通用操作程序 的英文怎麼說

中文拼音 [tōngyòngcāozuòchéng]
通用操作程序 英文
general purpose operating program
  • : 通量詞(用於動作)
  • : Ⅰ動詞1 (使用) use; employ; apply 2 (多用於否定: 需要) need 3 (敬辭: 吃; 喝) eat; drink Ⅱ名...
  • : Ⅰ動詞1 (抓在手裡; 拿; 掌握) hold; grasp 2 (做; 從事) act; do; operate 3 (用某種語言、方言說...
  • : 名詞1 (規章; 法式) rule; regulation 2 (進度; 程序) order; procedure 3 (路途; 一段路) journe...
  • 通用 : be in common use; be current; apply or be used universally
  • 操作 : 1 (按照一定的程序和技術要求進行活動) operate; manipulate; handle 2 (所進行的若干連續生產活動的...
  • 程序 : 1 (進行次序) order; procedure; course; sequence; schedule; ground rule; routing process 2 [自動...
  1. Then this paper concerns about the network packet intercepting technology of linux os and gives a thoroughly overview of network hacking methods and some application protocol criterion, including http, ftp, telnet, nntp, pop3, smtp etc. then the system design scheme of the transparent proxy has been discussed, this system can be divided to 4 modules below : establishment of transparent charnel, implement of proxy service, gui configuration and management application, accessory filter functions ( such as url filter, command filter and logger etc ). we explain key techniques in all 4 main parts of this system, define the interfaces of each module, what is more the main data structures and software implements codes are all illustrated

    首先,論文陳述了防火墻的相關技術基礎,分析了透明代理為一種先進易的防火墻技術的原理,闡述了linux系統網路數據包攔截技術和http 、 ftp 、 telnet 、 nntp 、 pop3 、 smtp等應層協議的協議規范和具體的工。接著敘述了本透明代理服務器的系統總體設計方案,將系統分為以下幾個部分:透明道建立、代理服務實現、 gui配置管理以及過濾功能(如url過濾、命令過濾和日誌審計等) 。論文然後分別介紹各個關鍵部分的具體實現要點,解釋了相互間的介面關系,列出了主要數據結構和實現流
  2. As a whole the system may compart three modules : ndis drivers in the kernel mode, the dll program in the user mode and the user application program, adopting the share memory technology three modules realize the data share of the control canal rule, the encapsulation data and the network neiborhood name and so on, so we can easily finis1 " the packet authentication by the control canal rule, improve the filtering efficiency of the system. whereas the current of firewall technology, the system has wide utily value and business value. this software is based on windows 2000 operating system, the programming language is chosen as visual c + + 6. 0 and win2000 ddk

    從總體上可以劃分為以下三個模塊:核心層的ndis網路驅動、應層的動態鏈接庫以及戶應,這三個模塊之間過內存共享技術完成對控管規則、封裝數據、網上鄰居名字列表等數據的讀寫,從而很方便的根據控管規則實現了對網路封包的認證,提高了系統的過濾效率。鑒于目前防火墻技術的發展趨勢,本系統具有廣泛的實價值和商業價值,因此具有一定的推廣前景。軟體的開發基於windows2000系統,開發語言採visualc + + 6 . 0和win2000ddk 。
  3. “ there has been a great deal of controversy lately over stamper thickness and how to measure it, ” says thomas hackl cco of datarius group. “ the universal stamper checker was developed as a direct response to the demand from the industry for a test system that can not only check the quality of stampers, but is also easy to use

    這個系統是產業中第一個符合標準的對母盤機械參數進行檢測的測試系統,測試系統在運行運行之後可以對品質進行全面的監控,而不需要受到人員的干預。
  4. The chip simulation network laboratory system this paper disguessed is a distribute network simulation system based on lan. the system ' s architecture is a c / s of three lays. the front platform are the chip simulation network system application program terminer ; the middle lay is a dcom server, it ' s duty is to deal with the communication and data transmission between the terminer and then database server, and to execute the logical operation. the application program just connect with the middle lay and get data from it, the connection and operation with database server will be managed by the dcom server. the duty of database server is to access and backup the final data

    具體是由位於網路各個終端的晶元模擬網路實驗系統應為前臺;中間層為dcom應服務器,負責處理前臺應與后臺數據庫的信和數據傳輸,並執行業務邏輯,前臺應只需要與應服務器建立連接,在中間層數據即可,與后臺數據庫的連接和由應服務器來統一管理。后臺數據庫只負責數據的存取。本論文實施的晶元模擬網路實驗系統模擬了主要的邏輯電路器件, 8088cpu ,存儲器,寄存器,數據總線,地址總線和控制總線,及其它相關晶元。
  5. A digital automatic ultrasonic inspection system designation is introduced. this system was developed with pc computer and embedded dsp, combining computer software and hardware, ultrasonic nondestructive testing, digital signal processing, embedded rtos and visual instruments technology. it meet the requirements of automatic inspection such as high repetitively frequency and real time alertation

    該方案以pc機和dsp系統為核心構成主從機系統框架,以基於虛擬儀器思想的pc機應和基於dsp的嵌入式實時系統構成雙重軟體結構,把傳統的超聲波無損檢測技術和先進的虛擬儀器技術、數字信號處理技術、嵌入式實時系統、計算機介面信技術相結合,從而滿足了自動化探傷中1k / s的重復頻率和實時報警的要求。
  6. By providing standard implementations for typical presentation - layer tasks such as data formatting and iterative or conditional content, jstl allows jsp authors to focus on application - specific development needs, rather than " reinventing the wheel " for these generic operations

    過為典型表示層任務(如數據格式化和迭代或條件內容)提供標準實現, jstl使jsp者可以專注于特定於應的開發需求,而不是為這些「另起爐灶」 。
  7. You can view registered file types and their associated applications for your computer using the folder options dialog available through the operating system

    您可以系統的「文件夾選項」對話框來查看計算機的已注冊文件類型及其關聯應
  8. Computerized high - speed lockstitch se4wing machine simplified the working process and improved the efficiency. with features of automatic thread trimmer, thread - wiper, reverse - feed and presser footlifter

    電腦控制的高速平縫機簡化了普平縫機的,減少了工人的勞動強度,大大提高了生產效率.具有自動剪線、自動停針、自動倒縫及自動抬壓腳等功能。
  9. This thesis studies the method about the military map data fusion based on mapinfo : first, it introduces the classifies, the encoding and the formats of the military map data, and how to unify them ; then by programming and using the operations which maplnfo provides to realize data conversion including element stratums, attribute encoding and data formats. by this way can realize the unity in these three aspects ; finally, by using graphics clipping and contour line tracing to realize the military map data fusion

    本文重點研究了基於mapinfo平臺的軍地圖數據融合方法:首先研究了各種軍地圖數據的分類、編碼和格式統一的途徑;然後過編製和利mapinfo平臺的各種功能實現了包括要素層、屬性編碼和數據格式在內的數據轉換,實現了三種軍地圖數據在這三方面的統一;最後,過圖形裁剪和等高線的追蹤等演算法實現了軍地圖的數據融合。
  10. The experiment platform should communicate with pc through epp, further design on the foundation of this platform, according with the norm of human interface devices, usb interfacing is designed to carry out the communication of experiment platform and pc

    實驗平臺與pc機的訊設計,採的是epp和usb介面。 usb介面的設計是將實驗平臺設計成人機介面設備( hid ) ,基於usb介面的應,介紹了如何調系統提供的專api函數來啟動應與設備驅動之間的信。
  11. Normal web proxy with minimal modification according to new interface of our file system can achieve high performance on traditional operating system and hardware

    的webproxy只要針對此文件系統庫做很少的修改,運行在系統和硬體之上,就能達到較高的性能。
  12. Software to load is named loader. most of os treat loader as their component while working processes of this component are unknown by common programs. relocation technology is the key point

    完成加載功能的稱為加載器,系統的組件出現,並且大部分的系統都屬于這種類別:將加載器系統的基本功能,具體的加載過被系統屏蔽起來。
  13. In acf vtam, the unit of data that is transmitted between an application program and a terminal connected in basic mode

    在虛擬遠信存取法高級( acf vtam )中,在應和按基本方式連接的終端之間傳輸的數據單位。
  14. In acf / vtam, the unit of data that is transmitted between an application program and a terminal connected in basic mode

    在虛擬遠信存取法高級( acf vtam )中,在應和按基本方式連接的終端之間傳輸的數據單位。
  15. That is, production process of the human - machine system was perfected, and high efficiency and economic object was realized through research about present stuff flow, plane layout of workplace, human - machine operation program, action analysis, staff configuration and task measurement. secondly, the human - machine system, which was made up of operator and ipc, was designed and its technical system was researched and developed. crt ' s human - machine information management system was designed using language visual foxpro 6. 0

    本文從人機工學角度出發,深入分析了人機系統理論知識及其設計模型,首先進行了加工中心人機系統業分析及改善,即過對現有的物料型流、車間平面布置、人機、動分析、人員配置及業測定的調研,完善此人機系統生產過,實現了此人機系統的高效、經濟目標;其次進行了人和工控機組成的人機系統分析設計,並對此系統中的技術系統( crt顯示界面)進行了研究與開發,利面向對象技術的關系型數據庫語言visualfoxpro6 . 0設計了crt人機信息管理系統。
  16. Based on the embedded study of the actuality of computerized five - prevention operation system, this thesis presents a computerized five - prevention operation system for non - attended substation and raises a implementary scheme of computerized five - prevention operation system for non - attended substation which features one industrial host computer keeping several five - prevention substations, computer key showing all operation order sentences and recording operation time automatically, and distance communication interface making modification and transfer of distance operation programs possible between main station and substations

    本文在深入研究微機五防系統現狀的基礎上,介紹了一種應於無人值守式變電站的微機五防系統;提出了無人值守式變電站防誤系統的實施方案。該系統主要有以下特點:一是一套工控主機對多個變電站實現防誤;二是在中電腦鑰匙可顯示全部語句及自動記錄時間;三是各無人值守變電站與主站間有遠動訊介面,實現了遠方的修改和傳遞。
  17. One windows nt server and one set of datum processors set up the real time achievement database server, the server adopts windows nt 4. 0 as operating system, ms sql 7. 0 as database management system, through tcp / ip achieving visit the server. visual basic 6. 0 was adopted to develop the terminal software, the system altogether includes affairs reminding subsystem, sportsmen dividing into groups subsystem, referee giving a mark subsystem, achievement calculate subsystem and achievement issue subsystem, 6 subsystems. at the same time, the systematic security divide into server operating systems security, database management system security, client terminal software security, and network security as well

    該系統採兩層的c s結構: windowsnt服務器、一臺數據處理機建立了處理實時成績信息的數據庫服務器,服務器windowsntserver4 . 0系統, mssqlserver7 . 0為數據庫管理系統,並過tcp ip協議實現對server的訪問;採visualbasic6 . 0設計語言為開發工具研製了系統終端軟體,共包括事務提醒子系統、運動員分組管理子系統、裁判員評分子系統、成績計運算元系統、成績發布子系統、成績瀏覽子系統等6個子系統;同時將系統的安全機制分為服務器系統的安全機制、數據庫管理系統的安全機制、 client端應的安全機制和網路的安全機制;由於c s系統中影響系統性能的因素主要包括client 、網路、 server 、數據庫和應系統;在「花樣輪滑評分系統」中充分考慮了這些因素,從數據分佈、數據庫系統配置等方面來提高系統的性能;並從系統運行、數據庫維護兩個方面考慮系統的維護問題。
  18. You do this by using some sort of offline analysis or by actually instrumenting the application to gain intelligence about how it behaves and the effects of resource allocations

    可以過其他方法實現這種功能,例如使某些離線分析工具,或者過測量來獲得有關如何和資源分配效果的智能。
  19. Public security mechanism discovers, the bank on date of zhang of the bank on the net that the near future has illegal element to steal investor beforehand through trojan program and net counts word certificate, log onto account of the bank on its net through internet next, its fund has redemptive operation ( zhang ) arrives after 3 days, be in redemptive capital uses redemptive capital move to do him to use after 3 days

    公安機關發現,近期有不法分子過木馬事先盜竊投資者的網上銀行賬號和網上銀行數字證書,然後過網際網路登錄其網上銀行賬戶,將其基金進行贖回(三天後到賬) ,並在贖回資金三天後使贖回資金挪做他
  20. Via police investigation analysis, the bank on date of zhang of the bank on the net that illegal element steals lin mou probably beforehand through trojan program and net counts word certificate, account of the bank on its net logins through internet after, its fund has redemptive operation, be in redemptive capital uses redemptive capital to be used at buying network game to nod card to wait after 3 days

    經警方調查分析,不法分子很可能過木馬事先盜竊林某的網上銀行賬號和網上銀行數字證書,后過網際網路登錄其網上銀行賬戶,將其基金進行贖回,並在贖回資金三天後使贖回資金於購買網路游戲點卡等。
分享友人