open topology

【计】开放拓扑结构

计算机



双语例句

  1. Open the runtime environment and create a new topology.
    打开运行时环境,并创建一个新的拓扑。
  2. To Open up Topology Design Concentrator of Wired Access Network Based on Ant Colony Algorithms
    基于蚁群算法的有线接入网络集中器拓朴设计
  3. Note on Core Compactness of Scott Open Filters Topology
    关于Scott开滤子拓扑核紧性的注记
  4. OpenESB, an open source implementation of JBI, includes a homogeneous topology option using clustered JBI instances when run in a GlassFish Application Server.
    OpenESB是JBI的一个开源实现,当其运行在GlassFish应用服务器上时,它包含了一个使用了集群JBI实例的同构拓扑选项。
  5. On Core Compactness of Scott Open Fliter Topology
    关于Scott开滤子拓扑的core紧性
  6. In this paper, a new topological space as well as minimal families topological space is established on completely distributive lattices by using the results of the minimal families, the result that the largest standard minimal families are only nontrivial open sets on this topology is proved.
    采用极小族理论建立了完全分配格上的另外一种拓扑枣极小族拓扑,使得最大标准极小族是该拓扑仅有的非平凡开集。
  7. Proposing one concentrator open up topology design on the basis of ant colony algorithm of wired ac-cess network.
    提出了一种基于蚁群算法的有线接入网络中集中器的拓朴设计。
  8. The characteristics of mobile ad hoc networks, such as open peer-to-peer network architecture, shared wireless resource and highly dynamic network topology, pose a number of challengers to the security design.
    移动adhoc的特点为实现安全带来了一系列挑战,如:公开的对等网络结构、共享的无线资源和高度动态的网络拓扑等。
  9. O_2-topology is coarser than the open interval topology.
    σ2拓扑比开区间拓扑粗;
  10. Semi-Open Sets and Semi-Continuous Functions in Fuzzifying Topology
    不分明化拓扑中的半开集和半连续函数
  11. In this paper, we study the relations between the excess of open manifolds and their topology by using the methods of comparison geometry.
    本文中,我们应用比较几何的方法研究开流形的Excess与其拓扑之间的关系。
  12. S 0, s 1, s 2, s 3, s 4 separation axioms is introduced in terms of semi open set, semi neighborhood and semi closure in fuzzifying topology and equivalenct propositions of the five axioms are given.
    本文在不分明化拓扑空间中,利用半开集、半邻域和半闭包等概念导入了S0-,S1-,S2-,S3-,S4-分离公理,并且给出这五个分离公理的等价命题。
  13. In finite dimensional space form a bounded open domain, we study some open convex subsets and it's topology, then give a complete metric space.
    考虑了在有限维空间中包含在某一有界开区域中的所有有界开凸子集所成空间上的拓扑,给出了一个相关的完备的度量空间。
  14. Secondly, based on the concept of fuzzifying regular open set, the concepts of nearly compactness and almost compactness are introduced in fuzzifying topology and some properties of them are obtained.
    还有,从不分明化正则开集出发引入了近似紧性和几乎紧性的概念,并且给出了它们的一些性质。
  15. Ultra-F2 compact open fuzzy topology
    超F2紧开模糊拓扑
  16. The order topology is coarser than the open interval topology in a lattice.
    格的序拓扑比开区间拓扑粗;
  17. The algorithm will open new wavelength paths if the arriving requests cannot be set-up over the existing IP-level topology effectively.
    对于动态变化的业务到达请求,如果在已有的基于IP级的逻辑拓扑上不能有效建立,则需要为该请求按算法分配资源,即解决路由选择和波长分配问题。
  18. Compact-open topology in multifunction spaces
    集值映射空间的紧致开拓扑
  19. Some properties of Z-Scott open set, Z-Lawson open set, Z-Scott topology and Z-Lawson topology are studied.
    研究了Z-连续偏序集上的Z-Scott开集,Z-Lawson开集,Z-Scott拓扑及Z-Lawson拓扑的一些性质。
  20. As a new kind of wireless mobile network, mobile ad hoc network is characterized by open medium, dynamic topology, distributed cooperation and constrained capability, hence ad hoc network is particularly vulnerable.
    移动adhoc网络具有开放媒质,动态拓扑,分布式合作,受限的网络能力等特点,所以特别容易受到攻击。
  21. This paper demonstrates what boundary axioms are and the condition under which boundary axioms equal the axioms of open sets. It's consequently proved that topology space can be built up in light of boundary axioms.
    首先给出边界公理的定义,然后证明边界公理与开集公理的条件等价.从而证明可以从边界公理出发建立拓扑空间的概念。
  22. Ethernet technology was applied in network remote monitoring system of open NC system. The overall structural design of network monitoring platform was completed based on client/ server, and a star topology network connectivity graph was build, using TCP/ IP protocol as a communications protocol.
    将以太网技术应用于开放式数控系统的网络远程监控系统中,完成了基于服务器/客户机的网络监控平台的整体结构设计,构建了星型网络连接的拓扑结构图,采用TCP/IP协议作为通讯协议。
  23. Self-organized network is also called Ad Hoc network. Its characteristics such as open medium, dynamic topology and distributed cooperation not only make it easy to organize a network, but also bring a lot of security problems to it.
    自组织网络又称作adhoc网络,其介质开放、动态拓扑、分布式协作等特征使得网络的组织更方便,也使得其面临着众多的安全问题。
  24. In each loop only one switch is allowed to open, and all opened switches in the ring constituted a network topology.
    每个环中只有一个开关是打开的,所有小环中打开的开关构成了一个网络拓扑。
  25. While, mobile ad hoc networks are more vulnerable to various attacks and more frangible in security, because it has features such as open media, dynamic topology, distributed collaboration, capacity-constrained and so on.
    然而,移动自组织网络的开放媒介、动态拓扑、分布式协作和能力有限等特性,使得它更容易遭受各种攻击,在安全性上比较脆弱。
  26. However, Ad Hoc network is particularly vulnerable due to its fundamental characteristics, such as open medium, dynamic topology, distributed cooperation, and constrained capability.
    但是,由于其开放媒质、动态拓扑、分布式协作和受限能力等特点,adhoc网络极易受到攻击。