data flow control layer 中文意思是什麼

data flow control layer 解釋
數據流控制層
  • data : n 1 資料,材料〈此詞系 datum 的復數。但 datum 罕用,一般即以 data 作為集合詞,在口語中往往用單數...
  • flow : vi 1 流,流動。2 (血液等)流通,循環。3 流過;川流不息;(時間)飛逝;(言語等)流暢。4 (衣服、...
  • control : n 1 支配,管理,管制,統制,控制;監督。2 抑制(力);壓制,節制,拘束;【農業】防治。3 檢查;核...
  • layer : n 1 放置者,鋪設者,計劃者。2 【賽馬】(一般)賭客。3 產卵的雞。4 【軍事】瞄準手。5 層;階層;地...
  1. The paper firstly combined the aerodynamic model, pollutant model, traffic model and the optimal operating fans selection model and then established the sample data gaining program to produce the optimal sample data ; secondly, the multi - layer forward neural network and the fuzzy control is combined within an equivalent structure, after the learning of sample data, the neural - fuzzy control system for the road tunnel longitudinal ventilation is produced ; thirdly, the optimal operating fans selection model is replaced by the fuzzy control model to make the tunnel ventilation simulation program, and then the control results under different traffic flow circumstances are evaluated in the matlab environment ; finally, the adaptive ability of the neural - fuzzy control system is discussed

    本文首先結合空氣動力學模型、污染模型、交通模型和最優風機開啟臺數選擇模型建立樣本數據獲取程序,利用該程序產生不同交通流下的最優樣本數據;然後,將多層前向神經網路與模糊控制進行結構等價型融合,通過學習最優樣本數據,建立公路隧道縱向通風神經模糊控制系統;之後,用此模糊控制模型替代最優風機開啟臺數選擇模型建立基於模糊控制的隧道通風模擬程序,在matlab下模擬模擬不同交通流下的隧道通風以測評控制效果;最後,對神經模糊控制系統的適應性進行了討論。
  2. Finally, this dissertation studies the transaction processing and mechanism of data flow of the usb host controller. the usb host controller was designed in five aspects : clock generating, serial data management in protocol layer, protocol regular translation, data fifo and predominated control

    最後,研究了usb主控制器的事務處理和數據傳輸機制,並從時鐘產生、協議層的串列數據處理、協議規范翻譯、數據fifo和主控制五個方面對其進行了結構設計與詳細設計。
  3. Fortunately, ipsec provides us security services for ip layer and higher layers, such as access control, connectionless integrity, data origin authentication, rejection of replayed packets ( a form of partial sequence integrity ), confidentiality ( encryption ), limited traffic flow confidentiality, and so on. the thesis gives a type of network security architecture based on ipsec system, it includes the following contents : 1 analyzing the security problem in tcp / ip protocol stack, current main network attack methods and regular defense methods. 2 studing the overall architecture, main security protocols, application environments, and working mechanism of ipsec

    本文所提出的新一代網路安全體制就是建立在ipsec體系基礎上的,在本文的撰寫過程中,我主要進行了如下一些工作: 1深入分析了由tcp ip協議棧本身帶來的安全問題、當前主要的網路攻擊方法以及常採用的防範對策; 2研究了ipsec標準的總體結構、主要安全協議、應用場合以及其工作機制; 3研究了當前常用的各種數據加解密機制以及密碼演算法,深入分析了它們各自的特性和具體的使用方式; 4閱讀了大量關于混沌密碼的文獻資料,了解目前混沌密碼的研究動態和成果,研究混沌密碼體制的工作機理,然後利用vc + + 6 . 0作為開發平臺對一類混沌密碼體制進行了實現,並為它編寫測試代碼評估其性能。
  4. Wan standards typically describe both physical layer delivery methods and data link layer requirements, including physical addressing, flow control, and encapsulation

    廣域網路標準典型地描述實體層的傳送方法和資料鏈結層的需求,包括實體層定址,流量控制和封裝。
分享友人