• It ADAPTS to computer aided analysis of network.

    整套公式适用网络分析

    youdao

  • It has and will go on to influence analysis of network performance, QoS control and network design.

    同时,网络性能分析服务质量控制以及网络设计产生了,继续产生深远的影响

    youdao

  • Constructing disjoint minimal path set is an important approach for reliability analysis of network.

    网络系统不交化小路求解进行网络系统可靠性分析重要途径

    youdao

  • Sampling the data in the network-flow plays the important role in the analysis of network characteristic.

    网络数据采样进行网络流量行为分析的过程中起着举足轻重作用

    youdao

  • The third part focuses on analysis of network monitoring public opinion on the type of executive power and its realization.

    第三部分着重分析网络舆论行政权力监督类型及其实现过程

    youdao

  • This article is the analysis of network intrusion BM pattern-matching algorithms based on the BM rules to improve the matching algorithm.

    本文分析现有网络入侵模式匹配BM算法基础,提出改进BM规则匹配算法

    youdao

  • Through the analysis of network test systems, following the ideology of the software engineering in component, this thesis distributes the.

    通过网络考试系统分析遵循组件软件工程学思想本文

    youdao

  • The capture of network data packets plays an important part in network security, which is helpful for our better analysis of network data flow.

    网络数据包捕获对于网络安全有着巨大作用我们更好分析网络中的数据提供了帮助

    youdao

  • We have researched on spatial analysis of pipeline information system based on MapInfo in order to add up spatial analysis of network to MapInfo.

    本文根据石狮市城市规划建设现状,探讨地下管线普查和采集方法,提出建立地下管线信息系统等有关问题

    youdao

  • To enumerate all spanning trees in undirected graphs is an important problem that people frequently encounter in the analysis of network and cycle.

    无向生成网络回路分析经常遇到重要问题

    youdao

  • Analysis of network performance measurement is implemented with researching parameters such as connection, delay, packet loss ratio, bandwidth, flux etc.

    网络性能参数分析通过对连接性、延迟带宽流量参数等方面研究实现

    youdao

  • Through the analysis of network intrusion methods, this article advances some prevention measures, investigation methods and methods of obtaining evidences.

    文章通过计算机网络入侵方法手段分析提出一些防范措施侦查取证方法。

    youdao

  • On the basis of randomness analysis of traffic demand and supply and the reliability analysis of network, the concept of unblocked reliability was presented.

    畅通可靠考虑交通供给交通需求随机变化特性基础上,借鉴网络可靠性分析方法,提出的概率型指标。

    youdao

  • On the basis of randomness analysis of traffic demand and supply and the reliability analysis of network, the concept of unblocked reliability was presented.

    畅通可靠度研究交通供需之间关系基础上提出概率型指标。

    youdao

  • Network simulation is an effective tool for analysis of network performance, network flow simulation is the foundation and important step of network simulation.

    网络仿真成为网络性能分析一个有效工具,网络流量仿真又是网络仿真基础重要步骤

    youdao

  • Finally, through the analysis of network marketing method to illustrate how the network marketing and travel daily to improve marketing target to achieve travel.

    最后通过网络营销方法分析说明旅行社如何进行网络营销达到提高浏览量实现旅行社的营销目标

    youdao

  • Then algorithm analysis of network traffic model, a brief introduction of the Poisson model, Markov model, ar, MA, ARMA model, focused on analyzing ARIMA model algorithm.

    接着网络流量模型算法分析简单介绍泊松模型,马尔科夫模型,AR,MA,ARMA模型,重点分析了ARIMA模型算法。

    youdao

  • A novel fault identification algorithm based on smooth pseudo Wigner-Ville distribution (WVD) is proposed, which focused on the time-frequency analysis of network traffic.

    通过研究网络流量分析提出新的基于平滑魏格分布(WVD)的故障识别算法

    youdao

  • Through the analysis of network, we can see that network will achieve to stabilization or balance through the function of antibody's multiplication weakening antigen gradually.

    通过网络分析可以看出,网络是通过抗体增殖,逐渐削弱抗原作用,进而趋于稳定平衡的。

    youdao

  • By analysis of network traffic (packets), frequent user behavior profiles are mined, and then by comparing the profile similarity, system behavior can be detected in real-time.

    通过网络数据包分析挖掘出网络系统中频繁发生行为模式,运用模式相似比较对系统的行为进行检测,进而自动建立异常和误用行为的模式库。

    youdao

  • From the analysis of network storage system architecture-DAS, NAS, SAN, the author mainly studies the application and implementation of SAN in BOSS (Business Operation Support system).

    分析网络存储系统结构——DAS,NAS,SAN入手,研究SAN电信业务支撑系统中的应用实现

    youdao

  • However, limited with the researching capability, the analysis of network governance is not completed, and the empirical study is not very supportive, which only can be improved in later research.

    但是限于笔者学术水平,本文的分析还有失完整,对网络治理实证分析也存在不足,只能以后学习研究中予以解决。

    youdao

  • Companies can spot these influencers, and work out all sorts of other things about their customers, by crunching vast quantities of calling data with sophisticated "network analysis" software.

    公司可以识别出这些影响力人,通过大量通讯数据信息使用精巧的网络分析软件计算客户各种相关偏好。

    youdao

  • The police department of Richmond, Virginia, has pioneered the use of network-analysis software to predict crimes.

    弗吉尼亚·里士满警局已经作为先驱使用网络分析软件预言犯罪了。

    youdao

  • The techniques of "social network analysis" have been known for some time, but businesses have been slow to make the most of them. That is changing.

    社交网络分析技术问世多时,企业反应迟缓,未能最大限度地加以利用这种情况正在改变。

    youdao

  • Figure 1 shows an example of an infrastructure analysis, focusing on a network with clients that use primarily mail messaging.

    1给出一个基础结构分析示例这个网络客户机主要使用邮件消息传递

    youdao

  • It's Security agents for network Traffic Analysis USES mobile software agents for intrusion detection in a network of computers.

    的“网络流量分析安全代理使用了移动软件代理,检测计算机网络中的入侵

    youdao

  • It's Security agents for network Traffic Analysis USES mobile software agents for intrusion detection in a network of computers.

    的“网络流量分析安全代理使用了移动软件代理,检测计算机网络中的入侵

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定