數據入棧 的英文怎麼說

中文拼音 [shǔzhàn]
數據入棧 英文
push data
  • : 數副詞(屢次) frequently; repeatedly
  • : 據Ⅰ動詞1 (占據) occupy; seize 2 (憑借; 依靠) rely on; depend on Ⅱ介詞(按照; 依據) according...
  • : Ⅰ動詞1 (進來或進去) enter 2 (參加) join; be admitted into; become a member of 3 (合乎) conf...
  • : 名詞1 (養牲畜的柵欄) shed; pen 2 (棧道) a plank road built on sides of cliffs for army3 (棧...
  • 數據 : data; record; information
  1. The content of this article is the research on the protocols for wireless communications on the media access control ( mac ) layer, which is a sublayer of the link layer, one of the five layers ( the physics layer, the link layer, the network layer, the transmission layer and the application layer ) which construct the stack of protocols for wireless communications. the emphasis of the research is on the applicability and superiority of two protocols on the mac layer

    本文的研究內容是mac ( mediaaccesscontrol )層? ?無線傳輸的五層協議結構(物理層、鏈路層、網路層、傳輸層、應用層)中鏈路層的媒體接控制子層? ?無線通信協議,重點研究兩種協議在傳感器網路應用中的適用性和優越性。
  2. Refers to push - down stack procedures and is the acronym for last in / first out, a buffer procedure

    一種把的過程,即緩沖的過程。 lastin firstout的縮寫。
  3. Vdl mode 4 is consulted the data link layer of osi reference model, and it provides upper layers with reliable point - to - point connection. because of the particularity of the civil aviation ' s applications, vdl - 4 protocol will support some special application program directly, such as automatic dependent surveillance - broadcast ( ads - b )

    在對協議進行研究的基礎上,本文實現了與廣播式自動相關監視( ads - b )應用相關的vdl - 4協議的vss子層和lme子層,其中主要包括預約機制、網路接和同步幀的廣播等。
  4. After analysing the codes of tcp / ip protocol stack under rtlinux, a new protocol is added into the stack, in which the network nodes are divided into two parts : a master node and a number of controlled nodes. each controlled node can transmit its data by ethernet only when the master send it a request in a fixed timeslot of a communication cycle

    本文在對rtlinux平臺的tcp / ip協議的原碼進行研究分析后,在其原有的協議中加了一種新的協議rcp ( real - timecontrolprotocol ) , rcp協議採用主/從模式,在固定的傳輸周期中使用分時槽的方式對傳輸進行限制。
  5. Because of lacking the hardware testing tools, a kind of low - cost testing scheme has been designed, and compared with other schemes. after adding usb host protocol stack to stite / os20 embedded operating system, and based on a large number of data verification and analysis, the conclusion was drawn that the usb host can communicate with usb devices correctly according to the protocol

    在缺乏硬體測試工具的情況下,本人設計了一種低成本的測試方案,並對這種方案進行分析比較,在大量驗證分析的基礎上得出結論:在stlite / os20嵌式操作系統中加本課題設計的usb主機協議后, usb主機能夠正確按照協議與usb設備進行通信。
  6. 2. as the difficulty of design, the core of system, firstly, tcp / ip reference model and configuration are analyzed. secondly, necessary of demultiplexing and encapsulation of data are explained

    2 .作為設計的難點,首先重點論述了系統的核心? ?以太網的tcp / ip通信協議,其次對分層的必要性和協議的封裝及分用進行了介紹。
  7. Fortunately, ipsec provides us security services for ip layer and higher layers, such as access control, connectionless integrity, data origin authentication, rejection of replayed packets ( a form of partial sequence integrity ), confidentiality ( encryption ), limited traffic flow confidentiality, and so on. the thesis gives a type of network security architecture based on ipsec system, it includes the following contents : 1 analyzing the security problem in tcp / ip protocol stack, current main network attack methods and regular defense methods. 2 studing the overall architecture, main security protocols, application environments, and working mechanism of ipsec

    本文所提出的新一代網路安全體制就是建立在ipsec體系基礎上的,在本文的撰寫過程中,我主要進行了如下一些工作: 1深分析了由tcp ip協議本身帶來的安全問題、當前主要的網路攻擊方法以及常採用的防範對策; 2研究了ipsec標準的總體結構、主要安全協議、應用場合以及其工作機制; 3研究了當前常用的各種加解密機制以及密碼演算法,深分析了它們各自的特性和具體的使用方式; 4閱讀了大量關于混沌密碼的文獻資料,了解目前混沌密碼的研究動態和成果,研究混沌密碼體制的工作機理,然後利用vc + + 6 . 0作為開發平臺對一類混沌密碼體制進行了實現,並為它編寫測試代碼評估其性能。
  8. Secondly, uses uml to build a general and useful model for h. 323 stack, and divides the stack into several modules under the principle of ooa, and realizes the stack programming with oop language on the base of a cross - platform classes - pwlib. subsequently, fluctuation in video transmission is deeply analyzed and a useful solution is presented. finally, a simulation terminal software is developed on the base of h. 323 stack, then the stack is tested with unit testing and systemic testing

    本文首先對h . 323標準進行了概括性的介紹,包括它所定義的實體、協議、通信過程;用uml和面向對象的思想對h . 323協議進行建模;實現了h . 323協議的模塊化劃分,並用跨平臺的pwlib類庫實現了h . 323協議;隨后對會議電視中視頻通信網路抖動的消除方法做了深的研究,並在此基礎上給出了一種有效的解決方案;最後,基於h . 323協議,開發了h . 323模擬終端,並用單元測試、系統測試的方法對協議進行了嚴格的測試。
  9. Before a method can be called, the argument values must be pushed on the stack, in left - to - right order corresponding to the parameter declarations

    方法調用之前,必須根聲明,按照從左到右的順序把對應的實參壓
分享友人