网络技术
- 与 网络技术 相关的网络例句 [注:此内容来源于网络,仅供参考]
-
Combines with the technologies of network communication, monitoring and embedded technology, the embedded system based on Internet/Intranet is designed for a remote monitoring, controlling system based on Internet/Intranet by way of being embedded into the object to be monitored.
基于Internet/Intranet的嵌入式系统是融网络通信技术、监测技术和嵌入式技术为一体,能嵌入和集成在其他对象中,通过Internet/Intranet网络进行远程监测和控制的系统。
-
Therefore an artificial nervenetwork with better effect of imminence should be designed so that it can be used in the field of technological innovation and achieve good results.
本文利用径向基函数神经网络这一技术手段,提出了基于径向基函数神经网络的技术创新风险评价模型,为技术创新项目的风险评价提出了一种新颖、高效的方法。
-
Aimed at the characteristic of multiple types of faults possibly happened in nuclear power plant, large scale of training sample, and requirement of quick and accurate diagnosing, after the analysis of large sample number generated by large fault type exceeds limitation of 64K paragraph in DOS and large number of local minmum in error surface, measurements of same format of data file, Win95/NT operating system platform, resetting weight learning rate, dynamic training set in quick learning algorithm and improvement on quick learning algorithm using homotopy method which can avoid local minmum points in error surface have been adopted to ensure quickly and effective process of the course of neural network's training and testing.
针对核动力装置可能发生的故障种类多,训练样本规模大,故障诊断需要快速准确的特点等,分析了样本多和故障种类多产生的训练样本量超出DOS段大小和网络误差曲面上局部极小值多的情况,采取了使用相同格式数据文件、Win95/NT操作系统平台,对快速学习算法采用重置神经网络权值学习率和动态训练集、并采用能够有效克服网络误差曲面上局部极小点的同伦方法对学习算法进行改进等措施保证神经网络训练测试过程的快速、有效地进行;针对装置发生的故障须快速、准确诊断的需要,分析了故障的产生对装置参数变化的影响及操纵员对故障诊断的基础,在核动力装置发生故障时参数曲线的变化量与正常运行时参数曲线的变化量存在明显差异的基础上,提出采用参数曲线的变化量作为神经网络的输入,并围绕参数变化量的方法采用二次曲线拟合滤波求变化量和阈值技术来保证神经网络得到精确的装置参数变化量,从而得到准确的诊断结果。
-
It includes four parts: 1 Part I, it introduces the basic knowledge of computer viruses such as computer virus definition, history and important viruses events, features, behavior phenomena, difference with computer software and hardware troubles, damage behavior and capability, classification, naming, future trend, etc; 2 Part II, it introduces the corresponding knowledge of computer systems related to computer viruses such as the composing of software and hardware of the computer system, storage media and its working mechanism, interrupt technologies,.com/.exe/.pe file formats and their working mechanism, etc; 3 Part III, it introduces computer virus mechanism and theory such as computer virus structure, work flow, working mechanism of key modules, typical technologies used to design computer viruses including the corresponding traditional technologies (interrupt filching, memory resident, etc.), the corresponding new routine technologies (self-encrypting, Mutation Engine, etc.), and the corresponding new technologies used by some prevalence computer viruses such as macro viruses, e-mail viruses, worm, hacker, Trojan, mobile phone viruses, the working mechanism analysis of some kinds of typical and prevalence computer viruses such as file-type viruses, macro viruses, e-mail viruses, worm viruses, hacker, Trojan, mobile phone viruses, the analysis of some typical and prevalence computer viruses examples including BALL viruses, WORD macro viruses, WantJob viruses, Code Red viruses, BO Trojan, etc; 4 Part IV, it introduces the defense and killing technologies of computer viruses such as the aim and criterion of computer viruses defense and killing, prevention methods and corresponding technologies, detection technologies (comparison method, character code scanning method, behavior inspecting method, analysis method, etc.), manual and automatic killing technologies, immunity technologies such as IBM digital immunity system, new anti-viruses technology trends (real-time anti-viruses technologies, 32 kernel technologies, active kernel technologies, etc.), some typical virus defense and killing softwares (Symantec AntiVirus product, PC-Cillin AntiVirus product, etc.), the defense and killing method analysis of some kinds of typical and prevalence computer viruses (file-type viruses, macro viruses, worm viruses, hacker, etc.), for example, firewall and intrusion detection technologies for anti-hacker, the defense and killing of some typical and prevalence computer viruses examples including WORD macro viruses, Code Red viruses, BO Trojan, etc.
课程内容具体包括四大部分:1)第一部分,介绍计算机病毒基本知识,包括:计算机病毒定义、病毒发展史及重大事件、病毒特点、病毒表现现象及与软硬件故障的区别、病毒破坏行为及危害性、病毒的传播途径及媒介、病毒分类、病毒的命名及计算机病毒技术发展趋势等内容;2)第二部分,介绍与计算机病毒有关的计算机系统相关知识,包括:计算机系统软硬件组成、存储介质结构及工作原理、计算机系统引导机理及流程、中断技术、。com/。exe/。pe等文件格式及工作机理等内容;3)第三部分,讲解计算机病毒机理,包括:计算机病毒的组成结构、病毒工作流程、病毒引导/触发/感染/破坏等模块的工作机理、计算机病毒所采取的编制技术(包括中断窃取/内存驻留等传统编制技术、自加密/隐形/变形机等新的常规编制技术、宏病毒/电子邮件病毒/网络蠕虫/特洛伊木马/黑客/手机病毒等一些新的流行病毒所采取的编制技术等)、一些类型的典型或流行计算机病毒的工作机理分析(包括:引导型病毒、文件型病毒、宏病毒、电子邮件病毒、蠕虫病毒、黑客、特洛伊木马、手机病毒等)、一些典型或流行的计算机病毒实例剖析(包括:小球病毒、WORD宏病毒、求职信病毒、红色代码病毒、冰河木马等)等内容;4)第四部分,讲解计算机病毒防治技术,包括:计算机病毒防治目的、病毒防治策略及规范、病毒在管理和技术上的预防措施、病毒检查技术(包括:比较法/病毒特征码扫描法/行为监测法/虚拟执行法/分析法等)、手工和自动病毒清杀技术、病毒免疫技术(包括:针对某种一次性感染病毒的基于病毒标签的免疫方法/基于自我完整性检查的计算机病毒免疫方法/IBM的数字免疫系统等)、反病毒技术的新发展(包括:实时反病毒技术/32位内核技术/主动内核技术/以毒攻毒技术等)、诺顿/趋势/金山等公司的病毒防治软件产品、一些类型的典型或流行的计算机病毒(包括:引导型病毒、文件型病毒、宏病毒、蠕虫病毒、电子邮件病毒、手机病毒、黑客、特洛伊木马)的防治措施(其中,也包括介绍面向防范黑客攻击的防火墙、入侵检测技术)、一些典型或流行的计算机病毒防治实例剖析(包括:WORD宏病毒、红色代码病毒、冰河木马v1.1/v2.2等)、多层次病毒防护体系等内容。
-
Combined with the technology of sensors, embedded system, meshwork and wireless communications, WSN is a new research hotspot.
无线传感器网络综合了传感器技术、嵌入式计算技术、现代网络及无线通信技术,是备受关注的新兴前沿研究热点。
-
Sensor network is a new-style network that integrates sensor technology,computer technology and wireless communication technology.
无线传感器网络是集成了传感器技术、计算机技术和无线通信技术的一种新型的网络。
-
Importing KDD technology into network management may be a useful method in making network more intellectual. And then with the enlargement of the network scope, the system architecture of the network management is changing distributed from centralized. Distributed network management can decentralizes management function to several Places and improve the retractility of network management, which has played a import role in today's network management.
当前,在网络管理系统中引入知识发现技术是实现网络智能化发展的一条有效途径;同时,随着网络规模的日益扩大,网络结构的复杂多变,网络管理的体系结构正在从集中式转向分布式,分布式网络管理将网管功能分布于网络各处,提高了整个管理结构的可伸缩性,逐渐成为现代网管一个重要的发展方向。
-
The key technology of this solution is simple network management protocol.
本监控子系统方案的技术核心是简单网络管理协议-SNMP,该协议是目前网络管理方面应用越来越广泛的一种技术方案,本文详细的讨论了此技术的原理、架构,根据项目要求,采用其机制,创新其应用,完整的实现了分布式监
-
The work reads as follows: setting up the concept of network users" behavior and categorised system, then discussing the classification of users based on network users" behavior; analyzing the information source of network behavior analytical system, considering mostly two respects of efficiency and accuracy of behavior information; probing into the demand,step and system frame for establishing network user"s behavior analytical system, and discussing some key technology in course of the system implementation; Then putting forward several kinds of common application modes or thought of network users" behavior analysis, including network click flow analysis , computer and network security analysis and user structure analysis of Intranet. The key algorithm of behavior analysis system has been discussed and improved .
本论文在此领域主要工作成果如下:建立了网络用户行为的概念与分类体系,并在此基础上进行了用户分类;分析了网络行为分析系统的信息源,其中主要考虑了信息获取的高效性和准确性两个方面;探讨了建立网络用户行为分析系统的需求、步骤和体系框架,以及设计和实现系统过程中所面临的一些关键技术;接着在上述基础上提出几种常用的网络用户行为分析系统模型或其思想,主要列举了网络用户行为分析在Web点击流分析、计算机与网络安全方面以及Intranet网内用户结构分析中的应用。
-
With the rapid evolution of image compression,network transmission and electron technique,Embedded image surveillant system has became a new developing hotspot.
随着图像压缩技术、网络传输技术和电子技术的飞速发展,嵌入式数字网络图像监控系统已成为当今监控领域的一个新的开发热点。
- 推荐网络例句
-
We have no common name for a mime of Sophron or Xenarchus and a Socratic Conversation; and we should still be without one even if the imitation in the two instances were in trimeters or elegiacs or some other kind of verse--though it is the way with people to tack on 'poet' to the name of a metre, and talk of elegiac-poets and epic-poets, thinking that they call them poets not by reason of the imitative nature of their work, but indiscriminately by reason of the metre they write in.
索夫农 、森那库斯和苏格拉底式的对话采用的模仿没有一个公共的名称;三音步诗、挽歌体或其他类型的诗的模仿也没有——人们把&诗人&这一名词和格律名称结合到一起,称之为挽歌体诗人或者史诗诗人,他们被称为诗人,似乎只是因为遵守格律写作,而非他们作品的模仿本质。
-
The relationship between communicative competence and grammar teaching should be that of the ends and the means.
交际能力和语法的关系应该是目标与途径的关系。
-
This is not paper type of business,it's people business,with such huge money involved.
这不是纸上谈兵式的交易,这是人与人的业务,而且涉及金额巨大。