protocol information 中文意思是什麼

protocol information 解釋
協議信息
  • protocol : n 1 議定書;調查書,始末記。2 (條約等的)草案,草約;(羅馬教皇詔書等的)首尾程式。3 〈the P 〉 ...
  • information : n. 1. 通知,通報,報告。2. 報導,消息,情報。3. 資料,知識,學識。4. 【自動化】信息,數據。5. 【法律】起訴,告發。adj. -al
  1. Fc - sb - 3 information technology - fibre channel - single - byte command code sets mapping protocol - 3 fc - sb - 3

    信息技術.光纖通道.單位元組命令代碼集映射協議. 3
  2. To compare different country ' s imports and exports policies of forest products and use their successful experience for reference, it is helpful for the country to adjust and make a reservation for the imports and exports policy of the forest products. furthermore it can also offer basis on which our policies can be linked up with international commercial treaties and the regulations, as well as the protocol of wto. it can also offer the theoretical method for the enterprises and companies engaging in foreign trade of forest products to get comparative information on both domestic and international imports and exports policy of forest products

    對世界不同國家森林產品進出口政策進行比較研究,借鑒其成功經驗,不僅有利於國家調整森林產品進出口政策,為森林產品進出口政策定位,而且能夠為國際貿易條約和協定及wto的規則對口銜接提供依據,還可以為從事森林產品進出口貿易的企業、公司取得國內外森林產品進出口政策比較信息提供理論方法,對中國成功地調整和制訂符合中國實際的森林產品進出口政策無論在理論上還是在實踐中,都具有重要意義。
  3. Aiming at the dynamics and enormous incomplete information, defeasible logic that if of flexibility and robustness is proposed as negotiation language and protocol operation semantic ( pos ) is utilized in the system as communication protocol to meet with the requirement of sequence information exchange

    針對合約市場協商的動態性和信息量大且不完全等特點,設計了靈活、魯棒性強的可廢止邏輯作為協商語言,並採用滿足序列信息交換要求的pos語義作為智能體平臺的通信協議。
  4. The article points out the importance and necessity of the information - security from its actuality in our country. the resources in the information system, for instance, hardware, software, data, document, operator, meterial and so on, are evaluated and gived safety grade firstly. and then, it analyses the menace including the nonauthorized access, the information leak, the refused sevice, the internal objection which the system will take. the following are the corresponding control police : confirm the users " rights and duties, including the mode of using account, the limit of accessing resource, the application of password, the building of backup ; confirm the administrators " right and duties, including physical safety, system configuration, account configuration and usufruct, password management, audit and control, backup and individual intimity ; run - of - mill measure of security defence, including access control, symbol and identification, integrality control, password technique, firewall system, audit and resumption, safety of operating system, safety of database system, defence of computers " virus and resisting - deny protocol. in the end, the article offers the strategies of disposing the safety - accident and analyse after ithow. to report it, how to solve it in phase, and how to avoid it happening again. in a word, the article presents a holistic resolvent about keeping away the information system ' s security, and supplies a essential frame for its configuration, management and application

    然後,對系統可能受到的威脅,包括非授權訪問、信息泄漏、拒絕服務和內部缺陷等進行分析,並提出了相應的控制策略:確定用戶的權力和責任,包括帳戶使用方式、資源訪問權限、口令應用以及建立備份等;確定系統管理員的權力和責任,包括物理安全、系統配置、帳戶設置及使用權限、口令管理、審計和監控、備份以及個人隱私等方面;一般性的安全防護措施:存取控制、標識和認證、完整性控制、密碼技術、防火墻系統、審計和恢復、操作系統安全、數據庫系統安全、計算機病毒防護和抗抵賴協議等。最後,對事故處理和事後分析提供策略,如何報告安全事故,如何協調解決安全事故,如何避免安全事故再次發生。總之,本文對信息系統安全防範工作給出一個整體的解決方案,為其在配置、管理和應用方面提供了基本的框架。
  5. Information technology - open systems interconnection - lotos description of the ccr protocol

    信息技術.開放式系統互連. ccr協議的lotos描述
  6. Contains detailed information about the mime protocol

    提供了mime協議的詳細信息。
  7. In this model, the information sub - model reveals some abstract facets in general systems, which can be reified by means of reflection, the representation sub - model decides how to represent the meta - information, while the controlling sub - model consists of some key elements to manipulate meta - level system, such as : meta - object protocol declaration, meta - object association and management

    其中,信息子模型指示出系統中可以通過反省揭示的抽象內容;表示子模型處理元信息的表達問題;控制子模型則包括元對象協議聲明、元對象關聯和管理等操縱元級系統的重要方法。
  8. Information technology - fibre channel protocol for scsi

    信息技術. scsi光纖通道協議
  9. Based on the detailed analysis on the current main ha technologies and the ha architecture in wacos gateway, which is a typical soft switch network device, and considered the characteristics of trillium ' s implementation of ha and protocols, the dissertation presents a warm - standby ha design based on psf ( protocol - specific - function ) information update mechanism

    在詳細分析了當前主要的ha技術及一種典型軟交換設備? wacos網關中ha體系實現的基礎上,結合trillium公司megaco協議棧產品及其ha的實現特點,本文提出了基於psf ( protocol - specific - function )信息刷新機制的溫備份( warm - standby )的ha設計方案。
  10. The major meaning provided in this thesis is that it provides a ha design and implementation based on psf information update mechanism, and implement the fault tolerance function of megaco protocol stack, complete the integration of trillium ' s megaco product, which is a typical distributed telecom software, and wacos ha manager

    本文工作的主要意義在於提供了一種基於psf信息刷新機制的ha方案,在此基礎上實現了megaco的系統容錯功能,完成了trillium的megac0協議棧這種典型的分散式大型電信軟體與wacos網關ha管理模塊的集成。
  11. Thirdly, a novel parameter - varying adaptive algorithm for rtt and rto estimations based on the information theory and the maximum entropy principle ( mep ) is presented. it is used in the implementation of trinomial protocol to detect packet losses and to adjust the sending rate

    再次,給出了一種新的基於信息理論和最大熵原理( mep )的變參數自適應rtt和rto估計演算法,在三項式協議實現過程中用於探測丟包及速率調整。
  12. Quantum key distribution protocol makes use of single photon of quanta - randomicity to achieve unconditioned security key distribution, especially which is the realism significance of research way in quantum information at present

    量子密鑰分配( qkd )協議利用單光子固有的量子隨機性實現具有無條件安全性的密鑰分配,是目前量子信息領域中特別具有現實意義的研究方向。
  13. The goal of the wae micro browser is to converge the http with wsp protocol stack, and supports many kinds of uri schemes, and adopts xml parser to parse the pages written in xhtml basic, wml, chtml, etc. the browser implements an efficient dom api. and it provides security support to protect the privacy of the end users and the information transmitted through the network. by the way, it adopts css, script and vm to enhance the presentation of the markup languages

    0瀏覽器的實現是以原有無線通信協議集成http協議,支持多種url解析;使用xml語言技術解析如: xhtmlbasic 、 wml 、 chtml等多種標記語言編寫的頁面;設計實現高效的dom介面;並且集成網路安全技術,使得個人信息可以安全的在網路上安全的傳送;電子科技大學研究生學位論文採用css 、腳本語言和虛擬機技術增強標記語言的表現力。
  14. Adt information technology - automation drive interface - transport protocol

    信息技術.自動化驅動介面.傳輸協議
  15. Information technology - telecommunications and information exchange between systems - broadband private integrated services network - inter - exchange signalling protocol - signalling atm adaptation layer

    信息技術.系統間通信和信息交換.寬頻帶私人綜合服務網.內交換信號協議.信號atm適應層
  16. In the leach - new protocol, the mainly improvement of the leach protocol exhibits as follow : for the sake of balancing the network load, the network choose the clusters based on the residual energy ; we take multi - hop communication between sensors instead of single - hop communication, which results in the reduction of energy consumption of clusters ; the new protocol finds the path to the cluster head with the minimum cost, using an algorithm similar to flooding to propagate the cost information and greedy algorithm to find the lowest cost link ; the algorithm for assigning tdma time slot reduces overall delays of network

    在leach - new協議中,對leach協議的改進主要體現在以下幾個方面:根據節點剩餘能量選擇簇頭,以平衡網路負載;節點間採用多跳路由,降低簇頭能量消耗;節點根據能量消耗的代價來選擇至簇頭的路由,通過擴散演算法來廣播代價消息,採用貪婪演算法來選擇能量消耗最小的路徑;採用tdma時隙分配演算法減少網路時延。最後,利用ns2模擬軟體進行驗證。
  17. Then common management information protocol ( cmip ), simple network management protocol ( snmp ) and cmip over tcp / ip ( cmot ) is compared. cmot can come up to the need of electric power communication network management best

    通過對公共管理信息協議cmip 、簡單網路管理協議snmp 、 cmot等協議的介紹和比較,認為以cmot為參照設計和開發電力通信網路管理協議最能適應電力通信的要求。
  18. Common management information protocol

    公用管理信息協議
  19. Information technology. open systems interconnection. common management information protocol. specification

    信息技術.開放式系統互連公用管理信息協議.第1部分:規范
  20. Information technology - open system interconnection - common management information protocol - part 1 : specification

    信息技術開放系統互連公共管理信息協議第1部分:規范
分享友人