kernel level 中文意思是什麼

kernel level 解釋
核心層
  • kernel : n 1 (果實的)核,仁。2 穀粒,麥粒。3 內核,核心,要點。4 【原子能】(原子)核。5 【數學】(積分...
  • level : n 1 水平儀,水準儀;水準測量。2 水平線,水平面;水平狀態;平面,平地。3 水平,水準;水位;標準;...
  1. It was restaurant industry graven topic that that of that of from input / output angle said, how advance restaurant kernel ability to compete, with the purpose of advance business economic benefit, as soon as possible brought return, accelerating demonetization end, abaft experience know clearly near twenty year stodgy state look forward to reform mechanism, our state hotel industry be around by babyhood trend maturity, by seller ' s market trend buyer ' s market, such transit should make part rational consumer enjoy to good value for money, too brought ought to part superficial restaurant taste to inevitable ; the government owned restaurant at multinational restaurant bloc and civilian battalion restaurant enterprise " dual impact down, calendar by know clearly reform of monetary system cum bank commercialization, market open cum solution control, market cum competitive mechanism three phase, owing to planned economy belated issues, structure irrationality wrought a matter of and overlapping investment wrought a matter of wait threefold cause, make government owned restaurant at market competition middle gradualness forfeiture competitive edge, in progression appearance hot water, how advance government owned hotel competitive power a matter of, toward me state tourism possess strong operation significance, hunan lotus hotel namely same family pole tool on government owned three stars level hotel behalf of the for the last years, by way of hotel industry occupy quite specific gravity

    從投入產出的角度講,如何提高飯店核心競爭能力,以達到提高企業經濟效益,盡快產生回報,加速貨幣回籠的目的,是飯店業嚴肅的話題。在經歷了近二十年步履艱難的國企改革歷程后,我國飯店業已開始由幼稚走向成熟,由賣方市場走向買方市場,這種轉變將使得部分理性的消費者享受到物有所值,也使部分膚淺的飯店品嘗到必然的失敗;近十年來,作為飯店業占相當比重的國有飯店在跨國飯店集團和民營飯店企業的雙重沖擊下,歷經了金融體制改革及銀行商業化、市場開放及解控、市場及競爭機制三個階段,由於計劃經濟遺留下來的問題、結構不合理造成的問題和重復投資造成的問題等三方面的原因,使得國有飯店在市場競爭中逐漸喪失競爭優勢,相繼出現困境,如何提高國有飯店競爭力的問題,對於我國旅遊業具有強烈的現實意義,湖南芙蓉賓館就是一家極具代表性的國有三星級飯店。
  2. The excellent level peanut kernel carefully chose in the homeland, take off red clothes, get rid of a gemmule, may be on a par with lucca oil each other

    粒粒優級花生米,精選國內優級花生米,脫紅衣、去胚芽,並有效杜絕了紅麴黴素的留存,可與橄欖油相媲美。
  3. In the following part, the author expatiate the experience and kernel technology during implementing cals strategic system which brought out by amercia dod. on the base of consummate the software and hardware in perfect, the author probes into the validly composite concept model of information resource share in our army. the concept model can provide some reference on how to lay out basic establishments and environment for information resouce share, we hope we can realize effective information resource share level in battleplan development by adopting relative technological criterion and policy

    本文從研究國內外軍機研製部門在實現信息資源共享領域的應用現狀著手,詳細探討了美國國防部在推出cals戰略體系時的實施經驗和相關核心技術,在進一步完善現有軟、硬體設施的基礎上探討了我軍軍機研製中實現有效信息資源共享集成系統的概念模型,為統一規劃和建設適應我國軍機研製的信息資源共享環境提供了參考,爭取在下一代軍機研製牛能夠實現滿意的信息資源共享水平。
  4. Several approaches are provided to construct secure operating systems. the paper mainly discusses diverse security policies in operating systems. by the gfac framework, we implement several security policies in linux kernel version 2. 2. 14, including hru model based fine grain discretionary access control, multi - level security policy based mandatory access control and biba model based integrity access control

    文章重點研究了如何在操作系統中實現多種安全策略,並在linux內核版本2 . 2 . 14中根據訪問控制通用框架( gfac )方法,實現了基於hru模型的細粒度自主訪問控制、基於bell - lapadula模型多級安全規則的強制訪問控制以及基於biba模型的強制訪問控制等多種安全策略,從而有效地增強了操作系統中信息的保密性和完整性。
  5. Through the implementing of kernel level file and cache mechanism at the client side, this newly proposed distributed network file system provides seamless network file access and reduces the performance decline caused by network transmission. utilizing the concept of logic block server, it provides the reliable data block storage and implements redundant storage capacity. utilizing the concept of the index server, it provide s the cost of the greatly for server and network during data access process and realizes the computing with balancing capacity

    在客戶端通過實現內核級文件的調用和緩沖機制,實現了文件的無縫網路存取,並減少由於網路傳輸帶來的性能下降的影響;利用邏輯塊服務器實現邏輯塊的冗餘存取,實現數據塊的安全存放;利用索引服務器進行負載均衡計算,實現資料存取的較低網路和服務器開銷;利用索引服務器實現服務器組的零管理,使該系統具有高效性、穩定性和可伸縮性。
  6. Drawing lessons from such methods that american scientists research the climatic features o f llj, combining c hinese w eather c haracteristics and c onsidering from vertical features of single station wind, we classified chinese southwest llsw, llj and low - level southwest strong wind without kernel in conception

    本文借鑒北美學者研究低空急流氣候特徵時的思想方法,同時結合中國的天氣特點,從單站風的垂直結構特點出發,對中國的西南低層大風、西南風低空急流、無核低層西南大風現象作了概念分類。
  7. By processing the serial of experimentation, the operator can not only comprehend the principle of os, but also he can get a basic ability of high level language programming, kernel programming, driver developing and embedded system developing

    實驗者進行這套實驗不僅可以通過分析一個操作系統成品? ? linux來理解操作系統原理,還可以為在linux下的高級語言開發、內核程序開發、驅動程序開發以及嵌入式系統開發打下一定基礎。
  8. We bring out a new method to implement auditing system by extending lsm framework and inserting auditing hooks into kernel. in this way, a secure kernel - level auditing subsystem, which is based on linux and accords with the fourth level requirements of the national standard of china, is designed and implemented, and its performance is analyzed

    本文提出了一個通過擴展lsm框架、在內核中安插鉤子函數調用來實現審計系統的方法,並遵循國家標準gb17859 - 1999第四級要求,在linux上設計並實現了一個審計系統,並對系統性能進行了分析。
  9. Then the article introduces the design and realization of user level monitor module and kernel level monitor module detailedly, including how to realize the system clipboard monitor, the file motion control, file print job interdiction, and the directory share monitor in system ’ s user level, how to realize the process accessing filter, the process privilege control, the file encryption and decryption in system ’ s kernel level

    本文詳細給出了用戶層監控模塊和內核層監控模塊的設計和實現,包括如何在操作系統用戶層實現系統剪貼板監控、文件移動控制、共享目錄監控、文件列印阻斷等,如何在內核層實現進程訪問過濾、用戶進程權限控制、文件透明加解密功能。
  10. This system has two levels, first, at the firm level, financial performance of the whole value of the intellectual capital is developed ; second, at the operation level, the non - financial measurement is performed using iam theory, which is the kernel of this thesis

    本文運用先進的iam測量體系,設定一系列的指標,對識別出的測量對象進行系統的非財務績效測量。
  11. On the basis of it, i design and implement ipsec in the network protocol stack of linux kernel, which can verify the encryption, integrity and authenticity of data at the ip level. it solves the problem of identification deceit, malicious modification and interception when datum is transmitted on the network, and the security of network transmission is improved greatly

    在此基礎上,在linux內核ip協議棧中設計並實現了ipsec ,在ip層提供數據傳輸的機密性、完整性和真實性,解決ip數據報在網路中傳輸時的身份偽造、被人篡改以及被竊聽的問題,使網路傳輸安全性得到很大提高。
  12. If an attacker can ' t take advantage of user privileges to install kernel - based software, the level of effort required to compromise the pc might be high enough to encourage him to find a softer target

    如果攻擊者不能利用用戶特權安裝內核軟體,危害此pc所需的努力可能高到激勵他尋找更軟弱的目標。
  13. Among them are ip firewalling, authentication mechanisms, system logs and auditing, cryptographic protocols and apis, kernel - level vpn support, and many more

    其中有ip防禦、認證機制、系統日誌和審計、加密協議和api 、內核級vpn支持,等等。
  14. Option to check that you have a suitable 2. 4 kernel level, and use the

    命令來檢查您是否擁有適當的2 . 4內核級別,使用
  15. Set the kernel level

    設置內核版本:
  16. And to improve matters further, there are administrative tasks - even at the kernel level - that you can perform on the fly, keeping your servers available

    為了做到盡善盡美,您可以實時執行一些管理任務,甚至是內核這一級別的任務,從而保持服務器的可用性。
  17. Detailed analysis is made on wireless sensor network ( wsn ) os hardware platform environment, system features and basic functions, and a novel os architecture providing reasonable function division between kernel level and service level is proposed

    摘要詳細分析了無線傳感網操作系統的硬體平臺環境、自身特點和基本功能,提出了一種合理劃分內核層與服務層功能的操作系統整體架構及內核結構。
  18. In this paper, the process migration mechanism in mosix cluster is studied firstly. and then, the implementation of tcp and udp socket in linux are also studied by reading the linux kernel source. on the basis of that, the key problems of socket migration are discussed. after that, a complete scheme of socket migration system in kernel level is presented and a prototype is implemented in mosix cluster which solved the problem of transparent tcp and udp socket migration in linux cluster

    本文首先研究了mosix進程遷移機制,然後通過源碼閱讀分析了linux系統tcp和udp套接字的實現,並在此基礎上,討論了這兩種套接字遷移中的關鍵問題;然後給出了內核級的遷移套接字的完整方案,實現了一個套接字遷移在mosix集群系統上的系統原型。
  19. The first phase construction of group networking security determined the organizing framework of security management, established integrated security strategy and networking security management system, and solved the problem of uniform defense and concentrated control for the w hole network virus, the security problem of transmission of the ddn special line, and the problem of accessing control of the important networks and networking servers by combining with corresponding security technique, anti - virus technique, firewall technique, invasion detected technique, and risk evaluation technique, etc, and implemented the security defenses for the weakest level ( transmission security of inter - region mainline network ) and kernel level ( multi - lans in first class secret units ) in the system

    集團網路安全一期建設確定了安全管理組織機構、制定了整體安全策略和網路安全管理制度,並結合相應安全技術防病毒技術、防火墻技術、入侵檢測技術、風險評估技術等,解決了全網病毒的統一防範集中控管問題、 ddn專線上的傳輸安全問題、重要網路及網路服務器的訪問控制問題等。實現了系統的最薄弱層(跨地域主幹網路傳輸安全) 、核心層(多個一級保密單位局域網)的安全防範。
  20. Event tracing for windows is an efficient kernel - level tracing facility that lets profiler log kernel or application - defined events. the data collected from the event provider can only be viewed using calltrace option of the

    Event tracing for windows ( etw )是一個高效的內核級別跟蹤實用工具,它使探查器可以記錄內核或應用程序定義的事件。
分享友人