英语人>网络例句>connection time 相关的网络例句
connection time相关的网络例句

查询词典 connection time

与 connection time 相关的网络例句 [注:此内容来源于网络,仅供参考]

Effects of some major factors on deoxidize rate of silver, such as Mix ratio connection of tartaric acid and glucose, over all concentration of mixed liquid, the pH level, the reaction temperature, the reaction time etc.

考察了酒石酸与葡萄糖的配比关系、还原混合液的总浓度、pH值、反应温度、反应时间对银还原率的影响,得出了酒石酸与葡萄糖、无水乙醇的质量比为1:2.6:1,pH值为12,在室温下放置时间为3-5d,银的还原率大于92.7%的最佳条件,总回收的金属银纯度为98.2%。

There was a time that an individual had to dial up just to get an internet connection.

曾经有一段时间,一个人不得不拨号刚刚获得互联网连接。

Each time the connection fails Amazing Dialer will automatically try to re-establish it.

每一次连接失败惊人的拨号器会自动尝试重新建立它。

If you experience sudden hang-ups, if you want your computer to connect to the Internet at specific time or when some application requests an Internet connection - Amazing Dialer is exactly what you need.

如果你的经验,突然杭起伏,如果你想让你的电脑连接到互联网上的特定时间或当一些应用要求网际网路连线-惊人的拨号软件正是您所需要的。

In this paper, the concept of network security and security structures of OSI and Internet is introduced, and various threats confronting the computer network are also discussed. Several kinds of network information security technologies, including firewall technology, virtual private network, intrusion detection system, data encryption technology, identity authentication and security protocol etc. are also examined. The security of internal network is the biggest problem in the construction of each network. The solution to this problem lies in setting up a firewall. The theory of a firewall and the approach to its actualization is studied. Intrusion detection system, an important part of the computer network security system, has gained extensive attention. IDS monitors the computer and network traffic for intrusion and suspicious activities. It not only detects the intrusion from the extranet hacker, but also the intranet users. The emergence of virtual private network paves the way for realizing secure connection of LAN quickly and at a relatively low cost. The concept, function, key techniques, including the tunnel technology, and the ways to realize VPN are expounded in this paper. Also introduced is the data encrypt network technology, which is called the soul of computer network security, such as digital digest, digital signature, digital certificate, digital encrypt arithmetic and so on. At the same time, the principle and the process of implementing network security by digital certificate and digital signature, the basic principle and characters of security protocols, and finally, three of the security protocols, concerning the security problems in network, IPsec, SLL and SET are analyzed in detail Computer network system should be a system of dynamic defence, both dynamic and static, passive as well as active, and even offensive, combined with management and technology.

本文系统地介绍了网络安全的概念、OSI及Internet的安全体系结构,并讨论了计算机网络面临的各种安全威胁;内部网络的安全问题是每个建网单位面临的最大问题,可以认为防火墙技术是解决网络安全的一个主要手段,本文研究了防火墙的原理及其实现手段;作为一种主动的防御措施,入侵检测系统作为网络系统安全的重要组成部分,得到了广泛的重视,TDS对计算机和网络资源上的恶意使用行为进行识别和响应,不仅检测来自外部的入侵行为,也监督内部用户的未授权活动;虚拟专用网技术的出现,为实现网络间的连接提供了快速安全但又相对便宜的手段,本文较深入的探讨了实现VPN的隧道技术,并对VPN的概念、功能、实现途径、基本构成、关键技术及发展前景等问题进行了全面论述;数据加密技术是网络安全核心技术之一,本文从数据加密算法、数字摘要、数字签名及数字证书等几方面简要介绍了数据加密技术,并分析用数字证书和数字签名实现网络安全的原理和过程;对安全协议的基本原理、主要特点进行了较为深入的研究,并就网络的安全性问题剖析了三种安全协议:IPsec协议、SLL协议和SET协议。

One of the first Discalced Carmelites in Spain, Thomas of Jesus, who has already been mentioned in connection with the missions, conceived the idea of founding a "desert" where the religious should find the opportunity for devoting their whole time and energy to the cultivation of a spirit of contemplation.

第一个discalced carmelites在西班牙,托马斯的耶稣,已经提到他涉嫌与使命,就构想成立一个"沙漠",而宗教应该找机会把自己的全部时间和精力用在培养一个精神的沉思。

The time of intrusion and uplift of granite located in the thermal center lag that of domal progressive metamorphism, there is no origin connection between metamorphism and igneous intrusion.

热中心花岗岩的侵位和上隆滞后于穹状递增变质作用,二者在成因上无直接的联系。

Improve algorithm to adjust the window of every phase as close as position of bandwidth estimation, network connection to rise, combinative network position and bandwidth estimation judge the rationality of congest window, adjust congest window dynamicly, when making congest is about to happen, the window can drop in time appropriate level, avoid what bring about as a result of congest to be lost in group as far as possible.

改进算法将每个阶段的窗口调整和带宽估计、网络状态紧密联系起来,结合网络状态和带宽估计判定拥塞窗口的合理性,动态地调整拥塞窗口,使拥塞即将发生时,窗口能及时下降到适宜的水平,尽量避免由于拥塞而导致的分组丢失。

If you have a DSL line or any other type Internet connection that is open all the time.

如果你有一个或任何其他类型的DSL线连接互联网,是开放的。

TCP port specified in the server can eavesdrop on the most, and at the same time with 100 connection.

详细说明: TCP服务器可以在指定的端口进行监听,并同时最多处理100个连接。

第6/19页 首页 < ... 2 3 4 5 6 7 8 9 10 ... > 尾页
推荐网络例句

The split between the two groups can hardly be papered over.

这两个团体间的分歧难以掩饰。

This approach not only encourages a greater number of responses, but minimizes the likelihood of stale groupthink.

这种做法不仅鼓励了更多的反应,而且减少跟风的可能性。

The new PS20 solar power tower collected sunlight through mirrors known as "heliostats" to produce steam that is converted into electricity by a turbine in Sanlucar la Mayor, Spain, Wednesday.

聚光:照片上是建在西班牙桑路卡拉马尤城的一座新型PS20塔式太阳能电站。被称为&日光反射装置&的镜子将太阳光反射到主塔,然后用聚集的热量产生蒸汽进而通过涡轮机转化为电力