英语人>网络例句>用户 相关的搜索结果
网络例句

用户

与 用户 相关的网络例句 [注:此内容来源于网络,仅供参考]

The method comprises: A, obtaining service area of user terminal, access and call status control node address of user terminal and session control identifiers of the access and call status control node through domain name node; B, user terminal sends a register request to access and call status control node which acquires the user terminal safety information from distribution apanage user server and performs safety information authentication between user terminal and the access and call status control node; C, the call and status control node modifies user terminal status in distribution apanage user server and downloads every kinds of service information of the user terminal.

通过域名服务节点,获取用户终端所在服务区域信息、和用户终端所属的接入呼叫状态控制节点的地址及该接入呼叫状态控制节点的会话控制标示符;B。用户终端向所述接入呼叫状态控制节点发起注册请求,由所述接入呼叫状态控制节点从分发归属地用户服务器获取该用户终端的安全信息,并进行用户终端与所述接入呼叫状态控制节点之间的安全信息认证;C。所述接入呼叫状态控制节点修改所述分发归属地用户服务器中该用户终端的状态,并下载该用户终端的各种业务信息。

AME (Asymptotic Multiuser Efficiency) is an important factor to evaluate multiuser detector. From this point of view, performance comparison among multistage multiuser detector, decision feedback multiuser detector and linear decorrelating multiuser detector is done here.

评价多用户检测器性能的一个重要的指标就是渐近多用户效率,本文第一次从渐近多用户效率的角度分析对比了多级多用户检测器、判决反馈多用户检测器和线性解相关检测器的渐近多用户效率。

The method comprises the following steps of intercepting a location update message sent from an area to other areas; extracting a user identification from the location update message; judging whether the user identification is a local user identification or not; and transmitting a welcome multimedia message according to the user identification when the user identification is not the local user identification.

本发明涉及实现欢迎消息的方法,拦截本区域向其它区域发送的位置更新消息;从所述位置更新消息中提取用户标识;判断所述用户标识是否为本地用户标识;当所述用户标识不是本地用户标识时,根据所述用户标识发送欢迎多媒体消息。

This invention relates to MIMO test method in a multi-user MIMO radio communication system including: estimating the channel matrixes of all users at the base station, computing an orthogonal projecting matrix M of the interference matrix of each user and transmitting M to each user periodically, receiving data sent by the base station at the user end and getting the orthogonal projecting matrix M from the received data, transforming the MIMO test of a desired user to the minimum value of a K-element secondary convex function, in which, K expresses the number of sending antennas and getting estimation of the test data by a ball test method.

一种多用户多输入多输出无线通信系统中的MIMO检测方法,包括步骤:在基站估计所有用户的信道矩阵;计算每个用户的干扰用户矩阵的正交投影矩阵M,并将每个用户的正交投影矩阵M定期发送给每个用户;在用户端接收基站发送的数据,并从接收的数据中得到正交投影矩阵M;利用正交投影矩阵M将期望用户的MIMO检测转化为K元二次凸函数的极小值,其中K表示对期望用户而言,发送天线的个数;利用球检测的方法,得到检测数据的估计。

The work reads as follows: setting up the concept of network users" behavior and categorised system, then discussing the classification of users based on network users" behavior; analyzing the information source of network behavior analytical system, considering mostly two respects of efficiency and accuracy of behavior information; probing into the demand,step and system frame for establishing network user"s behavior analytical system, and discussing some key technology in course of the system implementation; Then putting forward several kinds of common application modes or thought of network users" behavior analysis, including network click flow analysis , computer and network security analysis and user structure analysis of Intranet. The key algorithm of behavior analysis system has been discussed and improved .

本论文在此领域主要工作成果如下:建立了网络用户行为的概念与分类体系,并在此基础上进行了用户分类;分析了网络行为分析系统的信息源,其中主要考虑了信息获取的高效性和准确性两个方面;探讨了建立网络用户行为分析系统的需求、步骤和体系框架,以及设计和实现系统过程中所面临的一些关键技术;接着在上述基础上提出几种常用的网络用户行为分析系统模型或其思想,主要列举了网络用户行为分析在Web点击流分析、计算机与网络安全方面以及Intranet网内用户结构分析中的应用。

Spyware is a kind of software that installed in computer user's computer, it installed by spyware user without computer user's consentment or although spyware user get computer user's consentment but the function of spyware is beyond the function which spyware user tell during the installment ,or use a fraud tell manner to tell the computer user, or force the spyware run , or dosen't offer computer user a method that can easily and fully uninstall all the module of the software ,and its function s are as follow: control、destroy computer software and hardware; force computer's behavior; scout computer user's behavior, steal or cheat computer user's private information.

间谍软件是指安装在用户计算机上的程序,此程序的安装未经用户的同意,或虽经用户的同意但超出了告知的功能范围,或采用欺诈的方式征得用户的同意,或者强行运行,或者不能简便地一次性彻底卸载所有功能模块;并且其具有如下功能:控制、破坏用户计算机软硬件;强制用户行为;监视用户行为、盗窃或以欺诈的形式骗取用户信息。

The main works of this paper include four points as follows:(1) Patent retrieval domain ontology is designed through analyzing the common concepts in searching patent information. And the international patent classification table is expressed using ontology;(2) Design users'interests model from the information actively provided by users and passively provided by system based on users'requirements and historical searching record;(3) Design and implement three patent retrieval modes: quick search, table search, and advance search to meet various users'demands. And combine ontology, user's interest model and the inputed retrieval condition when users search for patent informations. This realizes individualized retrieval which meets the demands of users;(4) When users's search term is inaccurate, the precision will drop markedly and users will receive many disrelated informations.

本文的主要工作包括以下四点:(1)通过分析专利检索的常用概念,设计了专利检索领域本体和国际专利分类表(International Patent Classification,IPC)的本体表示;(2)根据用户的需求以及历史检索记录,从用户主动提供和系统被动学习两方面着手,设计了用户兴趣模型的本体表示;(3)为满足不同层次、不同需求的用户,设计并实现了三种专利检索方式:快速检索、表格检索、高级检索,并将本体、用户兴趣模型、用户输入的检索条件三者相结合,实现满足用户需求的个性化检索;(4)通过设计将检索结果按IPC号分类,由用户自主选择需要浏览的类别来为用户提供个性化服务。

In this paper,the character of the user behaviors in the Operating System and the formal de- scription are analyzed firstly,a insider user behavior monitoring model based on the user behavior tree is put forward, which can acquire the"open authorization"behavior traces by the OS behavior-tree,and make use of the user behavior- tree hierarchy to monitor the inside user behaviors.

首先分析了操作系统中用户行为的特征及其描述方法,提出了一种基于用户行为树的用户行为监管模型,依据操作系统行为树来分析用户在操作系统中可能存在的&开域授权&行为踪迹,然后根据用户行为的层次性来实现对用户行为的监管。

The effective information management must be closely related to effective user"s management, so effective user"s management becomes very important. But the development to effective user"s management system is very unstandard, Guide and standardize unifying , this must cause the reducing greatly of putting in an position of user"s management system , especially the use to user resources is very unfavorable, so a users management system in common use becomes of great significance.

而有效的信息管理必然与有效的用户管理密切相关,所以有效的用户管理就变得十分重要,但对于有效的用户管理系统的开发确很不规范,没有统一的指导和规范,这就必然导致用户管理系统的重用性的大大降低,特别是对于用户资源的利用非常不利,因此一个通用用户管理系统就变得意义重大。

This invention relates to a method for inviting users on-line used in conference services including: 1, in a process of setting up conversation between a first user device and a second user device, the first one gets the route set for transmitting signaling when having conversation between them and registers it, 2, the first device transmits a request to the second device with a new conversation ID to a service device to ask the second device to take part in the meeting, when the route set is not empty, the first device adds the registered route set to the route set of the request, 3, the service device and the second user device are connected for the conversation.

根据本发明的用于会议业务的在线用户邀请方法包括以下步骤:步骤S302,在第一用户设备与第二用户设备建立会话的过程中,第一用户设备从传输的消息获取第一用户设备和第二用户设备进行会话时传送信令的路由集合并记录路由集合;步骤S304,第一用户设备以新会话标识向会议业务服务设备发送对第二用户设备的请求消息以请求第二用户设备加入会议,在路由集合非空的情况下,第一用户设备将所记录的路由集合加入到请求消息的路由集合中;步骤S306,会议业务服务设备与第二用户设备进行会话连接。

第1/100页 1 2 3 4 5 6 7 8 9 ... > 尾页
推荐网络例句

This one mode pays close attention to network credence foundation of the businessman very much.

这一模式非常关注商人的网络信用基础。

Cell morphology of bacterial ghost of Pasteurella multocida was observed by scanning electron microscopy and inactivation ratio was estimated by CFU analysi.

扫描电镜观察多杀性巴氏杆菌细菌幽灵和菌落形成单位评价遗传灭活率。

There is no differences of cell proliferation vitality between labeled and unlabeled NSCs.

双标记神经干细胞的增殖、分化活力与未标记神经干细胞相比无改变。