高程式控制制加密 的英文怎麼說

中文拼音 [gāochéngshìkòngzhìzhìjiā]
高程式控制制加密 英文
vertical extension
  • : Ⅰ形容詞1 (從下向上距離大; 離地面遠) tall; high 2 (在一般標準或平均程度之上; 等級在上的) above...
  • : 名詞1 (規章; 法式) rule; regulation 2 (進度; 程序) order; procedure 3 (路途; 一段路) journe...
  • : 名詞1 (樣式) type; style 2 (格式) pattern; form 3 (儀式; 典禮) ceremony; ritual 4 (自然科...
  • : 動詞1 (告發;控告) accuse; charge 2 (控制) control; dominate 3 (使容器口兒朝下 讓裏面的液體慢...
  • : Ⅰ動詞1 (製造) make; manufacture 2 (擬訂; 規定) draw up; establish 3 (用強力約束; 限定; 管束...
  • : Ⅰ名詞1 (秘密) secret 2 [紡織] (密度) density 3 (姓氏) a surname Ⅱ形容詞1 (距離近; 空隙小)...
  • 程式 : form; pattern; formula; modality
  • 控制 : control; dominate; regulate; govern; manage; check; cybernate; manipulate; encraty; rule; rein; c...
  1. With the development of society, people increase the demand for medium density fiberboard constantly. it is an extremely urgent problem to set up the control system of the hot - pressing product line of mdf with higher automatic degree

    隨著社會的發展,人們對中度纖維板的需求不斷增,因而研究中度纖維板的熱壓生產線的,建立具有較自動化度的系統是迫在眉睫的問題。
  2. The main research contents are as follovvs : after the analyzing of the process of making train diagram, according with its character, and take into account the trend of innovation, chooses the total solution based on the b / s architecture, 3 - tier operation distributed and 2 - tier data distributed to separate the data from operation and simplify the development and maintenance ; the e - r data model that is accord with the 3nf criterion is designed after analyzing the data structure of the train diagram system. emphasis on the permission security of the distributed system, take the view schema, coupled with the login authentication and permissions validation, to ensure the data accessing domination, and take the synchronization, error control, and restore capability to advance the data security ; on the basis of b / s solution architecture, after comparing the existing transportation technologies, b - isdn and adsl is selected as the major solution architecture based on the package - svvitched networks. furthermore, error control, firewall, and encryption techniques are introduced to prevent the hacker attack and ensure the networks safety

    論文的主要研究內容包括:對目前我國列車運行圖管理體和編進行詳細分析,根據其「幾上幾下」的特點,並結合未來「網運分離」體改革的變化預測,選擇採用與之相適應的基於b s體系架構、三層業務分佈、二層數據分佈的整體方案,實現業務與數據的分離,降低開發與應用過的復雜度和總體成本;對列車運行圖系統的數據信息進行分析,設計符合3nf規范的數據e - r關系模型,並著重研究處于分散系統中的列車運行圖數據信息的訪問權限和數據安全問題,提出以視圖模結合用戶識別權限審定實現數據權限劃分,以並發處理、容錯技術、恢復技術提系統的數據安全性;在基於b s架構的系統整體方案基礎上,對當前多種數據傳輸技術進行分析比較,採用b - isdn為主幹網、 adsl為接入端的基於公用數據網路分組交換技術的系統網路體系結構,並針對網路自身安全性和黑客攻擊與侵入問題,詳細討論綜合採用差錯、防火墻、數據等技術手段提系統的網路安全性能。
分享友人