共查询到20条相似文献,搜索用时 273 毫秒
1.
Ge Guangping 《上海大学学报(英文版)》1998,(1)
ExactFailureProbabilityFormulaforStrictConsecutive┐k┐out┐of┐n:FSystemswithHomogeneousMarkovDependenceGeGuangping(ShanghaiUniv... 相似文献
2.
INTRODUCTIONAnimportantpartinthepulpingandpapermakingindustryistherefiningprocess.Whethertherefinedpulpisgoodornotiscrucialforachievingconsistentpulpquality.Whatpeopleexpectandstriveforintherefiningprocessisguaranteedrefinedpulpquality,safetyinproduct… 相似文献
3.
杨丹宇 《内蒙古师范大学学报(哲学社会科学版)》2001,(Z1)
IntroductionAccordingtoNida’stheory ,translatingconsistsinreproducinginthereceptorlanguagetheclosestnaturalequivalentofthesourcelanguagemessage ,firstintermsofmeaningandsecondlyintermsofstyle.Betweenthemeaningandthestyle,meaningmustbegivenpriority ,andth… 相似文献
4.
INTRODUCTIONLet{Y(t) ;-∞ <t <∞ }={Xk(t) ;-∞ <t<∞ }∞k=1 beasequenceofindepen dentOrnstein Uhlenbeck (OU)processeswithcoefficientsγk≥ 0andλk>0 ,i.e.,Xk(·)isastationary ,meanzeroGaussianprocesswithEXk(s)Xk(t) =(γk λk)exp( -λk|t-s|) ,k=1 ,2 ,… .TheprocessY(·)wasfirstintroducedbyDawson ( 1 972 )a… 相似文献
5.
SolvingLinearProgrammingProblemsviaAppendinganElasticConstraintPanPingqi(潘平奇)(DepartmentofMathematicsandMechanics,SoutheastUn... 相似文献
6.
EFFECT OF CORROSION ON BOND BEHAVIOR AND BENDING STRENGTH OF REINFORCED CONCRETE BEAMS 总被引:1,自引:0,他引:1
INTRODUCTIONThereisgrowingconcernforcorrosiondam ageinreinforcedconcrete (RC)structureswithseveraldecades’service.Thereinforcementcor rosionofRCconstructionsprobablyisthemostsignificantproblemandoutweighsotherformsofdeterioration .StudiesbyPeattieetal.( 1 9… 相似文献
7.
1 Introduction Toachieveourtargetinthecomingfifteenyears,itisessentialandimprotantinallrespectstotransformoureconomicgrwothmodeandimproveoureconomicqualityandbenefitconscientiously.Tomakefullunderstandingaboutthetransformingcanhelpustomaintainahigh… 相似文献
8.
YANG Chunhong 《思茅师范高等专科学校学报》2001,17(4):61-67
1 .IntroductionRequests ,inEllis’opinion ,“areattemptsonthepartofaspeakertogetthehearertoperformortostopperformingsomekindofaction”(Ellis,1 994:1 67) .Requestsareface-threateningbydefinition (Brown&Levinson ,1 978) :hearerscaninterpretrequestsasintrusiveimpibgementon… 相似文献
9.
1 Introduction Monocrotophosandparathion methyl,whichbelongtoorganophosphorouspesticideswithstrongandex tensivepoison ,wereappliedwidelyforthepreventionandcontrolofplantdiseasesandeliminationofpests .Itistakenmoreattentiontostudythepotentialharmtopeoples… 相似文献
10.
SomeRemarksonStationaryThermistorProblemGuanPing(管平)(DepartmentofMathematicsandMechanics,SoutheastUniversity,Nanjing210018)F... 相似文献
11.
虚拟专用网中的隧道技术研究 总被引:3,自引:0,他引:3
虚拟专用网(VPN)代替传统拨号网络和租用线路实现企业与企业之间,企业的分支机构之间以及企业与其雇员之间的信息交换是当前的一种趋势,而隧道技术是实现VPN的关键技术.本文结合VPN的实现要求,对现有的一些隧道协议(包括GRE,L2TP,IPSec和IP/IP)进行了比较研究,并且提出了在现有条件下实现VPN的隧道协议的集成方案.,It is a trend of virtual private networks (VPNs) to be used for information exchange between enterprises, branches of enterprises and enterprises and their employees instead of traditional dial networks and leased lines. The tunneling technique is the key technique to implement VPN. In this paper, with the VPN implementation requirements in mind, we perform a comparative research on the existing tunneling protocols including GRE, L2TP, IPSec and IP/IP. We also propose an integrated scheme of tunneling mechanism that supports VPN under the current condition. 相似文献
12.
金晶晶 《金华职业技术学院学报》2012,12(3):62-65
为了强有力的保障汽车整车的品质,作为汽车零部件供应商的紧固件生产企业迫切需要建立一套精确的全生命周期质量跟踪追溯系统。本项目以某汽车紧固件企业为研究对象,依据紧固件大批量离散型生产的特点.提出按批次和按时间相结合的质量追溯方式,并用Delphi7.0进行质量追溯程序的开发和应用。 相似文献
13.
14.
在当今的信息社会中,网络为企业带来了更多的资源和商机,但由此而引发的各种安全威胁也越来越多。由于对安全重视不够所造成的企业损失或企业破产的例子已经很多了。对于企业来说,了解和认知所面临的各种安全威胁及采取适当的防范措施已是当务之急,以确保企业整个商务信息系统的安全性。本文介绍了保障商务信息系统对企业的重要意义及企业当前所面临的常见威胁,从网络安全和商务交易安全两个方面介绍了常用的安全保障措施。 相似文献
15.
郑诗田 《华侨大学学报(哲学社会科学版)》2001,(1):28-33
本首先分析了B2B电子商务的特点和竞争优势,指出发展我国B2B电子商务的必要性,同时,分析了我国企业参与B2B电子商务现状的基础上,从培育网上市场,发展B2B中介服务网站和完善电子商务环境三个方面探讨我国企业开展B2B电子商务面临的问题与对策。 相似文献
16.
17.
随着企业规模的不断扩大,需要在企业总部、分支机构以及合作伙伴之间建立安全、有效、经济的传输信道,VPN是解决这一需求的有效手段.本文介绍了VPN的主要实现技术以及在企业网中的解决方案,并讨论了各解决方案的特点. 相似文献
18.
随着企业规模的不断扩大,需要在企业总部、分支机构以及合作伙伴之间建立安全、有效、经济的传输信道,VPN是解决这一需求的有效手段.本文介绍了VPN的主要实现技术以及在企业网中的解决方案,并讨论了各解决方案的特点. 相似文献
19.
Based on an analysis of the relationship between electronic business (EB) and collaborative product commerce (CPC), the conception of CPC is illustrated rigorously. Development and classification of manufacturing systems are summarized. System features and goals on each stage of a manufacturing system are investigated. In particular, goals and feature characteristics of CPC manufacturing system are discussed. A figure of relationship between the feature and goal of a CPC manufacturing system is given. A model of CPC manufacturing systems based on a set of five elements including goal, feature, topology, view, and process is proposed. Furthermore, four models of 3D function analysis for PFV, PTV, PTG, and PFG are established. 相似文献
20.
INTRODUCTION AND BACKGROUND In the last decade, as the Internet becomes a popular low-cost backbone infrastructure, many or- ganizations and companies use it to establish their secure private network, which is known as VPN (Virtual Private Network) technology (Cohen, 2003). Generally, VPN implements confidentiality of data, message integrity and endpoint authentication by the security protocols (such as IPSec: IP Security (Kent and Atkinson, 1998) and TLS/SSL: Transport Lay… 相似文献