网络技术
- 与 网络技术 相关的网络例句 [注:此内容来源于网络,仅供参考]
-
The research results suggest that:(1)the factors influence the control of IOR including economic,social and technological factors;(2)the application of interorganizational systems should focus on both technological and non-technological factors;(3)the stronger dependency between organizations, the more effective of the IOS reducing the coordination costs;(4)usually the investment of firms in interorganizational relationship is reciprocal;(5)the appicaton of IT changes the dependency between organizations, which should modify the coordination mechanism, resulting in the change of IOR;(6)the coordination cost affects the effectiveness of coordination among firms;(7) maintaining the interorganizational relationship influences the firms'' network life cycle and matureness;(8)both coordination cost and network size of firms affect sharing mechanisn of the costs and benefits for creating and maintaining interoganizational relationship;(9) the influence of coordination costs to the allocation of super profits deriving from interorganizational relationship is depent on the network topology;(10) the core firm in a network prefer the symmetric network.
我们的研究成果表明:(1)影响管理与控制IOR治理结构的因素有经济因素、社会学因素以及技术因素;(2)在应用组织际信息系统时,要同时关注技术和非技术的影响因素;(3)当组织之间存在较强的依赖关系时,组织际信息系统的应用能够有效减少组织之间的协调成本;当组织之间的依赖关系较弱时,组织际信息系统的应用会加深组织之间被对方侵占的风险,无法显著地减少组织际协调成本;(4)在通常情况下,参与组织际关系的成员的投资是互补的;(5)IT的应用会改变组织间的相互依赖性,组织应调整协调机制,而协调机制的变化会改变IOR;(6)协调成本的大小对协调有效性有着很大影响;(7)组织际关系的维护影响组织网络的生命周期和成熟度;(8)影响组织际关系建立和维护的成本分担和利益共享方案的因素不仅仅跟协调成本有关,而且还与网络规模有关;(9)在对称网络拓扑结构与非对称网络拓扑结构下,协调成本对超额回报分配的影响是不同的;(10)核心企业倾向于选择非对称的网络结构。
-
Have implemented a Trojan Horse system, named SAKER which introduces advanced hiding technique, spreading technique and safe communicating technique.
主要完成了以下工作:(1)研究了网络信息对抗技术,重点研究了网络攻击技术。(2)深入研究了基于木马的网络攻击技术。
-
With the rapid development of Internet and network application technology, Network multimedia application is an important application of Internet, with the development of multimedia compress technology and abundance of media issues method, VOD is to be more and more attractable in kinds of fields.
随着互联网的发展以及网络应用技术的飞速发展,网络多媒体应用已经成为Internet应用的重要一种,其中随着多媒体文件压缩技术的发展以及发布手段的丰富,网络视频点播技术也越来越引起各方面的注意。
-
Who communicates by letter, business synthesizing service as a telecommunication , data and information network to be in motion and do business, advantage , broad customer resource and fine cooperation concern the have distinctive telecommunication background , tremendous technology and fund, The company is engaged in synthetical telecommunication serving , synthesizing information service , broadband access , computer network information system integration , intelligent building structure-rization synthetical arrangement of wire system , building world automation navar , data telephone programme-controlled telephone switching boards system , video frequency convention system and so on mainly; Be in the data communication field , the new net of halo especially .
北京光环新网数字技术有限公司是北京通信光环电信集团下属的一家股份制公司,作为一个电信、数据和信息网络综合服务运营商,具有独特的电信背景、雄厚的技术和资金优势、广泛的客户资源和良好的合作关系,公司主要从事综合电信服务、综合信息服务、宽带接入、计算机网络信息系统集成、智能大厦结构化综合布线系统、楼宇自动化控制系统、数据电话程控交换机系统、视频会议系统等;尤其在数据通讯领域,光环新网公司拥有其它公司无法比拟的综合技术实力和线路网络资源优势。
-
In this paper, we put the mathematical model for warless transmitting consumption forward by analyzing nod\'s inner structure, communicational way and coverage on account of impulsions on nod\'s consumption.we discuss and compare some typical Middle Access Control algorithms and protocols in sensor networks, analyze the present problems about power-saving algorithms, protocols and problem been not still dealt, which is all based on considering and analyzing key techniques in energy-saving, such as power-saving in single sensor, data fusion and power-saving algorithms in crossing layers.
在对传感器网络关键节能技术,诸如单节点节能技术、数据融合技术以及垮层节能算法总结的基础上,着重讨论和比较了传感器网络中几类经典的媒体访问控制算法、协议;分析了目前无线传感器网络节能算法、协议和策略亟待解决的问题。
-
So its important for network managers to develop system to monitor network traffic, attacks and resources. It will help network managers to manage network more effectively.The article analyzes two normal approaches to realize network monitor, one is based on packets captured and another is based on logs generated by network gateway. Then, it introduces the three common kinds of log format, syslog, traffic log and WELF.
本文首先分析了网络监视系统实现的常用技术,基于包捕获的技术和基于网关设备日志分析的技术,接着详细分析了三种通用的网络设备日志——Syslog格式日志、Traffic Log格式日志与WELF格式日志,在此基础上详细介绍了本文的重点,基于网关日志分析的网络监视系统一LNMS (Log-based Network Monitor System)的设计和实现。
-
Compared with the firewall technology with static and filtrating tactics, the intrusion detection is one kind of network security technology which is dynamic and with the core of data analyzing and handing.
相对于静态的、基于包过滤策略的防火墙技术,入侵检测技术是一种动态的、以数据分析与处理为核心的网络安全技术,通过收集和分析计算机网络系统中若干关键点的信息,检查网络系统中是否存在违反安全策略的行为。
-
And we also succeed in inosculating the technic of multithreading、 multiple buffers、 windows socket、 IP multicast and RTP real time transmission by using Visual C++6.0 and MS Directshow SDK, and obtained a good result. At the same time, we carried on researching the robustness of this software. We made the research findings of digital video transmission based on network used in applications of banks, and got very good social effects and economic benefit.
本文主要在以下方面做了深入的工作: 1、结合数字视频监控应用的需求分析,对研究网络视频传输技术的意义做了阐述和分析,并就如何充分利用现有网络资源和成熟的多媒体计算机技术进行视频监控等领域的具体应用做了有益的探索; 2、对&数字视频的网络传输&应用中所涉及到的关键技术进行了深入的分析、比较,并进行了有机的融合。
-
All the ways such as VLAN, export router, IPv6, security policy, hardware firewall, anti virus software of net work-edition and management of information security are applied to the project to implement the optimization and revamps of campus network topology structure and the updating of the overall performance.
以青岛职业技术学院校园网二期改造工程为背景,根据国际化标准,研究了校园网设计原则,在分析了学院校园网一期工程性能缺陷和示范院校建设新需求的基础上,从功能扩展、网络安全及管理等各个方面进行了整体方案设计,详细研究了网络各层设计及设备选型,采用VLAN、出口路由处理、IPv6技术、安全策略、硬件防火墙、网络版防病毒软件以及各种信息安全管理等技术与手段,实现了校园网络拓扑结构的优化改造和整体性能的升级。
-
VPN technology is an important method to protect confidential communication and maintain network security. This article describes the VPN technology based on IPSec, including its concept, characteristic and principle. At the base of these, in the campus network environment and linux OS, we realize the resource sharing for campus network which lies in separate location and solves the resource sharing problem in the enterprise effectively.
VPN技术是保障机密通信,维护网络安全的重要手段,本文介绍了基于IPSec的VPN技术,讨论了其基本概念、特点及工作原理,在此基础上,以具体的校园网络为应用环境,阐述了在linux平台下,利用VPN技术,实现大学校园异地校区共享校园网络内部资源的过程,有效解决了企业共享内部资源的实现途径问题。
- 推荐网络例句
-
We have no common name for a mime of Sophron or Xenarchus and a Socratic Conversation; and we should still be without one even if the imitation in the two instances were in trimeters or elegiacs or some other kind of verse--though it is the way with people to tack on 'poet' to the name of a metre, and talk of elegiac-poets and epic-poets, thinking that they call them poets not by reason of the imitative nature of their work, but indiscriminately by reason of the metre they write in.
索夫农 、森那库斯和苏格拉底式的对话采用的模仿没有一个公共的名称;三音步诗、挽歌体或其他类型的诗的模仿也没有——人们把&诗人&这一名词和格律名称结合到一起,称之为挽歌体诗人或者史诗诗人,他们被称为诗人,似乎只是因为遵守格律写作,而非他们作品的模仿本质。
-
The relationship between communicative competence and grammar teaching should be that of the ends and the means.
交际能力和语法的关系应该是目标与途径的关系。
-
This is not paper type of business,it's people business,with such huge money involved.
这不是纸上谈兵式的交易,这是人与人的业务,而且涉及金额巨大。