路數 的英文怎麼說

中文拼音 [shǔ]
路數 英文
1. (途徑) way; approach2. (著數) a movement in martial arts 3. (底細) exact details; inside story; ins and outs
  • : 1 (道路) road; way; path 2 (路程) journey; distance 3 (途徑; 門路) way; means 4 (條理) se...
  • : 數副詞(屢次) frequently; repeatedly
  1. Data encryption scheme of network based on aes and rsa

    的網路數據加密方案
  2. The intrusion detection system chooses the misuse detection technology. the main content of the paper is divided into four sections : section 1 mainly explores the windows network architectonics, analyzed the program of ndis, and introduced the main network data capture schema of lower layer ; then introduced the mechanism of packet capture and filter, and analyzed the framework of winpcap in capture and filter packet on the bases of former work

    本論文主要包括四個方面:第一部分主要分析了windows的網體系結構,剖析了網驅動介面規范( ndis )的編程,介紹了低層網路數據的主要的捕獲方案:然後介紹了包捕獲和過濾機制;最後在前兩者的基礎上,分析了本系統開發用工具winpcap據包捕獲和過濾的的結構。
  3. The thesis design the specification of intrusion detection of the privileged program and network communication in the detail by asl specification

    本文用asl詳細的設計了特權程序和網路數據包的入侵檢測的規范。
  4. We now specialize in the design and manufacture of motherboards, panel pcs, barebones, ( ia ) accessories and embedded systems, and our product portfolio is focused on embedded system which could be applied to the uses of internet appliance ( ia ), digital video recorder ( dvr ), network application storage ( nas ), network application devices ( nad ), kiosk, and point of sale ( pos )

    本公司致力於主機板,平板電腦及各類準系統產品的設計及製造,主打嵌入式系統的各項應用,以滿足客戶在網字監控,網存儲設備,網應用,多媒體查詢終端, pos機和精簡型電腦等方面應用需求。
  5. Special organization developed mechanism of jiangsu public security safety of network of information of key internet unit is checked greatly, check key internet information to serve an unit in all 2627, hidden danger of next safety of hairnet sth resembling a net rectify and reform advice note 104, still rent to mandatory lead plane and fictitious space safety administration has repair, outstanding to 4 problems internet data center is executed hang out one ' s shingle supervise and direct, the course is rectified and reform, delete bawdy pornography information in all 2570

    江蘇公安機關專門組織開展了重點網際網單位信息網安全大檢查,共檢查重點網際網信息服務單位2627家,下發網安全隱患整改通知書104份,還對託管主機和虛擬空間出租安全治理進行整治,對4家問題突出的網際網路數據中心實行掛牌督辦,經過整改,共刪除淫穢色情信息2570條。
  6. Then this paper concerns about the network packet intercepting technology of linux os and gives a thoroughly overview of network hacking methods and some application protocol criterion, including http, ftp, telnet, nntp, pop3, smtp etc. then the system design scheme of the transparent proxy has been discussed, this system can be divided to 4 modules below : establishment of transparent charnel, implement of proxy service, gui configuration and management application, accessory filter functions ( such as url filter, command filter and logger etc ). we explain key techniques in all 4 main parts of this system, define the interfaces of each module, what is more the main data structures and software implements codes are all illustrated

    首先,論文陳述了防火墻的相關技術基礎,分析了透明代理作為一種先進易用的防火墻技術的原理,闡述了linux操作系統網路數據包攔截技術和http 、 ftp 、 telnet 、 nntp 、 pop3 、 smtp等應用層協議的協議規范和具體的工作流程。接著敘述了本透明代理服務器的系統總體設計方案,將系統分為以下幾個部分:透明通道建立、代理服務實現、 gui配置管理程序以及過濾功能(如url過濾、命令過濾和日誌審計等) 。論文然後分別介紹各個關鍵部分的具體實現要點,解釋了相互間的介面關系,列出了主要據結構和實現流程。
  7. The control system included the following units : video decode unit, data format conversion unit, fpga controller, cache unit and d / a monitor. the above self - design control unit plus row and column power supply units make the whole fed driving system, thus drove the 25 inch sample and realized color video display. the 25 inch vga sample thus fabricated could display video images, and obtained its brightness 400cd / m2, contrast ratio 1000 : 1, 256 circuit gray scale

    本文介紹了fed驅動系統的工作原理,重點論述了基於fpga的vga級彩色fed新型驅動控制系統的研製,這種新型fed驅動控制系統主要包括視頻解碼電據格式轉換電、 fpga控制電據緩存電和d / a監控電,配合后級列灰度調制單元和行掃描單元,組成完整的fed驅動系統,可以驅動25英寸vga級fed顯示屏,實現彩色視頻顯示,樣機亮度達400cd / m2 、對比度為1000 : 1 ,灰度等級為256級。
  8. Multi - loop intelligent data logging remote temperature controller

    三迴路數字顯示控制儀
  9. Reflection on the existence of digitalized information highway

    信息高速公路數字化生存之思
  10. Doth not he see my ways, and count all my steps

    4神豈不是察看我的道點我的腳步呢。
  11. The ids of the paper is network - based anomaly detection system. with the help of data mining technology, we bring forward a measure to describe the normal state of the network traffic and user behavior and extracting the useful rule from large network data. so we can establish the knowledge warehouse which describe the normal state of the network traffic and user behavior. the knowledge warehouse can be the standard in order to judge the normal state. we can find the dubitable connections according to account the state and anomly instances of connections

    論文在描述網應用和用戶行為時採用據挖掘技術從海量的網路數據中提取有用的規則,構建了一個描述正常狀態下的網應用和用戶行為的規則集,這個規則集是用來判斷網應用和用戶行為是否正常的標準,論文根據這個標準分析當前網連接的異常情況,將可疑的連接找出來。
  12. Development and utilization of free charge network database resources

    免費的網路數據庫資源的開發利用
  13. Microcircuits. digital microcircuits. fusible link prom memories

    微電.字微電.可熔鏈程序存儲器
  14. The design scheme how generally - used analog interphone transport system upgrades to networked digital system over ethernet is introduced

    摘要介紹了目前在監控系統中普遍使用的一種模擬對講機,通過以太網傳輸升級成網路數字系統的設計方案。
  15. Microcircuits. digital microcircuits. general requirements

    微電.字微電.一般要求
  16. At the same time, this article chooses the network framework of its system by analyzing several basic kinds of network system structure. it utilizes network data base programming principle to discuss the visit technology of data base odbc, web data base middle pieces technology cgi, and characteristic of the calculate mode of asp c / s b / s, proposes the topological structure of network data base used in this system

    同時分析了幾種基本的網體系結構,選擇了系統的網構架,利用網路數據庫編程原理,討論了據庫的訪問技術odbc 、 web據庫中間件技術cgi和asp 、 c s及b s計算模式的特點,提出系統中應用的網路數據庫拓撲結構。
  17. The article is about billing of ip network, especially on the aspects of theory and structure. it has researched the reality of ip billing, include three tiers web structure, cmm of sei, oob technology, radius protocol, netflow and the technology of integration

    本文深入研究了網計費技術的原理和體系結構,探索了網計費系統的實現技術,包括基於web的信息系統三層體系結構、軟體開發標準? cmm 、面向對象技術、 radius認證記費技術、網路數據流量採集與整合技術等。
  18. Parallel processing for data statistics in network database system

    路數據庫系統中據統計的并行處理
  19. In this paper, we study focus on building intrusion detection model based the technique of data mining ( dm ). firstly, the paper designed a scheme to modeling intrusion detection based dm and bright forward the idea of descriptive model and classified model to intrusion detection. secondly, we designed and implemented a net data collection system with high performance and a scheme to pretreat net data. thirdly, after studying the algorithms to mine association rule and sequence rule in net data, we extended and improved the algorithms according to the characteristic of net data and the field knowledge of intrusion detection

    首先設計了基於據挖掘技術的入侵檢測建模方案,提出使用該技術建立入侵檢測描述性模型和分類模型的思想,並用分類判決樹建立了入侵檢測分類模型;其次,設計和實現了一個高性能的網路數據採集系統和網路數據預處理的方案;然後,在對關聯規則挖掘和序列規則挖掘演算法進行研究的基礎上,結合網路數據的特性和入侵檢測領域的知識對演算法進行了擴展和改進,挖掘出了網路數據的關聯模式和序列模式;最後,研究了描述性模式的應用,並設計出基於模式匹配的入侵檢測引擎,該引擎具有誤用檢測和異常檢測功能。
  20. He attempted to find a doctor of questionable reputation.

    他想找個路數不正的醫生。
分享友人