英语人>网络例句>users 相关的网络例句
users相关的网络例句

查询词典 users

与 users 相关的网络例句 [注:此内容来源于网络,仅供参考]

Compared to information filtering systems which aim to find interesting information for users, the system has several differentiae.

它所过滤的内容与系统的某一个或者某一群用户无关,而是适用于过滤系统的全部用户。

The development and utilization of digitized information resources play crucial role in providing support for petrochemical technological innovation. In the web circumstances, more and more digitized petrochemical information resources become an important content that of the special library. It has very large difference to with traditional information resources in number, structure, distribution, diffuseness and the form of media under network. So, how to organize and manage digitized information resources for meeting the users' need and improving the ability of utilizing digitized petrochemical information resources has been more and more important to special library.

在网络环境中,越来越多的数字化石油化工信息资源成为图书馆信息资源的重要组成部分,其在数量、结构、分布与传播范围、媒体形态、控制机制、传递手段等方面都与传统的信息资源有着极大的差异,因此组织和管理好数字化信息资源,使信息环境高度有序化,让用户可以在网上快捷方便地获取自己所需的信息,提高数字化石油化工信息资源的利用率,是石油化工专业图书馆界的当务之急。

Technical innovation diffusion is a process that potential users accept and spread through some routes.

技术创新扩散是通过一定的渠道在潜在使用者之间传播采用的过程。

In this paper, the concept of network security and security structures of OSI and Internet is introduced, and various threats confronting the computer network are also discussed. Several kinds of network information security technologies, including firewall technology, virtual private network, intrusion detection system, data encryption technology, identity authentication and security protocol etc. are also examined. The security of internal network is the biggest problem in the construction of each network. The solution to this problem lies in setting up a firewall. The theory of a firewall and the approach to its actualization is studied. Intrusion detection system, an important part of the computer network security system, has gained extensive attention. IDS monitors the computer and network traffic for intrusion and suspicious activities. It not only detects the intrusion from the extranet hacker, but also the intranet users. The emergence of virtual private network paves the way for realizing secure connection of LAN quickly and at a relatively low cost. The concept, function, key techniques, including the tunnel technology, and the ways to realize VPN are expounded in this paper. Also introduced is the data encrypt network technology, which is called the soul of computer network security, such as digital digest, digital signature, digital certificate, digital encrypt arithmetic and so on. At the same time, the principle and the process of implementing network security by digital certificate and digital signature, the basic principle and characters of security protocols, and finally, three of the security protocols, concerning the security problems in network, IPsec, SLL and SET are analyzed in detail Computer network system should be a system of dynamic defence, both dynamic and static, passive as well as active, and even offensive, combined with management and technology.

本文系统地介绍了网络安全的概念、OSI及Internet的安全体系结构,并讨论了计算机网络面临的各种安全威胁;内部网络的安全问题是每个建网单位面临的最大问题,可以认为防火墙技术是解决网络安全的一个主要手段,本文研究了防火墙的原理及其实现手段;作为一种主动的防御措施,入侵检测系统作为网络系统安全的重要组成部分,得到了广泛的重视,TDS对计算机和网络资源上的恶意使用行为进行识别和响应,不仅检测来自外部的入侵行为,也监督内部用户的未授权活动;虚拟专用网技术的出现,为实现网络间的连接提供了快速安全但又相对便宜的手段,本文较深入的探讨了实现VPN的隧道技术,并对VPN的概念、功能、实现途径、基本构成、关键技术及发展前景等问题进行了全面论述;数据加密技术是网络安全核心技术之一,本文从数据加密算法、数字摘要、数字签名及数字证书等几方面简要介绍了数据加密技术,并分析用数字证书和数字签名实现网络安全的原理和过程;对安全协议的基本原理、主要特点进行了较为深入的研究,并就网络的安全性问题剖析了三种安全协议:IPsec协议、SLL协议和SET协议。

It is the experience that for a small minority of the users the tablets are not easily digestible.

这是经验,对少数用户的片不容易消化。

These top diggers have a higher chance of getting a story digged to the homepage than other users.

这些排名前列的digger与其他的用户比起来,其提供的文章更有可能进入到首页。

For simple digital camera users, this is the most popular choice.

简单的数码相机用户来说,这是最流行的选择。

T his name is most common among the users of digital signal processor s.

这个名字在数字信号处理器的用户中相当流行。

Current and potential digitizer users must be aware of these error sources and how to measure them.

当今和潜在的数化用户一定知道这些错误源并且怎样测量他们。

Users can process through the microphone in the game with 300 members of the upper limit of direct voice communications.

用户可以通过麦克风在游戏过程中与上限 300 人的成员直接语音通讯。

第96/100页 首页 < ... 92 93 94 95 96 97 98 99 100 > 尾页
相关中文对照歌词
Users
推荐网络例句

This one mode pays close attention to network credence foundation of the businessman very much.

这一模式非常关注商人的网络信用基础。

Cell morphology of bacterial ghost of Pasteurella multocida was observed by scanning electron microscopy and inactivation ratio was estimated by CFU analysi.

扫描电镜观察多杀性巴氏杆菌细菌幽灵和菌落形成单位评价遗传灭活率。

There is no differences of cell proliferation vitality between labeled and unlabeled NSCs.

双标记神经干细胞的增殖、分化活力与未标记神经干细胞相比无改变。