報文計數 的英文怎麼說

中文拼音 [bàowénshǔ]
報文計數 英文
message count
  • : Ⅰ動詞1 (告知; 報告) report; declare; announce 2 (回答) reply; respond; reciprocate 3 (答謝)...
  • : Ⅰ名詞1 (字) character; script; writing 2 (文字) language 3 (文章) literary composition; wri...
  • : Ⅰ動詞1 (計算) count; compute; calculate; number 2 (設想; 打算) plan; plot Ⅱ名詞1 (測量或計算...
  • : 數副詞(屢次) frequently; repeatedly
  • 計數 : count; tally; counting計數卡 numbered card
  1. Part five introduces the subjects and the procedure used in the author ' s this experiment, the methods used are also described carefully, which falls into twelve ways : to improve the students " background knowledge by means of singing english songs, by holding english parties, by vocabulary teaching, by english learning field, by school english broadcasting by reading background knowledge materials, by english competition on background knowledge, by establishing english corners, by giving warm - up of each class, by main grammar explaining in verse, by listening to english programs on tv and radio, and by telling english jokes, riddles doggerels and jingles

    第五部分論述了本實驗中的被試、實驗步驟以及實驗方法等情況。方法共分為十二種:通過英歌曲、英語晚會、詞匯學習、英語學習園地、校園英語廣播、閱讀背景知識材料、就背景知識進行的英語競賽、英語角、每節課剛開始時的熱身練習、運用英語知識歌訣解釋重點語法、通過電視和廣播收看或者收聽英語節目和通過英語笑話,順口溜和腦筋急轉彎等等。第六部分用統軟體spss告了據統分析的結果及相關討論… … 。
  2. Edi. message. bayplan stowage plan total numbers message baplte

    電子據交換..裝載劃總
  3. Thispaperhasstudiedonthedatalinkinterfacetechniqueoftacticalcontrolsystem. firstof all, functional requirement and the important role of data link interface in tactical controlsystem is introduced ; secondly, with object oriented method, the characteristic of uav taskcontrol process is analysed, and then uav task control information model is established, anddata link interface standard of tactical control system is designed based on this model, including message format and transmission mechanism ; thirdly, data link control module isdesigned based on embedded linux operating system and has realized conversion betweendata link standard interface and the private interface of uav data link ; and then, combinationreal time corba middleware and its event channel, data link control modular componenttechnology is studied, and realization scheme is put forward ; finally, demostration is madebased on prototype of tactical controlsystem, which verify the validaty of data link interfacestandardandembeddeddatalinkcontrolmodules

    對戰術控制系統中的據鏈介面技術進行研究:分析了據鏈介面在戰術控制系統中的功能需求;採用面向對象的方法,分析無人機任務控制問題,建立了無人機任務控制信息模型,並基於該模型設據鏈介面通信協議,包括格式和傳輸機制;基於嵌入式linux系統設據鏈介面控制模塊,實現了據鏈標準介面與無人機據鏈私有介面之間的相互轉換;結合實時corba中間件及其事件通道,研究了據鏈介面控制模塊組件技術,並給出了實現方案;通過戰術控制原理實驗系統的演示實驗,驗證了據鏈介面通信協議和嵌入式據鏈介面控制模塊的有效性。
  4. Covers technology, software, hardware and games news with analysis and commentary

    - engadget的中站點,算機硬體,碼消費電子產品,科技新聞
  5. Edi. message. bayplan stowage plan occupied and empty locations baplie

    電子據交換..裝載劃和空載
  6. Edifact message design rules for edi

    用於行政商業和運輸業電子據交換的規則
  7. Tv and radio stations broadcast news about her activities and teachings. through god s boundless glory, landmarks of enlightenment were erected in cities and countries around the globe, lighting the way for countless lost sheep, leading them to master and back to the kingdom of infinite light. those of us who were privileged to accompany her on the tour to assist with the multitude of tasks required to deliver lectures to thousands of people in city after city, country after country, with no respite between crowded lecture venues, could only look upon master with amazement

    1993弘法那百日期間,發送出無以的免費樣書傳單及海,無遠弗屆的紙廣播電視,載印師父的法相與教理,載播放送師父的法音,以十種不同的語,密集地從一個城市到一個城市,從一個國家到一個國家,帶著上帝無限的榮光,在地球的每一個角落,高高樹立起開悟的標志,照亮行路,引導之不盡的迷途羔羊,走向師父返回光亮的國度。
  8. At the present time the prediction method of attracting pest with black light and recognizing and counting by man is generally adopted. there are some serious shortages such as bad recognition accuracy and low efficiency. it reduces seriously accuracy and timeliness of prediction and is disadvantage in guiding insect disease prevention

    目前普遍採用的黑光燈誘集害蟲、人工識別的測方法,存在識別準確性差、效率低等嚴重缺陷,極大地降低了測的準確度和時效性,不利於指導農田害蟲的防治工作,因此本提出了基於機器視覺和小波分析的圖像識別技術,用於農田害蟲的自動檢測預
  9. In this paper, the author provide some theory research results, as following : protocol testing contents ; protocol testing methods ; the application of " formal technology " in networking testing and so on. besides these, author research and develop the testing tool of " activetester ", which not only includes all functions of traditional testing tools, but also have the function of sending packages. it can send all types packages, for instance, mac packet, ip packet, icmp packet, igmp packet, arp packet and so on

    為了科學地進行主動性測試,作者對協議測試理論進行了必要的補充,提出了自己的觀點,如協議測試研究的內容、協議測試的方法、形式化技術在協議測試中的應用等;同時為了便於測試人員掌握、使用主動性測試技術,作者研發了發送、偵聽、分析工具? activetester ,它除了具備傳統網路工具(如, sniffer )所具有的偵聽、流量統分析功能外,增加了發送功能,可以發送mac據幀、 ip、 icmp、 igmp、 arp等,在此基礎上還可測量網路整體的吞吐量,響應時間,故障定位,協議一致性測試等。
  10. With the characteristics of the underwater acoustic channel, media access control protocols at data link layer adopt the maca protocol which uses rts - cts exchange to solve the hidden and exposed situation and automatically control power

    據鏈路層的設中針對水下聲通道的特點,對于介質訪問控制協議採用了maca協議,它使用rts - cts控制握手機制來解決uan中的隱蔽終端、暴露終端以及功率控制問題。
  11. Abstract : according to the theory of statistic metrology, this paper analyzes the quantity, contents and authors of journal of microwaves from 1989 to 1998

    摘:本依據量學的原理[ 1 3 ] ,對《微波學》 1989 1998年論量、內容、作者等進行了比較全面的統分析,從而給《微波學》統的幾個方面一個量的概念。
  12. Based on a qualitative analysis of the articles on competitive intelligence in china academic journal full - text database ( web ), this article summarizes the actuality and characteristics of competitive intelligence studies and points out the problems in the development through chronological distribution, resources distribution, authors and subject analysed

    採用量分析方法,從章年代分佈、章來源、著者、主題等角度對《中國期刊全據庫》中競爭情章進行統,總結十年來我國競爭情研究的現狀、特點並發現存在的問題。
  13. The reliability of data display is acquired through the mechanism of counting datagram and retransmission

    可靠的據顯示是通過帶重傳機制和本地據的真確性獲得來保證。
  14. By applying the common used message digest algorithms, we can compute the test paper content with tester code to generate a fixed length contract which is sensitive to any change in the test paper

    摘要通過採用網路安全技術中經常使用的「摘要」演算法,將考生的試卷內容和考生的考號進行摘要算,然後生成一個固定長度的摘要,而考生試卷中的任何一個位元組變化都會影響到該摘要,從而保證考卷的據完整性。
  15. This paper first introduced the electronic war ' s basic concept, development process and its developing trend, and then gives out the theory, key technology, application and developing trend of communication scout, direction - finding communication and communication jam in great detail. after that the cjw - 2000 system was referred to, and its system function and information flowing was analyzed. then the paper analyzed and introduced the theory, function, system structure, technical guide line and working flowing of the electronic jam rivalry scouting and analysis sub - system in detail. at last it gave the analysis of the interface standard of the electronic rivalry scouting, its interface message format and the data - base design of different equipments

    首先簡單介紹了電子戰的基本概念、電子戰的發展過程及發展趨勢,接著比較詳細地分析了通信偵察、通信測向、通信干擾等的原理、關鍵技術、應用及發展趨勢,然後對cjw - 2000系統進行了簡單介紹,並且對其系統功能及信息流程進行的簡單分析,之後又對cjw - 2000系統中的電子對抗偵察與分析分系統的原理、功能、系統結構、技術指標和工作流程等進行了比較詳細的分析與介紹,最後詳細分析了電子對抗偵察與分析系統的介面標準,並對電子對抗偵察與分析系統內部不同設備之間的介面格式以及據庫的設進行了詳細的分析。
  16. Through standard message format protocols, several hundred different computers and electronic mail interfaces are able to exchange information with one another

    通過標準的格式協議,百個不同算機和電子郵件介面互相之間能交換信息。
  17. In order to guarantee the storage of message steadily and permanently, we use jms to offer the storage of message queue. we also design a component named router to transform message. it is a good scheme to solve the problem in data sharing and exchanging

    在這個原型系統上實現了https協議下的傳輸和安全通信,利用jms提供消息隊列存儲服務保證了的持久穩定的保存,通過設的消息路由器轉發消息較好地解決框架中的據共享和互操作。
  18. The author first completed interface design between rcm2200 and gps25lp - oem, and connected rcm2200 with local area network. then a communication controller was developed on rcm2200 microprocessor module using dynamic c language to program, which could realize receiving gps data and transmitting these data to local area network in the form of udp message. in local computers, the author used visual c + + to program and presented real - time data that was useful for location to users

    作者完成了rcm2200與本地局域網的連接以及與gps25lp ? oem之間的介面設,採用dynamicc語言編程,在rcm2200嵌入式微控制器模塊上開發了一個通信控制器,根據gps25lp ? oem的輸出據類型和格式,提取了gps定位據並以udp的形式轉發給本地局域網,在本地局域網的算機上,採用visualc + +進行編程處理,使用戶實時觀察到定位所需的有用據信息。
  19. This thesis describes in detail the whole process of sensors detect anomaly events in networks, collect audit data, report to superior analyzer, execute response instruction ; and the process of analyzers mine audit data, synthesize information from sensors, cooperate with other analyzers, and make distributed response to attacks

    詳細說明了感應器檢測網路異常據,收集安全審據,並向所屬的分析器匯,以及執行響應指令的過程;說明了分析器對安全審據進行分析挖掘,對感應器上的信息進行聚合分析,多個分析器進行協作檢查異常事件,對入侵行為進行分散式響應的過程。
  20. We implement the traffic generator by these studies. the thesis focuses on how to generate abundance flow, how to send flow fastly, how to measure network, how to synchronize flow sender and flow receiver. we use some solution to resolve the problems, including that using linear congruential and modifying select - giveup algorithm to generate random number, implement class that has good application interface to user, making random number as packet ’ s inter - departure - time and packet size, which can provide flow base on special distribution, designing and implementing a method to active measure by our traffic generator, designing a accurately time counter and precision delay function, synchronizing flow sender and receiver by tgm message

    通過對現有技術的研究和改進,我們形成的解決方案如下:通過利用改進的線性同余演算法,以及對舍選法進行研究和改進,實現了一個具有良好應用介面的隨機變量生成器,利用其產生的隨機作為發包的間隔或包的尺寸,以產生服從特定模式的流;利用傳輸的據包設並實現了網路的主動測量,為網路測量和流的發送設了高精度的時器,精確延時函;利用自定義的tgm協調發送端和接收端的操作。
分享友人