期刊问答网 论文发表 期刊发表 期刊问答
  • 回答数

    4

  • 浏览数

    302

zhangqipei
首页 > 期刊问答网 > 期刊问答 > 计算机论文摘要英语翻译怎么说

4个回答 默认排序1
  • 默认排序
  • 按时间排序

Youngerone

已采纳
用google可以翻译的比较完美的了

计算机论文摘要英语翻译怎么说

352 评论(15)

baozhongm00

AbstractDiscussed the establishment of the computer network from the account is now experiencing rapid development of the four stages, It also showed the advantages and disadvantages of each period, the computer network of interpretation of some terms, such as : Computer networks are used communication lines and communications equipment, will be scattered in different locations and have a number of independent functional computer systems connectivity, In accordance with international standards for data network protocol communications, the network hardware, software, database resource sharing computer Principle computer network through different network operating systems and network protocol support has been functioning, as well as computer network system components, and how computer networks with the gradual deepening, Cyber Crime is becoming a common form of crime, the paper from the world of cyber-crime status, causes and the solutions to areas such as countermeasures discussed with a view to arouse social concern and hope that the legislative and judicial areas to further improve our existing network management system, thus the network to achieve effective crime prevention and On the future development made their viewsKeyword Network;Three stages;Hacker;Information superhighway
323 评论(10)

幻賯熊

翻译成英文:Discuss with variable span and the constraints of X pattern matching problem, which extends therange of variable span effect of wildcards, X condition defines a matching number of textcharacters, forming a large and sparse candidate solution Description through the form, the input text, patterns and variable span is transformed into a directed acyclic graph structure, and prove that the graph structure in the path from the top layer to the bottom layer which is a collection of candidate solution space, the path subset independent of each other as the matching solution Then we give a graph structure of the path search Algorithm alternately pruning and search, use the preorder traversal delete redundant nodes, and according to the node's locationinformation and share information to choose the The experimental part adopts the matchingloss rate metrics of the completeness of the solution set of the solution, the results show that the algorithm with the heuristic algorithm can be complementary, effectively reduce the matching solution loss
254 评论(9)

武侠不留名

On my position,the network security is facing many problems,not only on technical but also on people's Almost all people on the world think that the enviroment of the internet is worse and For the application of the new technology and the being worse network security, this paper will take the important factors of the network security as the key point to analyze the methods to against all kinds of factors which will affect the normal running of the network ,and let people know more about the net work security on every we should solve the problem when they are still in the blossom, so that we can ensure the running and management of the network securitykey words: Internet, information security, rights of the internet, crime by computer
189 评论(9)

相关问答