助手标题  
全文文献 工具书 数字 学术定义 翻译助手 学术趋势 更多
查询帮助
意见反馈
   protocol content 的翻译结果: 查询用时:0.172秒
图标索引 在分类学科中查询
所有学科
更多类别查询

图标索引 历史查询
 

protocol content
相关语句
  协议内容
     The method was finally applied to analyze a sample protocol, describe the contribution of each protocol content and present the inefficacy of redundancy factors to protocol targets, thus achieving the safe simplification.
     应用该方法对实例协议进行分析 ,直接描述各协议内容的贡献度 ,显示冗余内容对目标实现的无效作用 ,从而可以安全化简 .
短句来源
  “protocol content”译为未确定词的双语例句
     ①The System uses a new rights control method and a new rights management protocol that is based on machine fingerprint and includes identity authentication protocol, content's integrality protocol and rights control protocol, which can eliminates the shortages of the common digital rights management system.
     ①该系统采用了本文提出的基于机器指纹的版权控制方法和基于机器指纹的集成身份认证—内容认证—版权控制三重协议的版权保护协议,保证了在安全性要求达到一般数字版权保护系统水平的基础上,相当程度地克服了一般数字版权保护系统的缺点,从而在整个数字内容的生命周期保护了数字内容的版权。
短句来源
     The development of fieldbus and the protocol content of CAN are first presentedin this paper, and the circumstance and performanceof real-time communication inmodern industry control system are discussed.
     本文介绍了现场总线尤其是 CAN 总线的通讯内容和特点,论述了现代工业控制中的实时性通讯环境和性能要求。
短句来源
     IKE protocol, which is responsible for the dynamic negotiation and management of IPSec SA, is an essential element of the IPSec protocol family. The thesis investigates the details of protocol content, the mechanisms of realizing the key exchange, as well as the pros and cons of the protocol itself.
     IKE(Internet Key Exchange)协议是IPSec(IP Security) 协议簇的重要协议之一,负责动态协商和管理IPSec SA(Security Association , 安全关联)。
短句来源
     Next, study is focused on the HART protocol content and how to communicate according to this protocol.
     接着着重阐述了HART通信协议及其在变送器中的软硬件实现方法;
短句来源
     With the un-opened characteristic of the SIEMENS PPI protocol content,this article maintain the data of PPI protocol through interception. Analyse this protocol content in detail,and introduce the problem during programming process,also use the protocol to realize the communication between the SIEMENS S7-200 PLC and Touch Pane. l
     针对西门子PPI协议不公开的特点,通过侦听获得PPI协议的数据报文,详细分析了该协议的具体内容,介绍了该协议在触摸屏软件的编程过程中所遇到的问题,并采用该协议实现了触摸屏与S7-200PLC之间的通讯。
短句来源
  相似匹配句对
     The content of P. C.
     血清P.
短句来源
     Its content is: I.
     主要内容是:
短句来源
     Cluster formation algorithm is the main content of LEACH protocol.
     簇的形成方法是LEACH协议的主要内容,而簇首选举算法又是簇形成的核心。
短句来源
     1. The background of WAP protocol and main content of information security.
     1.首先介绍了WAP协议的背景,并讨论了信息安全技术的一些主要内容。
短句来源
     323 protocol.
     323的PC到PC的语音终端软件的具体实现方法。
短句来源
查询“protocol content”译词为用户自定义的双语例句

    我想查看译文中含有:的双语例句
例句
为了更好的帮助您理解掌握查询词或其译词在地道英语中的实际用法,我们为您准备了出自英文原文的大量英语例句,供您参考。
  protocol content
Objectives: To describe key elements of a set of hospital prenatal substance exposure protocols, and to relate variations in protocol content to the state legislative environment and hospital characteristics.
      
The protocol content analysis yielded two developmental trends: From management to leadership, and from idealism to realism.
      


A real time and active intrusion detection system (IDS) needs the support of the perfect audit information. The purpose in this article is study on the perfection of audit information in IDS. First, the audit information in current IDS is introduced. The simple method of evaluating the perfection of the audit information using time series logic and space is also introduced, and it's found that the spacious audit information in neighbors of the receiver and the sender is not used in current IDS. Second, from...

A real time and active intrusion detection system (IDS) needs the support of the perfect audit information. The purpose in this article is study on the perfection of audit information in IDS. First, the audit information in current IDS is introduced. The simple method of evaluating the perfection of the audit information using time series logic and space is also introduced, and it's found that the spacious audit information in neighbors of the receiver and the sender is not used in current IDS. Second, from the receiver as source, the computer network is converted to a field, the receiver is the field source, and the packet frequency (packet number in a fixed time) sent to the receiver in a router is converted to the divergences of the field. On these grounds, the Defending Alliance Protocol (DAP) is proposed, which is used to perfect the spacious audit information to enhance the performance of IDS. The reason for establishing the protocol, the protocol content, the data form and the basic service primitives are demonstrated. The DAP is composed of the conception of security coefficient in receiver, the protocol between neighbors and receiver (NBDAP), and the protocol between network management centers (NMC) and receiver (MCDAP). The security coefficient in receiver is that the percentage of the sum of divergences in the neighbors of receiver divided by the buffer capacity in the receiver. It's explained that how to obtain and send the spacious audit information in neighbors to the receiver in the NBDAP. It's also explained that how to authenticate true of the connection between sender and receiver using NMC in the MCDAP. The relationship between NBDAP and MCDAP is analyzed. The basic service primitives demonstrate the services of DAP, and stipulate transmitting information through service access points. The self security in DAP is that the attacker obtains the management power of the neighbors of receiver and NMC using the buffer overflow attacks. The rules of defending the attacks are introduced simply. At last, the work in the future is prospected.

实时主动型入侵检测系统需要完善的审计信息的支持 ,该文首先介绍了目前入侵检测系统使用的审计信息及采用时序逻辑性和空间性来评价审计信息完善性的简单方法 ;然后从目的节点出发 ,提出网络可抽象为一个有源的场 ,场源是目的节点 ,在某一节点上发送到目的节点的数据包频度 (一定时间内的数据包总量 )抽象为在此节点上场的散度 .据此提出了防守联盟协议 ,用于完善空间性审计信息以提高入侵检测系统的性能 ,文章介绍了协议内容、数据格式和协议的基本服务原语 ;防守联盟协议包括目的节点安全系数的概念、目的节点和相邻节点间的防守联盟协议以及目的节点和网管中心间的防守联盟协议 ,目的节点安全系数定义为目的节点的所有相邻节点上的散度之和占目的节点缓存器容量的百分比 ,目的节点和相邻节点间的防守联盟协议阐述了存在于相邻节点的审计信息如何获取并发送至目的节点 ,目的节点和网管中心间的防守联盟协议阐述了利用网管中心如何认证连接的真实性以完善空间性审计信息 ,并分析了二者的关系 ;文章简单分析了防守联盟协议的自身安全性 .

In order to introduce the quantitatively analytical method into security protocol analysis, a protocol measurement method based on modal logic was defined. This method formally specifies the parameters and approaches to measure the satisfaction of security goals of the protocol contents. On this basis, approaches of mea- suring protocol redundancy and corresponding simplification were then put forward. The method was finally applied to analyze a sample protocol, describe the contribution...

In order to introduce the quantitatively analytical method into security protocol analysis, a protocol measurement method based on modal logic was defined. This method formally specifies the parameters and approaches to measure the satisfaction of security goals of the protocol contents. On this basis, approaches of mea- suring protocol redundancy and corresponding simplification were then put forward. The method was finally applied to analyze a sample protocol, describe the contribution of each protocol content and present the inefficacy of redundancy factors to protocol targets, thus achieving the safe simplification. The method is possessed of a main feature of applying quantitative analysis to the formal analysis of security protocol, and of the advantages and limitations of modal logic methods.

为将量化分析方法引入安全协议分析中 ,以模态逻辑方法为基础定义了协议度量方法 ,并形式化地给出度量协议内容对协议安全目标满足度的参数和方法 ,同时在此基础上 ,进一步地给出了对安全协议冗余进行度量及化简的方法 .应用该方法对实例协议进行分析 ,直接描述各协议内容的贡献度 ,显示冗余内容对目标实现的无效作用 ,从而可以安全化简 .量化分析在安全协议形式化分析中的应用是本方法的主要特点 ,它具有模态逻辑方法的优点及缺陷 .

With the un-opened characteristic of the SIEMENS PPI protocol content,this article maintain the data of PPI protocol through interception.Analyse this protocol content in detail,and introduce the problem during programming process,also use the protocol to realize the communication between the SIEMENS S7-200 PLC and Touch Pane.l

针对西门子PPI协议不公开的特点,通过侦听获得PPI协议的数据报文,详细分析了该协议的具体内容,介绍了该协议在触摸屏软件的编程过程中所遇到的问题,并采用该协议实现了触摸屏与S7-200PLC之间的通讯。

 
<< 更多相关文摘    
图标索引 相关查询

 


 
CNKI小工具
在英文学术搜索中查有关protocol content的内容
在知识搜索中查有关protocol content的内容
在数字搜索中查有关protocol content的内容
在概念知识元中查有关protocol content的内容
在学术趋势中查有关protocol content的内容
 
 

CNKI主页设CNKI翻译助手为主页 | 收藏CNKI翻译助手 | 广告服务 | 英文学术搜索
版权图标  2008 CNKI-中国知网
京ICP证040431号 互联网出版许可证 新出网证(京)字008号
北京市公安局海淀分局 备案号:110 1081725
版权图标 2008中国知网(cnki) 中国学术期刊(光盘版)电子杂志社