operating system design 中文意思是什麼

operating system design 解釋
操作系統課程設計
  • operating : adj 1 運行的;操作的;工作的。2 關于業務的;營業上的;關于收支的。operating expenses 業務開支;營...
  • system : n 1 體系,系統;分類法;組織;設備,裝置。2 方式;方法;作業方法。3 制度;主義。4 次序,規律。5 ...
  • design : vt 1 計劃,企圖,立意要…。2 指定,預定;留給,留著。3 設計,草擬,擬定,籌劃;起草,畫草圖,打(...
  1. This design can resolve the question of costliness. embedded operating system is the core of embedded automobile navigation systems. it manages arm ’ s resource and is the base of application, so it will be discussed in detail in this artlcle

    這樣的設計,解決了單獨的基於pc機的導航系統和基於wince的嵌入式導航系統成本高或攜帶不便的問題,系統性價比高,可彌補傳統導航定位系統的不足。
  2. Embedded system is an application specific computer system that focuses on the application and it is based on the computer technologyjts hardware and software is cuttable. the development of embedded systems is very fast during the last ten years, furthermore, as an important part of embedded system, embedded operating system is uesed in the embedded systems more and more, especially in handheld devices and electronic devices. but the design techniques of embedded system and embedd software is still germinant, and there are no standards and universal methods about it

    嵌入式系統是以應用為中心,以計算機技術為基礎,軟硬體可剪裁的專用計算機系統。近十幾年來,嵌入式系統的發展異常迅速,嵌入式操作系統作為嵌入式系統的核心,其應用也越來越廣泛,尤其在手持設備、信息家電領域更加突出。但嵌入式系統以及嵌入式軟體設計技術仍舊處于起步階段,仍舊未能形成一套完整、有效、通用的開發方法和規范。
  3. Besides, to enforce the security of authentication process, in this thesis we propose the design and implementation of a passwd checker and mandatary identification and authentication mechanism in ercist 4. 0 secure operating system

    本文還介紹了安勝4 . 0安全操作系統中口令檢查器和強身份認證機制的設計和實現,以增強鑒別過程的安全性。
  4. Design of aerodynamic operating system of loader multiple valve

    裝載機多路閥氣動操縱系統設計
  5. Furthermore, applying embedded real time operating system to the design of onc is innovative and can prompt the development of onc

    同時,將嵌入式實時操作系統引入到開放型數控系統開發當中,對開放型數控系統的研究和發展具有創新和現實推動意義。
  6. The method that absorb return circuit design used in power design and electromagnetic valve drive circuit, system power and operating supervision to mcu and redundancy and digital filter technology to the time interval to send wave and echo are used in system design to ensure the reliability and accuracy of measure and control system

    本系統在電源設計、電磁閥驅動電路中的吸收迴路設計、系統主電源和訛u運行監控以及採集的對發射波與回波時間間隔數據採用的冗餘技術和數字濾波措施,保證了測控系統的可靠性和精確性。
  7. Other differ operating system program theory are semblable, also it can expand. in addition, founding dll can process program blocking design in order to software engineering

    其他的不同操作系統之間的網路通信編程原理與其相似,本文沒有詳細講述,此原理並且可擴展到多臺。
  8. The program is developed with visualizing programming language called visual basic. net and general cartography software called autocad. based on the windows operating system, it has realized the integration of intelligent design, data processing and automatic cartography in a transformer substation ' s primary circuit, using intelligent technique supported by expert system, activex technique to develop

    開發的一次智能cad系統可以顯著提高工作效率、減少技術人員的勞動,對于促進供配電cad技術向高層次的集成化、智能化和標準化方向發展具有重要的理論意義和現實意義,是供配電所設計工作的發展方向。
  9. During the selecting of operating system, we find that there is an undirected, insufficient and complicated of the mysql + php under linux. so, we are planning to setup a database will be a convenient, fast tool for users who just can find out the related information from the internet. to design and apply software of the rnai medical information database analyzer

    在數據庫操作系統選擇過程中, linux下mysql + php建立的數據庫存在不直觀,數據類型不足,且對數據庫的修改操作過程復雜等缺點,為了使用戶可以方便、快捷地使用本數據庫,軟體設計採用了動態數據庫交互結構,外部用戶通過網際網路使用通用的瀏覽器就可以訪問數據庫。
  10. Being a widely utilized public ip platform, it is susceptible to security attacks of all nature, as outlined in the following areas : the open nature of the ip internet systems - increase of foreign attacks, for example dos / ddos attacks ; the current weakness of the existing operating system ' s internet protocol ; mainframe, and lack of an evaluation standard for back office systems, the inevitable problem of illegal internal access, the lack of guidelines for record keeping and post attack documentation processes, hi addition, still in existence, are managerial problems including the lack of securit y knowledge amongst the workforce and the inexistence of a complete set of security guidelines. to guarantee china telecom ' s 163 / 169 system ' s reliable functions, to protect the user ' s interests, at the same time, insuring quality service, it is necessary to adapt p2dr model as a solution to the current security issues. supported by the modern secure theory and made the secure implementation abundant project practices, this paper gives the general secure design for the chongqing public ip network using p2dr secure model

    中國電信建設的公眾ip網對我國internet的發展起著決定性作用,重慶電信163 / 169網際網路是國家骨幹網在本地的延伸,擁有7個核心節點(採用cisco12012 、 2 * 2 . 5gdpt環) ,三十八個匯接節點,能提供寬帶,窄帶多種接入方式的公眾ip網,現擁有近20萬用戶,佔全市網際網路用戶四分之三以上,作為這樣一個擁有眾多用戶,開放的ip平臺,會受到各種各樣的安全威脅,主要表現在ip網路的開放性,來自外部的攻擊增多,如dos / ddos攻擊;所使用的操作系統運行的網路協議自身的脆弱性;主機、網路設備的配置是否缺乏評估手段;不可避免的內部非法訪問;缺乏必要的攻擊審計作為犯罪取證,出此之外,還有管理上的一些問題,如人員安全意識不強,安全制度不夠健全等多方面原因。
  11. On the operating design of raas, the paper focused on the change of task _ struct, the design of kernel process kaasd, the timing of raas, the configuration and initialization of raas in the end, the paper evaluate the raas from the aim of system design, the integration with the other secure components of secure os, provide some problems unsolved, such as the expanding to network monitor, the new technology of ids

    對于實時審計分析系統的整體運行設計,從操作系統原有數據結構task _ struct的改變,內核進程kaasd的設計, raas的定時和系統的配置和初始化這幾個方面逐個進行敘述。在本文的最後,從raas的達到的目的,與原有安全功能的有效合成等方面對該系統作了一個評價,同時提出幾個需要進一步思考的問題,如對網路的擴展,對入侵檢測新技術的引入等
  12. Chapter 1, we introduce this paper. chapter 2, we anatomy active signaling and probe particularly. active signaling protocol ( asp ) is an important application in active network. probe is a model to debug and inspect active environment. furthermore, we analyse rsvp and its employmet process. chapter 3, we bring forward the active signaling and probe model to scout the network state. chapter 4, we analysys key class and object in the model. chapter 5, we design programmes for user and deploy it to linux 9. 0 operating system so we can experiment partly. chapter 6, we sum up and analysis work for later

    在第三章中,我們提出了主動信令和探針的結合模型,並用主動探針對網路狀態進行監視。在第四章中,我們對于模型中的關鍵類和對象進行了分析。第五章我們對探針程序及用戶端程序進行了設計,並在linux9 . 0中配置ee環境,對本文提出的處理模式進行了部分實驗。
  13. With increasing requirements of embedded system application and compliaction of embedded system design, on one hand, it is very necessary to use operating system as a implement platform, on the other hand, the controdiction of low commonness of embedded operating system and the shorting - time to market of the embedded product is very pointed. how to improve the performance and efficiency of embedded operating system is become a research hotspot. so with the research and implementation of microkernel eos51 for operating system based on sigle - chip computer, the paper gives an arichitecture of microkernel

    因為系統專用性能和其他功能方面的需求,使嵌入式操作系統必須具有各自獨特的特點。嵌入式系統應用功能需求的增加和系統設計復雜性的增大,一方面,系統設計和實現越來越離不開嵌入式操作系統作為底層支撐平臺;另一方面,嵌入式操作系統的非常低的通用性和日益縮短的嵌入式產品上市時間的矛盾日益尖銳。嵌入式操作系統的性能和效率已經成為當今嵌入式操作系統研究的熱點。
  14. First, thinking about all kinds of security. research internet security and financial affairs control. through the analyze of the internet financial affairs information system ' s risk, talk about the inter - control on the base of internet financial affairs information system ( operating system control, database control ) and outer - control on the base of internet financial affairs system ( surrounding control, visiting controk e - commerce controk remove disposal control ) second, on the e - currency and financial affairs balance, design different kinds of e - currency balance programmes. ( credit card. saving. case ) simplify the enterprise ' s balance and saving the last of balance ) widen the range of e - commerce activity

    首先,出於各個方面的安全考慮,就網路安全與財務控制方面作了研究。通過對網際網路財務會計信息系統的風險分析,提出了基於網際網路財務信息系統的內部控制(操作系統控制、數據庫控制)和基於網際網路財務信息系統的外部控制(周界控制、大眾訪問控制、電子商務控制、遠程處理控制)的方法。其次,就電子貨幣與財務結算方面,設計了不同類型電子貨幣的結算程序(信用卡型電子貨幣結算程序、存款利用型電子貨幣結算程序、現金模擬型電子貨幣結算程序)使企業簡化結算手續和節省結算費用的開支,擴展了電子商務活動的范圍。
  15. Dual - core embedded processor has high performance, high reliability, low frequency, so, it ’ s cared by many processor chip manufacturer. more, it has good pin compatibility, design compatibility with the prior signal - core processor, so, has attract many big telecomm equipment supporters. but, it need the support from the new real time operating system which under designing

    雙核嵌入式處理器以其高性能,低主頻,高可靠性正得到許多晶元生產商的關注,它具有良好的管腳兼容性,與單板硬體設計上的與單核處理器具有良好的兼容性,得到許多電信設備製造商及嵌入式高端應用集成商的垂青。
  16. Aim at the current practical situation, a kind design procedure is presented on terminal which based on arm and c / os -, and selects the arm microprocessor and operating system combine with the demand of the subject. it designs the hardware system based on the lpc2124 and the periphery interface chipset, and implements the transplantation of c / os - on the lpc2124, compiles the hardware drivers and the api based on c / os -, the system introduces multitask based on dispatching priority to solve the disadvantage of the foreground / background system. a kind of project on remote update software based on gprs and iap is presented, and discusses the reliability in the end

    針對目前實際情況,在研究了終端設計多項技術的基礎上,設計了一種基於arm和c / os -的配變監控終端,結合課題的要求對arm處理器和操作系統進行了具體選型,在基於lpc2124的mcu和外圍介面晶元上,進行了終端硬體系統的設計;實現了cos -在lpc2124mcu上的移植;編寫了基於c / os -的api介面函數和底層硬體驅動程序;採用多任務按優先權調度的方式解決了任務處理的實時性,克服了傳統前後臺軟體在復雜的監控終端設計中實時性差的問題;針對終端軟體升級方案進行了探討,提出了一種基於gprs網路的遠程在應用編程( iap )的軟體升級方案,對終端軟體升級模塊進行了軟、硬體設計,並對升級方案的可靠性進行了探討。
  17. Sixth, we introduce some helpful investigations about some key technologies of high level secure operating system design, such as covert channel analysis and trusted path, and describe their coarse - gained implementation in the real system

    第六,對高等級安全操作系統設計的其它幾個關鍵問題,包括隱蔽通道分析處理、可信路徑等做了有益的探索,給出了其在系統中實現的大致方案。
  18. This paper introduces the whole process porting and configuring from standard i386 architecture to arm architecture. this paper introduces the embedded system and linux operating system first, obtains the combination - embedded linux, and analyzes the features, advantages and current trends in the world. then introduces the hardware of embedded operating system, design an embedded system that can meet the requirements and improve the abilities of porting and reuse

    本文首先對嵌入式系統、 linux操作系統進行了簡單介紹,然後引出了二者結合的產物? ?嵌入式linux系統,並分析了其特點、優勢和目前國內外的研究情況;而後介紹了嵌入式系統的硬體,從整體上把握一個嵌入式系統使之即滿足應用要求,又能提高軟體的可移植性和可重用性。
  19. While some of the basic security functionality has since been added to this line of product, certain aspects of the operating system design make it

    雖然已經將某些基本安全性功能添加到這一產品系列中,而操作系統設計的某些方面
  20. Daacm is conformant to the requirements of the secure operating system design of structured protection level, and will be used to the practical system design

    Daacm符合論文中給出的《結構化保護級》安全操作系統設計的需要,並將實際應用於該系統的設計之中。
分享友人