欢迎来到淘文阁 - 分享文档赚钱的网站! | 帮助中心 好文档才是您的得力助手!
淘文阁 - 分享文档赚钱的网站
全部分类
  • 研究报告>
  • 管理文献>
  • 标准材料>
  • 技术资料>
  • 教育专区>
  • 应用文书>
  • 生活休闲>
  • 考试试题>
  • pptx模板>
  • 工商注册>
  • 期刊短文>
  • 图片设计>
  • ImageVerifierCode 换一换

    西安邮电大学软件工程专业英语复习资料解析(共10页).doc

    • 资源ID:6108390       资源大小:54.50KB        全文页数:10页
    • 资源格式: DOC        下载积分:20金币
    快捷下载 游客一键下载
    会员登录下载
    微信登录下载
    三方登录下载: 微信开放平台登录   QQ登录  
    二维码
    微信扫一扫登录
    下载资源需要20金币
    邮箱/手机:
    温馨提示:
    快捷下载时,用户名和密码都是您填写的邮箱或者手机号,方便查询和重复下载(系统自动生成)。
    如填写123,账号就是123,密码也是123。
    支付方式: 支付宝    微信支付   
    验证码:   换一换

     
    账号:
    密码:
    验证码:   换一换
      忘记密码?
        
    友情提示
    2、PDF文件下载后,可能会被浏览器默认打开,此种情况可以点击浏览器菜单,保存网页到桌面,就可以正常下载了。
    3、本站不支持迅雷下载,请使用电脑自带的IE浏览器,或者360浏览器、谷歌浏览器下载即可。
    4、本站资源下载后的文档和图纸-无水印,预览文档经过压缩,下载后原文更清晰。
    5、试题试卷类文档,如果标题没有明确说明有答案则都视为没有答案,请知晓。

    西安邮电大学软件工程专业英语复习资料解析(共10页).doc

    精选优质文档-倾情为你奉上1. We see Cloud Computing as a computing model, not a technology. In this model “customers” plug into the “cloud” to access IT resources which are priced and provided “on-demand”. Essentially, IT resources are rented and shared among multiple tenants much as office space, apartments, or storage spaces are used by tenants. Delivered over an Internet connection, the “cloud” replaces the company data center or server providing the same service. Thus, Cloud Computing is simply IT services sold and delivered over the Internet. Refer to section of Types of Cloud Computing. 我们看到,云计算作为一种计算模式,而不是技术。在这个模型中的“客户”加入到“云”,访问标价并提供“需要”的IT资源。从本质上讲,IT资源在多个租户之间被租用和共享,例如办公空间,公寓,或被租户使用的存储空间。 “云”交付了一个互联网连接,取代该公司的数据中心或服务器提供相同的服务。因此,云计算是在简单地在互联网上出售并传递的IT服务。参考部分云计算的类型。2. Delivers virtualized servers on which customers can run existing applications or develop new ones without having to worry about maintaining the operating systems, server hardware, load balancing or computing capacity. These vendors provide APIs or development platforms to create and run applications in the cloud e.g. using the Internet. Managed Service providers with application services provided to IT departments to monitor systems and downstream applications such as virus scanning for e-mail are frequently included in this category.提供虚拟化服务,客户可以运行现有应用程序或者开发新的应用程序,无需担心维护操作系统,服务器硬件,负载均衡或计算能力。这些供应商提供API或开发平台来创建和运行在云中的应用程序 - 例如使用互联网。带有应用服务的管理服务提供商将监视系统和下游的应用提供给IT部门,如频繁包括在此范畴中的电子邮件病毒扫描.3.It is important that the information contained within a data warehouse is stable. While data can be added, it should never be deleted. This property is referred to as being non-volatile. When a company uses a data warehouse that is stable, this will allow them to get a better understanding of the operations within their company. Despite the fact that these terms were first coined in the 1990s, they are still highly accurate today. However, it should be noted that some data warehouses are volatile. The reason for this is because many modern data warehouses deal with terabytes of data. Because they must store terabytes of data, many companies are forced to delete some of their information after a certain period of time. For instance, some companies will systematically delete data that has reached three years of age. Before a data warehouse can be built, the correct data must be located. Generally, the information that will be added to the warehouse will come from daily information or historical information. The historical information may be stored in a legacy system, and is challenging to extract. 重要的是,包含在一个数据仓库中的信息是稳定的。虽然数据可以被添加,但它永远不能被删除。此属性称为是非易失性的。当一个公司使用了一个稳定的数据仓库时,这将使他们对他们公司内部的操作有一个更好的理解。尽管事实是这些条款第一次被创造是在上世纪90年代,但是在今天它们仍然是高度精确的。然而,应该指出的是,一些数据仓库是不稳定的。原因是因为许多现代数据仓库处理TB级的数据。因为它们必须存储数TB的数据,很多公司都被迫在一段时间后删除一些自己的信息。例如,一些公司将系统地删除已达到三年的数据。在一个数据仓库被创建之前,正确的数据必须位于。通常,将要加入到仓库中的信息都来自日常信息或历史信息。历史信息可能被存储在一个传统的系统中,这是对提取的挑战。4.Being subject oriented means that the data will provide information about a specific subject rather than the information about the functions of a company. Because a data warehouse is subject oriented, it will allow you to analyze information that is connected to a specific subject. Being integrated means that the data that is collected within the data warehouse can come from different sources, but can be combined into one unit that is relevant and logical. Having a time-variant means that all the information within the data warehouse can be found with a given period of time. 作为面向主题意味着数据将提供有关特定主题的信息,而不是关于一个公司的功能信息。由于数据仓库是面向主题的,它可以让你分析连接到一个特定主题的信息。即整合意味着在数据仓库中收集到的数据可以来自不同的来源,但也可以合并成一个相关的和合乎逻辑的单元。随时间变化意味着在数据仓库内的所有信息可以根据被给的时间期间被发现。5、The copyright system grew up with printing-a technology for mass production copying. Copyright fit in well with this technology because it restricted only the mass producers of copies. It did not take freedom away from readers of books. An ordinary reader, who did not own a printing press, could copy books only with pen and ink, and few readers were sued for that. 版权系统随着印刷增长一种大量复制产品的技术。版权很好地适应了这种技术,因为它只限制大量复制品。它没有剥夺读者阅读书本的自由。一个没有打印机的普通读者只能利用钢笔和墨水复制书本,几乎没有读者被要求这么做。6、Digital technology is more flexible than the printing press: when information has digital form, you can easily copy it to share it with others. This very flexibility makes a bad fit with a system like copyright. That's the reason for the increasingly nasty and draconian measures now used to enforce software copyright. Consider these four practices of the Software Publishers Association (SPA): 数字技术是比印刷机更灵活:当信息具有数字形式,你可以很容易地复制它去和他人分享。这种特有的灵活性十分不适合像版权这样的系统。这就是越来越多的肮脏的和严苛的措施被用来实施软件著作权的原因。考虑软件出版商协会(SPA)的这四个做法:7、All four practices resemble those used in the former Soviet Union, where every copying machine had a guard to prevent forbidden copying, and where individuals had to copy information secretly and pass it from hand to hand as “samizdat”. There is of course a difference: the motive for information control in the Soviet Union was political; in the US the motive is profit. But it is the actions that affect us, not the motive. Any attempt to block the sharing of information, no matter why, leads to the same methods and the same harshness. 这四种做法都类似于前苏联使用过的方法,在那里每一个复印机有一个警卫来防止复制,使得人们不得不偷偷地复制信息,像“地下出版物''一样人手相传。这当然是有区别的:苏联控制信息的动机是政治,美国的动机是利润。但影响我们的是这种行为,而不是动机。任何阻止信息共享的尝试,无论什么原因,都导致了相同的方法和相同的冲突。8.Currently, there are a number of ways that data is transferred from device to device. CDMA (code division multiple access) is one popular technology, and TDMA (time division multiple access) is a second. CDMA transfers a number of different data packets on one channel, using codes to distinguish between different receivers. TDMA, on the other hand, again uses one channel but allots each different data packet a time slot.目前,数据从一个设备传送到另一个设备的方法与很多。 CDMA(码分多址)是一种流行的技术,TDMA(时分多址)次之。 CDMA在一个通道上传输多个不同的数据包,在不同的接收方使用编码进行区分。 TDMA,另一方面,也使用一个通道,但分送给每个不同的数据包一个时间槽。9.OFDM differs from these technologies significantly; the channel itself is divided into narrow bands, and data packets are sent through each band individually. This method proves to be much more efficient than the previously used technologies, hence it is considered to be an integral part of the 4G revolution.OFDM明显不同于这些技术;通道本身被分为窄频带,并且数据包通过每个频带分别发送。这种方法被证明比以前使用的技术更有效,因此它被认为是4G革命的一个完整的部分。 10、Developed by the 3GPP (Third Generation Partnership Project) group, is a new wireless broadband technology that differs from WiMAX. LTE places great emphasis on IP addresses, since it is closely based upon the TCP/IP networking skeleton. The idea is to create enough IP addresses so that each device has a unique one.由3GPP(第三代合作伙伴计划)小组开发,LTE是一种不同于WiMAX的新无线宽带技术。 LTE在IP地址方面被重点强调,因为它密切基于TCP / IP网络构架。我们的想法是创造足够多的IP地址,使每个设备都有唯一的一个IP地址。11、Were using the internet in ways its creators couldnt possibly have imagined, from the rise of video to the sheer number of connected devices1. Were constantly pushing the internets capacity, stability and security, and inevitably cracks are beginning to show.我们正在以因特网发明者也未必能想到的方式,从大量的视频服务到广泛的设备互联,都使用因特网。我们不断推动互联网的容量,稳定性和安全性,同时裂缝也不可避免地开始出现。12、With the existing internet, security is something thats largely been bolted on as an afterthought but the FIA program expects security to be a key consideration from the outset2. Thats leading to some interesting ideas, including one security system that takes its cues from Facebook. Davis Social Links (DSL) adds a “social control layer” to the network that identifies you not by your IP address but by your social connections. If it works and DSL is in the very, very early stages of development it could make a major dent in problems such as spam and denial of service attack。对目前的因特网,安全在很大程度上被固化为事后考虑的事情;但是FIA程序希望从一开始,安全就被作为关键因素来考虑。这导致了一些有趣的想法,包括一个灵感来自于Facebook的安全系统。戴维斯社交链接(DSL)给网络增加了一个可以识别你的“社会控制层”,这不是通过你的IP地址而是通过你的社会关系网络做的。如果它起作用了 - 并且DSL还处在发展的非常非常早期的阶段 - 它可以使诸如垃圾邮件和拒绝服务攻击这类问题大大减少。 13、 Some time after a web page has been crawled by the search bot or crawler, the search engine then processes or indexes the page to determine what search words and phrases the page is relevant to as well as how relevant that page is compared with other web pages for those phrases. During this processing the search engine looks at many different factors including how many times each word and phrase occurs on the page, which words are in headings or bold, the domain name of the site, filename of the page, the pages that link to the page, and many more.在网页已经被搜索马蝇或爬虫抓取后的一段时间,搜索引擎开始处理或索引网页以确定网页和或短语相关,以及对于这些短语,该网页和其他网页相比有多相关。在此处理过程中的搜索引擎着眼于许多不同的因素,包括每个单词和短语在页面出现了多少次,那些单词在开头或加粗,网站的域名,网页的文件名,连接到网页的网页,等等。14、 Exactly which factors a search engine looks at and how theyre weighted is called the search engines search ranking algorithm. Its like the search engines “secret sauce.” Each search engines algorithm is different and each is a heavily guarded secret.究竟搜索引擎看重哪些因素以及他们如何加权被称为搜索引擎的搜索排序算法。这就像搜索引擎的“秘密武器”。每个搜索引擎的算法是不同的,并且每个都是一个戒备森严的秘密。15、Because each search algorithm is a heavily guarded secret nobody outside of a few select engineers at each search engine knows exactly how much each particular factor weighs into the rankings of each search engine. But, people who spend their professional lives helping sites rank better in search engines have gained very good idea as to what factors matter most.因为每个搜索算法是一个戒备森严的秘密,除了在每个搜索引擎的一些特定的工程师外,没有人准确知道到底有多少个特定因素加权到了每个搜索引擎的队列中。但是,那些花费自己的职业生涯去帮助网站在搜索引擎中拥有更好的排名的人已经获得了关于什么因素是最重要的非常好的主意。16、You will never have to go hunting for a pen or piece of paper again, and never worry about searching for that missing napkin with the new system design scrawled on it.In a manner similar to the development of multimedia PCs, all consumer electronics - Music CD players, fax machines, pagers, audio journals - will be integrated into the wearable design. One device will be able to handle all forms of electronic media, whether it be audio, visual, or wireless digital communication.A seldom realized aspect of wearable computing is augmented reality: the seamless integration of real and virtual worlds. Electronically stored information is extremely useful when overlayed over a view of the outside world. For example: captions displayed with museum exhibits, names over faces (via face recognition), wiring schematics associated with the current project.你将永远不会再去追逐一根笔或一张纸,也不必担心寻找那个潦草地写上了新的系统设计的丢失了的餐巾纸。在类似于多媒体个人电脑发展的方式中,所有的消费电子产品 - 音乐CD播放机,传真机,寻呼机,音频期刊 - 都将被整合进可穿戴式设计中。一台设备将能够处理所有形式的电子媒体,无论它是音频,视频,或无线数字通信。可穿戴计算的一个很少被意识到的方面是增强真实感:现实世界和虚拟世界的无缝结合。覆盖了外部世界的看法的电子存储信息是非常有用的。例如:博物馆展品的字幕显示,在脸上命名(通过面部识别),与当前项目相关的接线原理图。17、The Private Eye,manufactured by Reflection Technology,is a LED based display that can produce a monochrome image at 720-780 resolution。It uses a vibrating mirror to create this image。私家侦探,通过反射技术制造,是一个基于LED显示的,可以生产720-780分辨率的黑白图像。它使用振镜来创建此图像。18、 At Cyrano Sciences, Inc. we are commercializing an electronic nose technology invented at the California Institute of Technology. This technology involves an array of sensors composed of polymers that are filled with conductive particles. When these sensors come in contact with a vapor, the polymer expands changing the resistance of the composite. This change in resistance is transmitted to a computer and the pattern derived from the sensor array is used to determine the type, quantity or quality of the odor that was sensed. This type of information is useful in a wide range of industries including the chemical, automotive, medical, petroleum, food, and fragrances.在西哈诺科学,inc .我们正在商业化一个在加利福尼亚研究所发明的电子鼻子技术。该技术包含了许多由充满了导电粒子的聚合物组成的传感器。当这些传感器接触到蒸汽时,聚合物将扩大并改变复合物的电阻。这种电阻的变化会传送到电脑并且这种来自于传感器阵列的模式是用于确定感觉到的气味的类型、数量或质量。这种信息的类型在包括化工、汽车、医药、石油、食品和香水的广泛行业都十分有用。 19、Deodorants, soaps, perfumes and wines are all consumer products developed with the help of human sensory panels. Replacing or augmenting the human approach with an objective electronic nose is currently under investigation. This tool would not only be useful in the development of new products but also for quality control in the manufacturing environment. Many manufacturing floors are equipped with automated visual inspection. 除臭剂、肥皂、香水和葡萄酒都是在人类感官面板帮助下发展的消费产品。替换或增加人类客观电子鼻子的方法目前处于调查中。这个工具不仅在新产品的开发中很有用,同时在生产环境的质量控制中也非常有用。许多制造的地板都配有自动视觉检测。20、The problem, in my opinion, is that our current computers are both deaf and blind: they experience the world only by way of a keyboard and a mouse. Even multimedia machines, those that handle audiovisual signals as well as text, simply transport strings of data. They do not understand the meaning behind the characters, sounds and pictures they convey. I believe computers must be able to see and hear what we do before they can prove truly helpful. What is more, they must be able to recognize who we are and, as much as another person or even a dog would, make sense of what we are thinking.这个问题,在我看来,我们当前的电脑都是又聋又盲:他们仅仅通过键盘和鼠标来体验世界。即使是多媒体机器,同那些处理音像信号和文本一样,只是运输数据的字符串。他们不了解他们传达的字符,声音和图片的意义。我相信计算机一定能在被证明真正有用之前看到和听到我们做的。更重要的是,他们必须能够认识到我们是谁,尽可能多的另一个人甚至一只狗,理解我们的想法。21、Our end product takes advantage of the fact that Pfinder follows the users position at all times. Borrowing this information, the speech-recognition system electronically “steers” an array of fixed microphones so that they reinforce only those sounds coming from the direction of the users mouth. It is an easy job. Because sound travels at a fixed speed, it arrives at different locations at slightly different times. So each sound location yields a different pattern of time delays. Thus, if the system takes the outputs from a fixed array of microphones and adds them to time delays that characterize a certain location, it can reinforce the sound from that location. Then it need only compare the sound with those of known words until a match is found.我们的最终产品利用了Pfinder 无时无刻跟随用户位置的事实。采用这种信息,语音识别系统电子“引导”一组固定的麦克风,以便他们加强来自于用户口部方向的声音。这是一个容易的工作。因为声音以一个固定的速度传播,它在稍微不同的时间到达不同的位置。所以每一个声音的位置产生了一个不同的时间延迟模式。因此,如果系统采取一个麦克风的固定阵列的输出,并将其添加到描述一个特定位置的时间延迟,它可以从该位置加强声音。然后它只需要比较声音与已知的单词,直到找到匹配。22、<1>、human-computer interfaces (HCIs), the links between computers and their users;<2>、augmented perception, tools that increase normal perception capabilities of humans;<3>、automatic media interpretation, which provides an understanding of the content of modern digital media, such as videos and movies, without the need for human intervention or annotation;<4>、video surveillance and biometrics.1、人机接口(HCIS),计算机及其用户之间的联系;2、增强感知,这些工具可以提高人类的正常认知能力;3、自动媒体解读,它提供了先进的数字媒体,如视频和电影的内容的理解,而不需要人工干预或注解;4、视频监控和生物识别技术。23、The first step consists of detecting all the moving objects in the scene by subtracting an estimated “background image”one that represents only the static objects in the scenefrom the current frame (Figures 3a and 3b, left). The next step is to distinguish people from moving vehicles on the basis of a form factor, such as the height:width ratio, and to locate their heads as the top region in their silhouette. In this way, the heads speed at each frame is auto

    注意事项

    本文(西安邮电大学软件工程专业英语复习资料解析(共10页).doc)为本站会员(飞****2)主动上传,淘文阁 - 分享文档赚钱的网站仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请立即通知淘文阁 - 分享文档赚钱的网站(点击联系客服),我们立即给予删除!

    温馨提示:如果因为网速或其他原因下载失败请重新下载,重复下载不扣分。




    关于淘文阁 - 版权申诉 - 用户使用规则 - 积分规则 - 联系我们

    本站为文档C TO C交易模式,本站只提供存储空间、用户上传的文档直接被用户下载,本站只是中间服务平台,本站所有文档下载所得的收益归上传人(含作者)所有。本站仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。若文档所含内容侵犯了您的版权或隐私,请立即通知淘文阁网,我们立即给予删除!客服QQ:136780468 微信:18945177775 电话:18904686070

    工信部备案号:黑ICP备15003705号 © 2020-2023 www.taowenge.com 淘文阁 

    收起
    展开