embedded key 中文意思是什麼

embedded key 解釋
嵌入鍵
  • embedded : 埋入的
  • key : n 1 鑰匙。2 要害,關口,要沖。3 關鍵,線索,秘訣;解法。4 (外國書的)直譯本,圖例,題解,圖解,...
  1. Furthermore some possible improvement on uc / os were made. secondly, this paper analyzed the key technology in embedded linux and built our embedded linux in broadcom board

    嵌入式linux是面向高端應用的嵌入式操作系統,作者對嵌入式linux進行了研究並在broadcom主板上構造了自己的嵌入式linux系統,其中重點介紹了linux下bootloader程序的編寫。
  2. The system has advantages of carriable, easy to upgrade and expansive, etc. the paper studies the key technologies of development embedded system with the background of 3d laser distance meter system

    本文以三維激光測距系統為應用背景,深入研究了嵌入式系統開發過程中的關鍵技術並進行了實現。
  3. The thesis addresses the following key techniques in hardware / software codesign " system level behavior model, design evaluation, hardware / software co - synthesis and prototyping of embedded microprocessor

    本文的主要研究了系統軟硬體協同設計中的若干關鍵技術,包括:系統模型、設計評價技術、軟硬體協同綜合和嵌入式微處理器虛擬原型技術。
  4. ( 2 ) resolute correlatively key technical problems, such as : embedded modem, embedded tcp / ip protocol, embedded webserver, gateway rg mode, lan inside network communication protocol, physical interface technology, total system miniaturization design and so on

    ( 2 )解決相關關鍵技術難點,主要包括:嵌入式modem 、嵌入式tcp / ip協議棧、嵌入式webserver 、家居網關rg模型、局域網內部網路通信協議、物理層介面技術、智能應用終端改造途徑、整個系統小型化設計等。
  5. ( 3 ) the embedded watermark can be extracted only by using a secret key

    ( 3 )採用密鑰以加強水印的秘密性。
  6. While the key of embedded system software is embedded operation system ; one of the main works in os application is to write the hal ( hardware abstraction layer ) code. two open source code embedded operation system - uc / os and embedded linux were analyzed in this paper

    文中作者以broadcom主板為硬體平臺(基於motorola通信處理晶元mpc850 )對兩種公開源代碼的操作系統uc os和嵌入式linux進行了研究與應用設計,其中的關鍵步驟是編寫硬體抽象層介面程序。
  7. It includes chip selection, schematic circuit design, cpu selection and configuration, startup of the system, selection and configuration of embedded operation system, selection and configuration of tcp / ip software. it also describes some driver programming techniques of network controller. part 3 ( chapter 5 and 6 ) briefly introduces encryption technology and the ipsec protocol system, including architecture, mode, security association, security policy, implementation mode, processing of in / out packet, esp ( encapsulation security payload ), ah ( authentication header ), ike ( internet key exchange ) etc. the security requirements of embedded - networking is also analyzed

    本文首先探討了嵌入式網路的原理和設計要求,接著介紹了本文所開發的嵌入式系統的硬體平臺的設計(包括處理器的選擇與配置、存儲器的選擇和io設備的選用等) ,系統的啟動(包括bios和dos的啟動以及嵌入式操作系統vrtx的配置和引導) ,網路及其安全服務的實現(包括嵌入式協議棧usnet的選取、底層驅動程序的設計和安全協議ipsec的分析與實施) 。
  8. We know that iraq has embedded key portions of its illicit chemical weapons infrastructure within its legitimate civilian industry

    我們知道伊拉克已將它非法化學武器基礎設施的關鍵部分安放在其合法的民用工業里。
  9. Under the background, networked embedded computing comes to the key technology

    在這樣的背景下,網路嵌入式計算已逐漸成為支撐信息時代的擎天之柱。
  10. In the rigorous aerospace circumstance, it has been and will always be aerospace pursuance to design and produce satellite embedded computers with longevity, high reliability, miniaturization and low cost features, and the reliability is the key factor

    作為衛星的核心系統之一,星載嵌入式計算機的要求越來越高。在苛刻的空間條件下,設計製造高性能、小型化和低成本的星載嵌入式計算機,其可靠性問題已經成為發展長壽命衛星的重大阻礙。
  11. The main contributions of this dissertation are as follows : 1 ) forms a scheme of network maintance as well as realiztion of the problem testing software after a thorough analysis of the regular network problems and a pertinent comment on the merits and demerits of the network detection and maintainance methodology. 2 ) presents approaches to the realization of principles of network health testing, network resources list and connectivity testing in the network problem testing software, and gives a in - depth analysis of the key issues in design process with vivid flow charts and convincing testing results. 3 ) ponits out possible problems and offers feasible solutions in the migration and development of the embedded software from six aspects, touching upon byte order, semaphore, coding optimization, etc. 4 ) discusses the exception handling mechanisms and debugging process for the sake of improving software robustness

    本文的主要工作如下: 1 )研究了以太網常見故障並對網路探測維護方式的優缺點進行了詳盡分析,根據項目要求確定了本系統的網路維護方案,並對故障測試軟體的總體實現方案進行了設計; 2 )闡明了網路故障測試軟體中網路健康測試、網路資源列表、連通性測試的原理,提出了相應的實現方案,分析了設計過程中的關鍵問題,並給出軟體流程圖和測試結果; 3 )從位元組序、信號量、代碼優化等六個方面談論了嵌入式軟體在移植開發中的注意事項; 4 )為提高軟體的健壯性,討論了本嵌入式系統軟體採用的異常處理機制以及軟體調試過程中的。
  12. The main content of the project contains the status of the rfid application research, the principle of the signal process and coding of the rfid application system, the principle and design of the rfid security system, the principle and design of the rfid card reader device, the design and implementation of the embedded ethernet communication module and it ' s key technology, the analysis and the implementation of the eatery rfid application system, the general scheme of the project and the synthesis and the prospect of the research

    課題研究的主要內容如下: rfid應用研究現狀,射頻識別應用系統的信號處理及編碼技術,射頻識別應用系統的安全原理及設計,射頻識別應用系統的讀寫設備設計原理及應用開發,嵌入式以太網通信模塊的設計及關鍵技術,食堂射頻信息管理系統應用設計,食堂射頻識別應用系統的總體設計與課題總結與展望。
  13. Then describe three aspects of the key techniques of using linux as the development tools of embedded system including the real - time variant of linux ? ? rt linux and it ' s principle, implementation and the programming ; the network coding in linux kernel and the analysis of linux network device drivers and the online debug environment of linux kernel and rtlinux kernel. i have also involved the implementation of embed linux / rtlinux in a floppy to simulate the embedded environment. in the last part of this thesis, i give the suggestions and prospect of the development of a mature embedded system which have the most competition ability in china market base on the current work

    緊接著,分兩個方面論述使用linux進行嵌入式系統開發的便利,包括linux的實時變種? ? rtlinux的原理、實現方案和編程方法,並且編程實現了一個計算實時任務調度時間的軟體; linux網路設備驅動程序的分析和利用到嵌入式系統中的方案;然後,以作者在黑龍江傲立信息有限公司課外實習期間的實際工作經歷,介紹了基於lineo公司的ucsimm開發評估板進行嵌入式設備開發的一般過程。
  14. Some novel enhancing morphologic translation algorithms such as mark, areaselect, bylsland, island are implemented in the experiment of this thesis. and what ' s more, making full use of overlapping movement compensation, embedded zerotree wavelet translation encoding and contend - based wavelet translation, this thesis has achieved the human - face - central video compression of the key objects

    實驗中提出了一系列新型增強形態變換演算法,如mark 、 areaselect 、 byisland 、 island等,並且將交疊運動補償、零樹小波編碼、基於內容的小波變換等有機地結合起來,實現了基於人臉關鍵對象的視頻壓縮。
  15. Objective : to summarize the key points in extraction of embedded supernumerary teeth in children under intravenous anesthesia

    摘要目的:探討在淺靜脈麻醉下兒童埋伏多生牙拔除的臨床技術要點。
  16. Elementarily talking about key points to construction monitor and control of embedded plastic drain - pipe engineering

    淺談埋地塑料排水管道工程施工監控要點
  17. On above basis the article presents the key steps of builing the embedded linux system on pc / 104 module with compact flash card

    在認真研究了上述幾個問題后,論文給出了在帶有compactflash卡的pc 104系統中構造嵌入式linux系統的具體方法與關鍵步驟。
  18. For daa to work, the secure chip, known as a trusted platform module, has a private cryptographic key embedded in it

    為了讓直接匿名認證成真,必須在一般稱為信賴平臺模組的安全晶片內,嵌上加密過的私密金鑰。
  19. One value with embedded key : use the

    帶有嵌入的鍵的一個值:使用
  20. The client reconstructs the public key using the embedded key parameters

    客戶機使用嵌入的密鑰參數重新構造公鑰。
分享友人