The main research content of this paper is network information detection technology and network security evaluation method.
本文主要研究的内容是网络信息的探测技术和建立在信息探测基础上的安全评估方法。
The application of fuzzy evaluation of blind information in electric network planning.
盲信息的模糊评价模型在电网规划中的应用。
Network security leak scan and vulnerability analysis are the base of system security evaluation and the essential components of Information security system.
网络安全漏洞扫描与脆弱性分析是进行系统安全评估的基础和信息安全保障体系中的必要组成部分。
Research on the feature, collection principle, evaluation standard, evaluation method and utilization of network information is important to the librarys following works.
研究网络信息的特点、收集原则、评价标准、评价方法及利用对图书馆今后的工作将有重要的意义。
This thesis mainly makes a probe into the theory and methods of the evaluation of network academic information resources.
本文主要探讨网络学术信息资源评价的理论和方法,共分三个部分。
Information network Design and network Performance Evaluation are critical network research areas, while network simulation is an important method to carry out these research activities.
信息网络设计和信息网络性能评价是网络研究的重要领域,而网络仿真技术是开展网络研究的重要方法。
This paper mainly discusses the connotation of the free degree of network information transmission, as well as influencing factors, evaluation indexes, and guidance strategies.
本文主要阐述了网络信息传播自由度的内涵、影响因子、评价指标及控制策略。
It is the evaluation and selection of network information resources that is the precondition of constructing library network information stage.
而建立图书馆网络信息平台的前提是对网络信息资源的评价和筛选。
Thus, the evaluation of network academic information resources becomes more important day by day. It has great significance as to how to effectively utilize network academic resources.
因此,网络学术信息资源评价便显得日益重要起来,它对于如何有效地利用网络学术信息资源,使高质量的学术资源为用者所用有着重要意义。
Mainly deals with the requirements for network information staff, and discusses the realization of evaluation, arrangement, accumulation and pollution control of network information resources.
论述网络信息人员的能力培养,如何实现对网络信息资源的价值评价、组织整序、积累贮存和污染控制等方面的问题。
According to the key techniques above, the paper designs system of network security evaluation based on information detection in chapter 3, and supplies method for the system realization.
基于前面的关键技术,第四章详细设计了基于信息探测的网络安全评估系统的方案并给出了具体实现的方法。
An operational and usable evaluation system of network standard information resources for enterprise user has been set up accordingly.
从而构建了一个具有可操作性、实用性的以企业用户为中心的网络标准信息资源评价体系。
This application can undoubtedly improve the accuracy and efficiency of evaluation of the covering information of public transportation network.
该模型的实际应用,能大大提高公交线网覆盖度评价的准确性和工作效率。
The development character of network centric operation needs new simulation models and evaluation methods, to forecast the effect of manoeuver based on information superiority.
网络化作战的时代特征迫切需要新的仿真模型和评价方法,以预测信息优势对作战效果的影响。
Chapter III is the focus of this paper, from GIS technology data management, information visualization capabilities, analysis of space transportation systems to deal with road network evaluation.
第三章是本文的重点,分别从GIS技术的数据管理、信息可视化能力、空间分析方面来处理公路网交通系统评价问题。
The third part evaluates the network academic information resources with the method of fuzzy comprehensive evaluation (FCE).
第三部分乃网络学术信息资源模糊综合评价研究。
This paper sets up the fractal evaluation model for covering information of public transportation network.
本文建立了公交线网覆盖形态分形评价模型。
The evaluation of the network security is not only one of the important contents of the research of network security, but also one of the hot topics of the information technology.
关于网络安全的定量评判是网络安全防御研究中的一项重要内容,也是it 领域中的前沿课题之一。
The evaluation of the network security is not only one of the important contents of the research of network security, but also one of the hot topics of the information technology.
关于网络安全的定量评判是网络安全防御研究中的一项重要内容,也是it 领域中的前沿课题之一。
应用推荐