英语人>网络例句>计算机 相关的搜索结果
网络例句

计算机

与 计算机 相关的网络例句 [注:此内容来源于网络,仅供参考]

And also introduced the using of computer technology in die casting and the computer integration manufacturing system.

介绍了计算机技术在压铸技术中的运用及计算机集成制造系统。

Information system of Medicined diet and Dietotherapy can be used for people to master Medicined diet and Dietotherapy, even you have little knowledge of Medicined diet and Dietotherapy but you know how to operate computer.

另外随着计算机技术的日新月异,应用计算机数据库技术建立药膳食疗的数据库模型,为用户提供药膳,食疗的信息咨询,方便用户对照症状查找相关的药膳食疗配方。

Based on the ideas that linearity instead of non-linearity and difference quotient instead of differential quotient, and establish the mathematical model on the computer-aided alignment.

总结了用于计算机辅助装调技术中的光学检测手段以及该技术的优化算法,分析了进行计算机辅助装调技术的重要性和必要性。

In this paper, the concept of network security and security structures of OSI and Internet is introduced, and various threats confronting the computer network are also discussed. Several kinds of network information security technologies, including firewall technology, virtual private network, intrusion detection system, data encryption technology, identity authentication and security protocol etc. are also examined. The security of internal network is the biggest problem in the construction of each network. The solution to this problem lies in setting up a firewall. The theory of a firewall and the approach to its actualization is studied. Intrusion detection system, an important part of the computer network security system, has gained extensive attention. IDS monitors the computer and network traffic for intrusion and suspicious activities. It not only detects the intrusion from the extranet hacker, but also the intranet users. The emergence of virtual private network paves the way for realizing secure connection of LAN quickly and at a relatively low cost. The concept, function, key techniques, including the tunnel technology, and the ways to realize VPN are expounded in this paper. Also introduced is the data encrypt network technology, which is called the soul of computer network security, such as digital digest, digital signature, digital certificate, digital encrypt arithmetic and so on. At the same time, the principle and the process of implementing network security by digital certificate and digital signature, the basic principle and characters of security protocols, and finally, three of the security protocols, concerning the security problems in network, IPsec, SLL and SET are analyzed in detail Computer network system should be a system of dynamic defence, both dynamic and static, passive as well as active, and even offensive, combined with management and technology.

本文系统地介绍了网络安全的概念、OSI及Internet的安全体系结构,并讨论了计算机网络面临的各种安全威胁;内部网络的安全问题是每个建网单位面临的最大问题,可以认为防火墙技术是解决网络安全的一个主要手段,本文研究了防火墙的原理及其实现手段;作为一种主动的防御措施,入侵检测系统作为网络系统安全的重要组成部分,得到了广泛的重视,TDS对计算机和网络资源上的恶意使用行为进行识别和响应,不仅检测来自外部的入侵行为,也监督内部用户的未授权活动;虚拟专用网技术的出现,为实现网络间的连接提供了快速安全但又相对便宜的手段,本文较深入的探讨了实现VPN的隧道技术,并对VPN的概念、功能、实现途径、基本构成、关键技术及发展前景等问题进行了全面论述;数据加密技术是网络安全核心技术之一,本文从数据加密算法、数字摘要、数字签名及数字证书等几方面简要介绍了数据加密技术,并分析用数字证书和数字签名实现网络安全的原理和过程;对安全协议的基本原理、主要特点进行了较为深入的研究,并就网络的安全性问题剖析了三种安全协议:IPsec协议、SLL协议和SET协议。

According to the demand of high magnetic field power supply, reference is increased with a set ramp rate and stops at a set stable value, so reference system is composed of digital setting and digit to analog converting circuit. But the stability of reference is mostly guaranteed by the performance of D/A circuit, so D/A circuit is particularly studied in reference system. The scheme of D/A circuit, the selection of DAC and its voltage reference, hardware anti-jamming design and PCB design are discussed in detail, and software of remote control and PLC are discussed in brief. Zero-flux DC current transformer well satisfies the demands of the high stability of Load current detection unit, so the principle of zero-flux DC current transformer is analyzed; in the mean time a project which detects the long term stability is designed. During 8 hours, analog signal which is detected with high precision digit multimeter is recorded in computer at 1HZ frequency by GPIB communication. The drift error source and related parameters are explained in the compare-amplify part. Detailed subtraction circuit is designed; also amplifier chip and periphery components are selected and verified according to the theory of error analysis.

根据强磁场电源的需求,参考源应按照软件设定的斜率逐渐上升到设定稳态值,则参考源系统应由数字给定和数模转换电路两大部分组成,而参考源的稳定度主要依靠完成数模转换功能的模拟电路的性能来保证,因此本文对参考源系统的研究以数模转换电路为重点,分别从电路方案的确定、数模转换芯片及其基准电压源的选取和验证、电路板硬件抗干扰和PCB设计几方面进行了论述,然后对数字给定部分的远控组态和PLC程序设计作了简要介绍;采用零磁通原理的直流电流转换器很好地满足了对负载电流检测单元高稳定度的需求,本文详细分析了零磁通检测的原理,并在选定此种类型电流转换器的基础上设计了一套检测长期稳定度的方案,8小时内以1秒为采样周期,通过计算机Labview程序和高精度数字电压表的GPIB通讯,将被高精度数字电压表数字化后的模拟信号采样值连续记录至计算机中;比较放大环节简要阐述了漂移产生的原因和相关参数指标,确定了具体的减法电路形式,并根据误差分析理论对运算放大器和外围元器件进行了选取和验证。

With the development of computer technology, computer digital image processing is getting more and more applications in human production and life.

随着计算机技术的发展,计算机数字图像处理在生产和生活中得到越来越多的应用。

With the development of computer and digital imaging technique,the applying field of computer vision rapidly broaden.

中文摘要:随着计算机技术和数字成像技术的发展,计算机视觉技术的应用领域迅速拓宽。

Calculating the hologram is using a digital computer integrated coding, it does not need to hologram objects, but the actual existence of things on the mathematical description of wave after treatment, the digital computer input or output plotter controlled cathode rays tube shows the hologram is made.

计算全息图是利用数字计算机来综合编码的全息图,它不需要物体的实际存在,而是把物波的数学描述输入数字计算机处理后,控制绘图仪输出或阴极射线显像管显示而制成的全息图。

With the computer's development and popularization, digitizer is replacing simulation device gradually. The computer measure and control technology plays a more and more important role in the process of production and scientific research.

随着计算机技术的发展与普及,数字设备正越来越多地取代模拟设备,在生产过程控制和科学研究等广泛的领域中,计算机测控技术正发挥着越来越重要的作用。

Last, computer simulation study of the interaction disciplinarian of laser and myocardium tissue has been made by using computer simulate experiment study method.

最后,利用计算机模拟实验研究的方法对激光与心肌组织的作用规律进行了计算机模拟研究。

第47/100页 首页 < ... 43 44 45 46 47 48 49 50 51 ... > 尾页
推荐网络例句

This one mode pays close attention to network credence foundation of the businessman very much.

这一模式非常关注商人的网络信用基础。

Cell morphology of bacterial ghost of Pasteurella multocida was observed by scanning electron microscopy and inactivation ratio was estimated by CFU analysi.

扫描电镜观察多杀性巴氏杆菌细菌幽灵和菌落形成单位评价遗传灭活率。

There is no differences of cell proliferation vitality between labeled and unlabeled NSCs.

双标记神经干细胞的增殖、分化活力与未标记神经干细胞相比无改变。