design vt. 1.计划,企图,立意要…。 2.指定,预定;留给,留着。 3.设计,草拟,拟定,筹划;起草,画草图,打(图)样。 design an attack 计划进攻。 design one's son for [to be] a soldier 立意要儿子做军人。 design a room for one's library 指定一间屋子做某人书房。 vi. 计划;打样,打图样 (for)。 n. 1.计划;企图;目的,意图,野心,阴谋。 2.(小说等的)提纲,结构,构想,情节。 3.设计,图案,图样。 by design and not by accident 是故意不是偶然。 have a design on 对…有野心,企图。 have designs upon [against] sb.'s life 拟加害某人。
The dissertation makes a deep study on security mechanisms of wlan , and summarizes experiences and lessons in previous protocol design . the dissertation proposed principle of designing security protocol , and proposed a authentication scheme based on pki . the improvements gotten from scheme are as following : 1 authentication server authenticates ap , therefore stations can authenticate ap by using authentication server 本文中,作者对无线局域网协议的安全机制进行了深入的研究,总结了协议设计中的经验教训,提出了安全协议设计准则,并提出了一个基于公钥基础设施pki体系的认证方案,本方案的改进之处主要在于: 1
First , the author makes some obvious improvements on algorithm implementation for protocol design , which has distinct advantages over the original fair document exchange protocol with aspects of security and applicability . secondly , the integrated protocol implementation is accomplished in detail based on java 2 platform ( take the document exchange protocol as an example ) . thirdly , during the process of the protocol implementation , the paper also puts the emphases on considering the multiple achievements of message queues and relative comparison on working function , which provide the secure and stable mechanisms for the protocol applications 本文的贡献有以下三个方面,首先,在初始的文件交换协议的基础上,在安全性及适用性方面对该协议的算法提出了较大幅度的改进和完善,提出了改进后的文件交换协议版本v1和v2 ;其次,本文作者提供了基于java2平台上的具体完整的协议实现;然后,在协议实现的过程中,本文还重点考虑了消息队列的多种实现方式及相关性能比较,为协议的应用提供安全稳定的实现机制。
Based on traditional cdma2000 system and to acess ip - bs , this paper analyses the a interface signalling protocol detailedly , and implements protocol design from the software aspect , and combines with other soft switching technology , then makes the entire system to be a cdma2000 system based on ip network 所以本文以传统cdma2000系统为基础,为了接入ip基站,对其a接口信令协议进行了详细分析,并在软件上实现了协议设计,结合其它软交换技术,从而使整个系统成为基于ip架构的cdma2000系统。
In the main body of this paper , the database design process is introduced , in which the database relation schema , data integrity and fault recovery are emphasized , and , the communication protocol designed for remote data acquisition is discribed and validated by petri nets , the develop method of client application and resolvent to some problems are also discussed , including the design of communication component , the asynchronous data return , how to dynamically return image to the client navigator in web application etc . finally , an abbreviated evaluation about the finished system is given 在论文的主体部分,论文详细介绍了数据库的设计过程,其中主要涉及到关系模式的规范化、数据完整性和故障恢复设计等,随后,文章设计了一种用于远程数据采集的通信协议,并使用petri网进行了描述和验证,论文也介绍了如何进行客户端应用程序的开发以及一些主要问题的解决,主要包括通信控件的设计、采集数据的异步返回、在web应用程序中如何动态为客户端返回图形等。最后,论文对整个系统做了一个简单的评估。
Deep discussions are offered for design and realization of several key technology , such as serial communications bsp design and realization , frame relay protocol design and realization , design and realization of interface between vxworks rtos and char & network devices , and powerpc860 ' s communications processor module 对很多设计与实现中的关键技术,如串行通讯bsp的设计与实现、帧中继协议的设计与实现、 vxworks嵌入式实时操作系统与字符设备和网络设备的接口方式的设计与实现、以及powerpc860处理器中的通讯处理器模块( cpm )进行了较为深入的讨论。
Based on the analysis of the architecture of wsn , the paper performed a study on its node design from the view of hardware design , software design and the cooperative design of hardware and software , probes into the protocol design of the link layer and network layer , and makes a good consideration of its power economy 摘要在分析无线传感器网络的体系结构的基础上,从硬件设计、软件设计和软、硬件协同设计等几方面对无线传感器网络的节点设计进行了探讨,对链路层和网络层协议进行了研究,并从硬件和软件的角度进行了节点的节能考虑。
Modeling yahalom protocol - creating and putting out share secret bases on symmetry cryptography - in strand space , the security of this protocol is proved by a convenient method which founds on strand space theory . finally , herein this authentication method , we give some advices in cryptographic protocols design 本文给出了基于对称密码算法产生和发布共享秘密的yahalom协议的串空间模型,并运用基于串空间理论的一种简便认证方法对其安全性进行了验证,证明了该协议的正确性;并且针对这一认证方法,给出了安全协议设计的几点建议。
The paper takes efforts to elaborate that the effective achievements appraisal can be achieved through associated effects of the different levels of enterprise administrators and employees only with the appraisal protocol designed according to the standard of overall effectiveness , definiteness and concreteness , reliability and consistency , objectiveness and justness , public participation , and choice and assembly of suitable appraisal methods according to the actual enterprise situations 本文着重阐述了只有按照全面有效、明确具体、可靠一致、客观公正、参与公开的要求设计考评方案,并根据企业实际情况选用和组合适当的考评方法,才能在企业各级管理者和员工的共同努力下完成有效的绩效考评。
In the designing of mdf device remote monitor systems and fiber optic transceiver device of telecom accessing network monitor systems , low - cost microprocessor is used to realize the real - time monitor of access device in telecom access network . with the combination of practical utilization of the two structures , this paper mainly concerns following designing : monitor systems topology ; communication interface ; communication protocol designing and realization ; hardware and software designing of different units in systems 结合所提出的这两种电信接入设备监控系统结构的实际应用,重点介绍了:电信接入设备监控系统组网拓扑结构设计;电信接入设备监控系统通信接口设计;电信接入设备监控系统通信协议设计与实现;电信接入设备监控系统各告警单元的硬件与软件设计。