英语人>网络例句>分布式系统 相关的搜索结果
网络例句

分布式系统

与 分布式系统 相关的网络例句 [注:此内容来源于网络,仅供参考]

This system is a distributed and distant communication system with PC as epigyny computer and 8098 SCM as hypogyny computers. The authors deeply research hardware structure and soft design of this system and draw up a plan for this system.

该系统是由PC机为上位机、6台8098单片机为下位机的远距离分布式通信系统,作者对系统硬件结构和软件设计进行了深入的研究,提出了系统的实现方案。

As the most of traditional Intrusion Detection Systems are static and have difficulty in coordinating with the outer dynamic situation, consequently, leading to a serial of deficiency such as limited distribution .limited accommodation and limited robust etc. Fortunately, the Human Immune System can protect themselves from the invasion of the virus, germina and all such sort of things. Meanwhile, they has a lot of excellent features such as good distribution, Self-organization,dynamic and so on and these features perform fabulous similarity on the function and characteristic with the Intrusion Detection System,which arousing peoples highly attention and interesting and make the researching and development of the Intrusion Detection System based Human Immune System becoming one of the hot and the key of the network security research.

由于传统的入侵检测系统大多是静态的,很难与动态环境协调一致,造成分布性差,适应性差,健壮性不好等种种缺陷;而生物免疫系统可以保护人类机体不受诸如病毒,病菌等各种病原体的侵害,且表现出了分布式保护,多样性,自组织性,动态性等良好特性,且这种与入侵检测系统在功能和特性上的惊人相似,引起人们的高度重视和兴趣,使得借鉴生物免疫系统的机理开发研究入侵检测系统成为网络安全的研究热点和重点。

The theme uses structure design of WUHAN DAMING company OAS for example, to actualize GIS and OAS integration exploitation, preferring two settlement ways: firstly, if you wants GIS and other computer system for integration no suture, you must use integration exploitation of GIS fully, and use tools software of GIS and graphic exploitation language in integration re-exploitation;then it is fully to utilize space data, to achieve effective assistant decision-making system;and, to research and to design database of based on metadata technique, distributed data management and share technique.

论文以武汉达明公司的办公自动化系统的结构设计为例,对实现GIS与OAS的集成开发,提出了两种解决办法:一是如果要让GIS 可以很方便地与各种计算机信息系统进行一体化的无缝集成的话,就要充分地利用GIS 的集成开发方式,结合GIS 工具软件与可视化开发语言进行集成的二次开发;二是要充分地利用空间数据,实现有效的辅助决策系统,对基于元数据技术的、分布式的数据管理与共享技术的数据库系统进行研究和设计。

The design of the platform is based on Multi-Agent system theory and our lab's research project -- PAMR (Pedrail Autonomous Mobile Robot).

本文首先介绍了智能体及多智能体机器人系统的概念,研究了其系统结构,提出多层次智能体树结构模型;然后根据该模型,结合嵌入式实时系统和履带式自主移动机器人的分布式硬件系统的特点,研究设计了机器人软件系统支撑平台。

It becomes more difficult to manage, integrate and share the control system real-time data when we set up the industrial real-time database because of complicated affair between every department and isomeric character of the system. A three-level-structure model and the method to establish database is provided based on CORBA criterion with its character of being regardless of programming languages, hardware platform and network protocol . A universal real-time database faces multi-system is also set up by learning the distributed criterion, it can realize the request broker , and the application software can visit the database pellucidly ; Thus the power station simulation model can be linked with the control system such as infi90 , ovation and be made use of the control object , a closed simulation and control experiment system is set up. Further more we can build an integrate automatic experiment platform from the simulation object of power plant to the process control and the to SIS. Li Ming(Control Theory and Control Engineering)Directed by associate prof. Lin Yongjun

在创建工控领域实时数据库时,企业各部门间的复杂事务及内部异构性给实时数据的管理、集成和共享带来了一定的困难,根据CORBA规范具有语言无关性、平台无关性和网络协议无关性的特点提出基于分布式计算规范CORBA的三层体系结构模型及建立与维护实时数据库的方法和途径;通过CORBA规范建立面向多个分散控制系统的通用实时数据库,实现数据访问代理,使应用软件可以透明地对实时数据库进行访问、存取、管理;将Infi90、Ovation分散控制系统与火电厂仿真机模型进行有效的互连,以全物理过程仿真数学模型为对象,构建了闭环控制仿真实验研究系统,实现数据的高效连通及管理;进而通过基于CORBA的实时数据库构建一个从火电厂仿真机对象到过程控制设备再到SIS系统的综合自动化试验平台。

In this paper,we simply introduces the whole design scheme of security network access server; subsequently, we deeply analyse the principle and structure model of RADIUS and TACACS in the distributed security authentication system, and more explain the idea and implementation of design. On the other hand, in order to authencating、authorizing and accounting more securely, efficiently and accurately to the remote users, we put forward a series of key techniques which are used in analysis such as MD5 encryption arithmetic、packet retransfer、buffer storage、interprocess communication and so on, and prove the compatibility of the system through employing the commercial software Shiva AccessManager.

本论文首先简要介绍了《安全网络访问服务器》的总体设计方案;之后,深入分析了分布式安全认证系统RADIUS和TACACS的原理与结构模型,并进一步详细阐述了安全认证模块的设计思想和实现,深入剖析了系统中引用的MD5加密算法、数据包重发机制、缓冲区存储、进程间通信等技术,这些技术使得系统能安全、高效、准确地对远程用户进行认证、授权和计费,而且通过使用商用软件Shiva AccessManager的测试验证了该系统的通用性。

Main on-going research works include:"Expressive speech synthesis system","Spontaneous Speech Generation in Natural Human Computer Interaction"(863),"High performance distributed speech synthesis and recognition engine"(863),"The evaluation system of Chinese information processing"(863),"Multilingual speech synthesis system","emotional speech synthesis and classification","text independent voice conversion", etc.

当前正在进行的研究工作包括:具有表现力的语音合成系统,自然人机交互中的口语产生系统(863),高质量分布式语音合成和语音识别引擎的研究(863),中文信息处理评价系统(863),多语言语音合成系统,情感语音合成与情感分类,文本独立的语音转换系统等。

In this mechanism,the system detection is triggered by correlative events,the information of node states is collected timely and distributedly,and the system reconfiguration is executed automatically and parallelly at each node by the way of regeneration and transfer of data.

为了设计高可用的分布式并行数据库系统,计算机工作者除了从系统结构去探索外,更注重系统内部机制的研究与实现,系统重构就是内部机制实现的关键技术之一。

This thesis deeply researches the J2EE security strategy on the application tier of enterprise system. The security strategy predigests the information security model and meets the security requirements expediently. But there are some disadvantages when the security requirements become more complex. The expositive security on the Web-Tier can not offer more information for authentication; there is no authentication for EJB-Tier to use, make the EJB-Tier depend on the Web-Tier; J2EE uses database or application server to manage the role information. Use database to manage the role information will increase the complex of enterprise application, and the way of application server will reduce the ability of migrate other J2EE platform. To solve these problems, the thesis designs an improved security strategy model.

本文从企业级系统应用层安全的角度出发,深入研究J2EE多层体系结构的安全策略模型。J2EE提供的安全策略简化了系统的信息安全模型,能够很方便地满足基于J2EE的分布式应用系统的安全需求,但是在面对更加复杂的安全需求时,J2EE安全策略在验证授权和角色管理中还存在不足之处:其在Web层的声明式验证机制无法为用户提供更多验证信息,可扩展性较差;在EJB层缺少业务逻辑层可供采用的验证机制,而是借助于Web层的验证机制,其耦合程度较高有悖于业务逻辑分离于表现逻辑的原则;在角色管理方面,J2EE采用数据库或者应用服务器来管理角色信息,其中,数据库管理角色的方式增加了应用开发的复杂度,应用服务器管理角色降低了系统的可移植性,两者都具有片面性。

This paper researches under fund project of nationality natural science (70271045):"The researches on E-government system model and government affair flow reforger". It starts from the proper operation requirement of E-government system, combines the severe challenges of E-government system under current distributing environment, lucubrates the organization and authorization system model of complex government affair information system, presents the flow realization of security access control implementation of E-government system and some noticeable taches.

本文以国家自然科学基金项目(70271045):&电子政务系统模型体系及政务流程再造研究&为研究背景,从电子政务系统特有的业务需求出发,结合当前分布式环境下的电子政务系统面临的严峻挑战,深入研究了复杂政务信息系统的组织与授权体系模型,给出了电子政务系统的安全访问控制实施过程中各个业务过程的流程实现以及需要注意的环节。

第18/63页 首页 < ... 14 15 16 17 18 19 20 21 22 ... > 尾页
推荐网络例句

Do you know, i need you to come back

你知道吗,我需要你回来

Yang yinshu、Wang xiangsheng、Li decang,The first discovery of haemaphysalis conicinna.

1〕 杨银书,王祥生,李德昌。安徽省首次发现嗜群血蜱。

Chapter Three: Type classification of DE structure in Sino-Tibetan languages.

第三章汉藏语&的&字结构的类型划分。