端並接層 的英文怎麼說

中文拼音 [duānbàngjiēcéng]
端並接層 英文
terminalanastomosis
  • : Ⅰ名詞1 (東西的頭) end; extremity 2 (事情的開頭) beginning 3 (門類; 方面) item; point 4 (原...
  • : 併名詞1. (山西太原的別稱) another name for taiyuan (in shanxi province)2. (姓氏) a surname
  • : Ⅰ動詞1 (靠近;接觸) come into contact with; come close to 2 (連接; 使連接) connect; join; put ...
  • : i 量詞1 (用於重疊、積累的東西 如樓層、階層、地層) storey; tier; stratum 2 (用於可以分項分步的...
  1. The chip simulation network laboratory system this paper disguessed is a distribute network simulation system based on lan. the system ' s architecture is a c / s of three lays. the front platform are the chip simulation network system application program terminer ; the middle lay is a dcom server, it ' s duty is to deal with the communication and data transmission between the terminer and then database server, and to execute the logical operation. the application program just connect with the middle lay and get data from it, the connection and operation with database server will be managed by the dcom server. the duty of database server is to access and backup the final data

    具體是由位於網路各個終的晶元模擬網路實驗系統應用程序為前臺;中間為dcom應用程序服務器,負責處理前臺應用程序與后臺數據庫的通信和數據傳輸,執行業務邏輯,前臺應用程序只需要與應用程序服務器建立連,在中間操作數據即可,與后臺數據庫的連和操作由應用程序服務器來統一管理操作。后臺數據庫只負責數據的存取操作。本論文實施的晶元模擬網路實驗系統模擬了主要的邏輯電路器件, 8088cpu ,存儲器,寄存器,數據總線,地址總線和控制總線,及其它相關晶元。
  2. This scheme integrates universual data accesss technology of microsoft, which plays a more and more important role in three - lay c / s ( client / server ) and uses the technology of ado ( active data access ), adopts the asp script language in display the results and uses stored procedure of sql server in databases design. in the system of b / s, client realizes a high efficient access to the server database through displaying diversified active controls in browser and using ado to access the data source. the disposing of data accures under the database not in the font of this system. this kind of scheme cannot only bring the system a higher real time response, but also decrease data runoff of the networks, lower the possibility that web server becomes bottleneck of the system and make the system more transplantable

    當前的web數據庫訪問技術正處于發展階段,針對這種情況,本文通過分析當前各種流行的web數據庫訪問方案的優缺點,結合在三次的c / s系統中扮演越來越重要的角色的中間件技術,採用了microsoft公司所提出的一致數據訪問技術,利用ado控制項,結合當前的asp語言,底數據庫採用了sqlserver7 . 0的存儲過程技術,設計了一種自己的web數據庫訪問方案,即在browser / server系統當中,客戶通過顯示在瀏覽器中的各種activex控制項,通過了ado連數據庫,數據的處理利用了存儲在數據庫內部執行,實現對後數據庫的高效訪問,且這種方案在給系統帶來較高的實時響應性能的同時,減少了網路數據流量,降低了web服務器成為系統瓶頸的可能性,也增強了系統的可移植性。
  3. Another is to design the unbalanced interconnect with one internal conductor to carry the " high " side of the signal, and a second one to carry the " low ", or " floating ground " side of the signal, plus a shield that surrounds them both and is tied to " ground " at one end of the cable only

    其二,在非平衡連中,用一個內部的導線傳送「高」的信號,同時第二個導線傳輸「低」或「浮地」的信號,將這兩股線用屏蔽裹起來且「只能"在線的一進行「地」 。
  4. Doing so revealed a hydrophobic meaning water - repellent tip that allows the viral harpoon to latch on more securely to the cell membrane, which is also hydrophobic. it also provided researchers with more insight into the dramatic structural change that the f protein undergoes while performing its task. when not in use, the f protein looks like a mushroom, and its hydrophobic tip is folded into a compact form, safely hidden inside the cap

    在沒有碰到人體細胞時, 「副流感病毒5型」細胞表的「融合蛋白」看起來就像一個蘑菇,防水頂嚴密封閉,且安全地藏在蘑菇帽子下面當病毒觸到人體細胞時,蘑菇帽子會突然破裂開來,防水頂也像魚叉一樣暴露出來,陷入人體細胞膜內。
  5. Firstly, the major ampullate glands were got from araneus ventricousus. total rna and mrna of ampullate glands were isolated and purified. double strands cdnas were synthesized in the assistance of amv - rt and e. coli dna polymerase i etc. by reverse transcription and replacement synthesis

    首先剝離大腹園蛛主壺腹腺,提取總rna和分離純化mrna ,反轉錄合成cdna ,凝膠析除去小於400bp片段,在雙鏈cdna兩引入ecor的銜頭,對其進行磷酸化處理。
  6. This card largely depends on three integrate chips to fulfill its function : 1 ) nic control main chip, corresponding the mac sublayer of ethernet, to realize csma / cd media access protocol, manage the sending and receiving buffers integrated on the chip and provide motherboard pci interface. 2 ) serdes ( serializing and deserializing ) chip, corresponding pcs and pma sublayers in ethernet, mainly to complete 8b / 10b coding and convert 10 bits parallel data to serial data, and convert them again at the receiving end. 3 ) fibre transceiver unit, completing light - electrical conversion of seri

    該網卡主要由3塊集成的晶元完成其功能,分別是i )網路控制主晶元,對應于以太網的mac子,主要完成csmaicd介質訪問協議,管理片上集成的發送和收緩沖區,提供和主板p0總線的介面: b ) s rd s (串列解串列化器)晶元,對應于以太同的pcs和pma子,主要完成sb lob編碼將10位并行的數據轉換為串列數據,在完成相反的功能:涌)光纖收發器,完成串列數據的光電轉換功能。
  7. In triangle plane filling between layers, the loop matching operator between layers was adopted, which is that the loops were matched according to their characters, geometry centers and perimeters. four kinds of regular algorithm in filling between layers were analyzed, and the shortest diagonal algorithm, which was rather fit to this dissertation, was adopted in this dissertation. the contour loops of section were grouped and each loop was split to make each loop become a single outer loop that was triangle split with delaunay algorithm

    間三角面片填充方面,採用間輪廓環按環的性質、幾何中心和周長進行匹配的間匹配演算法;分析了間三角面片填充的四種常用的演算法,根據本文需要選用實現了最小對角線法;面三角劃分時,將面的輪廓環進行分組,再對每組環進行切分處理,使得每組環變成一個單一的外環,對單一的外環按delaunay演算法進行三角劃分;將所生成的三角面片按規定的格式寫入stl文件,生成可直為快速原型製造所受的stl文件格式。
  8. The fourth chapter introduces the designing and im - plementing about the hardware of high speed bert, and gives some actual design cir - cuits. the fifth chapter introduces the designing and implementing about the software of high speed bert, and gives the simulation results of some program blocks and top block. the testing parameters are given in the sixth chapter

    本文第二章介紹數字通信及復技術的有關理論;第三章介紹高速誤碼率測試儀發子系統的設計方案;第四章介紹高速誤碼率測試儀的硬體設計及實現過程,給出了一些實際設計電路;第五章介紹高速誤碼率測試儀發送軟體設計及實現過程,給出了各程序模塊及頂模塊的模擬結果;第六章給出了高速誤碼率測試儀發送的測試參數。
  9. And realizes the follow function in chognqing electronics government. realized the safety communications between the web server and the client using ssl ; realizes the safety e - mail system using certificate. bring upped the economic, credible resolvent for proving the status of object in network

    針對電子政務系統中的具體應用實現了:利用安全套協議( ssl )實現web服務器和客戶瀏覽器之間安全通信;利用電子證書實現電子郵件安全傳;提出了比較經濟、可靠的分散式網路實體身份認證方式。
  10. Firstly, i introduce the hardware and software platform of embedded system, and explain the basic hardware and software development, it ’ s a cooperate process. then i analyse the cross development method for embedded system, mentioned the “ host ” and “ target ” in the development of an embedded system. take e - book project as an example, follows the process to introduce a real embedded system project, including the mcu, periphery hardware and the integrated development environment which can provide the whole platform for an integrated development on the pc - - wb33. then i present 3 of the hardware of e - book. for lcd, i introduce the common feature of lcd, the ssct lcd as well as the design, actualize of its driver. for the rs232 serial port, the principle of the serial port and the main driver of it are introduced. for flash memory, i introuce the principle of nor flash and nand flash, and how their drivers implemented. in the end, the conclusion of this paper is generated, there is also a prospect for further research

    以一個實際的嵌入式開發項目? ?電子閱讀器為例,按照項目開發流程,介紹了包括項目所使用的微控制器mcu及片內周邊電路;項目所使用的基於mcu的集成開發環境? ?能在pc機上提供完整集成開發的平臺wb33 ,使用它可以很方便的在pc機上模擬目標機的環境。詳細介紹了電子閱讀器的三個底硬體:對項目中採用的ssctlcd的特性以及其驅動的設計和實現的過程進行了詳細介紹;對rs232串口驅動,介紹了即電子閱讀器實現串口驅動介面的主要函數;對flash閃存驅動,分別介紹了norflash和nandflash的原理以及它們的驅動實現。最後,對全文給以總結,對以後進一步的研究做出了展望
  11. To avoid a terminal occupy channel excessively, access admission - base m - dcf ( aa - mdcf ) and its suggestion model are proposed. by combining subnet bandwidth management and ack mechanism in mac layer together, aa - mdcf can reduce the send rate of ack frame and prevent a terminal consuming wireless resource excessively

    為防止一個終過多地佔用無線資源,提出了基於入允許的改進型dcf : aa -入idcf ,通過子網帶寬管理sbm和mac確認機制的結合,降低ack的發送速率,限制一個終對無線資源的過度消耗,給出了建議的實現模型。
  12. Provides information and links to new data features for client and data tier applications

    介紹有關客戶和數據應用程序的新增數據功能的信息提供了相關鏈
  13. 1 ) realization of software packet embedded in m - es and md - is respectively to accomplish main function of mdlp, including assignment of tei ( temporary equipment identifier ), establishment of multiple frame operation, framing, flow control and error - free transmission of packets, is detailed. 2 ) a test model is established to evaluate the robustness and stability of mdlp and verify the validity of software packets. 3 ) according to the design of radio modem construction used in m - es, the modules of interface between data terminal equipment and radio modem are achieved to enable transmission of short message and continuous pseudo - random bit stream via rs232 uart

    本文首先概述了蜂窩數字分組數據網的結構和空中協議,詳細分析了移動數據鏈路協議,在此基礎上,重點敘述了以下方面的工作: 1 )設計完成了分別應用於m - es和md - is無線控制器的兩套程序實現數據鏈路的主要功能,包括分配臨時設備號、建立鏈路、組幀和面向連的服務保證分組正確無誤地傳輸,進行適當的流控; 2 )建立測試模型測試移動數據鏈路協議的可靠性和穩定性,證明了程序包的效用; 3 )根據cdpd系統無線數據機的軟硬體總體設計方案,完成了介面模塊,實現了rs232異步串口通信,使用戶可以根據需要發送短消息或連續的偽隨機比特流; 4 )在tms320c54x的軟體、硬體模擬平臺上,建立了cdpd試驗模型,實現了cdpd系統的mdlp基本功能。
  14. The main research contents are as follovvs : after the analyzing of the process of making train diagram, according with its character, and take into account the trend of innovation, chooses the total solution based on the b / s architecture, 3 - tier operation distributed and 2 - tier data distributed to separate the data from operation and simplify the development and maintenance ; the e - r data model that is accord with the 3nf criterion is designed after analyzing the data structure of the train diagram system. emphasis on the permission security of the distributed system, take the view schema, coupled with the login authentication and permissions validation, to ensure the data accessing domination, and take the synchronization, error control, and restore capability to advance the data security ; on the basis of b / s solution architecture, after comparing the existing transportation technologies, b - isdn and adsl is selected as the major solution architecture based on the package - svvitched networks. furthermore, error control, firewall, and encryption techniques are introduced to prevent the hacker attack and ensure the networks safety

    論文的主要研究內容包括:對目前我國列車運行圖管理體制和編制流程進行詳細分析,根據其「幾上幾下」的特點,結合未來「網運分離」體制改革的變化預測,選擇採用與之相適應的基於b s體系架構、三業務分佈、二數據分佈的整體方案,實現業務與數據的分離,降低開發與應用過程的復雜度和總體成本;對列車運行圖系統的數據信息進行分析,設計符合3nf規范的數據e - r關系模型,著重研究處于分散式系統中的列車運行圖數據信息的訪問權限和數據安全問題,提出以視圖模式結合用戶識別權限審定實現數據權限劃分,以發處理、容錯技術、恢復技術提高系統的數據安全性;在基於b s架構的系統整體方案基礎上,對當前多種數據傳輸技術進行分析比較,採用b - isdn為主幹網、 adsl為的基於公用數據網路分組交換技術的系統網路體系結構,針對網路自身安全性和黑客攻擊與侵入問題,詳細討論綜合採用差錯控制、防火墻、數據加密解密等技術手段提高系統的網路安全性能。
  15. On the side of the concourse which faces siu hong court, there is an extended structure which goes across and above the light rail track to link up the station with the existing light rail siu hong stop for the convenience of passengers interchanging between two systems

    兆康站樓高兩,上為車站大堂,下為月臺,總樓面面積為三萬平方米,設有兩個公共交通交匯處,分別位於大堂南北兩,而大堂向兆康苑的一邊有延伸部分,跨過輕鐵路軌連現有的輕鐵兆康站,方便乘客轉車。
  16. On a socket and get a zero return, this indicates that the peer at the remote end of the socket has called the

    操作得到一個為0的返回值,這表明遠程套的對等調用了
  17. In the database server construction, we emphasized on how to create new user database and its objects using sql server 7. 0 and transact - sql. we also introduced the measures adopted to ensure the safety of the database ; in the design of application software, we discussed how to realize the two modules of query and management of database using c + + builer. by the comparison of a few kinds of datasets in c + + builer, we got a deeper understanding of the principle of database query ; on closing this paper, we elaborated on the bde and odbc, and made efficient improvement on system function and executed helpful maintenance with the tools of sql server manager

    在數據庫的創建中,本文著重論述了如何使用sqlserver7 . 0以及transact - sql結構化查詢語言在服務器創建用戶數據庫及數據庫對象,且介紹了在用戶數據庫中採取的安全性措施;在客戶數據庫應用程序的設計中,按照設計的思路論述了如何用c + + builder編程語言實現數據庫查詢和管理兩大模塊,通過對幾種數據集組件的比較從更深的面研究了數據庫查詢的實現;最後,本文深入闡述了c + + builder的數據庫引擎( bde )和開放式數據庫連( odbc ) 。
  18. The limited number of sites and unattractive charges are problems arose in the process of operators and icps deploying the service and the restrictions on the terminals mostly refer to the small - sized displays of the handsets and the inconvenience of entering characters through the keyboard, which are manufacturers problems. as to slow connectivity, it seems to be the weakness of wap. however, the fact is that there is a limit of 9600 bits on the circuit - switched data services provided by the gsm network and this is the very bearer mode that is currently selected by wap established on the network layer. this only means that people do not accept wap over csd

    站點少、資費不具吸引力等缺點是運營商與icp在對該業務推廣的過程中所顯現的問題;來自於終的限制則是手機製造商的問題,雖然各大廠商都推出了支持wap的手機,但用戶的批評大都集中在手機屏幕太小及輸入不方便;至於連速度慢,這似乎是wap本身的缺陷,但事實是gsm網路所能提供的基於電路交換的數據業務存在9600bits的限制,而建立在網路之上的wap目前選擇的恰恰是這種承載方式,因此只能說wapovercsd這種業務提供模式人們不能受。
  19. Next, this paper studies the pki technology, ssl protocol and smart card technology, and then put forward a security email solution, which solves some problems as follows : ( 1 ) protect email subject secret ( 2 ) realize email header safe transmission ( 3 ) security keys management then, this paper uses existing products ( wallgreat kmc ) to build a pki platform, and realize a model for this solution, which includes a secure email server and an email client

    本文研究了pki技術、安全套ssl協議和智能卡技術,在此基礎上提出了一種安全郵件解決方案,旨在解決以下問題: ( 1 )郵件主題的保密性問題( 2 )郵件頭的安全傳輸問題( 3 )密鑰的安全管理問題著,本文利用公司己有產品(華翔騰密鑰管理中心)搭建pki平臺,設計實現了該解決方案的一個系統模型,該模型包括安全電子郵件服務器和客戶
  20. As the application of distributed computing is used much more widely , distributed database becomes a significant part of information management it avoids a lot of disadvantages of conventional centralized database , and is applicable to many situations distributed database is a set of data which is the unity logic , but in fact these data is located on different sites it is of high availability , easy expansibility , high concurrency , high efficiency and etc in distributed system , data redundancy is a method to improve the speed of query and the availability of system distributed query should shield the lower level details of data redundancy from end users , distributed transaction should ensure data from disaccord this paper introduces basic conceptions of distributed database firstly , discusses distributed transaction and concurrent control , describes the development prototype mysql ’ s characters , architecture and executive mechanism , then shows the skeleton model of dpsql and exposes the strategy and algorithm of distributed query and distributed transaction , at last analyzes the extra expenses and response delay of distributed processes this paper exposes the implementation mechanism of distributed query and distributed transaction emphatically distributed query uses the strategy of “ read one , write a11 ” s0 in such a system if user ’ s requests are read - - only for the most part and the distribution of data redundancy is plausible , efficiency is very high distributed transaction uses two - 。 phase commit protocol to ensure the consistency of global data , which has less communication overhead

    分散式查詢需要向用戶屏蔽數據冗餘分散的底細節,分散式事務處理要保證全局數據完整,這都是傳統集中式數據庫不曾面臨的問題。本文首先介紹了分散式數據庫的概念性問題;著討論了分散式事務涉及的定義及演算法;然後描述了dpsql的原型mysql的特性、結構和執行機制;繼而給出了dpsql的梗概模型,闡述了實現分散式查詢和分散式事務處理的策略及演算法;最後分析了進行分散式處理給系統增加的額外開銷和客戶的額外響應延遲。本文重點描述了分散式查詢和分散式事務處理的實現機制,分散式查詢採用」讀一個寫全部」的本地優先策略,在讀操作頻繁的系統中,只要庫的分佈合理,單機效率極高,幾乎無任何附加開銷和延遲,而以整個系統的角度看來,吞吐量就更是優于單機系統;分散式事務處理採用兩階段提交協議,通信次數較少能確實保證副本一致。
分享友人