英语人>网络例句>setting function 相关的网络例句
setting function相关的网络例句

查询词典 setting function

与 setting function 相关的网络例句 [注:此内容来源于网络,仅供参考]

Fall suppose in Swerling Ⅱ target, derivation detect below environment of ADT of threshold value of the MGF of quadrature generation function that this algorithm issues in even setting, average judgment, much target the maths of aiguille of the false alarm in probability Pd and clutter brim environment is analytic expression.

在SwerlingⅡ型目标假设下,推导了该算法在均匀背景下的矩产生函数MGF、平均判决阈值ADT、多目标环境下检测概率Pd和杂波边缘环境中虚警尖峰的数学解析表达式。

The main control of the air-con is set at center of the dashboard. Control panel is rich of the function button, and useful ,it can make driver easy to setting the mode of the air-con.

除此之外,中控台的中间就是冷气的控制器,这是个功能强大的控制器,不但可以方便的设定,而又有操作性。

To change an angle setting for any function, simply click onits display box and enter a new value.

对于改变为任何函数的角度,也仅仅是简单地点击它的展示盒,进入新值。

It realized the basic function of random arithmetic, including setting a number of scope, judgment, and arithmetic functions such as user wrong answer.

它实现了随机出算术题的基本功能,包括设置做题数量,算术题的范围,判断用户答题正误等功能。

Considering poineering enterprise dimensions small, risk characteristic of big, innovation is strong, in issue setting of committee of examine and verify to go up, card inspect can be installed technically do poineering work board issue committee of examine and verify, in card inspect publisher of the examine and verify on the foundation of first trial of branch of can relevant function issues the application of the stock publicly.

考虑到创业企业规模小、风险大、创新特点强,在发行审核委员会设置上,证监会专门设置创业板发行审核委员会,在证监会相关职能部门初审的基础上审核发行人公开发行股票的申请。

Micro-computer processor to ensure the setting of the bag length without changing any parts, preset counter, bag length, packing speed indicator are the part of the function.

微电脑袋长控制器,可任意设置袋长而无需更换零件,并可预制计数,显示包装速度,袋长等。

Iii By using the well-known properties of the dela vallee-poussin summability kernels and the pass principle of weakly compact operator, we study the weak compactness of C〓 on vector-valued analytic function spaces H〓, B〓, N and N〓, establish some connections between the weak compactness of composition operators and the structure properties of Banach spaces. These generalize and unify the corresponding results in the scalar-valued setting and enrich the content of the study of composition operator in another way.

第三,利用著名的de la Vallee-poussin可和核及有关算子的弱紧性的传递原理给出了向量值解析函数空间H〓、B〓、N及N〓上的复合算子的弱紧性的刻画,建立了复合算子的弱紧性与Banach空间的结构性质之间的联系,统一和推广了对应的数量值解析函数空间上的复合算子的弱紧性,这从另一种途径极大地丰富了复合算子的研究内容。

Computer control system: when setting the automatic constant temperature switches etc. Function.

电脑控制系统:设定时开关自动恒温超温报警等功能。

The custom-setting can also be used to program a frequently-used function, which can be activated by pressing the down arrow on the cursor key.

自定义设置也可以被用来程式经常使用的功能,它可以激活迫切的向下箭头光标的关键。

In this paper, the concept of network security and security structures of OSI and Internet is introduced, and various threats confronting the computer network are also discussed. Several kinds of network information security technologies, including firewall technology, virtual private network, intrusion detection system, data encryption technology, identity authentication and security protocol etc. are also examined. The security of internal network is the biggest problem in the construction of each network. The solution to this problem lies in setting up a firewall. The theory of a firewall and the approach to its actualization is studied. Intrusion detection system, an important part of the computer network security system, has gained extensive attention. IDS monitors the computer and network traffic for intrusion and suspicious activities. It not only detects the intrusion from the extranet hacker, but also the intranet users. The emergence of virtual private network paves the way for realizing secure connection of LAN quickly and at a relatively low cost. The concept, function, key techniques, including the tunnel technology, and the ways to realize VPN are expounded in this paper. Also introduced is the data encrypt network technology, which is called the soul of computer network security, such as digital digest, digital signature, digital certificate, digital encrypt arithmetic and so on. At the same time, the principle and the process of implementing network security by digital certificate and digital signature, the basic principle and characters of security protocols, and finally, three of the security protocols, concerning the security problems in network, IPsec, SLL and SET are analyzed in detail Computer network system should be a system of dynamic defence, both dynamic and static, passive as well as active, and even offensive, combined with management and technology.

本文系统地介绍了网络安全的概念、OSI及Internet的安全体系结构,并讨论了计算机网络面临的各种安全威胁;内部网络的安全问题是每个建网单位面临的最大问题,可以认为防火墙技术是解决网络安全的一个主要手段,本文研究了防火墙的原理及其实现手段;作为一种主动的防御措施,入侵检测系统作为网络系统安全的重要组成部分,得到了广泛的重视,TDS对计算机和网络资源上的恶意使用行为进行识别和响应,不仅检测来自外部的入侵行为,也监督内部用户的未授权活动;虚拟专用网技术的出现,为实现网络间的连接提供了快速安全但又相对便宜的手段,本文较深入的探讨了实现VPN的隧道技术,并对VPN的概念、功能、实现途径、基本构成、关键技术及发展前景等问题进行了全面论述;数据加密技术是网络安全核心技术之一,本文从数据加密算法、数字摘要、数字签名及数字证书等几方面简要介绍了数据加密技术,并分析用数字证书和数字签名实现网络安全的原理和过程;对安全协议的基本原理、主要特点进行了较为深入的研究,并就网络的安全性问题剖析了三种安全协议:IPsec协议、SLL协议和SET协议。

第3/13页 首页 < 1 2 3 4 5 6 7 8 9 ... > 尾页
推荐网络例句

Since historical times,England ,where the early inhabitants were Celts, has been conquered three times .

从有历史以来,英国,在此地早期居住的是凯尔特人,已经被征服了三次。

Bluetooth OBEX File Transfer Enables the sending and receiving of files on your phone via Bluetooth.

蓝牙OBEX文件移动允许经过蓝牙传送和接受文件。。。。

The almost sure central limit theorem is a pop topic of the probability research in recent years,because it has many actual applications in the random analogue.

中文摘要:几乎处处中心极限定理是近几十年概率论研究的一个热门话题。它之所以引起人们的注意是由于它在随机模拟方面的实际应用参见Fisher