stack layers 中文意思是什麼

stack layers 解釋
堆積層
  • stack : n 1 (麥桿等的)堆,垛;乾草堆。2 積材,層積,堆積;〈英國〉一堆〈木材等的計量單位,=108立方英尺...
  • layers : 板層
  1. It can be dispart 137 sand layers in the droop of 15 sand groups and adds up to 1191single sand layers, summarizes 7 types of correlation : steady, spite, pinch, stack, stack - pinch, stack - spite, complex in the work. the relation between the distribution types of substrata with reservoir levels are four types of reservoir, and i, ii are good reservoir of gas in bawu gas field

    通過對15個砂層組內的小砂層進行認真、詳細地劃分,在垂向上共劃分出137個小層,共計1191個單砂層,並總結出七種井間小層對比分佈類型:穩定分佈型、分叉型、疊置尖滅型、穩定疊置型、重疊分叉型、復合型。
  2. In this paper, we design a new film stack by use of multi - frequency design idea, which decrease the film thickness of high refraction layers greatly, and the damage threshold of it will be improved hopefully. and at the base of this film stack, by optimizing the film thickness of several outmost layers, we design the hr film at 45 incidence for 632. 8nm and 1315nm with 180 ? or 90 phase retardance at 1315nm

    隨著高功率coil輸出功率的進一步提高,傳統的設計膜系已逐漸不能滿足需要,為此我們利用倍頻的沒計思想,設計出了一種新的高反射膜系,與傳統的設計膜系相比,此膜系大大降低了高折射率層的厚度,使得膜系的損傷閩值有望得到極大提高。
  3. Which hosts the upper layers of the wap stack

    , wap棧中更高的層位於這一單元。
  4. Deadlock prevention and surprise dismount handling during this process require heroic efforts, including a mechanism whereby a file system driver can stash a pointer to an automatic variable ( that is, one allocated on the call / return stack ) to be used in deeper layers of recursion within the same thread

    在這個過程請求宏大結果的時候, (進行)死鎖預防和意外卸下處理,包括一個機制,憑借這個機制文件系統驅動可以中斷在相同線程中用於深層遞歸的自動變量的指示器(就是說,在調用/返回堆棧上分配一個) 。
  5. The content of this article is the research on the protocols for wireless communications on the media access control ( mac ) layer, which is a sublayer of the link layer, one of the five layers ( the physics layer, the link layer, the network layer, the transmission layer and the application layer ) which construct the stack of protocols for wireless communications. the emphasis of the research is on the applicability and superiority of two protocols on the mac layer

    本文的研究內容是mac ( mediaaccesscontrol )層? ?無線傳輸的五層協議棧結構(物理層、鏈路層、網路層、傳輸層、應用層)中數據鏈路層的媒體接入控制子層? ?無線通信協議,重點研究兩種協議在傳感器網路應用中的適用性和優越性。
  6. Experimental data from tests showed that the output range of a cymbal piezoelectric actuator is 6 times of a stack actuator with the same layers of the stack under the same voltage

    試驗結果表明,在相同驅動電壓下cymbal型復合壓電作動器的行程是疊堆式壓電作動器的6倍。
  7. Now it ' s possible to stack additional adjustment layers above and below the layer created in step 10 to change the lightness, contrast and colours as much as you like

    現在,它的可能棧額外調整層上方和下方的一層設立了10步,以改變亮度,對比度和色彩更如你所願。
  8. The wwrf reference model outlines how the solution stack ( perhaps with too many layers ) in a node will look like

    Wwrf參考模型指出解決方案棧(可能太多層)在一個結點看起來如何。
  9. Exception chaining can be used to throw a more appropriate exception without throwing away the details such as the stack trace of the underlying failure, allowing abstract layers to insulate the layers above them from the details of the layers below them while preserving information that might be useful for debugging

    異常鏈可以用於拋出一個更為合適的異常而不用丟棄關于底層失敗的細節(例如棧跟蹤) ,允許抽象層將位於它們之上的分層同位於它們之下的分層的細節隔離開來,同時保留對于調試可能有用的信息。
  10. If the stack will run on a little endian processor, it will have to reorder - at run time - the bytes of every multibyte data field within the various layers ' headers

    如果該棧運行於一個小端位元組序的處理器上,它不得不在運行時,在不同層的頭部,重排每一個多節字數據欄位的位元組順序。
  11. Fortunately, ipsec provides us security services for ip layer and higher layers, such as access control, connectionless integrity, data origin authentication, rejection of replayed packets ( a form of partial sequence integrity ), confidentiality ( encryption ), limited traffic flow confidentiality, and so on. the thesis gives a type of network security architecture based on ipsec system, it includes the following contents : 1 analyzing the security problem in tcp / ip protocol stack, current main network attack methods and regular defense methods. 2 studing the overall architecture, main security protocols, application environments, and working mechanism of ipsec

    本文所提出的新一代網路安全體制就是建立在ipsec體系基礎上的,在本文的撰寫過程中,我主要進行了如下一些工作: 1深入分析了由tcp ip協議棧本身帶來的安全問題、當前主要的網路攻擊方法以及常採用的防範對策; 2研究了ipsec標準的總體結構、主要安全協議、應用場合以及其工作機制; 3研究了當前常用的各種數據加解密機制以及密碼演算法,深入分析了它們各自的特性和具體的使用方式; 4閱讀了大量關于混沌密碼的文獻資料,了解目前混沌密碼的研究動態和成果,研究混沌密碼體制的工作機理,然後利用vc + + 6 . 0作為開發平臺對一類混沌密碼體制進行了實現,並為它編寫測試代碼評估其性能。
  12. The thesis chooses the four - layers structure as the rudiment of our protocol stack system, which includes physical layer, data link layer, network layer and application layer

    本文選擇了四層結構作為協議棧體系結構的雛形,即:物理層、數據鏈路層、網路層、應用層。
  13. Move layers up or down one level or to the top or bottom of a stack. create any stacking order that you need

    您可以將各層上移或下移一層,或移至頂層或底層,層疊的次序可根據需要隨意確定。
  14. In order to build a secure web services architecture, security issues of all layers of the web services stack should be carefully tackled, as vulnerability will invite malicious attackers to penetrate the system

    為建設安全的網路服務架構,必須慎重處理網路服務堆疊中所有層次的保安問題,因為網路服務若有任何漏洞,便可能招致黑客惡意侵入系統。
  15. The communicatin signal was put onto the power - line and ethernet upward layers was migrated to this power - line communication stack. from this way, the new network is compatible with common ethernet as well

    該設計採用電力線作為底層數據的傳輸媒介,結合以太網的特點,將以太網的上層協議完全移植到電力線上,如此做法,使得這個網路在上層完全和以太網兼容。
分享友人