present protocol 中文意思是什麼

present protocol 解釋
本議定書
  • present : adj 1 在座的,出席的,在場的,到(場)的;現存的,存在的 (opp absent)。2 現在的,今天的,當前的...
  • protocol : n 1 議定書;調查書,始末記。2 (條約等的)草案,草約;(羅馬教皇詔書等的)首尾程式。3 〈the P 〉 ...
  1. In this dissertation we present a general, extensible methodology that examines cryptographic protocols. our approach is specify a protocol in cpal ( cryptographic protocol analysis language ), apply hoare and dijkstra ? theory of formal semantics to it, analysis it ? forma ] semantics, define weakest precondition of each kind of language statement

    我們的方法就是用cpal ( cryptographicprotocolanalysislanguage )語言來表示協議,將hoare和dijkstra在形式語義方面的理論應用到該語言,分析該語言的形式語義,定義每種語句的最弱前置條件。
  2. This essay set forth the exploitive ways about web application system base on. net framework, particular discuss the problems from hereinafter five aspects : ( 1 ) proceed from present software design direction, the paper probed in details the development trend in the future, and demonstrate the strategy which was held by microsoft on july 2000, at the same time compared it with some other advanced technology. the. net platform is a brand - new development framework, in which it supply some windows service and a brand - new api programming interface of cooperation and integrated much back - end technology of 1990s of microsoft. the elements that. net merged into include : com + componet service, the web developing framework, xml and ood, the support to new web service protocol ( such as soap, wsdl and uddi ), and the idea taking internet as the centre

    Net平臺是一個全新的開發框架,它具有與windows服務和api合作的全新編程介面,集成了microsoft公司20世紀九十年代後期的許多技術。 . net中融合的元素包括: com +組件服務、 web開發框架、 xml和面向對象設計,對新的web服務協議(如soap , wsdl和uddi )的支持,以及以internet為中心的理念。
  3. Then, the paper present a protocol misusage ids in application layer based on markov chain, and obtain the following results after test : the system can have good effection on detecting the probe packet, dos attack and novelty attack. the system can overcome part of disadvantages in traditional intrusion detection system, and adapt requirements with different network. the experiment shows that the system can improve the detection accuracy rate, reduce the false negatives probability

    通過對檢測系統的測試分析,系統對掃描探測報文、 dos攻擊報文和新的攻擊報文等有較好的檢測率。基於馬爾可夫鏈建立的網路異常檢測系統可以克服傳統入侵檢測系統的部分缺陷,能夠適應不同網路環境的要求,同時也有效提高了系統的檢測能力和檢測效率,降低了誤報率。
  4. And we also present a multi - party security scalar product protocol

    其中我們還給出了一個安全的多方點積協議。
  5. Quantum key distribution protocol makes use of single photon of quanta - randomicity to achieve unconditioned security key distribution, especially which is the realism significance of research way in quantum information at present

    量子密鑰分配( qkd )協議利用單光子固有的量子隨機性實現具有無條件安全性的密鑰分配,是目前量子信息領域中特別具有現實意義的研究方向。
  6. After the briefly present the origin and features of internet protocol version 6 ( ipv6 ), the paper detailedly introduced the conception, characters, security technologies of vpn, and main tunnel protocols used to implement and deploy vpns. after analyzing and comparing these technologies of realizing vpns, we choosed ipsec. then, the paper analyzed in the ipsec structure, function, work mode, and its components such as authentication header ( ah ), encapsulating security payload ( esp ), internet key exchange ( ike ), encryption and authentication algorithms, security association, security policy, and how they cooperate with each other in order to secure ip packages

    在簡要介紹ipv6協議的由來和優點之後,詳細闡述了虛擬專用網的概念、特點、安全技術及實現的關鍵隧道協議,通過對實現技術的分析比較,選用了安全性強大的ipsec隧道技術,接著深入研究了ipv6安全協議ipsec的體系結構、操作模式,詳細論述了ipsec協議簇的各個組成部分,如認證報頭ah協議、封裝安全載荷esp協議、密鑰管理ike協議、加密認證演算法、安全聯盟和安全策略等,以及這些組件之間如何協作,來共同實現對網路層ip數據包的安全保護。
  7. In this paper, we present network management basie frame, network management protocol, intelligence agent and sane " elated theorys. according to the practical cnvironment of tyut campus network, we describe in detail the design and implemen : of a network performance management system based on snmp

    本文詳細論述了網路管理的基本結構、網路管理協議、智能代理以及相關的理論知識,並給出了一個基於snmp的網路性能管理系統的設計及實現過程。
  8. This thesis is about the designing and implementing the ems of epon system. the main contents are as follows : 1 ) with reference to the ieee802. 3ah protocol, we introduce the basic structure and advantages about epon system 2 ) compare the characteristics of snmp ( simple network management protocol ) with cmip ( common management information protocol ), after that we present an ems based on snmp

    本文主要研究的是基於snmp的ems的開發,主要內容如下: 1 )第一章以ieee802 . 3ah為參考,介紹了epon的系統結構以及優點。 2 )第二章比較了snmp和cmip各自的特點以及epon系統獨有的特點,提出了基於snmp (簡單網路管理協議)的epon網元管理系統結構模式,並對snmp協議的原理進行了詳盡的闡述和研究。
  9. But at present, many mobile banking systems only use some cryptographic algorithms as security measures, without depicting the procedure of message exchanging as a secuity protocol, needless to say how to analyze it or provide the correctness proof of it

    但目前很多手機銀行系統中只是簡單的使用了若干密碼演算法作為安全措施,沒有把消息交換過程抽象描述成安全協議的形式,更談不上對其進行形式化的分析證明。
  10. Based on collected and read literatures, this paper gives the analysis of its characteristics, architecture, security problem, qos problem, and comparison among present popular wireless ad hoc routing algorithm as well. 4. according to the characteristics of wireless network situation of wearable computer, this paper comes up with a wireless network frame for wearable computer based on lsr ( link state routing protocol )

    ( 4 )結合可穿戴計算機無線網路環境的特點,在對自組網路由選擇演算法比較分析的基礎上,提出了一種適用於可穿戴計算機無線網路的基於混合路由策略的lsr ( linkstateroutingprotocol )路由協議的框架,它能夠根據網路拓撲結構變化的不同程度在先應式和后應式路由策略之間進行自然平滑的切換。
  11. The goal of this paper was to present a spatial and temporal sharing framework ( including consistency maintenance, grouping method, dr algorithm and special transmission protocol ) for dve system to increase scalability and offer higher interaction ability

    本文的研究目標是針對dve系統規模變大,交互性變強的特點,提出一個包括一致性控制方法、分組方法、 dr演算法和專用傳輸協議在內的時間和空間共享解決框架。
  12. Firstly, the present condition of the power communication is discussed. at the same time, the necessity of the paper, and the function of the management machine of power communication, protocol conversion and communication management, are also presented

    首先,論文探討了電力通信的現狀,論述了開展論文工作的必要性,討論了通信管理機所實現的功能,規約轉換和通信管理。
  13. By comparing present five popular fieldbus and combining with ship ' s special environment requirements, the article proposed development project of vdr system, also characteristics and protocol of can ( control area network ) fieldbus were expounded

    對當今流行的5種現場總線進行了對比,結合船舶的特殊環境提出採用can總線進行船載航行記錄儀開發的思路,並闡述can總線的特點和協議規范。
  14. Quantum communication is a rising interdisciplinary field which combines classical communication and quantum mechanics. quantum key distribution protocol makes use of single photon of quanta - randomicity to achieve unconditioned security key distribution, especially which is the realism significance of research way in quantum information at present

    量子密碼術是經典通信和量子物理相結合的一門新興交叉科學。量子密鑰分配( qkd )協議利用單光子固有的量子隨機性實現具有無條件安全性的密鑰分配,是目前量子信息領域中特別具有現實意義的研究方向。
  15. ( 4 ) apply zero - knowledge proof into digital watermarking verification and present a kind of watermarking verification protocol

    ( 4 )將零知識證明應用於數字水印認證,提出數字水印基礎設施中的一種數字水印認證協議。
  16. Previous protocols for determining whether a point is inside a circle are not secure enough. we present a two - round protocol for computing the distance between two private points and develop a more efficient protocol for the point - circle inclusion problem based on the distance protocol. in comparison with previous solutions, our protocol not only is more secure but also reduces the number of communication rounds and the number of modular multiplications significantly

    保護私有信息的計算幾何問題是一類特殊的安全多方計算問題, attalah等首先提出了安全多方計算幾何的概念,介紹了點的包含多邊形相交判定最近點對及凸包問題,並分別基於茫然傳送協議及置換協議設計了兩個不同的點積協議,在此基礎上提出了解決點在多邊形中的包含判定及兩個多邊形相交判定的初步方法,但正如作者所指出,其方法還不夠完善,協議效率有待進一步改進。
  17. In 1995, the scientists in ntt basic research laboratories and university of geneva present a new system based on the symbiosis of the previous two, which is called as 4 + 2 protocol

    1995年,日本ntt基礎研究實驗室和日內瓦大學的科學家結合bb84與b92協議,提出了一種新的量子加密體系,被稱為4 + 2協議。
  18. We also present a simple communication. using this protocol, multiplexors can establish communication link and control data traffic

    我們結合項目的實際情況,提出一種簡單的通信協議( mcp )以滿足兩個復接器間通信鏈路的建立、同步和流量控制。
  19. Intserv / rsvp reserves the end - to - end bandwidth and buffers with rsvp signaling protocol to guarantee qos. as the most promising technology at present. diffserv aggregates the data streams of the same type to supply all kinds of services for clients

    Intserv rsvp利用rsvp信令協議在端到端之間預留帶寬和緩沖區等資源,從而確保所需的服務質量;而作為目前最有發展前途的ip網路qos支持技術的diffserv ,將具有相同特性的數據流聚合,以向用戶提供若干種類的服務。
  20. As stipulated in the article 1 of the protocol, a state party to the present protocol state party recognizes the competence of the committee on the elimination of discrimination against women the committee to receive and consider communications submitted

    根據任擇議定書第一條,所有任擇議定書之締約國認同消除對婦女歧視委員會接受及考慮提交委員會的書信。然而,委員會不會接受那些沒有署簽任擇議定書之國家內的個人或團體所提交的書信。
分享友人