It ADAPTS to computer aided analysis of network.
整套公式适用网络的机辅分析。
It has and will go on to influence analysis of network performance, QoS control and network design.
同时,这也对网络性能的分析,服务质量的控制,以及网络设计产生了,并将继续产生深远的影响。
Constructing disjoint minimal path set is an important approach for reliability analysis of network.
网络系统不交化最小路集的求解是进行网络系统可靠性分析的重要途径。
Sampling the data in the network-flow plays the important role in the analysis of network characteristic.
网络流的数据采样在进行网络流量行为分析的过程中起着举足轻重的作用。
The third part focuses on analysis of network monitoring public opinion on the type of executive power and its realization.
第三部分着重分析网络舆论对行政权力监督的类型及其实现过程。
This article is the analysis of network intrusion BM pattern-matching algorithms based on the BM rules to improve the matching algorithm.
本文在分析现有网络入侵模式匹配BM算法的基础上,提出了改进BM规则匹配算法。
Through the analysis of network test systems, following the ideology of the software engineering in component, this thesis distributes the.
通过对网络考试系统的分析,遵循组件的软件工程学思想,本文将。
The capture of network data packets plays an important part in network security, which is helpful for our better analysis of network data flow.
网络数据包的捕获对于网络安全有着巨大的作用,为我们更好的分析网络中的数据流提供了帮助。
We have researched on spatial analysis of pipeline information system based on MapInfo in order to add up spatial analysis of network to MapInfo.
本文根据石狮市城市规划建设现状,探讨地下管线普查和采集的方法,提出建立地下管线信息系统等有关问题。
To enumerate all spanning trees in undirected graphs is an important problem that people frequently encounter in the analysis of network and cycle.
求无向图的生成树是在网络和回路分析中经常遇到的重要问题。
Analysis of network performance measurement is implemented with researching parameters such as connection, delay, packet loss ratio, bandwidth, flux etc.
该网络性能参数分析通过对连接性、延迟、丢包率、带宽、流量参数等方面的研究实现。
Through the analysis of network intrusion methods, this article advances some prevention measures, investigation methods and methods of obtaining evidences.
文章通过对计算机网络入侵方法与手段的分析,提出一些防范措施和侦查取证方法。
On the basis of randomness analysis of traffic demand and supply and the reliability analysis of network, the concept of unblocked reliability was presented.
畅通可靠度是在考虑交通供给和交通需求的随机变化特性的基础上,借鉴网络可靠性分析方法,提出的概率型指标。
On the basis of randomness analysis of traffic demand and supply and the reliability analysis of network, the concept of unblocked reliability was presented.
畅通可靠度是在研究交通供需之间关系的基础上提出的概率型指标。
Network simulation is an effective tool for analysis of network performance, network flow simulation is the foundation and important step of network simulation.
网络仿真已成为网络性能分析的一个有效工具,网络流量仿真又是网络仿真的基础和重要步骤。
Finally, through the analysis of network marketing method to illustrate how the network marketing and travel daily to improve marketing target to achieve travel.
最后通过对网络营销方法的分析来说明旅行社如何进行网络营销并达到提高浏览量以实现旅行社的营销目标。
Then algorithm analysis of network traffic model, a brief introduction of the Poisson model, Markov model, ar, MA, ARMA model, focused on analyzing ARIMA model algorithm.
接着对网络流量模型算法分析,简单介绍了泊松模型,马尔科夫模型,AR,MA,ARMA模型,重点分析了ARIMA模型算法。
A novel fault identification algorithm based on smooth pseudo Wigner-Ville distribution (WVD) is proposed, which focused on the time-frequency analysis of network traffic.
通过研究网络流量的时频分析,提出了一种新的基于平滑魏格纳分布(WVD)的故障识别算法。
Through the analysis of network, we can see that network will achieve to stabilization or balance through the function of antibody's multiplication weakening antigen gradually.
通过对网络的分析可以看出,网络是通过抗体的增殖,逐渐削弱抗原的作用,进而趋于稳定或平衡的。
By analysis of network traffic (packets), frequent user behavior profiles are mined, and then by comparing the profile similarity, system behavior can be detected in real-time.
通过对网络数据包的分析,挖掘出网络系统中频繁发生的行为模式,并运用模式相似度比较对系统的行为进行检测,进而自动建立异常和误用行为的模式库。
From the analysis of network storage system architecture-DAS, NAS, SAN, the author mainly studies the application and implementation of SAN in BOSS (Business Operation Support system).
从分析网络存储系统结构——DAS,NAS,SAN入手,研究SAN在电信业务支撑系统中的应用与实现。
However, limited with the researching capability, the analysis of network governance is not completed, and the empirical study is not very supportive, which only can be improved in later research.
但是,限于笔者的学术水平,本文的分析还有失完整,对网络治理的实证分析也存在不足,这只能在以后的学习研究中予以解决。
Companies can spot these influencers, and work out all sorts of other things about their customers, by crunching vast quantities of calling data with sophisticated "network analysis" software.
公司可以识别出这些有影响力的人,并通过大量的通讯数据信息,使用精巧的“网络分析”软件计算出客户的各种相关偏好。
The police department of Richmond, Virginia, has pioneered the use of network-analysis software to predict crimes.
弗吉尼亚·里士满警局已经作为先驱使用网络分析软件来预言犯罪了。
The techniques of "social network analysis" have been known for some time, but businesses have been slow to make the most of them. That is changing.
社交网络分析技术已问世多时,但企业反应迟缓,未能最大限度地加以利用。这种情况正在改变。
Figure 1 shows an example of an infrastructure analysis, focusing on a network with clients that use primarily mail messaging.
图1给出一个基础结构分析示例,在这个网络中客户机主要使用邮件消息传递。
It's Security agents for network Traffic Analysis USES mobile software agents for intrusion detection in a network of computers.
它的“网络流量分析的安全代理”使用了移动的软件代理,检测计算机网络中的入侵。
It's Security agents for network Traffic Analysis USES mobile software agents for intrusion detection in a network of computers.
它的“网络流量分析的安全代理”使用了移动的软件代理,检测计算机网络中的入侵。
应用推荐