英语人>网络例句>on paper 相关的网络例句
on paper相关的网络例句

查询词典 on paper

与 on paper 相关的网络例句 [注:此内容来源于网络,仅供参考]

The formula derived in this paper are consistent with those in CHEN's paper where they are derived based on geometric graph, while the former are easy to comprehend.

根据相位裕度的概念推导出的参数整定公式与基于几何图形推导出的参数整定公式一致,但更容易理解。

This paper mainly includes two aspects:(1) The review on soft-measuring technique:The first aspect of this paper introduces the mathematical descriptive form of soft-measuring technique and its engineering design steps, then elaborates the two modeling methods of soft measurement which include the regression analysis and the artificial neural network.

本文研究的内容主要有以下两大方面:一、对软测量技术进行综述。介绍了软测量技术的数学描述形式及工程化设计与实现的步骤。

This paper mainly adopts the study methods of traditional dialectology. Based on the fieldwork, the paper describes the phonetic system of Chengkan dialect in detail.

本文主要采用传统方言学的研究方法,在两次田野调查的基础上,对呈坎方言的语音系统进行了较为全面、细致的描写,整理出了呈坎方言音系、同音字汇、儿化韵表、词汇表、语法例句及呈坎方言与中古语音声韵调对照表,总结了该方言的音韵特点,归纳了儿化和文白异读的规律,初步讨论了古全浊声母的今读和韵母的特点两个专题。

This paper summarize the course of industry development in Anhui from the days of national economy renaissance,and track the development course of diaphysis enterprises simply.In the end,this paper bring forward correlative expectation on the decelopment of Anhui industry in the eleventh five-years programme and further future.

本文将国民经济恢复时期以来的安徽工业经济发展历程进行了系统整理,并对几个骨干企业的发展史进行简要追踪,文章最后对"十一五"及未来更长时间内安徽工业经济发展提出了相关展望。

In this paper, the concept of network security and security structures of OSI and Internet is introduced, and various threats confronting the computer network are also discussed. Several kinds of network information security technologies, including firewall technology, virtual private network, intrusion detection system, data encryption technology, identity authentication and security protocol etc. are also examined. The security of internal network is the biggest problem in the construction of each network. The solution to this problem lies in setting up a firewall. The theory of a firewall and the approach to its actualization is studied. Intrusion detection system, an important part of the computer network security system, has gained extensive attention. IDS monitors the computer and network traffic for intrusion and suspicious activities. It not only detects the intrusion from the extranet hacker, but also the intranet users. The emergence of virtual private network paves the way for realizing secure connection of LAN quickly and at a relatively low cost. The concept, function, key techniques, including the tunnel technology, and the ways to realize VPN are expounded in this paper. Also introduced is the data encrypt network technology, which is called the soul of computer network security, such as digital digest, digital signature, digital certificate, digital encrypt arithmetic and so on. At the same time, the principle and the process of implementing network security by digital certificate and digital signature, the basic principle and characters of security protocols, and finally, three of the security protocols, concerning the security problems in network, IPsec, SLL and SET are analyzed in detail Computer network system should be a system of dynamic defence, both dynamic and static, passive as well as active, and even offensive, combined with management and technology.

本文系统地介绍了网络安全的概念、OSI及Internet的安全体系结构,并讨论了计算机网络面临的各种安全威胁;内部网络的安全问题是每个建网单位面临的最大问题,可以认为防火墙技术是解决网络安全的一个主要手段,本文研究了防火墙的原理及其实现手段;作为一种主动的防御措施,入侵检测系统作为网络系统安全的重要组成部分,得到了广泛的重视,TDS对计算机和网络资源上的恶意使用行为进行识别和响应,不仅检测来自外部的入侵行为,也监督内部用户的未授权活动;虚拟专用网技术的出现,为实现网络间的连接提供了快速安全但又相对便宜的手段,本文较深入的探讨了实现VPN的隧道技术,并对VPN的概念、功能、实现途径、基本构成、关键技术及发展前景等问题进行了全面论述;数据加密技术是网络安全核心技术之一,本文从数据加密算法、数字摘要、数字签名及数字证书等几方面简要介绍了数据加密技术,并分析用数字证书和数字签名实现网络安全的原理和过程;对安全协议的基本原理、主要特点进行了较为深入的研究,并就网络的安全性问题剖析了三种安全协议:IPsec协议、SLL协议和SET协议。

The paper gives a brief introduction on theory and means of orebed digitaled and interrelated mining software in domestic and international. On the basis of systematic analysis and research on Jiayashan ore segment, with the mathematic-economic model software bag developed by our library, via the special software Surpac and Micrmine, on the need of the Lanping Pb-Zn mine, the mathematic-economic model of the deposit has been established in Lanping pb-zn mine Jiayashan ore segment. Correlative important technological and economic guide lines have been analyzed and studied. At last, some fruits have been achieved:(1) For the first time, the mathematic-economic model of Lanpingpb-zn mine has been established , digitated and visualed of all kinds of useful information on ore body have been realized.

本文在对矿床数字化的理论与方法及相关的国内外矿业软件综述基础上,通过对该矿床的架崖山矿段地质特征进行充分分析和研究,运用自行研制的大型"矿床数学-经济模型软件包",以国外矿业软件Surpac和Micrmine为辅助,结合兰坪铅锌矿矿山的实际需求,建立了兰坪铅锌矿架崖山矿段矿床数学经济模型,并对相关的重要技术经济指标进行了分析与研究,最终取得了如下成果:(1)首次在兰坪铅锌矿架崖山矿段建立了矿床数学-经济模型,实现了矿体各有用信息的数字化和可视化。

The paper gives a brief introduction on theory and means of orebed digitaled and interrelated mining software in domestic and international. On the basis of systematic analysis and research on Jiayashan ore segment, with the mathematic-economic model software bag developed by our library, via the special software Surpac and Micrmine, on the need of the Lanping Pb-Zn mine, the mathematic-economic model of the deposit has been established in Lanping pb-zn mine Jiayashan ore segment. Correlative important technological and economic guide lines have been analyzed and studied. At last, some fruits have been achieved:(1) For the first time, the mathematic-economic model of Lanping pb-zn mine has been established , digitated and visualed of all kinds of useful information on ore body have been realized.

本文在对矿床数字化的理论与方法及相关的国内外矿业软件综述基础上,通过对该矿床的架崖山矿段地质特征进行充分分析和研究,运用自行研制的大型"矿床数学-经济模型软件包",以国外矿业软件Surpac和Micrmine为辅助,结合兰坪铅锌矿矿山的实际需求,建立了兰坪铅锌矿架崖山矿段矿床数学经济模型,并对相关的重要技术经济指标进行了分析与研究,最终取得了如下成果:(1)首次在兰坪铅锌矿架崖山矿段建立了矿床数学-经济模型,实现了矿体各有用信息的数字化和可视化。

This paper introduces some fundamental principles of the Fused Deposition Modeling in Rapid Prototyping, and analyzes the factors influencing the prototype surface quality from two parts, which include the choice of prototyping direction and the prototyping parameter. Based on this, in response to these common quality problems in Fused Deposition Modeling prototyping, this paper puts forward some methods to improve quality.

介绍了快速成型技术中熔融沉积制造的基本原理,从成型方向的选择和成型参数两方面分析了影响原型表面质量的因素,并针对熔融沉积制造原型常见的表面质量问题,提出了改善质量的措施。

This paper analyzed data from multiple sources and different structures, concluded three types of info: Login info, Event info, and Packet data info, then created the formation for every type of data; In order to combine future possible new data, IDS using profile and formation string together, create and practice data formation standard algorithm; Because in the collected data, there is info that is redundant or has minor effect on the IDS, this paper discussed the rules of redundant data differentiating and safe data differentiating, Then create data filter rule base; Data collecting system uses distributivity design, collecting module like a black box. we can get data which was filterd and had standard formation, if we created a new model string for new data source. Module work individually; filter data right away at the collecting node.

本文分析了多种来源的、不同结构的数据,将其总结成登录信息、事件信息和网络数据包信息三种类型,并为每种类型的数据设计了固定的格式;为了与将来可能出现的新型数据兼容,采用了配置文件与模式字符串相结合的方法,设计并实现了数据格式标准化算法;由于收集到的数据中存在冗余的信息和对入侵检测影响不大的信息,本文分别讨论了冗余数据辨别规则和安全数据辨别规则,并建立起数据过滤规则库;数据收集系统采用分布式设计,收集器以黑盒形式提供,对新的数据源只需设计一个新的模式字符串,即可得到过滤后的、具有标准格式的数据,各收集器间独立工作;在收集点即对数据进行过滤,只向分析中心报告可疑数据,以减少传输和存储的数据量,降低对网络性能的影响。

The higher the elongation of flexility on each piece of paper, paper is also not easy to draggle.

伸长率越高,纸张的柔韧性就越强,纸张也不容易被拉断。

第97/100页 首页 < ... 92 93 94 95 96 97 98 99 100 > 尾页
相关中文对照歌词
If I Could Just Get It On Paper
Trippin' On A Hole In A Paper Heart
Eyes On Paper
推荐网络例句

I can not make it blossom and suits me

我不能让树为我开花

When temperatures are above approximately 80 °C discolouration of the raceways or rolling elements is a frequent feature.

当温度高于 80 °C 左右时,滚道或滚动元件褪色是很常见的特征。

The lawyer's case blew up because he had no proof.

律师的辩护失败,因为他没有证据。