設備地址 的英文怎麼說

中文拼音 [shèbèidezhǐ]
設備地址 英文
bd-addr bluetooth device address bluetooth
  • : Ⅰ動詞1 (設立; 布置) set up; establish; found 2 (籌劃) work out : 設計陷害 plot a frame up; fr...
  • : Ⅰ動詞1 (具備; 具有) have; be equipped with 2 (準備) prepare; provide with; get ready 3 (防備...
  • : 名詞(建築物的位置; 地基) location; site; ground; foundation
  • 設備 : equipment; device; facility; implementor; apparatus; installation; appointment; furnishing; setou...
  1. Finaiiy, the paper also has introduced the virtua1 worid of windows rs ; j { ? # - - lase / and how to map the 1ogica1 address to physica1 address in protected mode and the interrupt mechanism of protected mode, then the paper has i11ustrated that it is necessary to write virtua1 device driver ( vxd ) in order to access hardware device from the third leve1

    最後,在介紹了windows的虛擬世界,和在保護模式下如何將邏輯映射成物理,以及保護模式下的中斷機制的基礎上,闡明了在保護模式下應用程序對硬體操作驅動程序的必需的中間橋梁作用。
  2. A " real " address, the value that must be placed on the system address bus to select a physical memory bank or device

    物理:真實的,其值必須被置於系統總線中用於選擇物理存儲位置或者
  3. To associate an absolute address, virtual address or device identifier with a symbolic address or label in a computer program

    在計算機程序中,將絕對、虛擬標識符與符號或標號聯系起來。
  4. The assigning of a value or referent to an identifier ; for example, the assigning of a value to a parameter or the assigning of an absolute address, virtual address, or device identifier to a symbolic address or label in a computer program

    把一個值或指定的對象賦給某一標識符,例如,把一個值賦給一個參數或把一絕對、虛擬標識符分配給計算機程序中的符號或標號。
  5. Audio - visual, video and television equipment and systems - control, synchronization and address codes - method of operation for pulsed cue tone control systems for two still projectors

    視聽視頻電視及系統.第5部分:控制同步和碼.第2節:雙片式投影儀脈沖音調控制操作方法
  6. F unctions : people and heavy console instruments can directly enter into the draught hood, which has increased the convenience of the operation

    功能:人員及重型落儀儀接進入通風櫃內,增加操作更利性。
  7. Basis " orders of sell of access of land of shenzhen special economic zone " the seventeenth regulation, contract of sell one ' s own things should have the following and main provision : ( one ) the full name of bilateral party or name, address ; ( 2 ) a ground date of access of land of sell one ' s own things, area ; ( 3 ) land is used year period reach case stop time ; ( 4 ) the amount of gold of land access sell one ' s own things, money is planted, pay kind and time ; ( 5 ) the time of consign land ; ( 6 ) point of program, municipal design ; ( 7 ) project complete is referred check and accept time ; ( 8 ) municipal facilities form a complete set builds obligation ; ( 9 ) land of use photograph adjacent and viatic limitation ; ( 10 ) the project that builds accessary, add establishment and obligation ; ( 11 ) responsibility of breach of contract ; ( 12 ) party thinks necessary other item

    根據《深圳經濟特區土使用權出讓條例》第十七條的規定,出讓合同應具以下主要條款: (一)雙方當事人的姓名或者名稱、; (二)出讓土使用權的宗號、面積; (三)土使用年期及起止時間; (四)土使用權出讓金的數額、幣種、交付方式及時間; (五)交付土的時間; (六)規劃、市政計要點; (七)項目竣工提交驗收時間; (八)市政施配套建義務; (九)使用相鄰土和道路的限制; (十)建附屬、附加施的項目及義務; (十一)違約責任; (十二)當事人認為必要的其他條款。
  8. For installing from an ls - 120 drive atapi version with a set of floppies, you need to specify the virtual location for the floppy device

    要想在ls - 120驅動器atapi版本使用這些軟盤,您需指定這些軟盤的虛擬
  9. Random - access memory. a broad classification of memory devices that includes all devices in which individual memory locations may be read or written as required

    隨機訪問存儲器。一個包含了所有每個能被按需讀寫的存儲的粗略分類。
  10. Some laptop models produced by dell are known to crash when pcmcia device detection tries to access some hardware addresses

    Dell筆記本的一些型號,會在pcmcia檢測程序嘗試訪問一些硬體的時候死機。
  11. Today, numbers are on the wane thanks to the ease with which mobiles can store and retrieve names and the ubiquity of e - mail addresses and other internet - based identity tags, such as skype names

    現在,由於移動存取名字十分方便、再加上無處不在的電子郵件及其它源自網際網路的身份標識,數字在生活中正變得越來越少見。
  12. Specification for audio - visual, video and television equipment and systems - control, synchronization and address codes - synchronized tape visual operating practice

    視聽視頻電視及系統.第5部分:控制同步和碼.第1節:磁帶圖象同步操作慣例
  13. A remote attacker may exploit this condition in multiple routers that reside on the same network segment as the attacker, to trigger a device reset

    遠程攻擊者可以利用在相同網路段內多個路由器中的漏洞導致重置。
  14. Networks telephone, is over the communication system of h. 323, which is made up of gatekeeper and endpoints. gatekeepers provide register control, admission control and address translation services

    網守是網路電話通信系統的管理,管理所有的終端,為終端提供翻譯和網路接入等服務。
  15. Two notable characteristics of tcn are as follows : ( 1 ) polling mac strategy is adopted in link layer by iec 61375 - 1 to ensure the certainty of data transmission time ; ( 2 ) train inauguration procedure is devised to realize the automatic allocation of rail vehicle address in the network. the paper consists of two nain parts : 1. a sinulating system of wire twisted bus ( wtb ) inauguration

    Tcn的西大特點是: ( 1 )為了保證數據傳送時間的確定性, iec61375 - 1標準在鏈路層採用輪詢機制; ( 2 )由於列車編組經常變化,導致列車總線網路設備地址變化,為此iec61375 - 1計了列車初運行過程,以實現列車組成變化后車輛的自動分配。
  16. This shows you information about the notification, including the subscriber id and device address

    此標題可以顯示有關通知的信息,其中包括訂閱方id和設備地址
  17. When a usb device is plugged in, it is enumerated by the host controller driver using control pipes and assigned a device address 1 to 127

    Usb插入時,主機控制器使用控制管道來枚舉它並給它分配設備地址( 1到127 ) 。
  18. Because the bluetooth device address is unique, the bluetooth device is relate to its user, the user ' s secrect is not saft. we may solve this by change the bluetooth device address

    由於藍牙設備地址的唯一性,藍牙和使用者之間會出現很大的關聯性,藍牙的使用者的隱私權易受侵犯。
  19. The network communication function, may establish this device address and in the data passes on under the communication agreement standard, realizes the higher authority carries on the management to various equipment work and the output

    網路通訊功能,可置該設備地址並在通訊協議規范下數據上傳,實現上級對各工作與產量進行管理。
  20. Because authentication is apart from data transpoart later and the authentication has no time stamp or nonce, when received information the bluetooth device does n ' t tell from the information is new or out of date. so authentication is easy attacked by so called middle man. we may solve this by introduce time idea at authentication. one is operate the bluetooth device address and bluetooth clock and take the value as bluetooth device, the other is start a timer at authentication

    由於鑒權過程和後面的數據傳輸是分開的,同時鑒權過程又沒有時間戳或現時,藍牙收到信息后不能辨別所收到的信息是新的信息還是過時的信息,所以鑒權過程易受「中間人」攻擊。可以在鑒權過程中引入時間概念,一是將藍牙時鐘與藍牙設備地址進行某些操作,操作后的值作為鑒權時的藍牙設備地址輸入;二是在鑒權開始時啟動定時器。
分享友人