• 他们跟踪数据编制高清晰度社交网络计算机模型模拟流感这样疾病学校传播

    Then they compiled the tracking data into a high-resolution social contact network and used a computer model to simulate the spread of a flu-like disease throughout the school.

    youdao

  • 这种情况下SCA作为一个登记处可以集中管理也可以分布管理,同时还能网络不同来源跟踪sca元数据

    In this case SCA Domain serves as a registry, which can be either centralized or distributed and track SCA metadata from various sources on your network.

    youdao

  • 对于这个应用程序而言,网络数据性能进行跟踪有必要。

    In the case of this application, traces of the network and traces of database performance will also be worthwhile.

    youdao

  • 《华尔街日报》指出在这之间存有百余个中间商,其中包括跟踪公司数据代理广告网络,他们竞相提供大量的关于个人行为兴趣数据,以满足日益增长需求

    The Journal identified more than 100 middlemen - tracking companies, data brokers and advertising networks - competing to meet the growing demand for data on individual behavior and interests.

    youdao

  • 进程跟踪查看计算机所有传输网络数据进程(进程PID)。使用会话树形视图查看各个进程的数据

    Process Tracking: view all the processes on your machine generating network traffic (process name and PID). Use the conversation tree to view frames associated with each process.

    youdao

  • LNP数据跟踪端口号本地路由号(LRN),其中本地路由号可网络中的每一交换提供唯一标识

    The LNP database keeps track of ported numbers and Local Routing Numbers (LRNs) which provide a unique identity for every exchange in the network.

    youdao

  • 采用RFID技术矿山井下人员跟踪定位系统能够对井下人员进行识别利用计算机网络进行数据采集传送

    The system for tracing and locating the staff in mine with RFID technique could identify the staff in mine, collect and transfer the data by computer Intranet.

    youdao

  • 无线传感器网络这种特点使实时数据感知目标跟踪以及环境数据采集领域有着广泛应用

    This feature of wireless sensor networks make it in real-time data-aware, target tracking, and environmental areas such as data collection has a wide range of applications.

    youdao

  • 跟踪保护目标是某些网站广告商使用的数据有透明度,这些数据漫游网络时候被他们用来跟踪你。

    Tracking Protection aims to bring transparency to the data some sites and advertisers use to track you as you journey across the web.

    youdao

  • 当前一些大型网络数据管理系统(DBMS)的安全性方法主要包括身份认证访问控制审计跟踪数据备份一些更为敏感和重要的数据需要进行数据加密或者容灾系统的设计。

    The major Security methods in DBMS are as follows: identification, visiting control, trace of audit and copy of database, but as to the sensitive and important database, it needs to be coded.

    youdao

  • 借助计算机模拟跟踪起始算法证明正确有效的,数据关联算法被证明是优于神经网络方法

    With the help of computer simulations, the tracking initiation algorithm is proven to be correct and effective, and the data association algorithm is proven to be superior to the NN method.

    youdao

  • 借助计算机模拟跟踪起始算法证明正确有效的,数据关联算法被证明是优于神经网络方法

    With the help of computer simulations, the tracking initiation algorithm is proven to be correct and effective, and the data association algorithm is proven to be superior to the NN method.

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定