英语人>网络例句>virtual 相关的网络例句
virtual相关的网络例句

查询词典 virtual

与 virtual 相关的网络例句 [注:此内容来源于网络,仅供参考]

Firstly, a probability computing model is constructed to present system call sequences and the SCSFA algorithm is designed to predict the attempt of intrusion and to determine what need to protect, which is based on the analysis of system call sequence in virtual computing systems; Secondly, the sensitive data protected are divided into a number of film data, and for the goals of random errors tolerance, each tablet data are redundant backup based on Byzantine fault tolerance; Then, the redundant data are distributed to different virtual machines.

设计SCSFA算法分析虚拟计算环境的系统调用行为序列,以识别虚拟计算环境下的入侵企图,预测敏感数据的高危区域;其次,将要保护的数据划分成若干片数据,并以容忍虚拟计算环境随机错误为目标对每个片数据冗余备份;然后将冗余片数据分散到不同虚拟机上。

Considering minimization of total wire length as the objective, it allows virtual blocks to transform into rectilinear shapes without overlaps and selects the optimum shapes for virtual blocks. It is based on the dead space block assignment and pin allocation during the process of packing.

该算法以线长最小化为目标,通过在位置优化过程中对虚拟模块进行无重叠的直角多边形变形来实现虚拟模块的形状优化,形状优化过程是基于模块填装过程中的空白区分配算法和引脚分配算法,并以降低线网在半周长模式下的线长下限为其主要理论依据。

For most virtual world users, though, there is a clear delineation between the virtual and real personas.

尽管,对于大部分的虚拟世界用户,对于虚拟和现实人物形像间会有一个清楚的描绘。

This system is mainly the virtual instrument softwareLabview that makes use of the company of NI to carry out theparameter diagraph of, is a kind of the virtual instrument testtechnique.

本系统主要是利用NI公司的虚拟仪器软件Labview来实现参数测量的,是虚拟仪器测试技术的一种。

In this paper, the concept of network security and security structures of OSI and Internet is introduced, and various threats confronting the computer network are also discussed. Several kinds of network information security technologies, including firewall technology, virtual private network, intrusion detection system, data encryption technology, identity authentication and security protocol etc. are also examined. The security of internal network is the biggest problem in the construction of each network. The solution to this problem lies in setting up a firewall. The theory of a firewall and the approach to its actualization is studied. Intrusion detection system, an important part of the computer network security system, has gained extensive attention. IDS monitors the computer and network traffic for intrusion and suspicious activities. It not only detects the intrusion from the extranet hacker, but also the intranet users. The emergence of virtual private network paves the way for realizing secure connection of LAN quickly and at a relatively low cost. The concept, function, key techniques, including the tunnel technology, and the ways to realize VPN are expounded in this paper. Also introduced is the data encrypt network technology, which is called the soul of computer network security, such as digital digest, digital signature, digital certificate, digital encrypt arithmetic and so on. At the same time, the principle and the process of implementing network security by digital certificate and digital signature, the basic principle and characters of security protocols, and finally, three of the security protocols, concerning the security problems in network, IPsec, SLL and SET are analyzed in detail Computer network system should be a system of dynamic defence, both dynamic and static, passive as well as active, and even offensive, combined with management and technology.

本文系统地介绍了网络安全的概念、OSI及Internet的安全体系结构,并讨论了计算机网络面临的各种安全威胁;内部网络的安全问题是每个建网单位面临的最大问题,可以认为防火墙技术是解决网络安全的一个主要手段,本文研究了防火墙的原理及其实现手段;作为一种主动的防御措施,入侵检测系统作为网络系统安全的重要组成部分,得到了广泛的重视,TDS对计算机和网络资源上的恶意使用行为进行识别和响应,不仅检测来自外部的入侵行为,也监督内部用户的未授权活动;虚拟专用网技术的出现,为实现网络间的连接提供了快速安全但又相对便宜的手段,本文较深入的探讨了实现VPN的隧道技术,并对VPN的概念、功能、实现途径、基本构成、关键技术及发展前景等问题进行了全面论述;数据加密技术是网络安全核心技术之一,本文从数据加密算法、数字摘要、数字签名及数字证书等几方面简要介绍了数据加密技术,并分析用数字证书和数字签名实现网络安全的原理和过程;对安全协议的基本原理、主要特点进行了较为深入的研究,并就网络的安全性问题剖析了三种安全协议:IPsec协议、SLL协议和SET协议。

The traditional method of fault diagnosis is utilizing instrument, therefore, in our virtual digit circuit experiment system, virtual instrument is one of important parts.

在对虚拟仪器进行了深入的研究基础上,结合系统的实现,建立了虚拟仪器的面向对象的层次结构模型。

Adopting the latest research result on dynamic signal discrete spectrum analysis and the idea of virtual instrument, a dynamic signal analysis virtual instrument software system is developed, which is based on windows and has good performance.

并采用动态信号离散频谱分析领域最新研究成果,基于虚拟仪器设计思想,研制新方法、实时性好、精度高的基于Windows2000的动态信号分析虚拟仪器软件系统。

In theoretical circle there are many controversies about the legal attribute of virtual property . In the judicial practice the dissention with virtual property could not be settled satisfactorily because the related law is absent.

在理论界对虚拟财产的法律属性存在诸多争议,而在司法实践中由于相关法律的缺位,导致了虚拟财产纠纷难以得到很好地解决。

The background and fundamental concepts of virtual enterprise application integration were addressed firstly in Chapter 1. A state-of-the-art review of existing research, projects and applications in the domain of virtual enterprise application integration is presented.

第一章对网络化制造基本内涵及其相关研究内容作了介绍,论述了虚拟企业及其应用集成的背景和国内外研究现状,指出了当前该领域研究存在的问题,介绍了本论文的选题背景、课题来源、主要研究内容及总体结构。

The Internet is a virtual goldmine - call it a virtual El Dorado, if you will.

互联网是一个虚拟的金矿-称之为一个虚拟埃尔多拉多,如果您的意愿。

第14/100页 首页 < ... 10 11 12 13 14 15 16 17 18 ... > 尾页
相关中文对照歌词
Chica Virtual
Virtual Friend
Virtual Death
Virtual Life
Virtual Diva
Virtual Insanity
Virtual Reality
Virtual Environment
Virtual Reality
Virtual World
推荐网络例句

The split between the two groups can hardly be papered over.

这两个团体间的分歧难以掩饰。

This approach not only encourages a greater number of responses, but minimizes the likelihood of stale groupthink.

这种做法不仅鼓励了更多的反应,而且减少跟风的可能性。

The new PS20 solar power tower collected sunlight through mirrors known as "heliostats" to produce steam that is converted into electricity by a turbine in Sanlucar la Mayor, Spain, Wednesday.

聚光:照片上是建在西班牙桑路卡拉马尤城的一座新型PS20塔式太阳能电站。被称为&日光反射装置&的镜子将太阳光反射到主塔,然后用聚集的热量产生蒸汽进而通过涡轮机转化为电力