英语人>网络例句>网络 相关的搜索结果
网络例句

网络

与 网络 相关的网络例句 [注:此内容来源于网络,仅供参考]

For the purpose of saving energy and prolonging the lifetime of ad hoc network, this dissertation discuss the network lifetime in detail, and consider the lifetime and energy synthetically, provide a minimal energy cost maximal lifetime broadcast tree construction algorithm.

2针对移动Ad Hoc网络能量有效性问题,为了节省网络使用过程中的能量消耗,提高网络的生命周期,本文对网络的生命期问题,展开了详细的论述,同时又将生命期与能量消耗结合起来考虑,提出了一个最小能量最长生命周期广播树的构造算法。

The security mechanisms of current network storage systems and their merit and demerit are analyzed,and the key technologies for the implementation fo the security system are introduced. Finally,according to the recent development of software,hardware and application,the future research direction of network storage security is pointed out.

简要介绍了网络存储安全系统的研究概况,总结分析了当前网络存储安全机制及其优缺点,并指出了网络存储安全系统实现的主要关键技术,最后根据当前软硬件的发展和应用的发展需求,展望了网络存储安全的研究方向。

Much of what happens during this time depends on factors such as access to a DNS, network traffic, valid network addresses, network access, network hardware/microcode, and the number and type of adapter/interfaces being configured.

大部分发生什么事在这段时间,取决于因素,如接触到的DNS ,网络流量,有效的网络地址,网络接入,网络硬件/微,数量和类型适配器/接口配置。

With nodes of the vast network , more and more sensitive information is being stored and manipulated online , the computer network is more vulnerable to miscellaneously malicious or unauthorized actions , network security is becoming increasingly important .

而在网络增长的同时,越来越多的敏感信息被在线存储和管理,使网络更加脆弱,更容易受到网络上各种恶意或非法用户的攻击,因此网络安全已变得越来越重要。

We do research on the transitions between states of network protocol,the protocol misusage detection model based on Markov chain,the framework of the IDS technology and protocol anormity after we discuss the current technology. The main research contents of this paper include: research on transitions between states of network protocol and session process, protocol misuage and the anomaly detection model based on Markov chain, the research of intrusion detection framework, more accurately model based on the characteristic of the network traffic and so on.

在分析了现有入侵检测系统的基础上,本文围绕典型网络协议状态转换、基于马尔可夫链的检测模型、入侵检测技术框架、以及协议异常等几个方面展开深入研究,主要工作内容包括:典型网络协议转换状态的分析和会话过程的研究;基于马尔可夫链的网络异常检测模型;分布式的检测架构;针对网络流量特征而提出了精确的检测模型等。

There are complex variations in realistic low-voltage power line network topology framework.In order to study the low-voltage power line transmission channel model,a model to describe the power line network channel topology framework is established in terms of basic characteristics of low-voltage power line network in this paper.

低压电力线网络拓扑结构变化复杂,为了研究低压电力线信道传输模型,根据低压电力线网络的基本特点建立了描述电力线网络拓扑结构的模型,利用模型把低压电力信道作为一个过程去描述,建立了节点信号传输函数来推导低压电力线网络的传递函数。

We study the recursive structure of the twisted-cube connected network sufficiently, and prove that the twisted-cube connected network is an n regular graph with connectivity n: point out that the twisted-cube connected network is a cube-free network, which is an essential distinction with the hypercube and other variations of the hypercube; prove that the diameter of n dimensional twisted-cube connected network is [ (n+1)/2] , which is almost the half of hypercube's.

首先对其结构的递归性进行充分地研究,证明它是连通度为n的n正则图;指出扭立方体连接网络无立方体子图,这是扭立方体连接网络与超立方体及其其它变种的本质差别;证明了n维扭立方体连接网络的直径为[(n+1)/2],它几乎是超立方体直径的一半;最后,给出超立方体及其变种的等价定义,并对它们的结构递归性、网络参数和拓扑性质等作了简单的分析、综合和比较。

There are three important structural features in complex networks: small-world effect, scale- free property and network's navigability. Typical models reflecting these features, respectively, are the Watts-Strogatz's model, the Barabási-Albert's model and the Kleinberg's model. Based on the typical models, a new model of growing and navigable networks is proposed, with the generated networks possessing all these features simultaneously. The results of navigation obtained by using a greedy algorithm on networks of the model are similar to, or even better than, that of the Kleinberg's model.

复杂网络具有3种重要的结构特性:小世界性、Scale-free性和可导航性,反映它们的经典模型是:Watts-Strogatz模型、Barabási-Alhert模型和Kleinberg模型为了全面地反映出这些特性,在经典网络模型的基础上提出了一个新的增长可导航网络模型,这个模型同时具有这3种重要特征,并且在这个网络模型上使用贪婪算法时,它与Kleinberg模型具有相同的导航效果,有时甚至更加优越。

Network Diagram is ideal for network engineers and network designers who need to draw detail network documentation.

网络图表是网络工程师及需要设计详细的网络文档的网络设计师理想工具。

The single source and single sink network and the multiple sources and multiple sinks network are considered,respectively.We first construct an auxiliary network and convert the min-cost flow problem in origial network into the min-cost circulation problem in the auxilary network,and then find the optimal solution of min-cost circulation problem in the auxiliary network by using out-of-kiltem algorithm.

分别就单源单汇和多源多汇情况构造不同的辅助网络,将原网络中的最小费用流问题转化为辅助网络中的最小费用循环流问题,然后用瑕疵算法求最小费用循环流问题的最优解,这样在求出原网络中最小费用流的同时,也获得了总流量的最优取值。

第33/100页 首页 < ... 29 30 31 32 33 34 35 36 37 ... > 尾页
推荐网络例句

The split between the two groups can hardly be papered over.

这两个团体间的分歧难以掩饰。

This approach not only encourages a greater number of responses, but minimizes the likelihood of stale groupthink.

这种做法不仅鼓励了更多的反应,而且减少跟风的可能性。

The new PS20 solar power tower collected sunlight through mirrors known as "heliostats" to produce steam that is converted into electricity by a turbine in Sanlucar la Mayor, Spain, Wednesday.

聚光:照片上是建在西班牙桑路卡拉马尤城的一座新型PS20塔式太阳能电站。被称为&日光反射装置&的镜子将太阳光反射到主塔,然后用聚集的热量产生蒸汽进而通过涡轮机转化为电力