security flow analysis 中文意思是什麼

security flow analysis 解釋
安全數據流分析
  • security : n 1 安全(感);安穩;穩妥;平安。2 確實;確信;把握;可靠性;安心。3 【軍事】防禦物。4 保護;防...
  • flow : vi 1 流,流動。2 (血液等)流通,循環。3 流過;川流不息;(時間)飛逝;(言語等)流暢。4 (衣服、...
  • analysis : n. (pl. -ses )1. 分解,分析;【數學】解析。2. 梗概,要略。3. 〈美國〉用精神分析法治療(= psychoanalysis)。
  1. Based on the analysis of office network data flow we lay stress on the arboreous security state machine model which befits the office network of army or government

    探討機關辦公網路的數據流特點,並提出一種適合部隊和政府機關辦公網路的樹狀安全狀態機模型。
  2. On the other hand, by the statistical analysis of historical flow data, the system can model the network traffic flows, and forecast short - term network flows. after that the system can analyse the network traffic abnormity. by use of the netwok management system and network security facility, we can setup a security infrastructure to monitor flows in real time, predicts the future flows, alarm some abnormal flows, respond to the abnormity automatically and immediately

    論文通過定期採集網路關鍵設備,包括匯聚層和核心交換層的流量情況,處理后以結構化、層次型的方式保存起來,一方面提供了圖形化的用戶介面,將收集的各種歷史數據和實時數據在其中以圖形的方式直觀地顯示出來,另一方面通過對歷史流量數據的統計分析,從而對網路流量進行建模,短時間預測網路流量情況,實現對網路流量異常情況的觀察分析,利用有充分響應能力的網路管理系統和網路安全設備,構成響應和預警的綜合安全系統。
  3. This thesis adopts vfp database manage system ( dbms ), oo ( object oriented ) programming and sas statistic analysis software. starting with the impacting factors on cocoon - cooking technique of filature production, the system analyzes diversified data information, along with the relativity of various parameters used in technical designing. based on those, we scheme out the structure composing and system flow chart of cocoon - cooking problem - consulting, also develop maintainable and practical technological designing subsystem with friendly interface, simple operation and fine security

    本課題採用vfp數據庫管理系統開發技術和面向對象的編程技術及sasrelease6 . 12統計分析軟體,採用關系數據模型,從繅絲生產中煮繭工藝過程的相關影響因素入手,充分分析影響煮繭的各種數據信息,以及在工藝設計中用到的各類參數的相關性,在此基礎上設計出煮繭問題咨詢子系統的結構組成和系統流程圖,進而研製具有良好界面,操作簡便,安全性好,實用且可維護的工藝設計子系統,以建立一個完善的煮繭工藝設計專家系統( cctdes ) 。
  4. The basic software consists of topology analysis, on - line load flow computation, state estimator, security analysis, dispatchers training simulator, short circuit current computation, and voltage / reactive power optimize, etc. the derived softwares consist of load control, capacitor optimizer configuration, transformer and feeder load distribution, impedance computation of generator, etc. network analysis software is powerful dispatch tool, though witch the current state of the power system can be realize, then improve the security and economic potential

    Dms網路分析的基本軟體有:網路結線分析、潮流計算、狀態估計、負荷預報、短路電流計算、電壓無功優化等。派生軟體有:負荷控制、電容器優化配置、變壓器與饋線負荷分配、電源阻抗計算等。網路分析軟體是有力的調度工具,通過它可以了解和掌握當前的運行狀態,從而挖掘安全和經濟方面的巨大潛力。
  5. This thesis mainly introduce a development process of mis of steel tube enterprise producing. a universal mis of adapting to our country middle and small producing enterprise is developed in accordance with the practical situations of our country producing enterprise. the structure and developing method of the mis are analyzed, followed by the introduction of the development process in stages. the system development abides strictly by the requirements of software engineering, with all the files standard and complete. during the process of the development, we took into consideration practicality as well as scientific principles. the system is development under a quick prototype method. first, the logic module of the system is established through the analysis of the business flow process and the information flow concerning productive enterprise of steel tube ; secondly, in light of the module, the system is set up including the design of the system ' s network platform, developing tools, database, system code, software modules, system security, user ' s interface and so on. finally, the prototype of the system is implemented on the basis of the design

    文中首先分析了管理信息系統的開發方法和體系結構,然後分階段地介紹了具體的開發過程。該系統的開發嚴格遵守軟體工程的要求,文檔規范完善,在開發過程中堅持實用性和科學性相結合的原則。系統採用快速原型法進行開發,首先通過對鋼管生產企業業務流程和數據流程的分析,建立了系統的邏輯模型;接著針對該模型進行系統設計,包括對系統的網路平臺、開發工具、數據庫、編碼、軟體模塊、系統安全及用戶界面等方面的設計;然後在設計的基礎上實現了系統原型;通過對原型的評價和改進,使原型最終成為實際產品。
  6. This paper described the design and realization of a command and communication system database in the environment of vfp. it briefly introduced the mostly function, the system frame, the constitute & the information flow ; it introduced the key techniques used in the database design, such as user interface designing technique, application system toolbar designing technique, multi - media technique, data exchange technique, security and maintaining secrecy technique, etc. moreover it do more analysis, research & prospect for these technique & the developing way of the system

    本篇描述了vfp環境下某指揮通信系統數據庫的設計和實現;簡要介紹了該數據庫系統的主要功能、體系結構、組成和信息流程;介紹了數據庫設計中的用戶界面設計技術、應用系統工具欄設計技術、多媒體技術、數據交換技術、安全保密措施等技術,並對這些技術以及系統的發展方向進行了進一步的分析、研究和展望。
  7. And also, several modules of the human resource management, equipment management, work management, security management and work assistant management are presented in the system analysis & design phase. the analysis & design flow is presented, and the object - oriented idea is used in the development

    在系統分析設計階段,對人事管理、設備管理、生產管理、電量管理、安全管理、生產輔助管理等幾個模塊進行了分析,給出了系統分析設計流程,採用面向對象的思想,進行系統的總體結構、訪問策略、子模塊的設計。
  8. On the base of the fujian power system that has the special configuration of " large power generator with small power system " in 2000, constructs power system models of fujian and fujian interconnected with other parts, does a lot of calculation and analysis and simulation, researches the security mechanism and rule of the fujian special power system interconnected with large power system. the above connection can keep security and stability and can make obvious benefits, but when the transmission power reach to excessive quantity the main power grid will increases interconnected flow - in or flow - out exchange power load. the power operation state tended to instability ; the infirmable interconnection make s the damp infirmable

    本文以2000年前後具有「大機組小電網」特殊結構的福建電力系統為背景,建立了福建電力系統及其與外部互聯的數學模型,開展大量的模擬計算分析,研究了「大帆組小電網」電力系統與大容量電力系統互聯偏弱的安全穩定性的機理和規律:前述互聯可以安全穩定運行,取得顯著效益,當傳輸功率達到一定量后,主網架增加了送出或吸收互聯交換功率的負載,系統運行狀態向穩定性水平有所下降的方向轉移;聯絡偏弱使阻尼偏弱,聯絡線小幅低頻振蕩和大幅低頻振蕩易被激發,聯絡線一旦重載斷開,系統高周或低調嚴重。
  9. Only when dispatch host computers are furnished with state estimator and on - line flow, not only security detection but safety analysis and economic operation can be realized. it has been about thirty years since state estimation in power system was researched

    為使這些系統不僅可以完成安全檢測的功能,還可以進行安全分析和經濟運行等計算工作,就要求調度主機應該具有在線潮流和狀態估計計算的功能。
  10. The paper analyzes in detail the hidden defect of public security and traffic police network structure and security ; to use the zero - copy technology to snatch all the network packages under the high ? speed network ; to use multi - protocol analysis and reduction technology to solve the bottleneck, the heavy flow of network information protocol analysis and reduction

    本文詳細分析公安交警網路結構和網路安全隱患;運用零拷貝技術解決高速網路下獲得所有的數據包問題;運用多協議分析與還原技術解決網路信息大流量協議分析還原這一瓶頸問題。
  11. The system designs login security and insert, alter, seek and delete function. the paper uses java, xml technology and multy _ layer archtecture to realizes pms, and explains the pms development process from the system requiement analysis, function design, realization idea of key function and the pragram flow chart

    本文在應用java相關技術和xml ,採用多層體系結構,從系統需求分析到具體功能設計,以及系統關鍵部分的具體實現思路和流程框圖,闡述了一個人事管理軟體的設計和開發過程。
  12. This article has carried out business requirements analysis, service flow analysis, system oerverall architecture design ( including development and running platform design, security design, inter - system communication interface design )

    本文對長沙市商業銀行網上銀行系統進行了業務需求分析、業務流程分析、體系架構設計、系統開發與運行平臺設計、系統安全性分析與設計、系統通訊介面分析與設計。
  13. The text commenced from the technique background of the firewall, which introduced the ixa architecture of the network processor first, including the total architecture characteristics, internal technique, hardware etc. ; then described the whole hardware structure and the software structure of the firewall, and development environment ; after that introduced the conception of network security and firewall technique, and gave analysis of characteristics of ipv6 protocol in detail ; with the firewall design immediately after at every step thorough, put forward the requirement of the ipv6 firewall project first, including design target, technique innovation, application situation etc., described software and hardware architecture of the whole system, the internal connection and total flow later on, elaborated function and realization of six modules of control plane, including vpn, packet filter core, application proxy, configuration and management, url filter, log, and referred to the database that the

    正文開始從防火墻的技術背景入手,先介紹了網路處理器的ixa架構,包括總體的架構特點、內部技術、具體型號硬體等;接著描述了防火墻的整個硬體結構和軟體結構,以及開發環境;然後介紹了網路安全的概念和防火墻技術,並對ipv6協議特點作了較為詳細的分析;接著按著防火墻設計的步步深入,先提出了ipv6防火墻的需求,包括設計目標、技術創新點、應用場合等,隨后描述了系統整體的軟硬體結構、內部聯系及總體流程,而後著重詳細闡述上層vpn 、包過濾核心、應用代理、配置管理、 url過濾、日誌六個控制平面子模塊的功能和實現,並提及系統實現中使用的數據庫。
分享友人