控制信令碼 的英文怎麼說

中文拼音 [kòngzhìxìnlìng]
控制信令碼 英文
control signaling code
  • : 動詞1 (告發;控告) accuse; charge 2 (控制) control; dominate 3 (使容器口兒朝下 讓裏面的液體慢...
  • : Ⅰ動詞1 (製造) make; manufacture 2 (擬訂; 規定) draw up; establish 3 (用強力約束; 限定; 管束...
  • : Ⅰ名詞(表示數目的符號或用具) a sign or object indicating number; code Ⅱ量詞1 (指一件事或一類的...
  • 控制 : control; dominate; regulate; govern; manage; check; cybernate; manipulate; encraty; rule; rein; c...
  1. The article points out the importance and necessity of the information - security from its actuality in our country. the resources in the information system, for instance, hardware, software, data, document, operator, meterial and so on, are evaluated and gived safety grade firstly. and then, it analyses the menace including the nonauthorized access, the information leak, the refused sevice, the internal objection which the system will take. the following are the corresponding control police : confirm the users " rights and duties, including the mode of using account, the limit of accessing resource, the application of password, the building of backup ; confirm the administrators " right and duties, including physical safety, system configuration, account configuration and usufruct, password management, audit and control, backup and individual intimity ; run - of - mill measure of security defence, including access control, symbol and identification, integrality control, password technique, firewall system, audit and resumption, safety of operating system, safety of database system, defence of computers " virus and resisting - deny protocol. in the end, the article offers the strategies of disposing the safety - accident and analyse after ithow. to report it, how to solve it in phase, and how to avoid it happening again. in a word, the article presents a holistic resolvent about keeping away the information system ' s security, and supplies a essential frame for its configuration, management and application

    然後,對系統可能受到的威脅,包括非授權訪問、息泄漏、拒絕服務和內部缺陷等進行分析,並提出了相應的策略:確定用戶的權力和責任,包括帳戶使用方式、資源訪問權限、口應用以及建立備份等;確定系統管理員的權力和責任,包括物理安全、系統配置、帳戶設置及使用權限、口管理、審計和監、備份以及個人隱私等方面;一般性的安全防護措施:存取、標識和認證、完整性、密技術、防火墻系統、審計和恢復、操作系統安全、數據庫系統安全、計算機病毒防護和抗抵賴協議等。最後,對事故處理和事後分析提供策略,如何報告安全事故,如何協調解決安全事故,如何避免安全事故再次發生。總之,本文對息系統安全防範工作給出一個整體的解決方案,為其在配置、管理和應用方面提供了基本的框架。
  2. The catv charge and control system is mainly composed of the management software 、 the header data modulator and the terminal charge and control equipment. i am responsible for design catv charge and control equipment and test system. the header data modulator is used to encrypt the control single from computer and transmit it into the appointed frequency. the terminal charge and control equipment demodulate out the control single from data modulator and transmit it to the addressing control part, where the demodulated fsk single is received and well - handled by the cpu unit, decode the unauthorized signals and deliver it to the shut point, shut point make use of capability of wideband anf characteristic of shut, then the signal of illegal customer will be turn off and vice versa, the legal customer can receive the normal signal

    前端數據調器完成對計算機輸出的號加密處理,將指載送到一指定頻率點。終端收費器解調出號,送至單片機尋址部分。單片機尋址部分接收經fsk數據解調器送來的號,送入cpu單元后,解出不授權號,然後向關斷部分送入號,關斷部分利用pin二極體的寬帶工作能力以及關斷特性,實現對非授權用戶或者非法用戶的號關斷,使之不能正常收視,繳費用戶進行開通正常收視,達到用戶通道的管理。
  3. Information technology - generic coding of moving pictures and associated audio information - part 10 : conformance extensions for digital storage media command and control dsm - cc

    息技術.運動圖像及其伴音息的通用編.第10部分:數字存儲媒體命的一致性擴充
  4. I selected the user datagram protocol as transport protocol, and formulated application protocol, so that the server can receive the orders from the client and do anything ordered by the client. data is transported by " stream " that is object - oriented abstract data between the client and the server in the lan, and i also use tumudp to transmit and receive " stream ". many api functions are used in my paper in order to control the keyboard and the mouse of the remote computer, and also control its system ability ( such as turn off or reset it )

    位於同一局域網內的服務器和客戶機之間採用用戶數據報協議( udp )作為運輸層通協議,論文作者還定了功能編,使得服務器能夠解釋客戶機通過網路發送的命,並根據命進行操作;論文以建立在面向對象基礎上的抽象數據類型「流」作為傳送數據的載體,通過delphi提供的nmudp項進行「流」的發送和接收以實現服務器和客戶機之間的交互。
  5. Hence, the requirements of the servo control card are getting much sophisticated. in this thesis, the research work and implementation details of a 6 axes servo control card are discussed. this card is based on the ti company ? dsp chip tms320f240 and has realized the following functions : a ) signal encoder, b ) position limit, c ) dual ram communication with cpu, d ) coordinated control e ) dia conversion

    該卡以ti公司的16位定點數字號處理器tms320f240為核心晶元,實現6路編號輸入處理,軸限位中斷處理,通過雙埠ram與pc進行通訊,接收pc發送過來的和數據,完成插補運算、聯動運算等,通過d / a轉換電路,將結果轉化為模擬電壓送伺服放大器驅動電機。
  6. It reframes the traceback problem as a polynomial reconstruction problem, and uses techniques from algebraic coding theory to provide robust methods of transmission and restriction. the scheme is a new solution to the traceback problem during a dos attack ; the honeypot for ddos, which is a tool of traceback, lures the attacker to believe that he successfully compromised a slave for his needs, convincingly simulating the architecture of a potential ddos attack ; the source - based approach to ddos defense, which is a useful adjunt to traceback systems, deploys a ddos defense system at source - end networks. attacks are detected by monitoring two - way traffic flows, and the attacks originating from source networks are stopped by rate - limiting ; the routing mechanism based on pushback treats ddos attacks as a congestion - control problem

    最後,就有關ddos攻擊反向追蹤問題,從四個方面對其解決方案進行了研究:在分析比較幾種反向追蹤演算法的基礎上,著重研究了代數方法編反向追蹤息的方案,該方案把追蹤重構問題當作多項式重構問題,使用代數編理論技術提供魯棒的傳送和重構方法,是dos攻擊過程中的反向追蹤問題的一種新的解決方法; ddos陷阱作為反向追蹤的工具,引誘攻擊者相自己成功與所需的傀儡主機通話,服地模擬出潛在ddos攻擊體系結構;基於源的ddos防禦方法作為反向追蹤有用的補充,將防禦系統部署在源網路,通過監雙向流量檢測攻擊和限速率終止來自源的攻擊;基於向後倒推的防禦ddos的路由機把ddos攻擊看作擁塞問題,添加功能到每個路由器來檢測並優先丟棄可能屬于攻擊的包,通過向後倒推上級路由器也得到通知而把這樣的包丟棄。
  7. This paper have introduced a kind of the design principle of wireless manage control system, the system have solved the technical baffling problem on making coding, decoding and identity identification in wireless communication and have remedied the shortcomings of traditional wireless manage system by using micro controller ( at89c2051 ) and dtmf baffling

    介紹了一種無線調度系統的設計原理,使用單片機( at89c2051 )和dtmf解決了無線通中的、解及身份識別等技術問題,彌補了傳統的無線調度系統的不足。
  8. Enterprise information system framework provides a series of reusable groupware, such as persistence layer which introduces dynamic value object 、 value list hander and command pattern, it encapsulates the detail of accessing database and affords the interface of different persistence layer framework ; basing on asynchronous javascript and xml ( ajax for short ), we develops the client validity check engine 、 dynamic cascading menu and common 、 dynamic tree structure groupware, as well as a set of tag library which include query 、 pagination 、 cache an so on. they reduce the code redundancy and predigests the development of interface layer enormously ; the security subsystem which is based on secure socket layer ( ssl for short ) and role - based access control ( rbac for short ) ensures the data security transmission and privilege control. furthermore, the model of enterprise application integration ( eai for short ) which based on web services, it supply some helpful explore for the sake of system integration and data communion for the future

    企業息系統框架提供了一系列可復用組件,例如採用動態vo 、值列表處理器以及命模式的持久層組件,封裝了數據庫訪問細節,並為不同的持久層框架提供調用介面;基於ajax ( asynchronousjavascriptandxml )技術的客戶端校驗引擎、動態級聯菜單以及通用動態樹型結構組件,一系列查詢、分頁、緩存等標簽庫則減少了表示層的代冗餘,簡化了表示層開發;基於ssl登錄以及基於角色的訪問的安全子系統則初步實現了數據安全傳輸和權限;此外基於web服務的企業應用集成模型為今後系統集成、數據共享提供了有益探索。
  9. The cross debugger has four components : user interface, debugging module, communication module and operating system supporting module. the monitor programs of the target are composed of executive module of debugging command, communication module and code control module

    交叉調試器可以分成四部分:用戶介面、調試功能模塊、通模塊和操作系統支持模塊;目標機端的監程序主要是由調試命執行模塊、通模塊、代模塊組成。
  10. On the one hand of hardwar : first of all, the thesis introduces the interiror structure of pic18f8260 and its distinguishing with other singlechip ; secondly, having narrated the structure and performance of gsm communicate module - tc35i module and the hardware performance process of communications interface of gsm ; thirdly, having studied the drived principle and dynamic scanned circuit of led ’ s panel ; lastly, having put forward serial interface circuit which the application of system. on the other hand of software which have accomplished the running of hardware : in design, utilizing mscomm control to realize the serial communication between computer and cell phone, utilizing at command to realize the cell phone control and sms receiving and sending operation, the pdu ( protcol data unit )

    設計上,利用mscomm項實現計算機與gsm模塊間的串口通,使用at指實現對gsm模塊的各種和簡訊的收發,分析發送和接收短消息的pdu ( protcoldataunit )格式、簡訊內容、手機號、 smsc (短消息服務中心)號等;單片機與pc機之間的通採用pic中c語言和c + +語言編程,以中斷方式實現pic18f8260與led的通,同樣利用mscomm項從漢字字庫的提取點陣,最後顯示在led上。
  11. You can think of the pending changes window as the source control command console ; it centralizes information about the status of your project and provides access to contextually - relevant source control, and work item management information and commands

    可以將「掛起的更改」窗口看作是源代管理命臺;它集中有關項目狀態的息,並提供對上下文相關的源代管理功能以及工作項管理息和命的訪問。
  12. In this paper, we briefly introduced the performance of wave coding and vocoder, emphasizedly studied the principle and performance of variable rate vocoder q4401, including the internal construction and pins, qcelp coder & vocoder, pcm interface, cpu interface initialization process, command format and so on. we also designed a application circuit, with the experiment validated its performance. in this design, the pcm interface chip is tp3057, it was used to finish a / d transform, the compress coding was finished by q4401, the initialization and control were accomplished by 8051 singlechip

    重點是研究變速率語音編解晶元q4401的工作原理及性能。其中包括q4401的內部結構及管腳、 qcelp編方式、 pcm介面、 cpu介面、初始化過程、命格式等,並在此基礎上,設計一個實際的應用電路,通過實驗,驗證其性能。在設計中用pcm介面晶元tp3057來完成從模擬號到數字號的轉換,再由q4401進行壓縮編,對q4401的初始化及由8051單片機來完成。
  13. As the information era proceeds, highly developed digital image processing technique and communication technique make multimedia communication possible, and it is now on the way of progress. video conference have received more attention as an example of multimedia. in this paper we first describe the construction and characteristic of the video conference system and analyze the theory of protocol with itu - t h. 323 recommendation which inculde video and audio codec standard, communication control protocol h. 245. call signalling protocol h. 225, as well as procedures within these protocols define how these components communicate. also an experimental video conferencing system is designed and some relating key technologies are studied, which include multithread programming, transmission technology, mcu technology, qos mechanism and so on. especially, a video codec based on h. 263 recommendation with high fram rate as well as high compression ratio is researched and implemented because of importance of video application, which solves the bad image reconstrction quality problem existed in the most present video systems that adopt h. 261 video compression algorithm. by using these technologies. a video conferencing system is implemented based on lan. the system that the paper provides is easy to implement and the results of exmperiment is good. such system can be widely used in the fields such as business conference, distance education etc. and it is of good practical value

    隨著息時代的前進,數字圖像處理技術和通技術的高度發展,多媒體通已成為可能並已初具規模,視頻會議作為它的一個具體應用實例受到普遍關注。本文首先對國際電聯盟itu - t定的基於分組交換的多媒體通h . 323系列建議進行了闡述,其中包括ip網路視頻會議系統的結構組成、視頻傳輸標準、音頻傳輸標準、系統的流、通協議h . 245和呼叫協議h . 225以及會議系統的進行過程。在此基礎上給出了ip視頻會議的實現的整體框架,為系統的軟體實現進行了模塊的劃分和整體設計,分析了各個模塊的功能、作用。
  14. The video phone system designed by us is mainly the real - time implement of a - v codec the implement of h. 323 protocol stack and the implement of the network communication protocol for example pppoe smtp and pop3 etc. so we not only ensure that the qos of the a - v codec ' s datum, but also develop the increment services for example e - mail system and browser etc. the paper will emphasis on the graft and realization of the internet protocols h. 263 video codec rate control algorithms for video encoder and optimization methods of the codec based on tm1300. h. 323 sip, h. 264 and psos + are also simply introduced

    本文主要針對作者在實現ip可視電話系統中所從事的研究工作而展開的,將重點放在ip可視電話系統中tcp ip協議棧在psos +上的移植、網路通協議如pppoe 、 ppp 、 smtp 、 imap 、 pop3 、 dns 、 dhcp等協議的實現、 h . 263視頻編及其演算法研究、視頻編中基於程序結構和7m1300dsp專用指的優化方法,同時初步介紹h . 323 、 sip 、 h . 264及嵌入式系統中的實時操作系統( rtos ) psos + 。
分享友人