棧法 的英文怎麼說

中文拼音 [zhàn]
棧法 英文
stack method
  • : 名詞1 (養牲畜的柵欄) shed; pen 2 (棧道) a plank road built on sides of cliffs for army3 (棧...
  • : Ⅰ名詞1 (由國家制定或認可的行為規則的總稱) law 2 (方法; 方式) way; method; mode; means 3 (標...
  1. For this reason bridging the communications gap between serial - only devices to tcp / ip network hosts is a very important research topic. the thesis starts from the three research methods about gateway equipment, talks about the each characteristics, finally brings forward the material method how to implement the tcp / ip stack on the 51 mcu. at the same time, it uses the format of the callback function implementing the application layer protocol facing industrial real - time communication ( modbus protocol )

    論文從目前國內主要的三種關于網關設備的研究方談起,討論了各個方的特點,提出了在常規的51單片機硬體上實現簡化的tcp / ip協議設計方和具體實現,並利用回調函數的形式實現了面向工業實時通訊的應用層協議( modbus協議) 。
  2. Andrea gave the inn - keeper twenty francs, and in taking them from his pocket dropped a visiting card

    安德烈給那個客老闆十郎,當他從口袋裡掏錢的時候,他丟下了一張名片。
  3. The inn - keeper himself was a man of from forty to fifty - five years of age, tall, strong, and bony, a perfect specimen of the natives of those southern latitudes ; he had dark, sparkling, and deep - set eyes, hooked nose, and teeth white as those of a carnivorous animal ; his hair, like his beard, which he wore under his chin, was thick and curly, and in spite of his age but slightly interspersed with a few silvery threads

    老闆是一個年約四十多歲的人,身材高大強壯,骨胳粗大,典型的國南部人。兩眼深陷而炯炯有神,鷹鉤鼻,牙雪白,就象一隻食肉獸。雖然他已上了年紀,但他的頭發,卻似乎不願變白,象他那胡須一樣,茂密而捲曲,但已略微混入了幾根銀絲。
  4. We discuss the formation of the unidirectional links and their influence on the manet routing protocols such as dsr, dsdv, aodv. solutions are given to overcom e the problems, we analyze some of they and point out their limitations. in the third part, we show a new on - demand routing strategy supported unidirectional links, it use the two circuits route search algorithms to establish the route from the source node to the destination and backward with directions ; it transfer the route error messages from the backward positions to the forward positions one by one ; it apply the packet encapsulation technique to forward the packets through the unidirectional links and introduced the circuit path to transmit information from the forward node to the backward node

    接著,指出在移動自組網環境中,單向鏈路的普遍存在,分析了它的產生原因、它對目前協議的影響;然後,我們給出了一種按需路由的自組網單向鏈路路由演算,它只有在需要路徑的時候才維護路由,使用二循環路由尋徑演算以建立節點間的路徑,使用逐跳逆向傳遞的方式報告路由終斷,使用封裝廣播的方式沿單向鏈路正向傳輸,使用報文封裝方式支持單向鏈路下游節點向上游節點傳遞信息。
  5. New method to defend against stack smashing attacks for windows

    溢出攻擊的新方
  6. Doas method that have not been associated with the

    之前的調用堆) ,它還沒有與包含在認證的
  7. Taking foundation fieldbus ( ff ) for example, the real time schedule mechanism of fieldbus is investigated, the implementation of communication stack is presented, the method of building real time schedule table is put forward, the schedule algorithm and the algorithm schedulabilty of real time schedule table are researched

    以基金會現場總線為實例,研究了現場總線的實時調度機理;給出了通信軟體的具體實現;提出了實時調度表的建立方;並對實時調度表的調度演算和可調度性分析進行了研究。
  8. " the most frequent attack path hackers use to get into systems is to use stack overflows, buffer overflows, and memory overflows

    「黑客用來闖入系統最常見的攻擊方是使用堆溢出、緩沖區溢出和內存溢出。
  9. In essence, what happens upon calling this method is that a snapshot of the state of the call stack is taken at that very instant and the sets of permissions intersected with each other

    中間接實現的。本質上,調用這個方所發生的事情是對那一瞬間調用堆和一組相互交疊的權限進行快照。
  10. It indicates that the current method s stack frame should be removed before the call instruction is executed

    它指示在執行調用指令前應移除當前方的堆幀。
  11. Performs a postfixed method call instruction such that the current method s stack frame is removed before the actual call instruction is executed

    執行后綴的方調用指令,以便在執行實際調用指令前移除當前方的堆幀。
  12. Changing the invocation statement of a method that is on the call stack

    更改對調用堆中某個方的調用語句。
  13. According to specified application, tcolormodel is utilized to design adevice independent osd module, and rectangle and region algorithm combined withimage representation is utilized to avoid flicker of displaying pages, further more, stack allocator is chosen to improve the efficiency of memory allocation

    結合實際的應用需求,提出了基於顏色模型的設備無關osd模塊,並進一步提出基於矩形和區域的優化演算防止頁面跳轉產生的閃爍,採用式內存管理方來提高內存分配效率。
  14. This demand causes the runtime to check the permissions of all callers in the call stack, starting with assembly e. because assembly e has been granted p1 permission, the runtime proceeds to examine the permissions of assembly c. but because method c has denied p1, the security check invoked by method e fails at that point, and a

    此要求使運行庫檢查調用堆中所有調用方的權限(從程序集e開始) 。因為程序集e已被授予p1權限,運行庫會接著檢查程序集c的權限。但是因為方c已拒絕p1 ,所以方e調用的安全檢查會在此處失敗,並引發
  15. Firstly, this paper makes a detailed study on the field control bus system ( pcs ), including the characters of pcs by comparing fcs and dcs, model networking of pcs and several popular field bus, then put forward a question for discussion combining embeded internet technology and field bus and measure and control networking model based embeded internet technology is constructed. secondly, it studies embeded system including the core of hardware ? mbeded microprocessor and real time operation system. thirdly, the method of realizing embeded internet is discussed for emphasis, and difficulty of ehernet application in industry measure & control system is analysed. an instance of measure & control networking system based embedded ip is given. finally, the author designed a networked remote video surveillance system based embedded web server, c / os - ii is sacled and ported into the embedded microprocessor at89c51. based on the c / os - ii rtos, tcp / ip protocol suite and application program is designed in detail. the system w orks well that improves that the embedded internet technology will be widely used in modern measure & control networking system and has extend values

    本文首先分析了現場總線系統( fcs )與傳統集散控制系統( dcs )相比具有的特點、 fcs的網路體系結構,介紹了幾種流行的現場總線,提出了將嵌入式internet技術結合現場總線構建現代測控網路的課題;在此基礎上,構建了基於嵌入式internet技術的測控網路結構模型;深入研究了嵌入式系統的核心硬體?嵌入式微處理器,通過對比普通操作系統,描述了嵌入式實時操作系統的特點;重點研究了實現嵌入式internet的四種實現方,並分析了以太網在工業測控系統中應用的難點,給出了一個基於嵌入式ip的網路測控系統實例;最後,研究與設計了一個基於嵌入式web服務器的遠程網路視頻監控系統,該嵌入式web服務器利用目前成熟的嵌入式實時操作系統c / os - ,通過對c / os -進行適當的裁剪、修改與移植,在at89c51嵌入式微處理器上實現了tcp / ip協議及應用程序,系統的成功運行證明了本文研究成果的有效性,也表明嵌入式internet技術在現代測控網路系統中具有廣闊的應用前景和推廣價值。
  16. The jeweller examined attentively the interior of the inn and the apparent poverty of the persons who were about to sell him a diamond that seemed to have come from the casket of a prince. relate your story, madame, said he, wishing, no doubt, to profit by the absence of the husband, so that the latter could not influence the wife s story, to see if the two recitals tallied

    「那珠寶商仔細地察看著客內部,看出對方顯然是窮人,而他們要賣給他的那顆鉆石,簡直象是從一位親王的珠寶箱里弄來的似的,講一下你們的故事吧,太太,他說道,無疑是想利用那丈夫離開的機會,使後者無影響他妻子的故事,看看兩篇話是否符合。
  17. It is particulary suited to multirate signal transmission due to the use of an offset stacked spreading modulation scheme, which simplifies th ' e rate - matching algorithm relevant to multimedia services and facilitates asymmetric traffic in up - and downlink transmissions for ip - based applications

    通過調整偏移,偏移的大小,可簡化多媒體服務的速率匹配演算,特別適用於ip網路中上行鏈路和下行鏈路非對稱業務的傳送。
  18. Common network attacks such as ip spoofing, source route spoofing, icmp redirect deception and ip hijack are analyzed and protected by filter manage module. ip hijack protection is implemented through injecting a hook function into protocol stack in detail

    針對常見的ip地址欺騙、 ip源路由欺騙、 icmp重定向欺騙、 ip劫持等網路攻擊給予了分析並在過濾管理模塊中給出了防禦的方,其中ip劫持防禦是用一個鉤子函數注入協議中來實現的。
  19. This thesis has made thorough research to ipsec protocol architecture and esp protocol and ah protocol. it has proposed the design methods of realizing vpn security gateway based on ipsec protocol under linux, and has discussed in detail the implementation of esp protocol and ah protocol in tunnel mode, as well as the secure kernel improvements to ip protocol stack on linux vpn security gateway machine

    本文對ipsec的體系結構、 esp協議、 ah協議進行深入研究,提出了在linux上實現基於ipsec協議的vpn安全網關的設計方,並討論了在隧道模式下esp協議和ah協議在linux上的的具體實施和對linuxvpn安全網關上內核ip協議的安全內核改造。
  20. The esdar - 1 is based on the member durability synthesis assessment method. in this dissertation, using corrosion reinforcement measuring data of experiment member and steelworks outdoor trestle column in shangming city, fujian province, the esdar - 1 is applied to assess corroded member ' s durability. through analyzing durability assessment results

    4 )編制了一種基於構件耐久性綜合評定方的計算機軟體? ?現役鋼筋混凝土結構耐久性評估專家系統,並以試驗構件和福建省三明鋼廠露天橋柱鋼筋銹蝕的實測數據,應用專家系統進行了銹蝕構件的耐久性評定。
分享友人