控制棧 的英文怎麼說

中文拼音 [kòngzhìzhàn]
控制棧 英文
control stack
  • : 動詞1 (告發;控告) accuse; charge 2 (控制) control; dominate 3 (使容器口兒朝下 讓裏面的液體慢...
  • : Ⅰ動詞1 (製造) make; manufacture 2 (擬訂; 規定) draw up; establish 3 (用強力約束; 限定; 管束...
  • : 名詞1 (養牲畜的柵欄) shed; pen 2 (棧道) a plank road built on sides of cliffs for army3 (棧...
  • 控制 : control; dominate; regulate; govern; manage; check; cybernate; manipulate; encraty; rule; rein; c...
  1. If size of stack window exceeds size of parent ' s client area user can pan window contents by clicking and dragging on the whitespace area or static / disabled control of child dialog box

    如果堆窗口的頁面大小超過了父窗口的客戶區域,用戶可以通過點擊和拖放空白區域或子對話框的靜態/禁用項來擴展窗口內容。
  2. This option is an advanced feature to control stack probes

    此選項是探測的高級功能。
  3. Controls stack probes

    探測。
  4. The third group is used to maintain the internal stack and control flags.

    第三組用來維持內部堆標志。
  5. The gateway hardware and the key software ( access through i2c bus 、 the realization of tcp / ip protocol stack and web server, the drivers of ethernet controller and blue tooth module ) is presented in this paper. a study and analysis on the smart home system based on this gateway is presented also. at last, the main center - controlling program and server script program are written in vb and jsp for the center - controlling and remote - controlling emulation of smart home system

    論文中作者不僅給出了藍牙家庭網關的硬體設計和軟體實現的主要思想( i2c總線的訪問技術、 tcp / ip協議實現、網卡器晶元的驅動程序、 web服務器實現和藍牙模塊的驅動等) ,同時對基於該智能藍牙網關的家居系統做了一些探討和分析。
  6. The complete device tree therefore contains stacks for the device, for the hub, and for the host controller

    因此完整的設備樹包含設備的、集線器的和主機器的堆
  7. Firstly, this paper makes a detailed study on the field control bus system ( pcs ), including the characters of pcs by comparing fcs and dcs, model networking of pcs and several popular field bus, then put forward a question for discussion combining embeded internet technology and field bus and measure and control networking model based embeded internet technology is constructed. secondly, it studies embeded system including the core of hardware ? mbeded microprocessor and real time operation system. thirdly, the method of realizing embeded internet is discussed for emphasis, and difficulty of ehernet application in industry measure & control system is analysed. an instance of measure & control networking system based embedded ip is given. finally, the author designed a networked remote video surveillance system based embedded web server, c / os - ii is sacled and ported into the embedded microprocessor at89c51. based on the c / os - ii rtos, tcp / ip protocol suite and application program is designed in detail. the system w orks well that improves that the embedded internet technology will be widely used in modern measure & control networking system and has extend values

    本文首先分析了現場總線系統( fcs )與傳統集散系統( dcs )相比具有的特點、 fcs的網路體系結構,介紹了幾種流行的現場總線,提出了將嵌入式internet技術結合現場總線構建現代測網路的課題;在此基礎上,構建了基於嵌入式internet技術的測網路結構模型;深入研究了嵌入式系統的核心硬體?嵌入式微處理器,通過對比普通操作系統,描述了嵌入式實時操作系統的特點;重點研究了實現嵌入式internet的四種實現方法,並分析了以太網在工業測系統中應用的難點,給出了一個基於嵌入式ip的網路測系統實例;最後,研究與設計了一個基於嵌入式web服務器的遠程網路視頻監系統,該嵌入式web服務器利用目前成熟的嵌入式實時操作系統c / os - ,通過對c / os -進行適當的裁剪、修改與移植,在at89c51嵌入式微處理器上實現了tcp / ip協議及應用程序,系統的成功運行證明了本文研究成果的有效性,也表明嵌入式internet技術在現代測網路系統中具有廣闊的應用前景和推廣價值。
  8. The content of this article is the research on the protocols for wireless communications on the media access control ( mac ) layer, which is a sublayer of the link layer, one of the five layers ( the physics layer, the link layer, the network layer, the transmission layer and the application layer ) which construct the stack of protocols for wireless communications. the emphasis of the research is on the applicability and superiority of two protocols on the mac layer

    本文的研究內容是mac ( mediaaccesscontrol )層? ?無線傳輸的五層協議結構(物理層、鏈路層、網路層、傳輸層、應用層)中數據鏈路層的媒體接入子層? ?無線通信協議,重點研究兩種協議在傳感器網路應用中的適用性和優越性。
  9. In the third chapter, the graft of tcp / ip in openbsd on psos + and the realization of the internet protocols including pppoe ppp smtp pop3 imap dns dhcp, embedded web server and how to estimate network state used by rtp / rtcp are introduced. in the fourth chapter, firstly h. 261, h. 263 h. 263 + standards and their differences are introduced

    在第三章中闡述了基於ip的網路通信協議的實現,主要是openbsd中的tcp ip協議在psos +上的移植和pppoe 、 ppp 、 smtp 、 imap 、 pop3 、 dns 、 dhcp協議、嵌入式web服務器的實現,然後介紹如何利用rtp rtcp來檢測網路有效帶寬,其中的網路有效帶寬就是在第六章提出的碼率演算法中確定目標幀率的依據之一。
  10. In this dissertation, based on the st company ' s sti5100 hardware platform, the development of usb host computer software, the test procedure, and the application of this software on dvr set top box have been introduced, which are mainly including the implement of the host controller driver, the kernel of usb protocol stack, the usb device drivers and the usb host protocol stack on dvr set top box

    本文介紹了基於st公司提供的sti5100硬體平臺上usb主機軟體的開發與測試和該軟體在dvr機頂盒上的應用,主要包括主機器驅動、 usb核心協議和usb設備驅動程序三個部分的軟體實現和該usb主機協議在dvr機頂盒應用的軟硬體實現。
  11. On the other hand, atm is connection - oriented, the implementation of cac function for svc depends on atm signaling system. however, as a result of having no necessary functions of call and connection control, the protocol stacks for atm signa ling defined by itu - t can not realize the function of cac and can not be used directly in the atm equipment

    另一方面, atm是面向連接的,交換型虛連接( svc )真正體現了atm技術的靈活性,與svc相應的cac功能則依賴于atm信令系統來完成,然而itu - t所定義的atmuni和nni信令協議由於缺乏必要的呼叫/連接功能,從而無法對cac進行支持且無法直接應用於各種atm設備中。
  12. In software, for realizing the real - time qualities of control system i transplant rtos - uc / oc - ii on the platform of gateway and i also transplant the tcp / ip stack called lwip to realize network function of the gateway. in worldfip, using fullfip2 ' s fip device manager come to realize the functions of fieldbus

    在軟體方面,為了實現系統的實時性,在網關平臺上移植了rtos ? ? c oc - ,並且移植了tcp ip協議lwip來實現網關的internet網路功能;在現場總線側,應用通信器fullfip2的通信庫fipdevicemanager來實現現場總線的功能。
  13. Marks the current frame in the call stack with a special flag indicating that all preceding frames in the control flow should not be considered for access checking

    方法是用一個特殊旗標標識調用堆的當前幀,指明流中所有前面的幀都不進行訪問檢查。
  14. It is a hot topic in applying ethernet technology to industrial control. in this article, high speed ethernet ( hse ) was selected as the study object. especially, some key technologies used in hse were mainly focused

    以太網技術在工業中的應用成為當前領域的研究熱點,本文選擇了現場總線基金會提出的高速以太網( highspeedethemet , hse )作為研究對象,著重對hse通信的關鍵技術進行了研究。
  15. Common data interfaces used in radio include rs - 232, etc. as the rapid growth of data speed in data radio, asynchronous serial port does not meet the need of data transmission of high - speed data radio. data radio is gradually using ethernet interface as high - speed data radio ’ s data interface, to function as a high - speed data channel between host computer and data radio. this paper brings forward a universal radio interface protocol model, whose core is taking ethernet as a high speed data channel in network protocol stack

    本文針對電臺的以太網介面,經過對各種電臺的功能分析,提出了一種通用的在以太網通信中適用的報文介面協議模型,其核心思想是將以太網作為網路協議中內部的高速數據傳輸通道來使用,作為鏈路層和物理層之間的內部介面,同時提供電臺和數據傳輸兩大功能模塊。
  16. The structure of protocol stack and the components of the h. 323 system are mainly discussed

    323協議,包括協議的系統結構、協議結構以及協議描述的通信過程等。
  17. Firstly, h. 323 protocol ? he recommendation that describes how to provide multimedia communication services over packet - based networks is introducesd in this article. the structure of protocol stack and the components of the h. 323 system are mainly discussed

    323協議,包括協議的功能特點、協議結構以及協議描述的通信過程,從組成結構和工作方式上研究了遵循h
  18. This results in a stack dump to the console and process termination

    不發送。這將導致堆轉儲到臺和進程終止。
  19. Supporting a limited number of platforms and controlling the software stack for that platform does have advantages

    支持有限數量的平臺並用於該平臺的軟體堆的確有一些好處。
  20. The article highlights the implementation of how to detect the route to an aimed intranet by traceroute, how to determine the operating system by the tcp / ip stacks fingerprints, how to find the users information of the common os, how to realize the port scan by multi - thread, how to find the vulnerabilities of a terminal, and how to control a remote system by the trojan horse

    文章還詳細介紹了如何利用traceroute和源路由的traceroute探測到達目標網路的路徑;如何利用常規方法和tcp ip協議指紋特徵來識別操作系統類型;如何探測常見操作系統的用戶信息;如何利用多線程實現埠掃描;如何發現系統中與用戶、服務相關的漏洞缺陷;如何利用木馬技術來實現遠程等。
分享友人