英语人>网络例句>realizing 相关的网络例句
realizing相关的网络例句

查询词典 realizing

与 realizing 相关的网络例句 [注:此内容来源于网络,仅供参考]

The results showed that DO is one of the most important controlling parameters for realizing shortened simultaneous nitrification and denitrification.

试验结果表明,溶解氧浓度是实现短程同步硝化反硝化的一个重要控制参数。

Depolarizer plays an important role in realizing Raman pump source with low degree of polarization and in solving the problem of polarization dependent gain.

消偏器在实现低偏度喇曼泵浦源、解决喇曼放大器偏振相关增益问题中有重要的作用。

I am realizing that the derby here in Milan is very particular, as it is in Brazil.

我认识到在米兰德比是非常特别的,就像在巴西。

The paper gives a particular description of project designment and realizing progress.

详细介绍了该系统的方案设计实现过程。

Realizing you need to detox your body is the first step for your health, but do you have any idea where to start?

实现你需要排毒您的身体是第一步,为您的健康,但你有什么想法从哪里开始呢?

Then, in order to trade off between the cost and performance of super-fine phase when realizing the low-jitter low-power high-performance frequency synthesizer for Ethernet application, a novel dynamic voltage-mode phase interpolator with 8-stage differential ring VCO has been provided satisfying the requirement of transmitter and receiver simultaneously. The chip has been implemented in SMIC 0.18-um standard CMOS process and achieved an RMS jitter of 11ps with the crystal oscillator reference RMS jitter of 16ps.

接着,在实现以太网低抖动低功耗高性能的频率综合器设计中,为了有效解决超精细相位性能与成本的矛盾,提出一种新颖的动态电压模相位内插电路,与8级环振VCO相配合,为系统同时满足发送与接收需求起到至关重要的作用。

In this paper, the concept of network security and security structures of OSI and Internet is introduced, and various threats confronting the computer network are also discussed. Several kinds of network information security technologies, including firewall technology, virtual private network, intrusion detection system, data encryption technology, identity authentication and security protocol etc. are also examined. The security of internal network is the biggest problem in the construction of each network. The solution to this problem lies in setting up a firewall. The theory of a firewall and the approach to its actualization is studied. Intrusion detection system, an important part of the computer network security system, has gained extensive attention. IDS monitors the computer and network traffic for intrusion and suspicious activities. It not only detects the intrusion from the extranet hacker, but also the intranet users. The emergence of virtual private network paves the way for realizing secure connection of LAN quickly and at a relatively low cost. The concept, function, key techniques, including the tunnel technology, and the ways to realize VPN are expounded in this paper. Also introduced is the data encrypt network technology, which is called the soul of computer network security, such as digital digest, digital signature, digital certificate, digital encrypt arithmetic and so on. At the same time, the principle and the process of implementing network security by digital certificate and digital signature, the basic principle and characters of security protocols, and finally, three of the security protocols, concerning the security problems in network, IPsec, SLL and SET are analyzed in detail Computer network system should be a system of dynamic defence, both dynamic and static, passive as well as active, and even offensive, combined with management and technology.

本文系统地介绍了网络安全的概念、OSI及Internet的安全体系结构,并讨论了计算机网络面临的各种安全威胁;内部网络的安全问题是每个建网单位面临的最大问题,可以认为防火墙技术是解决网络安全的一个主要手段,本文研究了防火墙的原理及其实现手段;作为一种主动的防御措施,入侵检测系统作为网络系统安全的重要组成部分,得到了广泛的重视,TDS对计算机和网络资源上的恶意使用行为进行识别和响应,不仅检测来自外部的入侵行为,也监督内部用户的未授权活动;虚拟专用网技术的出现,为实现网络间的连接提供了快速安全但又相对便宜的手段,本文较深入的探讨了实现VPN的隧道技术,并对VPN的概念、功能、实现途径、基本构成、关键技术及发展前景等问题进行了全面论述;数据加密技术是网络安全核心技术之一,本文从数据加密算法、数字摘要、数字签名及数字证书等几方面简要介绍了数据加密技术,并分析用数字证书和数字签名实现网络安全的原理和过程;对安全协议的基本原理、主要特点进行了较为深入的研究,并就网络的安全性问题剖析了三种安全协议:IPsec协议、SLL协议和SET协议。

By using this direct memory access transfer technology,system characters can be improved,CPU efficiency is enhanced and the difficulties of realizing the large high speed buffer are resolved.

利用DMA直接内存存取的数据传输技术,提高了系统性能,解放了CPU,解决了大量数据高速采集的问题。

As a philosophical system, Mysticism considers as the end of philosophy the direct union of the human soul with the Divinity through contemplation and love, and attempts to determine the processes and the means of realizing this end.

作为一个哲学体系,神秘主义认为,作为哲学终结的直接联盟的人类灵魂与神通过沉思和爱戴,并试图确定的程序和手段实现这一目的。

The digital signature is the powerful safeguard of the developing of E-business. It plays an important role in realizing the functions of identification anthentication, data integrity and denying the disavowal.

数字签名是开展电子商务的有力保障,在实现身份认证、数据完整性和不可抵赖性等功能方面都有重要作用。

第15/100页 首页 < ... 11 12 13 14 15 16 17 18 19 ... > 尾页
推荐网络例句

Singer Leona Lewis and former Led Zeppelin guitarist Jimmy Page emerged as the bus transformed into a grass-covered carnival float, and the pair combined for a rendition of "Whole Lotta Love".

歌手leona刘易斯和前率领的飞艇的吉他手吉米页出现巴士转化为基层所涵盖的嘉年华花车,和一双合并为一移交&整个lotta爱&。

This is Kate, and that's Erin.

这是凯特,那个是爱朗。

Articulate the aims, objectives and key aspects of a strategic business plan.

明确的宗旨,目标和重点战略业务计划。