監聽系統 的英文怎麼說

中文拼音 [jiāntīngtǒng]
監聽系統 英文
foldback
  • : 監名詞1. (古代官府名) an imperial office 2. (姓氏) a surname
  • : 動詞1 (用耳朵接受聲音) hear; listen 2 (聽從; 接受) obey; accept; heed 3 (治理; 判斷) superv...
  • : 系動詞(打結; 扣) tie; fasten; do up; button up
  • : Ⅰ名詞1 (事物間連續的關系) interconnected system 2 (衣服等的筒狀部分) any tube shaped part of ...
  • 監聽 : monitor; monitoring
  • 系統 : 1. (按一定關系組成的同類事物) system 2. (有條理的;有系統的) systematic
  1. According the cidf pattern, the system was divided into five fundamental modules : packet capture, network sniffer, rules disposal, data analyze and system reaction. each module mapp ed to different applications and the system function was introduced in brief

    根據cidf入侵檢測模型,將分為五個基本模塊:數據捕獲、網路、規則處理、數據分析和響應模塊,分別對應于不同的應用功能;並對目前開發的功能做了簡單的介紹。
  2. On the basis of familiar with can bus and gsm communication, considering hev ( hybrid electric vehicle ) battery administrative system ' s demand for the host pc monitoring system, i have designed can - rs232 converter gateway to realize transmission the real - time data from can node to rs232 serial port, which is carried out by the project of at89c52 mcu + sja1000 can controller + 82c250 can controller interface. host monitoring software has accomplished real - time datas display, storage, historical datas graph analysis and storage fashion change from access to excel, at the same time, realized important datas transmission remotely with tc35 short message module. system software programs in assembly and vb

    Can - rs232轉換網關採用at89c52微處理器+ sja1000can控制器+ pca82c250can控制器介面實現對can總線節點通訊的,並將其轉換成rs232串口電平發送到pc機串口,同時用siemens公司的tc35模塊和at指令實現現場採集重要數據和錯誤信息的短消息通訊。在上位pc機中,主要完成的是對串口設置的選擇控制、現場採集數據的實時刷新顯示、歷史數據的圖表分析及數據的access數據庫存儲和excel電子表格的轉換。軟體採用匯編語言和vb實現。
  3. Jdl is an interpretative language system. it has data types, expression, control flow statements and user - defined function just like the imperative programming language, but also has data types and statements such as job control statements, task control statements, wait statement, parallel statement and monitor statements particular to jms

    Jdl是一種解釋型語言,既有一般命令式語言所具有的數據類型、表達式、控制流語句和用戶自定義函數等要素,也另有作業管理所特有的數據類型、作業控制語句、任務控制語句、等待語句、并行語句和語句等。
  4. The icac made full and extensive use of their powers, including electronic surveillance, search warrants and public and private hearings with the result that there was evidence to suggest that two councillors were involved in soliciting substantial bribes from developers, through go - betweens, in return for supporting their development proposals

    廉署在調查這宗矚目的案件期間,充分運用其權力,包括利用電子、執行搜查令,以及舉行公會及非公開聆訊。最後,證據顯示兩名議員透過中間人向發展商索取巨額賄款,作為支持其發展計劃的報酬。
  5. Satellite system monitoring station

    衛星
  6. 9. more people could take part in the conference when system is connected with ir language distribution system

    4 .採用耳罩式耳機發言5 .可配合連接紅外線語言分配使用
  7. Several integrated services report the tcp port they are listening to for requests on your system

    中,幾個集成的服務報告了它們在請求的tcp埠。
  8. With the ip address of your z os system and the ip port number where soap for cics is listening for requests

    您應該用z / os的ip地址和用於cics的soap的請求的ip埠替換
  9. Some key techniques, such as monitoring and identifying a data package, analyzing a data package, reducing lost package rate have been used in this system

    採用了與識別數據包、分析數據包、減小丟包率等關鍵技術。
  10. This paper defines the sync objects, explains component - program design method and how to tailor migo under linux system, analyze the method of developing a mobile data communication system based on mico and strategy of defining a sync object

    本文闡述了組件化程序設計方法以及同步組件的定義,符合corba規范的mico組件在嵌入式linux下的定製方法,基於mico組件如何開發一個移動同步數據通信,以及同步數據對象的定義、對其進行的策略。
  11. But a quiet revolution is under way ? an idea revolution ? led by managers and supervisors who, in a small but growing number of companies, have learned how to listen systematically to their employees

    但在很少數但數目卻在不斷擴大的一些公司中,這些經理與理們正在領導一場潛在的變革? ?創意,他們學習如何地聆雇員們的心聲。
  12. The initialisation key is the first security gate in bluetooth security system, if the initialisation key is got by attacker, the attacker will get the common link key by continue listening the communication. if the common link key is known by others, the two device is no secret before he. the third party can not only listen the two device ' s communication but also assert him one party to authenticate the other. pairing at place where less people here will reduce the attack. to use long pin managed by diffie - hellman key exchange algorithm will also reduce the attack

    初始字是藍牙安全的第一道安全屏障,如果初始字被攻擊者得到,攻擊者就可以通過兩設備的后續通訊進而獲得兩設備的公共鏈路字,如果兩設備的公共鏈路字為第三方知曉,那麼兩設備對于第三方面而言就毫無安全性可言。第三方不但可以偷兩設備的加密通訊,還可以冒充其中一方向另一方鑒權。
  13. In addition, to make the sub - ids run in different modes, a data - capturing module is introduced to realize packet sniffing and filtering

    另外,為了使該子能夠靈活地以多種方式運行,中設置了數據捕獲模塊以實現數據包的和過濾。
  14. Abstract : on the basis of analyzing the partial key escrow system, a new partial key escrow scheme has been presented, which prevents against that the computational complexity in old systems is too height, but also prevents against that led ( law enforcement decryptor ) is too much power

    文摘:在分析可驗證部分密鑰託管的基礎上,提出了實現部分密鑰託管的新途徑.它不僅克服了以往可驗證部分密鑰託管方案中計算復雜度過高而無法實現的缺點,而且還進一步克服了這些方案中一次破壞部分特性和權力過大的缺點,為部分密鑰託管的實際應用提供了新方法
  15. The system call dosopen allows the client process to gain access to the named pipe created by the server in listen mode

    調用dosopen ( )允許客戶端進程訪問由服務器創建的處于模式的有名管道:
  16. Dosconnectnpipe is used by the server process to connect to the pipe on one end. this puts the pipe to listen mode, and client processes can now access the pipe using

    服務器進程可以使用調用dosconnectnpipe ( )連接到管道的一端上,這樣就可以將管道設置成模式,客戶端進程現在就可以使用dosopen ( )來訪問這個管道了:
  17. Then, a prototype system of this model has been implemented based on network monitoring and data mining. in this prototype many basic functions have been accomplished such as raw data capturing, behavior data preprocessing, mode definition, mode mining, mode maintenance and mode contrast. finally, this paper have researched mode update and anomaly identification tentatively and given some farther suggestions of improvement

    論文中對該模型進行了整體規劃和詳細設計,並利用網路和數據挖掘等技術實現了一個網路訪問行為分析的原型,完成了用戶訪問行為原始流量的捕獲,行為數據預處理,行為模式的定義、挖掘、維護以及當前行為與歷史行為模式比對等基本功能,並對模式更新、異常識別等方面進行了嘗試性研究,提出了進一步完善模型的若干設想。
分享友人