Kim's team conducted three different analyses -- one called an intention to treat analysis, one called a modified intention to treat analysis and one called a pro-protocol analysis.
吉姆团队采取了三种不同的分析方法——意图治疗分析,改良的意图治疗分析,以及居前协议分析。
Analyses and simulation results show that the broadcast protocol can not only avoid collision, but also highly reduce the redundant rebroadcasts and the broadcast latency.
分析和仿真结果说明,本文所提出的广播协议不仅能够避免冲突而且能够大大减少冗余的广播消息和减小广播延时。
In this paper, we will systematic introduction SIP (Session Initiation Protocol), at the same time, compare with H. 323 Protocol, analyses its advantage.
本文将系统介绍会话初始协议SIP,同时与H . 323协议进行比较,分析其优势。
This article briefly states the layer structure, the states, handshake protocol and cryptographic calculation of SSL V3.0, and analyses its security.
文章简述了SSLv3.0的分层结构、协议状态、握手协议和加密参数计算,并对其安全性做出分析。
The paper describes the principle of multicast and its route protocol, designs a system of collecting video data, and analyses a network of real time video data transmission.
论述了组播传输技术的原理和相关的路由协议,设计了一个视频信息的采集系统,分析了实时视频信息组播传输网络。
This paper introduces the architecture of radio-etiquette protocol and analyses cognitive radio's potential contribution to spectrum pooling.
本文介绍了无线电礼仪协议的结构并分析了认知无线电对频谱统筹可能的贡献。
The paper mainly analyses a industry apparatus communication protocol, introduces programming technology of developing PC realtime data collection with VB6.0.
本文通过对一台工业仪表通信协议进行分析,介绍了用VB6.0开发微机实时数据采集程序的编程技术。
The security analyses show that the improved authentication protocol is much stronger against these three kinds of attacks than the traditional protocol.
相应的安全性分析明确给出了考虑这三种攻击时,改进的认证协议比以前的协议更加强健。
Aiming at the problems of large-scale WLAN which using traditional architecture, this paper analyses the centralized WLAN architecture, and researches on the communication protocol.
针对传统WLAN结构在大规模组网时存在的问题,对集中式WLAN体系结构进行分析,研究其通信协议部分。
After introducing IP Multimedia Subsystem and Session Initiation Protocol, the thesis analyses the characteristic of SIP when compressing.
论文在分别介绍IP多媒体子系统及其呼叫控制协议SIP之后,对SIP消息的特点进行分析。
This paper focuses on the VPN concept and advantages, analyses the VPN technique and protocol, and compares the different VPN protocols.
本文介绍了VPN的概念、优势,分析了VPN的关键技术与协议,并对不同协议进行了相互比较。
Then, by using the results of the analyses, the preliminary design of the implementation of SEND protocol and its extension on a LINUX system is proposed.
根据分析结果,论文中提出了对于SEND协议及其扩展的实现的概要设计,分别描述了主机节点以及路由器节点上的系统框图以及状态转移图。
This paper analyses the characteristics of the design for the protocol of phase I tolerance trial which makes nasal cavity spray, skin gel and skin sticking plaster for example.
本文结合实际范例分析鼻腔喷雾剂、皮肤外敷剂、皮肤外用贴剂等三种外用中药制剂的人体耐受性试验设计特点。
This paper gives an introduction to the functions, packet format and working theory of the ARP (Address Resolution Protocol) and analyses the security vulnerabilities that exist in the ARP.
文章详细介绍了ARP协议的功能、分组格式和工作原理,分析了当前ARP协议所存在的安全性问题。
This paper presents the analyses of TETRA air interface protocol, and then introduces the software implementation method of Tetra network layer protocol use UML.
分析了TETRA空中接口协议,提出一种基于UML语言开发TETRA协议高层信令的方法。
It analyses the information transported in application layer protocol and controls the forwarding of the information based on the filtering rules.
它对应用层协议中传输的信息进行分析,并根据过滤条件,控制信息的转发。
Analyses the COPS protocol. 3 Suggests a simple way as how to create a security SA automatically.
分析了COPS协议(3)提出了一个简单实现安全关联(SA)创建的方法并进行了具体实现。
It analyses the information transported in application layer content protocol and controls the forwarding of the information based on the filtering rules.
它对应用层内容协议中传输的信息进行分析,并根据过滤条件控制信息的转发。
It analyses the information transported in application layer content protocol and controls the forwarding of the information based on the filtering rules.
它对应用层内容协议中传输的信息进行分析,并根据过滤条件控制信息的转发。
应用推荐