數據傳輸捕獲 的英文怎麼說

中文拼音 [shǔzhuànshūhuò]
數據傳輸捕獲 英文
data transmission trap
  • : 數副詞(屢次) frequently; repeatedly
  • : 據Ⅰ動詞1 (占據) occupy; seize 2 (憑借; 依靠) rely on; depend on Ⅱ介詞(按照; 依據) according...
  • : 傳名詞1 (解釋經文的著作) commentaries on classics 2 (傳記) biography 3 (敘述歷史故事的作品)...
  • : Ⅰ動詞1 (運輸; 運送) transport; convey 2 [書面語] (捐獻) contribute money; donate 3 (失敗) l...
  • : 捕名詞(姓氏) a surname
  • : Ⅰ動詞1. (捉住; 擒住) capture; catch 2. (得到;取得) obtain; win; reap 3. (收割) reap; harvest Ⅱ名詞(姓氏) a surname
  • 數據 : data; record; information
  • 捕獲 : 1. (捉到; 逮住) catch; capture; succeed in catching; acquire; arrest; seize 2. (俘獲) trapping
  1. There are two series interface installed on the os in advance, the one is called bsd socket designed by berkeley software, with the working mode of blocking synchronization, nonblocking asynchronization and polling, the other is named winsock designed by microsoft, worked via the way of windows message driven. as the foundation of process socket seizing technologies under microsoft windows, api ( application program interface ) hook technology is the core to achieve

    Windows進程套接字劫持技術的基礎部分, windows應用程序介面api掛接技術,該技術是實現操作系統不支持的特殊功能的應用程序的核心,有相當難度,與統的基於網路設備介面規范( ndis )的包過濾技術相比,該技術的不同之處在於它可以在應用層上對任意進程的網路入和進行
  2. This paper introduces a project based on code division multiplexed that is used to realize four el channels ' s wireless transportation. after briefly introducing the whole structure of the device of transportation, this paper introduces mainly implemention of the hardware. futhermore, the discussion concerning the selection of principles in code acquisition and the threshold setting of code acquisition on continous pilot in the receiving unit is given. at the same time, the methods about how to design the parameters of dll is introduced in this paper. in addtion, how to solve the actual problems in debugging the hardware is also provided

    本文提出了一種基於碼分復用技術的四路e1擴頻無線設備的實現方案。在介紹整個擴頻設備實現框圖的基礎上,重點介紹了硬體平臺的實現;接收單元策略的研究及其門限的確定方法;以及接收單元dll環路參設計方法;並給出了調試過程中遇到的實際問題及其解決措施。基於調試所遇到的問題,論文的最後提出了這套設備的改進方案。
  3. Synchronization acquisition technique is one of the most important techniques in any communication systems. in mc - cdma system, we exploit multi - carriers to transmit high - speed data, which is sensitive to the errors of synchronization, so synchronization is important, especially fast acquisition

    在mc - cdma系統中,利用多個載波,並且的是高速,它對系統的同步錯誤非常敏感,所以同步技術就顯得尤其重要,而且要求能夠快速
  4. In this paper, the streaming media technology applied to network video monitor system are researched on the basis of video streaming. the emphases are put on system design, video captures and play, and the design of network transmission module and relevant software development method. in fact, uality of service of the network has unstable characteristics, we have analyzed qos guarantee strategy in video streaming transmission on network, and presents a integrated qos guarantee scheme which based on data encapsulation, buffer storage technology and congestion control on network. this scheme do its best to avoid the big delay or congestion on network based on make full use of network bandwidth, which can guarantee the best qos of the video transmission

    重點討論了系統架構、視頻和播放、網路模塊設計以及相關軟體開發方法。同時,針對實際網路中存在的服務不穩定性特點,分析了視頻流在網路過程中的qos保證技術,並在系統中提出了基於封裝、緩存技術以及網路擁塞控制機制的綜合qos解決方案。該方案使系統在充分利用網路帶寬的情況下最大程度上避免出現大的延遲或擁塞,保證了視頻的最佳服務質量。
  5. The thesis describes the common network attack types as well as research condition of network intruding inspection system, and analyses the basic theory of network data packets transfer on account of protocol tcp / ip, and finally discusses network safe system framework on account of p2drr, which takes linux operating system as the development platform, has c as the development tool, uses libpcap as a tool to capture network data packets, and decode according to various protocols, along with the preprocess function on account of such inspection as i / o port scanning, and analyses the misuse inspecting technology deeply on account of key word mode matching, and studies theory abnormal inspecting system on account of data mining. the inspecting and output function of the whole system is designed as mold in plug - mechanism, so as to transplant and extend the system

    論文介紹了網路常見的攻擊模式及網路入侵檢測系統的研究現狀,分析了基於tcp ip協議的網路的基本原理,討論了基於p2drr模型的網路安全系統架構,本系統以linux操作系統為開發平臺,採用c作為開發工具,利用1ibpcap庫為工具網路包,並根不同協議實現報文的解碼,實現了基於埠掃描等檢測的預處理功能,對基於關鍵字模式匹配的誤用檢測技術作了深入地分析,並對基於挖掘的異常檢測系統進行了探討,整個系統的檢測與出功能均以插件機制設計成模塊,以便系統的移植和擴展。
  6. The system adopts different transmission method to improve the transmission efficiency with a view to different transmission characteristic of file data and picture data. it adopts the method of capturing data packets for file data, and storing, sending for picture data

    針對文件和圖像不同的特點,採用不同的方式,對于文件採用加密的方式,對于圖像採用存儲轉發的方式,有效地提高了網路效率。
  7. From the point of view of theory, motion capture data is a new type of information carrier, so it is necessary to research on data capturing, processing, analysis, storing, browsing and transferring

    在理論方面,運動捉記錄下的是一種新的信息載體,因此在取、處理、分析、存儲、檢索、都有必要進行深入研究。
分享友人