英语人>网络例句>nodal computer 相关的网络例句
nodal computer相关的网络例句

查询词典 nodal computer

与 nodal computer 相关的网络例句 [注:此内容来源于网络,仅供参考]

It includes four parts: 1 Part I, it introduces the basic knowledge of computer viruses such as computer virus definition, history and important viruses events, features, behavior phenomena, difference with computer software and hardware troubles, damage behavior and capability, classification, naming, future trend, etc; 2 Part II, it introduces the corresponding knowledge of computer systems related to computer viruses such as the composing of software and hardware of the computer system, storage media and its working mechanism, interrupt technologies,.com/.exe/.pe file formats and their working mechanism, etc; 3 Part III, it introduces computer virus mechanism and theory such as computer virus structure, work flow, working mechanism of key modules, typical technologies used to design computer viruses including the corresponding traditional technologies (interrupt filching, memory resident, etc.), the corresponding new routine technologies (self-encrypting, Mutation Engine, etc.), and the corresponding new technologies used by some prevalence computer viruses such as macro viruses, e-mail viruses, worm, hacker, Trojan, mobile phone viruses, the working mechanism analysis of some kinds of typical and prevalence computer viruses such as file-type viruses, macro viruses, e-mail viruses, worm viruses, hacker, Trojan, mobile phone viruses, the analysis of some typical and prevalence computer viruses examples including BALL viruses, WORD macro viruses, WantJob viruses, Code Red viruses, BO Trojan, etc; 4 Part IV, it introduces the defense and killing technologies of computer viruses such as the aim and criterion of computer viruses defense and killing, prevention methods and corresponding technologies, detection technologies (comparison method, character code scanning method, behavior inspecting method, analysis method, etc.), manual and automatic killing technologies, immunity technologies such as IBM digital immunity system, new anti-viruses technology trends (real-time anti-viruses technologies, 32 kernel technologies, active kernel technologies, etc.), some typical virus defense and killing softwares (Symantec AntiVirus product, PC-Cillin AntiVirus product, etc.), the defense and killing method analysis of some kinds of typical and prevalence computer viruses (file-type viruses, macro viruses, worm viruses, hacker, etc.), for example, firewall and intrusion detection technologies for anti-hacker, the defense and killing of some typical and prevalence computer viruses examples including WORD macro viruses, Code Red viruses, BO Trojan, etc.

课程内容具体包括四大部分:1)第一部分,介绍计算机病毒基本知识,包括:计算机病毒定义、病毒发展史及重大事件、病毒特点、病毒表现现象及与软硬件故障的区别、病毒破坏行为及危害性、病毒的传播途径及媒介、病毒分类、病毒的命名及计算机病毒技术发展趋势等内容;2)第二部分,介绍与计算机病毒有关的计算机系统相关知识,包括:计算机系统软硬件组成、存储介质结构及工作原理、计算机系统引导机理及流程、中断技术、。com/。exe/。pe等文件格式及工作机理等内容;3)第三部分,讲解计算机病毒机理,包括:计算机病毒的组成结构、病毒工作流程、病毒引导/触发/感染/破坏等模块的工作机理、计算机病毒所采取的编制技术(包括中断窃取/内存驻留等传统编制技术、自加密/隐形/变形机等新的常规编制技术、宏病毒/电子邮件病毒/网络蠕虫/特洛伊木马/黑客/手机病毒等一些新的流行病毒所采取的编制技术等)、一些类型的典型或流行计算机病毒的工作机理分析(包括:引导型病毒、文件型病毒、宏病毒、电子邮件病毒、蠕虫病毒、黑客、特洛伊木马、手机病毒等)、一些典型或流行的计算机病毒实例剖析(包括:小球病毒、WORD宏病毒、求职信病毒、红色代码病毒、冰河木马等)等内容;4)第四部分,讲解计算机病毒防治技术,包括:计算机病毒防治目的、病毒防治策略及规范、病毒在管理和技术上的预防措施、病毒检查技术(包括:比较法/病毒特征码扫描法/行为监测法/虚拟执行法/分析法等)、手工和自动病毒清杀技术、病毒免疫技术(包括:针对某种一次性感染病毒的基于病毒标签的免疫方法/基于自我完整性检查的计算机病毒免疫方法/IBM的数字免疫系统等)、反病毒技术的新发展(包括:实时反病毒技术/32位内核技术/主动内核技术/以毒攻毒技术等)、诺顿/趋势/金山等公司的病毒防治软件产品、一些类型的典型或流行的计算机病毒(包括:引导型病毒、文件型病毒、宏病毒、蠕虫病毒、电子邮件病毒、手机病毒、黑客、特洛伊木马)的防治措施(其中,也包括介绍面向防范黑客攻击的防火墙、入侵检测技术)、一些典型或流行的计算机病毒防治实例剖析(包括:WORD宏病毒、红色代码病毒、冰河木马v1.1/v2.2等)、多层次病毒防护体系等内容。

The element equations are derived in a fixed current element coordinates which are coincident with the current moving element coordinates. The perturbed moving element coordinates and the variation of the element nodal rotation parameters corresponding to the perturbation of element nodal displacements and rotations referred to the current fixed element coordinates is consistently determined using the first order linearization of the way used to determine the current element coordinates and element nodal rotation parameters corresponding to the incremental element nodal displacements and rotations referred to the global coordinates.

本研究在梁元素当前的变形位置上,利用元素节点的座标及断面方位建立一个移动元素座标并决定元素节点的旋转参数,对应於元素节点旋转参数扰动量的广义节点力为一广义力矩,为推导传统力和力矩与该广义力矩的关系,本研究在一个与当前的移动元素座标重合的固定元素座标上,推导出元素节点在当前固定元素座标的扰动位移和扰动旋转与元素节点旋转参数的扰动量的关系。

Shanghai principle light software company Respective profession: Computer software Software test software engineer Mainly is engaged in the printer driver the test The Shanghai negotiable securities Times panoram network sponsor network starts off develops Respective profession: Computer software Does not have other The road develops the personnel Education experience Shanghai electrical machinery institute computer application technical college Programming language - familiar C, object-oriented language and so on programming C++, VB, java, assembly Computer network - computer network principle, website construction and maintenance Database - Access Computer application - computer assembly and service, construction of data The operating system - skilled grasps the Windows all operating system, has the certain foundation to Linux Charting - Auto CAD intermediate, PhotoShop, Flash, multimedia technical Authorware The science and technology manages the school computer application specialized middle school Computer network technology, computer composition principle, visible programming VB, Computer operation system, computer operation technology, homepage manufacture, network security, Computer system maintenance, microcomputer principle and assembly language, office automation and so on.

上海理光软件公司所属行业:计算机软件软件测试软件工程师主要从事打印机驱动程序的测试上海证券时报全景网络主办网上路演所属行业:计算机软件无其他路演人员教育经历上海电机学院计算机应用大专编程语言——熟悉C,面向对象程序设计C++、VB、java、汇编等语言计算机网络——计算机网络原理、网站建设与维护数据库——Access 计算机应用——计算机组装与维修、数据结构操作系统——熟练掌握Windows所有操作系统、对Linux有一定基础制图——Auto CAD中级、PhotoShop、Flash、多媒体技术Authorware科技管理学校计算机应用中专计算机网络技术,计算机组成原理,可视化程序设计VB,计算机操作系统,计算机操作技术,网页制作,网络安全,计算机系统维护,微机原理和汇编语言,办公自动化等等。

To be able to grasp more opportunities for sex crimes at the same time the relatively high use of three-station configuration, to operate a computer, here are divided into A Computer, B Computer and C computers, computer A computer-based operations, the main task is to buy and sell orders operations and holdings of individual stocks that have been tracked so that the best point and fled the country, late in the day or night, werewolves are the technical stock selection, with the potential to become a dark horse, or it is possible to start the second Stock elected, put into the C computer Optional Share Lane, B computer is a laptop, while wirelessly with a broadband connection, broadband and sometimes dropped to avoid or segment of electricity causes can not be traded, the general cases, the task of the computer B is always concerned about the A shares and Hong Kong stock market trend in broader market, in the opening period of time, C is Optional Share computer display, and interface options with the four shares of K-line column, and set to automatically turn the industry, so that If the C Optional Share computer technology, there are individual stocks will soon reach the selling points, werewolves can be found in the first time and simultaneously enter the code in the A computer, using keyboard shortcuts with the fastest speed for the next single!

为了能够把握更多的机会,狼人同时运用3台配置相对较高的电脑进行操作,这里分为A电脑、B电脑和C电脑,其中A电脑为主操作电脑,主要任务就是进行买卖下单操作和对已经持有的个股进行跟踪,以便在最佳点位出逃,在每天的盘后或者是晚上,狼人都会进行技术选股,把有可能成为黑马或者是有可能二次启动的股票选出,放入到C电脑的自选股里,B电脑是笔记本,同时以无线方式与宽带连接,避免了有时宽带掉线或者是段电的原因造成无法进行交易,一般情况下B电脑的任务是随时关注A股大盘和港股大盘走势,在开盘的时间内, C电脑显示为自选股,同时界面上选择4股K线同列,并设置为自动翻业,这样,如果在C电脑的自选股中有个股即将到达技术买点,狼人可以在第一时间发现并同时在A电脑中输入代码,使用键盘快捷方式以最快速度进行下单!

Firstly, several kinds of schemes were proposed according to the design demand. The best scheme was chosen after analyzing and comparing the schemes. The robot's structure was designed with Pro/Engineer and AutoCAD software. Secondly, the kinematics analysis conducted, coordinate transformation matrix using D-H method was set up, and the kinematics equation direct solution and inverse solution was deduced. The manipulative interface about the kinematics equation direct solution and inverse solution was completed with VC++ and the velocity Jacobian of displacement matrix was constructed using differential transform method. In the process of the trajectory planning based on robot's kinematics analysis, I propone a method by which we can get middle nodal point with normalizing factor in order to simplify our searching for these middle nodal points. In addition, I give these middle nodal points with actual physics signification. For eliminating contradiction between real-time and accuracy, I bring forward separately limit of error and reversal interpolation method. For decreasing calculation quantity, we resort to tri-spline interpolation in the articulation space.We analyse the work range of the robot by resorting to graphic means.

首先,作者针对机器人的设计要求提出了多个方案,对其进行分析比较后,选择其中最优的方案后用Pro/Engineer和AutoCAD软件进行了机器人模型结构设计;其次,进行了运动学分析,用D-H方法建立了坐标变换矩阵,推算了运动方程的正、逆解,运用VC++制作了正、逆运动学求解的求解界面;并且用微分变换法推导了速度雅可比矩阵;在基于机器人的运动学的轨迹规划中,通过在操作空间的规划,提出了归一化因子来求解中间结点,通过它可以使求解中间结点变得更简单,并且赋予这些中间结点实际的物理含义,对于规划中精确性和实时性的矛盾,提出了以误差极限法和反向插值法来解决的方法;为了减少规划过程中计算量,在关节空间进行三次样条插值;然后借助图解法进行工作空间分析,作出了实际工作空间的轴剖图。

These eigenvalue algorithms are examined under the mode error, i.e, the ratio of out-of-balance nodal point forces that is the difference of maximum elastic nodal point forces and maximum inertia nodal point forces, and the maximum elast...

与ANSYS的子空间迭代和Lanczos法相比,本文的子空间迭代比ANSYS的效率高很多,Lanczos法和ANSYS的效率差不多。大量较大规模的例题显示,本文对特征值算法的改进是十分有效的,算法的健壮性,通用性都达到了高水平。

For the principal component, namely the voltage stability analysis function, three kinds of nodal injection power modes are defined, i.e., the random varying direction of load, the response setting direction of generator and the ratio of active power component to reactive power component in load power, and a continuous power flow model that is easy to utilize and comprehend by dispatching center is built, based on this model three kinds of formulae to calculate the sensitivities of loading margin with respect to three kinds of nodal injection power modes are derived respectively, and on this basis the influence of nodal injection power mode on loading margin can be analyzed in order that the voltage collapse can be avoided by fast implementing early warning of voltage stability and adopting effective corrective control.

文章针对N-EMS的主要组成部分--电压稳定分析功能,定义了3类节点注入功率模式:负荷的随机变化方向、发电机的响应设定方向、负荷的有功和无功比例,建立了易于被调度中心运用和理解的连续潮流模型,在此模型基础上分别推导得到负荷裕度对3类模式的灵敏度公式,据此分析节点注入功率模式对负荷裕度的影响,以便能够快速进行电压稳定预警和采取有效的校正控制来避免电压崩溃。

Hypercube has many advantages, such as smaller diameter, simple routing algorithm, many parallel paths between any two nodes, and fault-tolerance, on the other hand that the Hypercube nodal degree increased logarithmetically to the number of nodes has limited network population. So we propose a constant nodal degree hierarchical topology to remedy the weakness of Hypercube and take advantages of Hypercube most. Given the definition of FCCN we analyse the basic properties including nodal degree , number of links , extensibility and diameter (maximum network communication delay). Also we proposed a simple and self-routing algorithm applied in FCCN. Although the self-routing algorithm is not optimal, but at more than 82% case it can get the shortest path, and the percent is larger and larger increased with network levels. By the self-routing algorithm the internodal distance is calculated to evaluate the network communication delay more clearly. The average internal distance is in order of the cubic root of the network population that is almost same as logarithmetically relation in a few thousands. FCCN is a highly scalable network due to its recursive construction.

首先在比较了基本互连网络的基础上,看到超立体网络的杰出性能,包括网络直径小、寻路算法简单且为自寻路算法、容错能力好等等,但是由于其节点度随网络的规模的增加而按对数关系增长,使得超立体网络的应用规模受到极大限制,所以为了能最大限度利用超立体网络的优点的同时弥补其节点度方面的不足,作者提出了节点度等于常数4的FCCN网络结构,来最多地利用立方体网络的优点;然后在对FCCN网络进行严格的定义后,分析了网络的节点度、链路数、延伸特性、网络的直径(决定网络的最大通讯延迟)等,并提出了适于FCCN网络的简单的自寻路算法,计算自寻路算法可得到最短路径的比例,看到在多于82%以上的情况自寻路算法都是最优的,而且比例随网络层数的增加而增加;应用所提出的自寻路算法计算了可以更加准确反映网络通讯延迟的参数—网络平均节点距离,计算得到此参数与网络大小的立方根成正比,此比例关系在网络的规模在几千节点以内与对数关系的网络几乎一样;FCCN网络是一高度可扩展结构,这是因为FCCN的递归构成方式,使得网络在增加节点时其原有的拓扑结构可以保持不变,不需对网络进行重新设计,为网络的实用扩展提供了条件;理论分析得出FCCN网络是一种高度可扩展高性能网络的结论。

The focal mechanism at 8.9 km: the nodal planes Ⅰ, the nodal planes Ⅰ: strike 213°, dip 76°, slip -21°; the nodal planes Ⅱ: strike 308°, dip 70°, slip -165°; T-axis: azimuth 261°, plunge 4°; P-axis: azimuth 169°, plunge 24°.

震源深度为8.9km的地震,其节面Ⅰ参数为:走向213°,倾角76°,滑动角-21°;其节面Ⅱ参数为:走向308°,倾角70°,滑动角-165°T轴方位角:261°,倾角:4°;P轴方位角:169°,倾角:24°。

Spyware is a kind of software that installed in computer user's computer, it installed by spyware user without computer user's consentment or although spyware user get computer user's consentment but the function of spyware is beyond the function which spyware user tell during the installment ,or use a fraud tell manner to tell the computer user, or force the spyware run , or dosen't offer computer user a method that can easily and fully uninstall all the module of the software ,and its function s are as follow: control、destroy computer software and hardware; force computer's behavior; scout computer user's behavior, steal or cheat computer user's private information.

间谍软件是指安装在用户计算机上的程序,此程序的安装未经用户的同意,或虽经用户的同意但超出了告知的功能范围,或采用欺诈的方式征得用户的同意,或者强行运行,或者不能简便地一次性彻底卸载所有功能模块;并且其具有如下功能:控制、破坏用户计算机软硬件;强制用户行为;监视用户行为、盗窃或以欺诈的形式骗取用户信息。

第1/500页 1 2 3 4 5 6 7 8 9 ... > 尾页
相关中文对照歌词
Computer Age
Computer Love
My Computer
CPU
Long Way To Go
Computer Cowboy
Computer Assisted Design
Computer Eyes
Plastic Beach
Technology
推荐网络例句

More direct, directer ; most direct, directest

径直的,笔直的

Do you know how to use a chain saw?

你知道如何使用链锯吗?

This is close to the cost of the purchase price.

这样的收购价已接近成本。