首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 273 毫秒
1.
ExactFailureProbabilityFormulaforStrictConsecutive┐k┐out┐of┐n:FSystemswithHomogeneousMarkovDependenceGeGuangping(ShanghaiUniv...  相似文献   

2.
INTRODUCTIONAnimportantpartinthepulpingandpapermakingindustryistherefiningprocess.Whethertherefinedpulpisgoodornotiscrucialforachievingconsistentpulpquality.Whatpeopleexpectandstriveforintherefiningprocessisguaranteedrefinedpulpquality,safetyinproduct…  相似文献   

3.
IntroductionAccordingtoNida’stheory ,translatingconsistsinreproducinginthereceptorlanguagetheclosestnaturalequivalentofthesourcelanguagemessage ,firstintermsofmeaningandsecondlyintermsofstyle.Betweenthemeaningandthestyle,meaningmustbegivenpriority ,andth…  相似文献   

4.
INTRODUCTIONLet{Y(t) ;-∞ <t <∞ }={Xk(t) ;-∞ <t<∞ }∞k=1 beasequenceofindepen dentOrnstein Uhlenbeck (OU)processeswithcoefficientsγk≥ 0andλk>0 ,i.e.,Xk(·)isastationary ,meanzeroGaussianprocesswithEXk(s)Xk(t) =(γk λk)exp( -λk|t-s|) ,k=1 ,2 ,… .TheprocessY(·)wasfirstintroducedbyDawson ( 1 972 )a…  相似文献   

5.
SolvingLinearProgrammingProblemsviaAppendinganElasticConstraintPanPingqi(潘平奇)(DepartmentofMathematicsandMechanics,SoutheastUn...  相似文献   

6.
INTRODUCTIONThereisgrowingconcernforcorrosiondam ageinreinforcedconcrete (RC)structureswithseveraldecades’service.Thereinforcementcor rosionofRCconstructionsprobablyisthemostsignificantproblemandoutweighsotherformsofdeterioration .StudiesbyPeattieetal.( 1 9…  相似文献   

7.
1 Introduction Toachieveourtargetinthecomingfifteenyears,itisessentialandimprotantinallrespectstotransformoureconomicgrwothmodeandimproveoureconomicqualityandbenefitconscientiously.Tomakefullunderstandingaboutthetransformingcanhelpustomaintainahigh…  相似文献   

8.
1 .IntroductionRequests ,inEllis’opinion ,“areattemptsonthepartofaspeakertogetthehearertoperformortostopperformingsomekindofaction”(Ellis,1 994:1 67) .Requestsareface-threateningbydefinition (Brown&Levinson ,1 978) :hearerscaninterpretrequestsasintrusiveimpibgementon…  相似文献   

9.
1 Introduction Monocrotophosandparathion methyl,whichbelongtoorganophosphorouspesticideswithstrongandex tensivepoison ,wereappliedwidelyforthepreventionandcontrolofplantdiseasesandeliminationofpests .Itistakenmoreattentiontostudythepotentialharmtopeoples…  相似文献   

10.
SomeRemarksonStationaryThermistorProblemGuanPing(管平)(DepartmentofMathematicsandMechanics,SoutheastUniversity,Nanjing210018)F...  相似文献   

11.
虚拟专用网中的隧道技术研究   总被引:3,自引:0,他引:3  
虚拟专用网(VPN)代替传统拨号网络和租用线路实现企业与企业之间,企业的分支机构之间以及企业与其雇员之间的信息交换是当前的一种趋势,而隧道技术是实现VPN的关键技术.本文结合VPN的实现要求,对现有的一些隧道协议(包括GRE,L2TP,IPSec和IP/IP)进行了比较研究,并且提出了在现有条件下实现VPN的隧道协议的集成方案.,It is a trend of virtual private networks (VPNs) to be used for information exchange between enterprises, branches of enterprises and enterprises and their employees instead of traditional dial networks and leased lines. The tunneling technique is the key technique to implement VPN. In this paper, with the VPN implementation requirements in mind, we perform a comparative research on the existing tunneling protocols including GRE, L2TP, IPSec and IP/IP. We also propose an integrated scheme of tunneling mechanism that supports VPN under the current condition.  相似文献   

12.
为了强有力的保障汽车整车的品质,作为汽车零部件供应商的紧固件生产企业迫切需要建立一套精确的全生命周期质量跟踪追溯系统。本项目以某汽车紧固件企业为研究对象,依据紧固件大批量离散型生产的特点.提出按批次和按时间相结合的质量追溯方式,并用Delphi7.0进行质量追溯程序的开发和应用。  相似文献   

13.
X3DOM是一种新的WEB3D技术.基于X3DOM设计一个适用于工艺品生产企业的工艺品外观定制系统,其功能设计紧紧围绕工艺品交互设计和定制等主题进行.从工艺产品外观设计的特点出发,研究分析适用于外观个性化交互定制的模式,包括设计思路、定制流程、技术实现、运行模式和实现案例,它是总结山区工艺品企业生产特点的基础上进行设计研发的,具有一定普遍适应性.  相似文献   

14.
在当今的信息社会中,网络为企业带来了更多的资源和商机,但由此而引发的各种安全威胁也越来越多。由于对安全重视不够所造成的企业损失或企业破产的例子已经很多了。对于企业来说,了解和认知所面临的各种安全威胁及采取适当的防范措施已是当务之急,以确保企业整个商务信息系统的安全性。本文介绍了保障商务信息系统对企业的重要意义及企业当前所面临的常见威胁,从网络安全和商务交易安全两个方面介绍了常用的安全保障措施。  相似文献   

15.
本首先分析了B2B电子商务的特点和竞争优势,指出发展我国B2B电子商务的必要性,同时,分析了我国企业参与B2B电子商务现状的基础上,从培育网上市场,发展B2B中介服务网站和完善电子商务环境三个方面探讨我国企业开展B2B电子商务面临的问题与对策。  相似文献   

16.
在面向模具产品开发中,全生命周期管理系统可以分为发生在企业内和企业外两部分,对于发生在企业内的数据一般可以通过对企业内部的管理共享,对于发生在企业外的数据,需要通过一定的方法获得(如调查)。通过对全生命周期在我国模具行业发展的现状、可行性的分析,给出了全生命周期管理系统实施的可行的方法途径和框架途径,为全生命周期管理系统应用于企业的可视化模型研究打下了基础。  相似文献   

17.
随着企业规模的不断扩大,需要在企业总部、分支机构以及合作伙伴之间建立安全、有效、经济的传输信道,VPN是解决这一需求的有效手段.本文介绍了VPN的主要实现技术以及在企业网中的解决方案,并讨论了各解决方案的特点.  相似文献   

18.
王书海  刘刚 《邯郸学院学报》2007,17(3):34-37,43
随着企业规模的不断扩大,需要在企业总部、分支机构以及合作伙伴之间建立安全、有效、经济的传输信道,VPN是解决这一需求的有效手段.本文介绍了VPN的主要实现技术以及在企业网中的解决方案,并讨论了各解决方案的特点.  相似文献   

19.
Based on an analysis of the relationship between electronic business (EB) and collaborative product commerce (CPC), the conception of CPC is illustrated rigorously. Development and classification of manufacturing systems are summarized. System features and goals on each stage of a manufacturing system are investigated. In particular, goals and feature characteristics of CPC manufacturing system are discussed. A figure of relationship between the feature and goal of a CPC manufacturing system is given. A model of CPC manufacturing systems based on a set of five elements including goal, feature, topology, view, and process is proposed. Furthermore, four models of 3D function analysis for PFV, PTV, PTG, and PFG are established.  相似文献   

20.
An application-layer based centralized information access control for VPN   总被引:3,自引:0,他引:3  
INTRODUCTION AND BACKGROUND In the last decade, as the Internet becomes a popular low-cost backbone infrastructure, many or- ganizations and companies use it to establish their secure private network, which is known as VPN (Virtual Private Network) technology (Cohen, 2003). Generally, VPN implements confidentiality of data, message integrity and endpoint authentication by the security protocols (such as IPSec: IP Security (Kent and Atkinson, 1998) and TLS/SSL: Transport Lay…  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号