數據包標識 的英文怎麼說

中文拼音 [shǔbāobiāozhì]
數據包標識 英文
datagram identification
  • : 數副詞(屢次) frequently; repeatedly
  • : 據Ⅰ動詞1 (占據) occupy; seize 2 (憑借; 依靠) rely on; depend on Ⅱ介詞(按照; 依據) according...
  • : Ⅰ名詞1 [書面語] (樹梢) treetop; the tip of a tree2 (枝節或表面) symptom; outside appearance; ...
  • : 識Ⅰ動詞[書面語] (記) remember; commit to memory Ⅱ名詞1. [書面語] (記號) mark; sign 2. (姓氏) a surname
  • 數據 : data; record; information
  • 標識 : [物理學] characteristic; identification; identifying標識碼 identification code; 標識位置 home position
  1. The article points out the importance and necessity of the information - security from its actuality in our country. the resources in the information system, for instance, hardware, software, data, document, operator, meterial and so on, are evaluated and gived safety grade firstly. and then, it analyses the menace including the nonauthorized access, the information leak, the refused sevice, the internal objection which the system will take. the following are the corresponding control police : confirm the users " rights and duties, including the mode of using account, the limit of accessing resource, the application of password, the building of backup ; confirm the administrators " right and duties, including physical safety, system configuration, account configuration and usufruct, password management, audit and control, backup and individual intimity ; run - of - mill measure of security defence, including access control, symbol and identification, integrality control, password technique, firewall system, audit and resumption, safety of operating system, safety of database system, defence of computers " virus and resisting - deny protocol. in the end, the article offers the strategies of disposing the safety - accident and analyse after ithow. to report it, how to solve it in phase, and how to avoid it happening again. in a word, the article presents a holistic resolvent about keeping away the information system ' s security, and supplies a essential frame for its configuration, management and application

    然後,對系統可能受到的威脅,括非授權訪問、信息泄漏、拒絕服務和內部缺陷等進行分析,並提出了相應的控制策略:確定用戶的權力和責任,括帳戶使用方式、資源訪問權限、口令應用以及建立備份等;確定系統管理員的權力和責任,括物理安全、系統配置、帳戶設置及使用權限、口令管理、審計和監控、備份以及個人隱私等方面;一般性的安全防護措施:存取控制、和認證、完整性控制、密碼技術、防火墻系統、審計和恢復、操作系統安全、庫系統安全、計算機病毒防護和抗抵賴協議等。最後,對事故處理和事後分析提供策略,如何報告安全事故,如何協調解決安全事故,如何避免安全事故再次發生。總之,本文對信息系統安全防範工作給出一個整體的解決方案,為其在配置、管理和應用方面提供了基本的框架。
  2. Is a textual description of the mark

    含此記的所有相關庫的日誌備份。
  3. In this system, the movement of the step - electromotor is controlled by computer, and then the dial pointer is drove by the step - electromotor. at the same time, these images of the analog instrument are took by high precision ccd video, and then these images will be processed by the computer, using some image - processing algorithms such as image segmentations, threshold identification, image binarization, areas labeling, dial center - point identification, useful areas identification & abstracting, and areas thinning, etc. followed this, the dial pointer of the “ circle ” is able to be located. at last, the dial pointer position will be recognized by the computer

    本系統由計算機控制步進電動機的運動,進而驅動指針式儀表表針的運動,並且通過高精度ccd攝像機實時獲取表盤圖像,同時進行表盤圖像的相關處理,括圖像分割,閾值確定,圖像二值化,區域記演算法,圓心擬合,有效區域別提取,區域細化等,最終快速別出表盤指針所處位置;最後,根國家指針式儀表類檢定規程所制定的演算法計算出該儀表的相關誤差,檢定指針式儀表的各種精度,通過這些判斷該儀表是否合格,列印該儀表的檢定結果報表。
  4. According to the program structure of ansi c, some syntax - tree - nodes are designed in front - end, including function, block, data structure, type, expression, identifier and so on. syntax tree is divided into three levels, namely program level, function level and block level, which are useful for analysis of syntax and semantic in compiler as well as transferring syntax tree into rtl. retargetable compiler mainly includes intermediate representation, machine description and interface technique between compiler and machine description

    編譯前端的實現技術括詞法分析、語法語義分析和中間代碼生成技術等,針對ansic的程序結構,分別設計了函、塊、結構、類型、表達式、符等語法樹結點,並將語法樹分成編譯層次、函聲明和塊三個不同層次,使語法樹具有清晰的層次結構,有利於編譯程序的語法和語義分析,以及從語法樹到rtl中間表示的轉換。
  5. Data grid replica location is coined to denote that get one or more physical positions by logical file name in data grid

    格網中,根給定邏輯文件給出一個或多個含該文件內容物理位置的問題稱為格網中的復制定位問題。
  6. Identification card systems - inter - sector electronic purse - data objects

    別卡系統.部門間電子錢.
  7. In the border router, we design a new diffserv scheduler ( bswcs : bit - based weight time slot compensate scheduler ), which dynamically adjust the weighted quantum of service. combined with the error concealment technology in the video decoder, in case of severe congestion which cause losing a lot of ip packets, these algorithms have been proved effective, hence the delay, jitter and the perceived picture quality all meet requirement for real - time video transmission

    4建立了一個區分服務網路模型,根視頻編碼的特點,提出了一種針對視幀傳輸的新的服務優先等級演算法,即根不同視頻幀解碼時的重要程度和網路的傳輸狀況將不同視頻幀的記為不同等級,賦予不同的質量保證。
  8. The xml file includes schema information that identifies the database structure of the data

    Xml文件庫結構的架構信息。
  9. A data source object is a reference to a connection, and at a minimum, it includes a connection string and a data source identifier

    源對象是對連接的引用,它至少括一個連接字元串和一個符。
  10. An implementation should define the exact semantics of data source identifiers ; however, it must be possible to determine a data source identifier directly from the bytes that comprise the data source

    實現應該精確地定義符的語義;然而,必須有可能由源的位元組直接地確定符。
  11. Another indicator employed by education18. com was the " research output " among the universities, based on the figures released by the research grant council. the research outputs included papers, books, patents, agreements signed with companies, and other semi - academic works

    香港專業教育網所採用的另一個評價指為各院校的研究作品成果表現,所採用的資料根研資局刊布的括論文書籍專利權許可證協議知產權和注冊公司,及其他非學術或半學術性文章及講辭等。
  12. 5 a multi - thread software cooperated with smp ( 2 cpu ) hardware performs the image - preprocessing correlation and post - processing synchronously, thus an automatic working module is realized. 6 systematic designed software, including grabing sarnies constructing rfl diging roi, and trainning ann offline and inline modules, has passed the practical tests which indicates that the opr could reach the recogniton possibility above 85 % and decrease the false alarm in the environment of high noise low contrast and multi - objects. and these are proved stable and repeatable in statistics, and so an advanced progress toward practical systems is achieved

    6 、系統化設計的軟體,括了樣本採集、參考濾波器庫構成、相關平面的roi採集,以及ann脫機訓練、 ann聯機運行的軟體功能模塊,在實時運行的測試結果中表明了該opr系統對處于高噪聲、低反差、多目的惡劣條件下,對三維畸變目的判率( > 85 % ) ,降低了虛警率,並通過大量的實驗證明了該系統各項指的穩定性和可重復性(從統計意義上講) ,向實用系統邁進了一大步。
  13. A series methods of data combination analyzing are selected to form the operating method system for crop discrimination. combining gis, gps, and other data from field work with rs data can determine interpretation features and set off working regions, combining rs data can enhance spatial features in order to do unsupervised classification efficiently, union of gis data enable us to join maps and extract features, to analyze crop structure, crop calendar, cultivating system

    本項研究篩選出了構成運行化作物遙感別技術體系的一系列復合分析方法,括gps 、 gis以及其它田間作業信息與rs之間的復合,確立解譯志和劃分作業區; rs之間的復合,進行圖像增強,改善非監督分類效果; gis之間的復合,分析作業區作物結構、物候和耕作制度現狀,地圖拼接、特徵提取等。
  14. The lexer is the part of our language knowledge that says " this is a sentence ; this is punctuation ; twenty - three is a single word. " the parser is the language knowledge that says " this sentence contains a verb, a subject, a few adjectives, and some pronouns. " when parsing is done, the meaningless to a computer stream of data becomes something a computer can understand

    詞法分析器是我們的語言知別「這是一個句子;這是點; twenty - three是一個單一的詞」的那一部分。解析器則是別「這個句子含一個動詞、一個主語、一些形容詞和一些代名詞」的那一部分。在完成解析之後,沒有意義的(對計算機來說)流就成為了計算機可以理解的內容。
  15. According to the standard of kddcup ' 99 and by adopting numeric mixed coding, 41 features of the captured network packets are extracted and transferred into numerical form which can be accepted by neural network in this paper, we present a misuse detection model based on hybrid neural network and decision tree

    第三屆國際知發現和挖掘競賽( kddcup ' 99 )準,對截獲的網路進行41維特徵抽取,並採用混合值編碼方法,使這些特徵轉化為能被神經網路處理的值形式。
  16. Cells identify cell types that are not bound data cells that contain other, non - data - bound content

    單元格含其他非綁定內容的、不是綁定單元格的單元格類型。
  17. The change of the group member s real number will not affect the short number numbering plan so that members of the group can communicate with each other all the same. they only need to remember the internal short numbers to call the intended colleagues. when the short number numbering plan has changed, including the change of the real numbers corresponding to the vpmn numbers, the addition of new real numbers or vpmn numbers, etc., the group in question should inform the mobile operator of the change and the operator should change the service data accordingly

    其目的是方便記憶和管理,短號碼可以唯一的一個集團成員(職位、工號等信息) ,當集團成員的真實號碼改變時可以不影響其短號碼的編號方案,這樣,集團內部的員工不會因移動通信終端真實號碼的變更而影響工作聯系,集團內用戶只要記住集團內部短號碼就可以找到他希望找到的用戶;當集團內部的短號碼編號方案發生變化時(括vpmn號碼所對應的真實號碼發生改變、需要添加新的用戶真實號碼或vpmn號碼等情況) , vpmn集團需將具體的變化內容通知運營商,由運營商對業務作相應的改變。
  18. By integrating dematel, concordance analysis, fuzzy comprehensive evaluation, the analytic hierarchy process and dea, faedss established its databank, model bank, algorithm bank and help subsystem with the aid of vb 6. 0, matlab and other computer program language and recognized the integration of qualitativeness and quantitativeness, human brain and electron brain for factor analyzing and systematic evaluating. faedss was applied to the development problem of jilin provincial software industry in factor analyzing and efficiency evaluating of software enterprises

    針對一個具體的問題,在眾多的影響因素中採用dematel等系統方法別主要因素;對系統評價與決策問題採用協調分析、模糊綜合評判、層次分析原理( ahp ) 、絡分析( dea )等多指評價與分析模型與方法,實現評價過程的定性定量相集成、人腦電腦相集成的科學化。
  19. Efm use ordinary ethernet frame to transport oam information but special destination address and type code field, considering epon protocols were standarded last year, most of the network device may not recognize the oam frame above data link layer, so we use linux access link layer method to construct / capture oam frame at l2

    Ieee802 . 3ah協議規定使用準的以太幀作為傳送oam信息的載體,但使用特殊的組播目的地址域和類型/長度域,以區別普通的以太。由於協議是2004年剛頒布的,所以現有的網路設備很可能不能別新的oam幀,這就需要在鏈路層對進行捕獲和構造。
  20. Means involved in this paper included delphi, performance evaluation by means of benchmarking, analyzing the main composition, dea. at the same time, the paper put forward performance evaluation by means of benchmarking - oriented dea algorithm to evaluate the units of public administration, the method can also be employed to improve the management in those units where dea does not work

    本論文用到的學與管理知括delphi方法、 360度績效考評法、桿管理、主成分分析法、絡分析( dea ) ,提出了基於桿管理的dea演算法來考評政府部門績效,並對非dea有效的決策單元提供了改進的方向。
分享友人