進網協議 的英文怎麼說

中文拼音 [jìnwǎngxié]
進網協議 英文
network access protocol
  • : 進構詞成分。
  • : Ⅰ名詞1 (捕魚捉鳥的器具) net 2 (像網的東西) thing which looks like a net 3 (像網一樣的組織或...
  • : Ⅰ形容詞(共同) joint; common Ⅱ動詞(協助) assist; help; aid
  • : Ⅰ名詞(意見; 言論) opinion; view Ⅱ動詞(商議) discuss; exchange views on; talk over
  1. It provides a kind of method to ameliorate protocol

    它為改提供了一個思路。
  2. This paper aims at deep research of network device performance assessment method based on simple network management protocol ( snmp ) and eetf ' s rfc2544. a distributed antitype assessment system with this function is provided, and a test is performed with this system. some items will be discussed here

    本文以簡單路管理( snmp )和ietf的rfc2544等為基礎,深入研究了路設備性能測試的方法,給出了分散式測評軟體系統的體系結構和一個實現原型,並利用此原型系統行了測評實驗。
  3. Second, based on integrating networks of mobile management, the thesis modifies the access protocols of umts ps to build the transmission bearer cannel of data and signaling and guarantee the seamless connection of maent and umts. then, using adov routing protocol with mip, the thesis builds the emulation model of integration network and analyzes the throughput of network in ns

    然後,在ns ( networksimulation )模擬環境中,利用基於移動路絡( mobileinternetprotocol , mip )的按需距離向量路由( adhocon - demanddistancevectorrouting , aodv )對整合通信路模擬建模,並對整合通信路的路吞吐量行了分析。
  4. Then this paper concerns about the network packet intercepting technology of linux os and gives a thoroughly overview of network hacking methods and some application protocol criterion, including http, ftp, telnet, nntp, pop3, smtp etc. then the system design scheme of the transparent proxy has been discussed, this system can be divided to 4 modules below : establishment of transparent charnel, implement of proxy service, gui configuration and management application, accessory filter functions ( such as url filter, command filter and logger etc ). we explain key techniques in all 4 main parts of this system, define the interfaces of each module, what is more the main data structures and software implements codes are all illustrated

    首先,論文陳述了防火墻的相關技術基礎,分析了透明代理作為一種先易用的防火墻技術的原理,闡述了linux操作系統路數據包攔截技術和http 、 ftp 、 telnet 、 nntp 、 pop3 、 smtp等應用層規范和具體的工作流程。接著敘述了本透明代理服務器的系統總體設計方案,將系統分為以下幾個部分:透明通道建立、代理服務實現、 gui配置管理程序以及過濾功能(如url過濾、命令過濾和日誌審計等) 。論文然後分別介紹各個關鍵部分的具體實現要點,解釋了相互間的介面關系,列出了主要數據結構和實現流程。
  5. We analyze agent cooperation methods now commonly in use, and, on the basis of ecology and experiences, we propose a competitive price auction contract network protocol. while using the same network traffic volume as the simple auction, our strategy of second overbid competitive price auction can achieve the same effect as the traditional auction. further, we improve traditional contract network protocol, introduce constraints into message transmit, and use fell back punishment and credit when an agent cannot complete the intended task, consequently the traffic volume and the complexity of systems are considerably reduced

    本文分析了現在通常採用的agent同方法,提出基於生態學和經驗的競價拍賣合同,採用的選擇次高價競價拍賣策略能在與簡單拍賣相同的通信量上達到類似於傳統競價拍賣的效果,對傳統的合同行改,在消息傳播中加入約束機制和對agent不能完成任務時不採取轉變角色重新招標而採用違約懲罰和信用機制,減少了系統的通信量和系統的復雜度,最後在此基礎上實現一個基於fipa標準的多agent電子商務原型系統。
  6. One is the famous negotiation protocol - contract net protocol. we extend the contract net and introduce several parameters for mental state such as trust degree, conservativeness degree, cooperation frequency and activeness degree into process of announcing and bidding. we combine the bdi model of an agent with the extended contract net and implement contract net through a series of bdi - based rules of action

    研究工作主要涉及兩個方面:一是對傳統的? ?合同行了擴充,將信任度、穩健度、合作頻度和積極程度等心智狀態參數引入到合同的招投標過程中,並將agent的bdi模型與擴充的合同相結合,通過一系列的bdi行為驅動規則實現合同
  7. Secondly, i study the real - tune quality of ethernet and find out the ethernet is n ' t a real - time network. although real - time networks has a high real - time quality, it ' s stability is worse than ethernet ' s. we buy better networks " hardware and lessen the period of communication, so we need n ' t to improve the protocol of ethernet

    然後再對路的實時性行研究,雖然以太不是一個實時的通信,但現在的實時通信層比較少,這會帶來通信的可靠性問題,所以為了保證通信的可靠性和實時性我們通過加大硬體投資和減少訪問周期來達到實時性,這樣就不必要通過改變以太層就可以實現實時性的要求。
  8. This is to help reduce network traffic by allowing implementations to use more efficient data encoding, such as a binary protocol between the device and the wireless gateway, as long as such encoding is transparent to both the web service consumer and the producer

    這樣做是通過允許執行程序使用更有效的數據編碼方法來幫助減少路傳輸,例如在設備和無線關間使用二(只要這樣編碼對消費者和生產者是透明的) 。
  9. Hse protocol released by fieldbus foundation is the key study of this paper. hse unit module design, hse communication stack interface design, hse communication stack software integration design and message process flow are introduced in detail in this paper

    現場總線基金會發布的高速以太是本文的研究重點,在此基礎上,本文對高速以太行了軟體設計和實現,包括高速以太單元模塊的設計、 hse軟體的介面設計、 hse軟體的集成設計以及報文處理流程。
  10. Based on the analysis of shortcoming and limitation in traditional contract net protocol, the author provides a new cooperation strategy - improved contract net protocol, which improves the efficiency of the system and the quality of the task completed by introducing evaluated parameters and expanding the statements of tenderee and bidder. also, a bidder - selected strategy is presented. selecting a proper interaction way and expanding kqml can make kqml support high - level, complicated and multi - bout interaction and cooperation, and can realize the improved contract net protocol

    為實現改的合同,還需要對agent的通信方式行選擇並需要對agent的交互語言? kqml行原語級的擴充,以彌補kqml中有關任務交互原語的缺乏,使kqml支持agent間關于目標、任務的高層次、復雜、多回合的交互作,而實現改的合同
  11. An extended contract net protocol is presented in which the task manager may be permit bidding for tasks. as a result, the space of optimization is enlarged for the cooperation planning. the interaction diagram and planning model are described and the validity of the model is proved by genetic algorithm

    提出了一種任務管理者自身可以參與競爭的改合同,擴大了作計劃的優化空間,建立了作計劃的多agent交互模型和規劃模型,通過化演算法求解示例,驗證了作規劃模型的有效性。
  12. By synthetically using contract net protocol, the traditional mrp arithmetic theory, goal programming, fuzzy integrated evaluation, a production planning making algorithm for ve is presented creatively. the available - to - promise calculation algorithm model based on goal programming is discussed in details, and an improved simplex method is presented. the mathematics model of bid documents evaluation problem based fuzzy integrated evaluation and the fuzzy relation synthetic is presented in details

    3 、綜合運用合同、傳統mrp演算法的核心思想、目標規劃、模糊綜合評判等內容,創造性地提出了一種虛擬企業的成員企業之間生產計劃的制訂演算法模型;詳細討論了基於目標規劃的產品可交付量的數學模型,並且提出了一種改的單純型解法;給出了基於模糊綜合評判的標書選擇問題的數學模型,以及模糊關系合成運算的具體演算法。
  13. Firstly, a thorough analysis of the dynamic property of c4isr information fusion process is presented, and then a c4isr dynamic information fusion process model is proposed. based on the well - known de bruijn net, a new method to construct the topology of c4isr information fusion system is given. the contract net protocol is adopted to settle the problem of cooperation mechanism among nodes

    在對c ~ 4isr系統中的信息融合過程的動態特性行深入分析的基礎上,針對jdl等信息融合處理模型的不足之處提出了一種c ~ 4isr動態信息融合模型;提出了一種基於debruijn的c ~ 4isr分散式信息融合系統拓撲結構;在此基礎上,提出並建立了基於合同的融合節點交互機制。
  14. In this model, we adapt entity agent and abstract the entities in the workshop to manager agent, task agent and resource agent. the agents cooperate each other through contract net and complete the production order. we build and analyze the three agents " functionalities, discuss the cooperation process and make a simulation of a flexible job - shop scheduling problem

    該模型採用實體型智能體,將參與車間調度的實體浙江下業人學碩}學位論文抽象為管理者agent 、任務agent和資源agent ,並按照合同行智能體之間的調和合作,以達到智能體共同商來完成訂單加工任務。
  15. A resource can be active or passive. an active resource is the cpu or a network adapter for protocol processing ; it provides a service. a passive resource is the main memory, communication bandwidth or a file system ( whenever we do not take care of the processing of the adapter ) ; it denotes some system capability required by active resources

    資源可以是主動的或被動的,主動資源有cpu和處理的路適配器,它們提供服務;被動資源有主存、通信帶寬或文件系統,它們代表主動所要求的系統能力。
  16. 2. as the difficulty of design, the core of system, firstly, tcp / ip reference model and configuration are analyzed. secondly, necessary of demultiplexing and encapsulation of data are explained

    2 .作為設計的難點,首先重點論述了系統的核心? ?以太的tcp / ip通信,其次對分層的必要性和數據棧的封裝及分用行了介紹。
  17. It is capable of real time data stream analysis, ip data package logging and protocol analysis, which makes it a new hot issue in safeguarding the network security

    Snort是一個輕量級的路入侵檢測系統。它具有實時數據流量分析和日誌ip路數據包的能力,能夠分析,是路安全領域的一個新興的熱點。
  18. Then, about software design, this paper elaborates on the realization of the ethernet protocol and the interface drive of the ethernet

    然後,在軟體設計方面,對以太及以太介面驅動的實現、以太的實現行了詳細論述。
  19. The system capture the network packet with the help of winpcap, then analysis the packet, mainly analysis ip, tcp, udp and icmp protocol, and then display the data and store the data into the logs that may be analysed anon. and i design a intrusion detection language, and realize a intrusion detection database. after the network packet was captured, it match the packet

    其主要流程是數據包捕獲模塊運用winpcap抓取路數據包,然後對數據包分析,主要分析了ip , tcp , udp , icmp,並且按照數據包的類型顯示數據,並把數據記錄在日誌文件中供以後分析使用,同時設計了一個簡單的入侵描述語言,根據該語言的規則建立了一個入侵特徵數據庫,讓已抓獲的數據包與入侵特徵數據庫中的規則行匹配,如果匹配成功,則說明有異常行為發生,否則,則說明行為正常。
  20. The results of verification indicate that the ip protocol processor designed in this paper possesses the essential functions of ip protocol such as fragmenting, reassembly, routing and etc. and can process network data at the line - speed of 320mbit / s

    驗證結果表明,本文設計的ip處理器具備分片、重組、路由等ip的基本功能,並能以320mbit / s的線速度對路數據處理。
分享友人