模塊名字 的英文怎麼說

中文拼音 [kuāimíng]
模塊名字 英文
module name
  • : 模名詞1. (模子) mould; pattern; matrix 2. (姓氏) a surname
  • : 名詞(古時佩帶的玉器) penannular jade ring (worn as an ornament in ancient china)
  • : Ⅰ名詞1 (名字; 名稱) name; appellation 2 (名聲; 名譽) fame; reputation 3 (名義) name 4 (姓...
  • : Ⅰ名詞1 (文字) character; word 2 (字音) pronunciation 3 (字體) form of a written or printed ...
  • 模塊 : camac module,camac
  1. As a whole the system may compart three modules : ndis drivers in the kernel mode, the dll program in the user mode and the user application program, adopting the share memory technology three modules realize the data share of the control canal rule, the encapsulation data and the network neiborhood name and so on, so we can easily finis1 " the packet authentication by the control canal rule, improve the filtering efficiency of the system. whereas the current of firewall technology, the system has wide utily value and business value. this software is based on windows 2000 operating system, the programming language is chosen as visual c + + 6. 0 and win2000 ddk

    從總體上可以劃分為以下三個:核心層的ndis網路驅動程序、應用層的動態鏈接庫程序以及用戶應用程序,這三個之間通過內存共享技術完成對控管規則、封裝數據、網上鄰居列表等數據的讀寫操作,從而很方便的根據控管規則實現了對網路封包的認證操作,提高了系統的過濾效率。鑒于目前防火墻技術的發展趨勢,本系統具有廣泛的實用價值和商業價值,因此具有一定的推廣前景。軟體的開發基於windows2000操作系統,開發語言採用visualc + + 6 . 0和win2000ddk 。
  2. Names of modules and packages are printed in a sans serif typeface

    和包用無襯線體表示。
  3. First, the user access flow of inrp protocol is discussed. second, the frame architecture of inrp is introduced. third, packet process is the kernel process of inrp and the tag which differs from dns protocol, the dissertation has a deeply discussion here

    我們首先概述了inrp的訪問流程,和dns的主要區別,概述了基於路由技術的inrp協議的幾個主要功能,然後對其中幾個主要進行了較深入的研究。
  4. Gets a string array containing all the keys module names in the

    中所有關鍵稱)的元串數組。
  5. Further more, the thesis lucubrates some key techniques : aiming at the management of the distributed objects, we skillfully construct the isomorphic project object tree for the real projects structure by using the corba naming service, and laconically and effectively implement the management of the services and modules by using the location service. and we also propose a design which uses corba event service and borland midas to implement the distributed data service in a creative way and analyze the advantages and disadvantages of this design at the same time

    並針對一些關鍵技術做了深入的討論和分析,例如針對整個系統的分散式對象的管理,巧妙地借用corba的服務構造了同構于實際工程組織的工程對象樹,同時使用定位服務簡潔而有效的實現了對服務和的管理;針對分散式數據庫的實現,創造性地提出了一種使用corba事件服務和borlandmidas組件來實現分散式數據服務的設計,並實現了這個設計,同時分析了這種設計的優劣。
  6. We regulate a command - response pair for the encryption / decryption operation based on permutation code, combining rsa and md5 used in cos safety module, and bring forward a safety transmission process for documentation

    並給排列碼加密解密操作賦予相應的命令應答對,結合智能卡操作系統的安全中的rsa演算法和md5演算法,提出了使用這種數卡進行文件安全傳輸的過程。
  7. In this article, we study the implemetation of fpga for elliptic curve digital signature algorithm. based on number thesis 、 abstract algebra and complex thesis , integrated information theory 、 cryptography and some specific relevant algorithm , we ascertain the implementation of ecdsa for hardware project : according to the design idea of hiberarchy and modularization, we adopt very high speed ic hardware description language ( vhdl ) as design input and simulate the design in every level and every model for the correct of the fundamental design. after finish the top design, we perform the whole simulation. then , we carry out the timing simulation after the logic synthes and layout

    本文從實際應用出發,研究了橢圓曲線數演算法的fpga的實現:以基本的數論理論、抽象代數和復雜度理論為依據,結合信息論、密碼學的一些知識以及一些具體的相關演算法,確定了ecdsa的硬體實現方案:按照層次化、化的設計思想,採用硬體描述語言vhdl作為設計輸入進行ecdsa的硬體設計;在每個設計層次和每個都進行了擬驗證,得以保證底層設計的正確性。在確保每個的設計正確后,完成對電路的頂層設計,進行總體的擬。
  8. A secure authentication and key exchange protocol is designed in this thesis, which could prevent man - in - the - middle attack, increasing the reliability of authentication and security of key exchange. the data encryption module is implemented by openssl including symmetry key algorithm, public key algorithm, hash function. the system ’ s function is tested finally, the data transmission rate using different encryption algorithm

    研究並設計了一套基於數證書和數技術的身份認證協議和密鑰交換協議,能夠有效地防止中間人的竊取和篡改,提高了身份認證的可靠性和密鑰交換的安全性;利用openssl標準庫函數實現系統的數據加密,實現對稱加密、非對稱加密以及信息摘要的常用演算法。
  9. In chapter 2, the main function units of the inrp protocol for the cdn routing system based on content name are summarized, then several units are deeply studied

    在第二章中,主要討論路由技術的inrp協議。 inrp協議負責為用戶的內容請求建立路由。
  10. We use session manager to solve the problem of sending and receiving the multi formats of media data ; use local service layer and java applet numeric underwrite mechanism to reading and writing the local resource

    使用通信管理器功能解決多種媒體格式的數據同時在網路上傳輸的問題;使用本地服務層或者javaapplet數機制,為applet存取本地資源提供有效手段。
  11. Gets a string representing the name of the module

    獲取表示元串。從
  12. Check out cpan s modules in alphabetical order by modules contained in the distributions

    請參閱該發行版中按模塊名字母順序排列的
  13. Double - click on the name of the application client module in the j2ee hierarchy view to start the deployment descriptor editor, or from other views, open

    雙擊j2ee hierarchy透視圖中的應用程序客戶端模塊名字來啟動部署描述符編輯器,或者是從其它透視圖中打開
  14. In addition, no namespace or module level keywords, such as

    此外,不支持任何命空間或級的關鍵(如
  15. Through analyzing the results, we expatiate the feasibility of using dsp to implement digital signature. in hardware design, tms320c50 chip is chosen as the core processor and electrical periphery circuit is designed on basis of it. the function and connection information of digital signature electric circle is presented in detail in this report. at last, the validation software of signature is accomplished in computer. we run the whole system to get the result of digital signature and its validation, thus verify the correctness of the signature and the validity in identifying attack

    本次設計在硬體上採用的核心處理晶元為tms320c50 ,在熟悉此晶元的內部結構的基礎上,設計了處理器晶元的外圍功能輔助電路,製作了簽電路板和硬體介面板,本文具體給出了數電路板和介面電路板各部分電路的功能和接線情況。最後,在計算機中編寫了簽驗證軟體,並給出運行整個系統得到的對數據「簽」和對「簽驗證」的結果,對數結果的正確性和識別攻擊的有效性進行了驗證。
  16. Rule 2 every module owns a mnemonic which is built from the name ( ex : svaud ). this mnemonic is used as prefix for all the interface methods

    每個擁有一個由組成的助記符。這個助記符作為介面方法的前綴。
  17. This specifies the generic module name, which is passed as a character string

    它指定普通的稱,作為元串傳遞。
分享友人