英语人>网络例句>网络连接 相关的搜索结果
网络例句

网络连接

与 网络连接 相关的网络例句 [注:此内容来源于网络,仅供参考]

The invention relates to an arbitration method of exchange network, wherein each input buffer inputs one exchange request to arbitrator; based on exchange allowance, building connection allowance with relative output unit; on the idle input buffer and output unit without connection, arbitrator uses random distribution to build one-to-one connection with all input buffer and output unit.

本发明提供了一种交换网络的仲裁实现方法,该方法中,每个输入缓存每次向仲裁器仅需提一个交换请求,然后根据交换许可与对应的输出单元建立连接认可,对于未建立连接认可的空闲输入缓存和输出单元,仲裁器按照公平性原则,采取随机分配的机制,使得交换网络的所有输入缓存和输出单元间均能建立一一对应的连接。

1、Neural network correlated with LIFG and RIFG exists in normal subjects in resting-state,which might be the neural foundation in retaining the normal language function;2、The left fusiform gyrus,bilateral medial frontal gyrus and right anterior cingulum in aphasia patients after stroke showed low degree correlation,that might be one of the mechanisms of aphasia;3、The brain regions showed positive correlation with RIFG in aphasia patients only exist in right hemisphere in resting-state as well as which exist in bilateral hemisphere in normal subjects,suggested that RIFG is out of correlation with the left hemisphere in aphasia patients;4、The left thalamus showed positive correlation with RIFG only in normal subjects, inferred that the left thalamus might be an important mesomerism structure in the correlation of bilateral hemisphere;5、Left insula showed stronger positive correlation with RIFG in normal subjects than that in aphasia patients,suggested that dominant hemisphere insula is important in retaining in normal language function.

1、正常人在静息状态下即存在与LIFG和RIFG具有相关性的神经网络,该网络可能是维持正常语言功能的神经基础;2、脑梗死后运动性失语患者左侧梭状回、双侧额叶内侧回、右侧前扣带与LIFG的连接程度的减低可能是运动性失语的发生机制之一;3、与RIFG正相关的脑区在对照组为双侧半球分布,而在患者组仅出现在右侧半球,说明患者组RIFG与左侧半球的连接中断;4、RIFG与左侧丘脑的正相关性仅出现在正常对照组中,推测左侧丘脑可能是联系两侧半球功能区的重要中介结构;5、对照组与RIFG正相关性明显高于患者组的脑区位于左侧岛叶,说明优势半球岛叶对维持正常语言功能具有重要作用;第二部分脑梗死运动性失语患者语言恢复机制的静息态fMRI初步探讨目的:运用fMRI技术,采用种子点方法在静息状态下分析脑梗死运动性失语患者不同的恢复阶段语言功能连接方式。

In this paper, the concept of network security and security structures of OSI and Internet is introduced, and various threats confronting the computer network are also discussed. Several kinds of network information security technologies, including firewall technology, virtual private network, intrusion detection system, data encryption technology, identity authentication and security protocol etc. are also examined. The security of internal network is the biggest problem in the construction of each network. The solution to this problem lies in setting up a firewall. The theory of a firewall and the approach to its actualization is studied. Intrusion detection system, an important part of the computer network security system, has gained extensive attention. IDS monitors the computer and network traffic for intrusion and suspicious activities. It not only detects the intrusion from the extranet hacker, but also the intranet users. The emergence of virtual private network paves the way for realizing secure connection of LAN quickly and at a relatively low cost. The concept, function, key techniques, including the tunnel technology, and the ways to realize VPN are expounded in this paper. Also introduced is the data encrypt network technology, which is called the soul of computer network security, such as digital digest, digital signature, digital certificate, digital encrypt arithmetic and so on. At the same time, the principle and the process of implementing network security by digital certificate and digital signature, the basic principle and characters of security protocols, and finally, three of the security protocols, concerning the security problems in network, IPsec, SLL and SET are analyzed in detail Computer network system should be a system of dynamic defence, both dynamic and static, passive as well as active, and even offensive, combined with management and technology.

本文系统地介绍了网络安全的概念、OSI及Internet的安全体系结构,并讨论了计算机网络面临的各种安全威胁;内部网络的安全问题是每个建网单位面临的最大问题,可以认为防火墙技术是解决网络安全的一个主要手段,本文研究了防火墙的原理及其实现手段;作为一种主动的防御措施,入侵检测系统作为网络系统安全的重要组成部分,得到了广泛的重视,TDS对计算机和网络资源上的恶意使用行为进行识别和响应,不仅检测来自外部的入侵行为,也监督内部用户的未授权活动;虚拟专用网技术的出现,为实现网络间的连接提供了快速安全但又相对便宜的手段,本文较深入的探讨了实现VPN的隧道技术,并对VPN的概念、功能、实现途径、基本构成、关键技术及发展前景等问题进行了全面论述;数据加密技术是网络安全核心技术之一,本文从数据加密算法、数字摘要、数字签名及数字证书等几方面简要介绍了数据加密技术,并分析用数字证书和数字签名实现网络安全的原理和过程;对安全协议的基本原理、主要特点进行了较为深入的研究,并就网络的安全性问题剖析了三种安全协议:IPsec协议、SLL协议和SET协议。

The network is liable to be attacked by the hacker and virus because of the fluidness of information, the distribution of resource, the opening of connection and diversity of connection forms. So the security problem is become more and more serious.

由于计算机网络具有信息的流动性,资源的分布性,连接的开放性和连接形式的多样性等特征,致使网络易受到黑客和病毒的攻击,因此计算机网络的安全问题变得越来越突出。

On the net collect summed up the following respects, offer text to receive the main page on the site repeatedly, according to website size, more or less can webpage numerary receive all pages repeatedly even; For every join provides a brief introduction, in order to hints this one's duty allows the person that visit is about which on one hand; Exceed in website map and text the mainest crucial term alludes inside join, the help searchs theme of page of join of engine identifying place is about which on one hand; Help engine indexes a few dynamic pages, because a few pages will be of dynamic generation, if not be user behavior is called,will not show come, can put this join on website map, in order to help the dynamic page with engine main index; To make website map attracts the visit of network spider, the descriptive sex statement with go up certain must be written to use this connective keyword to have simple description at the back of join, but the use keyword that cannot transfer, can be just the opposite to what one wished otherwise; Because general spider catchs page of before 3 class only, so website map makes the same score better more, what point to here is logical way, is not physical method.

在网上搜集总结了以下几个方面,提供文本连接到站点上主要的页面,根据网站大小,网页数目的多少甚至可以连接到所有的页面;为每个连接提供一个简短的介绍,用以提示访问者这部分内容是关于哪一方面的;在网站地图和文本超连接里面提及最主要的要害词语,帮助搜索引擎识别所连接页面主题是关于哪一方面的;帮助引擎索引一些动态页面,由于一些页面将是动态产生的,假如不是用户行为调用将不会显示出来,可以将此连接放在网站地图上,以帮助引擎索引重要的动态页面;为了使网站地图吸引网络蜘蛛的访问,一定要在连接后面写上一定的描述性语句并使用此连接的要害词进行简单描述,但不能过渡的使用要害词,否则会适得其反;因为一般蜘蛛只抓前三级页面,所以网站地图越平越好,这里指的是逻辑路径,而不是物理路径。

The data capture mainly gathers the data from the network. Protocol analysis can analyse every segment of the data packet according to protocol standard. Data recover can recover all the data of the application layer of the TCP connection. IP spoofing can construct all kinds of packets and realize the network attack. Real-time interruption can interrupt the TCP connection of Both sides of communication as the third party. Fire wall can realize network access control. Then the system can protect the network information safety from many aspects.

数据捕获主要完成从网络采集数据的功能;分析还原包括协议分析和数据还原两部分内容,协议分析可以对捕获到的数据包按照网络协议规范分别进行各协议字段分析,数据还原功能可以将每条TCP连接中传输的所有应用数据进行重新组合,还原出原来数据的内容;IP欺骗指构造各种功能的数据包,实现网络攻击;实时阻断指第三方实时阻断通信双方的TCP连接,禁止他们进行数据通信;防火墙主要实现网络访问控制,保护内部子网的功能。

The cable headend connects the cable network with dishes that receive both satellite and traditional broadcast TV signals, and with cable modems linking to the Internet.

这种电缆接入端将电缆网络与接收卫星和传统广播电视信号的蝶形天线连接在一起,并且将电缆网络与连接Internet的电缆调制解调器连接在一起。

Cable .Make use of this principle, we can quickly locate the target cable or break point from large amount of cables, under carpet, the inner of decoration wall and over ceiling1 operation is simple , reliable , the interface is nimble , use is broad , bionic form , carry-over are convenient, since our link tester has two signal output port, it can work when switch is running, this is very convenient. 2 applies to all metal cable such as network cable , tele phone line cable , video cable , automobile circuit .it can not be work with high voltage(above 80V),if you want to locate it ,please turn off the cable power supply3 can test the telephone line polarity, connectedness, rough position of breaking point.4 uses the two crocodile clamp to avoid getting rid of the job of make network cable. Use the RJ45/RJ11 interface can connect to the network and the telephone line directly.5 link tester can find out that pair of circuit line cable from large mount of cables. 6 high amplitude ranks 200 times amplification circuit is sui table to locate long distance cable.7 two-sided network lines sequence indicator is easy to examine the network line cable whether or not correctly conveniently. 8 portable types multifunctional bag can encase most of your engineering tools; remit your messy carry-over of implement bothering. 9 adopt two 9V batteries.

线路通产品特点:1 操作简单、性能可靠,接口灵活、用途广泛,仿生外形、携带方便,由于本设备采用了信号双路输出方式,可以解决交换机工作状态下使用,避免了关掉交换机影响其他线路的使用的麻烦。2 适用于查找网络电缆、电话线路、视频电缆、汽车电路、无强电状态下的所有金属电缆。3 可以测试电话线路极性、连通性,断点大概位置。4 两个鳄鱼嘴夹,避免了去做水晶头的麻烦,RJ45/RJ11接口线,可直接连接网络和电话线模块。5 寻线器快速地在众多紊乱的线路中找出需要查找的那一对线路线缆。6 高音频振幅级别200倍的放大电路,适合长距离电缆定位。7 双面网络线续灯可以更直观方便的检查校正网络线续线路连接是否正确。8 便携式多功能软包,可以把您工程施工、维护的基本工具装齐,免除您工具散乱携带的麻烦。9 本寻线器采用2节9V电池。

Be work with high voltage(above 80V),if you want to locate it ,please turn off the cable power supply3 can test the telephone line polarity, connectedness, rough position of breaking point.4 uses the two crocodile clamp to avoid getting rid of the job of make network cable. Use the RJ45/RJ11 interface can connect to the network and the telephone line directly.5 link tester can find out that pair of circuit line cable from large mount of cables. 6 high amplitude ranks 200 times amplification circuit is suitable to locate long distance cable.7 two-sided network lines sequence indicator is easy to examine the network line cable whether or not correctly conveniently. 8 portable types multifunctional bag can encase most of your engineering tools; remit your messy carry-over of implement bothering. 9 adopt two 9V batteries.

l线路通产品特点:1 操作简单、性能可靠,接口灵活、用途广泛,仿生外形、携带方便,由于本设备采用了信号双路输出方式,可以解决交换机工作状态下使用,避免了关掉交换机影响其他线路的使用的麻烦。2 适用于查找网络电缆、电话线路、视频电缆、汽车电路、无强电状态下的所有金属电缆。3 可以测试电话线路极性、连通性,断点大概位置。4 两个鳄鱼嘴夹,避免了去做水晶头的麻烦,RJ45/RJ11接口线,可直接连接网络和电话线模块。5 寻线器快速地在众多紊乱的线路中找出需要查找的那一对线路线缆。6 高音频振幅级别200倍的放大电路,适合长距离电缆定位。7 双面网络线续灯可以更直观方便的检查校正网络线续线路连接是否正确。8 便携式多功能软包,可以把您工程施工、维护的基本工具装齐,免除您工具散乱携带的麻烦。9 本寻线器采用2节9V电池。

A method for carrying out terminal management based on EPON includes connecting unit management system on optical line terminal based on EPON and setting up network management channel between them and between optical line terminal and each network terminal, carrying out analysis on message by optical line terminal when network management protocol message is sent to optical line terminal by unit management system, retransmitting message to network terminal by set up operation-maintenance channel when network protocol message is aimed at network terminal and retransmitting message reported from network terminal to unit management system by optical line terminal.

一种对基于EPON进行终端管理的方法,在基于EPON的光线路终端上连接设备管理系统,在它们之间建立网络管理通道,并在光线路终端和各网络终端之间建立承载在操作管理维护协议层上的网络管理通道;设备管理系统向光线路终端发送网络管理协议报文时,光线路终端对该报文进行解析,如果是针对网络终端的网络管理协议报文,则将该报文通过所建立的操作维护通道转发给该网络终端;网络终端向设备管理系统上报的消息,由光线路终端转发给设备管理系统。

第19/65页 首页 < ... 15 16 17 18 19 20 21 22 23 ... > 尾页
推荐网络例句

I will endeavour to find you some assistance.

我尽力帮你找人帮忙。

At first I only know bruck is the idol of American younglings, afterwards I returned back to Taiwan ,even in Beijing last year ,I saw her poster everywhere, I was so surprised at her charm.

起初我只晓得布鲁克雷德丝是美国少男少女崇拜的偶像,后来回台湾,甚至去年在北京,居然也四处看见她的海报,才惊讶她的魅力之大。

Ah may dee:You are chinese living in a democratic country.

你是居住在民主国家的中国人吧。