技术;研究了污水处理自动控制系统的内在结构、控制规律、主要特点和设计方法;选取污水处理中的典型参数温度、溶解氧、PH值和液位等为控制对象,设计了以个人计算机为上位机、以8098单片机为下位机,并辅之以传感器、变送器及相关接口单元所构成的二级集散控制系统;介绍了几个主要程序模块的设计思路、工作过程,这些程序模块是:用高级语言Visual Basic6.0开发的上位机人机交互界面程序、数据处理和图表输出程序,用执行效率高的汇编语言开发的下位机数据采集与系统监控程序、上位机与下位机之间的数据通信程序,汇编语言与VB之间的转接程序,等等。
-
This paper introduces the development process of wastewater disposal,its auto control system,the level of nowadays and several new techniques of China and foreign countries. The immanent structure,control rules,main features and design methods of auto control systems in wastewater disposal process are studied in this paper. Aiming at four typical parameters,such as temperature,dissolved oxygen,PH and the planes of water,the Distributed Control System is designed,composed by PC called epigyny computer and SCM 8098 called hypogyny computer,and some sensors,shift deliver utensils and related meet orifices of parameters gathering and figures communication. The idea and work processes of some program modules are also introduced here. The programs in epigyny computer include the program of mutual interface between operator and computer,figure disposal program and chart output program,which are exploited with Visual Basic 6.0. And the programs in hypogyny computer are composed by figure gathering program,the program of supervision and control of system,communication program and meet orifice program between assemble language and VB,which are designed with assemble language.
本文介绍了国内外污水处理及其自动控制系统的发展过程、当今水平和提高自动化程度的若干新技术;研究了污水处理自动控制系统的内在结构、控制规律、主要特点和设计方法;选取污水处理中的典型参数温度、溶解氧、PH值和液位等为控制对象,设计了以个人计算机为上位机、以8098单片机为下位机,并辅之以传感器、变送器及相关接口单元所构成的二级集散控制系统;介绍了几个主要程序模块的设计思路、工作过程,这些程序模块是:用高级语言Visual Basic6.0开发的上位机人机交互界面程序、数据处理和图表输出程序,用执行效率高的汇编语言开发的下位机数据采集与系统监控程序、上位机与下位机之间的数据通信程序,汇编语言与VB之间的转接程序,等等。
-
In the development process, the company attaches great importance to adopt advanced technologies, the use of computer technology to enhance their design and production skills. 1996, introduced to the most advanced computer design all kinds of children's clothing, computer markers, lofting the CAD computer system and computer management system, allows the company's design and production capacity has continued development.
在发展过程中,公司十分重视采用各种先进技术,重视使用计算机技术提高企业设计生产的技术水平。1996年起,引进了到国内最先进的各类童装电脑设计、电脑排料、电脑放样的CAD系统及电脑管理系统,使得公司的设计水平和生产能力有了持续的发展。
-
Including TCSEC (Trusted Computer System Evaluation Criteria; commonly called the "Orange Book"), which is a standard for computer security issued by the US government; ITSEC(the Information Technology Security Evaluation Criteria), which is a standard for computer security that was issued by the Europe, CC, which is a world standard for computer security; GB 17859-1999, which classified criteria for security protection of Computer information system in China.
本文论述了计算机网络安全现状、评价现状,以及网络信息安全评估标准,包括美国可信计算机安全评价标准,欧洲的安全评价标准,国际通用准则(CC,等同GB 18336),我国计算机信息系统安全保护等级划分准则(GB 17859-1999)。
-
But how will the computer + the human brain in this intelligent combination of dual-core functions, when the computer system failures as a result of the virus and slow down or even crash, most people can only wait anxiously for the experts, or home computer to be painstakingly maintenance stations for maintenance, because the traditional way to deal with this problem again when the need to use the CD-ROM system (often because the driver would also like to find lost disk driver), a number of computers equipped with the "one-click restore" feature or the current popular technologies only GHOST users can restore your computer to your computer at all times or do the factory GHOST time, and after they were unable to retrieve data, and in the time to do the reduction is due to the use of conventional disk copy, the whole is a long time.
但如何将电脑+人脑这智能的双核功能结合在一起,当计算机由于系统故障、感染病毒而变慢甚至死机时,大多数人只能焦急地等待专家上门或费尽周折将电脑送到维修站进行维修,由于传统方式处理这种问题时需要使用光盘重做系统(常常会因为驱动盘丢失还要找驱动程序),许多电脑配备的"一键还原"功能或目前流行的GHOST技术仅仅可以将用户电脑还原到电脑出厂时刻或做GHOST时刻状态,之后的数据它们是无法找回的,而且在做这些还原的时候由于采用的是常规的磁盘拷贝技术,整个时间也是比较长的。
-
Although it is the earliest-issued thesis on the study of computer radiation safety, people paid little attention. In 1983, a Swedish scientist published a pamphlet named Compromising Computer, in which the radiation leakage of computer was mentioned once again. In 1985, a Netherlandish scholar named Ike issued his study report on electromagnetic radiation from video display units of computers at the Third Conference on Computer Communication Safety Protection. At the same time he demonstrated how to use a black and white TV set to receive signals from a computer with radiation leakage.
这是最早发表的研究计算机辐射安全的论文,但当时没有引起人们的注意。1983年,瑞典的一位科学家发表了壹本名叫《泄密的计算机》的小册子,其中再次提到计算机的辐射泄漏问题。1985年,荷兰学者艾克在第三届计算机通信安全防护大会上,公开发表了他的有关计算机视频显示单元电磁辐射的研究报告,同时在现场作了用一台黑白电视机接收计算机辐射泄漏信号的演示。
-
Although it is the earliest-issued thesis on the study of computer radiation safety, people paid little attention. In 1983, a Swedish scientist published a pamphlet named Compromising Computer, in which the radiation leakage of computer was mentioned once again. In 1985, a Netherlandish scholar named Ike issued his study report on electromagnetic radiation from video display units of computers at the Third Conference on Computer Communication Safety Protection. At the same time he demonstrated how to use a black and white TV set to receive signals from a computer with radiation leakage.
这是最早发表的研究计算机辐射安全的论文,但当时没有引起人们的注意。1983年,瑞典的一位科学家发表了一本名叫《泄密的计算机》的小册子,其中再次提到计算机的辐射泄漏问题。1985年,荷兰学者艾克在第三届计算机通信安全防护大会上,公开发表了他的有关计算机视频显示单元电磁辐射的研究报告,同时在现场作了用一台黑白电视机接收计算机辐射泄漏信号的演示。
-
Although it is the earliest-issued thesis on the study of computer radiation safety, people paid little attention. In 1983, a Swedish scientist published a pamphlet named Compromising Computer, in which the radiation leakageof computer was mentioned once again. In 1985, a Netherlandish scholar named Ike issued his study report on electromagnetic radiation from video display units of computers at the Third Conference on Computer Communication Safety Protection. At the same time he demonstrated how to use a black and whiteTV set to receive signals from a computer with radiation leakage. His report caused a great reverberation in the world. From then on people began to treat this problem seriously.
这是最早发表的研究计算机辐射安全的论文,但当时没有引起人们的注意。1983年,瑞典的一位科学家发表了一本名叫《泄密的计算机》的小册子,其中再次提到计算机的辐射泄漏问题。1985年,荷兰学者艾克在第三届计算机通信安全防护大会上,公开发表了他的有关计算机视频显示单元电磁辐射的研究报告,同时在现场作了用一台黑白电视机接收计算机辐射泄漏信号的演示。
- 相关中文对照歌词
- Computer Age
- Computer Love
- My Computer
- CPU
- Long Way To Go
- Computer Cowboy
- Computer Assisted Design
- Computer Eyes
- Plastic Beach
- Technology
- 推荐网络例句
-
Great. What repertoire did you see?
太棒了。你看的是什么剧目?
-
I prepared not to accept such ridiculousness:"Please," I said to him.
我可不想理会这套荒谬的东西:"请你通情达理一点儿。"
-
For instance, Oriental Horizon, Topics in Focus, and News Probe are falling into this category. These programs share the common that they are sensing the age, concerning the social event and focalizing the hot news to transmit voice of our Party and desires of people. All of them are uniquely characterasted with decency, unadornment, and precision, and they are the successful examples to investigative reports in our country.
如《东方时空》、《焦点访谈》、《新闻调查》等,这些节目的一个共同特点就是在央视栏目化板块化改革背景下拨握住时代的脉搏,关注社会大事、聚焦新闻热点、传达党的声音、反映人民的意愿,形成了庄重、大方、朴实、严谨的独特风格,为我国调查类报道的成功范例。