數據出棧 的英文怎麼說

中文拼音 [shǔchūzhàn]
數據出棧 英文
pull data
  • : 數副詞(屢次) frequently; repeatedly
  • : 據Ⅰ動詞1 (占據) occupy; seize 2 (憑借; 依靠) rely on; depend on Ⅱ介詞(按照; 依據) according...
  • : 名詞1 (養牲畜的柵欄) shed; pen 2 (棧道) a plank road built on sides of cliffs for army3 (棧...
  • 數據 : data; record; information
  1. This thesis has introduced the development of the traditional wireless sensor network and current situation at first, then analyzed the principle an framework of the wireless sensor network, and the challenge to the traditional wireless sensor network technology for environmental monitoring, put forward the novel environmental monitoring system based on wireless sensor network technology, have recommended a kind of brand - new wireless node design plan of framework of wireless sensor network and node hardware to be designed and realized, then based on ieee 802. 15. 4 standard, this thesis analysed the design faces the wireless communication protocol stack used in environmental monitoring, have introduced the realize of physics layer, data chain layer, network layer, application layer. have solved the wireless sensor network data sampling, systematic energy - conservation optimize, this thesis summarized the preceding work finally, have looked forward to the development, application and commoditization in the future

    本文首先介紹了傳統無線傳感器網路的發展概況及現狀,然後分析了無線傳感器網路的原理與架構及其在環境監測對傳統無線傳感器網路技術的挑戰,接著本文提了新穎的基於無線傳感器網路技術的環境監測系統架構設計,介紹了一種針對大氣環境監測的全新的無線傳感器網路節點的構架設計方案以及節點的硬體設計和實現,然後本文以ieee802 . 15 . 4標準為基礎分析設計了面向環境監測應用的無線通信網路協議,從工程角度介紹了物理層、鏈路層、網路層、應用層的設計實現,解決了無線傳感器網路節點的採集、節點互聯以及系統節能優化等問題,最後本文總結了前面的工作,展望了基於無線傳感器網路技術的環境監測系統在未來的發展方向和應用方式等幾個方面的發展遠景。
  2. I explain each protocol layer associated with the written code, and give the data flow of the implemented protocol at the end of each chapter

    在描述藍牙規范時,對各個協議層都結合具體實現時開發的代碼予以說明並在講述每層協議的章節最後給了該層協議實現時的流程。
  3. Adaptive stack cache with fast address generation policy decouples stack references from other data references, improves instruction - level parallelism, reduces data cache pollution, and decreases data cache miss ratio. stack access latency can be reduced by using fast address generation scheme proposed here

    該方案將訪問從高速緩存的訪問中分離來,充分利用空間訪問的特點,提高指令級并行度,減少高速緩存污染,降低高速緩存失效率,並採用快速地址計算策略,減少訪問的命中時間。
  4. Common data interfaces used in radio include rs - 232, etc. as the rapid growth of data speed in data radio, asynchronous serial port does not meet the need of data transmission of high - speed data radio. data radio is gradually using ethernet interface as high - speed data radio ’ s data interface, to function as a high - speed data channel between host computer and data radio. this paper brings forward a universal radio interface protocol model, whose core is taking ethernet as a high speed data channel in network protocol stack

    本文針對電臺的以太網介面,經過對各種電臺的功能分析,提了一種通用的在以太網通信中適用的報文介面協議模型,其核心思想是將以太網作為網路協議中內部的高速傳輸通道來使用,作為鏈路層和物理層之間的內部介面,同時提供電臺控制和傳輸兩大功能模塊。
  5. Employing idef to establish framework, dynamitic and functional models, the system also designs a non - back shifting search arithmetic for double - scanning buffer zone and a double - track structure for searching process. according to the characteristics of e - mail control and electronic documentary mining technology, bayes classifiers are made to strengthen the electronic control system in which electronic documentary mining technology is used ; and moreover the double systematic structure of c / s & b / s is constructor with the presence of some function relationships in mining process as well as systematic mining and program handling

    系統採用i _ 2def方法建立了結構模型、動態模型和功能模型;設計了雙掃描緩沖區的無回溯搜索演算法及搜索過程的雙結構;根電子郵件監控系統和電子文檔挖掘技術的特徵,設計了bayes分類器並使用了增強型方法,提了一種運用電子文檔挖掘技術的電子郵件監控系統;構建了c / s和b / s雙重體系結構;並給了挖掘過程的部分函調用關系及系統挖掘的處理過程、部分處理程序。
  6. Then the structure of hardware and software of the data acquisition device is introduced and the design and implementation of an ip protocol stack running on uc / os - ii is described in detail

    採集裝置的軟硬體結構,並詳細介紹了在c os -上實現的ip協議
  7. Then, it analyzed can and canopen application layer, including : real - time characteristics of can, the core of canopen - od, all kinds of communication objects, the allocation of cob - id and some device profiles. and xcanopen was brought forward for implementing of canopen in power line communication. then, on the reference design platform of freescale - agilent, xcanopen ’ s two standard software interfaces, bottom driver and function of communication and network management based on canopen were implemented

    本文詳細分析了低壓電力線通信機的結構與工作原理;分析了can協議及其可以保證實時可靠傳輸的實質,剖析了應用層協議canopen ,著重解釋了canopen的核心?對象字典od 、各類通訊對象、標識符的分配,以及一些設備子協議( deviceprofiles ) ,並提了在電力線通信上實現canopen的解決方案? xcanopen框架;在基於freescale - agilent電力線通信的參考設計平臺上實現了xcanopen的兩個標準軟體介面,電力線通信底層驅動軟體的設計以及基於canopen協議的節點通信和網路管理功能,達到了使用canopen協議來實現電力線通信的標準化模塊的目的;最後,在canopen通信的實時調度上做了進一步的改進探索研究。
  8. Because of lacking the hardware testing tools, a kind of low - cost testing scheme has been designed, and compared with other schemes. after adding usb host protocol stack to stite / os20 embedded operating system, and based on a large number of data verification and analysis, the conclusion was drawn that the usb host can communicate with usb devices correctly according to the protocol

    在缺乏硬體測試工具的情況下,本人設計了一種低成本的測試方案,並對這種方案進行分析比較,在大量驗證分析的基礎上得結論:在stlite / os20嵌入式操作系統中加入本課題設計的usb主機協議后, usb主機能夠正確按照協議與usb設備進行通信。
  9. Fortunately, ipsec provides us security services for ip layer and higher layers, such as access control, connectionless integrity, data origin authentication, rejection of replayed packets ( a form of partial sequence integrity ), confidentiality ( encryption ), limited traffic flow confidentiality, and so on. the thesis gives a type of network security architecture based on ipsec system, it includes the following contents : 1 analyzing the security problem in tcp / ip protocol stack, current main network attack methods and regular defense methods. 2 studing the overall architecture, main security protocols, application environments, and working mechanism of ipsec

    本文所提的新一代網路安全體制就是建立在ipsec體系基礎上的,在本文的撰寫過程中,我主要進行了如下一些工作: 1深入分析了由tcp ip協議本身帶來的安全問題、當前主要的網路攻擊方法以及常採用的防範對策; 2研究了ipsec標準的總體結構、主要安全協議、應用場合以及其工作機制; 3研究了當前常用的各種加解密機制以及密碼演算法,深入分析了它們各自的特性和具體的使用方式; 4閱讀了大量關于混沌密碼的文獻資料,了解目前混沌密碼的研究動態和成果,研究混沌密碼體制的工作機理,然後利用vc + + 6 . 0作為開發平臺對一類混沌密碼體制進行了實現,並為它編寫測試代碼評估其性能。
  10. The operating process of network cipher computer and kdmc are discoursed firstly, then the tcp / ip stack of linux is introduced, and an ipsec realization method with using a cipher card is put forward. triplex key system is adopted for internet key exchange ( ike ). the database and other modules are also designed and implemented

    論文論述了網路密碼機和密鑰管理中心的工作流程,接著介紹了linux下tcp / ip內核協議,提了加密卡方案,採用了三重密鑰管理體系實現了internet密鑰自動交換,進行了中心庫設計與實現,最後對其它模塊進行了實現。
  11. Secondly, uses uml to build a general and useful model for h. 323 stack, and divides the stack into several modules under the principle of ooa, and realizes the stack programming with oop language on the base of a cross - platform classes - pwlib. subsequently, fluctuation in video transmission is deeply analyzed and a useful solution is presented. finally, a simulation terminal software is developed on the base of h. 323 stack, then the stack is tested with unit testing and systemic testing

    本文首先對h . 323標準進行了概括性的介紹,包括它所定義的實體、協議、通信過程;用uml和面向對象的思想對h . 323協議進行建模;實現了h . 323協議的模塊化劃分,並用跨平臺的pwlib類庫實現了h . 323協議;隨后對會議電視中視頻通信網路抖動的消除方法做了深入的研究,並在此基礎上給了一種有效的解決方案;最後,基於h . 323協議,開發了h . 323模擬終端,並用單元測試、系統測試的方法對協議進行了嚴格的測試。
  12. Tcp / ip was developed for narrowband text transfer. now, with the rapid development of global internet, people avail the network and depend on it more and more, but because of the original designing mechanism, the layered architecture can ’ t satisfy peoples demand correspondingly, and the disadvantage of tcp / ip becomes obvious in such cases

    由於最初的tcp / ip協議本來就是為了窄帶文本而開發的,隨著全球網際網路的蓬勃發展, tcp / ip層次網路體系所帶來的矛盾也不斷突。現在對網路體系結構的研究表現在兩個方面,一個是在tcp / ip體系結構上進行改進。
  13. Another form of object loitering arises when arrays are used to implement data structures such as stacks or circular buffers

    組用於實現諸如堆或環形緩沖區之類的結構時,會現另一種形式的對象游離。
  14. Secondly, it can detect opened ports on the basis of results of the first port - scan, and get the information of service and version of these opened ports. thirdly, through many kinds of detecting ways, it can get the os - fingerprints of tcp / ip protocol stack of the destination computer, and guess the faraway operation system exactly. at last, taking cve ( common vulnerabilities and exposures ) as the standard, a more practical vulnerability database by combining the structures of two large - scale oversea vulnerability databases is designed

    設計開發的網路漏洞探測系統具有較強的綜合性能,能夠提供多種埠掃描技術,在第一次掃描結果的基礎上對開放的埠進行第二次探測,得到開放的埠的服務和版本信息,通過多種探測方法獲得目標主機的tcp / ip協議指紋信息、較準確的推測遠程操作系統,並以cve ( commonvulnerabilitiesandexposures )為標準,結合國外兩個大型漏洞庫的結構,設計了較實用的漏洞庫。
分享友人