恢復攻擊 的英文怎麼說

中文拼音 [huīgōng]
恢復攻擊 英文
ctrl+ins:end disengagement
  • : Ⅰ形容詞1 (重復) repeated; double; duplicate 2 (繁復) complex; compound Ⅱ動詞1 (轉過去或轉過...
  • : Ⅰ動詞1 (攻打) attack; assault; take the offensive 2 (指責別人的過錯; 駁斥別人的議論) accuse; ...
  • 攻擊 : 1 (進攻) attack; assault; launch an offensive 2 (惡意指責) attack; accuse; charge; slander; v...
  1. At this repulse, the assailants instantly withdrew, and gradually the place became as still as before the sudden tumult.

    這一小小的還,立刻使進者退了下去;接著,這兒也就漸漸地了平靜,靜得跟這突如其來的騷動發生之前一樣。
  2. The instauration of attacked ie browser and the prevention methods

    瀏覽器受和預防
  3. Burrow ( crypt fiend / carrion beetle ) - allows crypt fiends to burrow into the ground, become invisible, and regenerate hit points at a faster rate. while burrowed, crypt fiends cannot attack

    鉆地(地穴惡魔/腐屍甲蟲) -地穴惡魔可以鉆進地下,變成隱身狀態,並且加快生命速度.當鉆地時,地穴惡魔不能
  4. Their powers fully restored, alexstrasza and the other aspects attacked deathwing and forced him to flee

    阿萊克斯塔薩和其他龍神元氣后,協力死亡之翼,迫使它逃離。
  5. In chapter 2, a general digital watermarking frame is presented, including the generation, embedding and detection of watermark. in chapter 3, the concept of watermarking channel is presented, the modes of watermarking channel and image dct coefficients is proposed, the capacity of watermarking channel is evaluated by embedding watermarks to selected still image dct coefficients in direct spread spectrum. in chapter 4, a watermarking algorithms based wavelet multi - resolution is presented, by conjunction with human visual model, it keeps invisibility of watermark in host image and need not original image during detection

    數字水印是一種新的數字媒體保護技術,它是將特定的信息(如版權信息、秘密消息等)嵌入到圖象、語音、視頻等各種數字媒體中,以達到版權保護等目的,同時,這種信息對宿主媒體的影響不足以引起人們的注意且有特定的方法,此信息對非法接收者應該是不可見的,本文主要對數字水印的一般框架,靜止圖象dct系數的理論容量,圖象水印的嵌入和檢測,數字媒體防篡改以及數字水印的等問題進行了研究,提出了兩個新的水印算演算法。
  6. Fellow striker thomas brdaric is still recovering from knee surgery, while defender vinicius is struggling with a foot problem

    手巴德里奇還在膝蓋手術的期,后衛維尼修斯也在和腳傷斗爭。
  7. When the watermarking bit is destroyed, which position can be judged exactly, and then block checkout and hamming checkout are used to recover it. meanwhile, watermarking can be extracted without the original document and original watermarking information, which is significative copyright information, so it is a public watermarking technology

    時,能準確判斷水印比特位受破壞的具體位置,並能通過塊校驗和海明校驗將破壞的水印比特位進行適當;同時,提取水印時既不需要原始文本,也不需要原始水印,且提取的水印信息是有意義的版權信息,是一種公開水印。
  8. With respect to the second topic, several country ' s legislative efforts against terrorism, the level of terrorism, experienced threat, and how law enforcement agencies fight terrorism in their respective states are handled

    第三個專題,包括評價的救災和災后行動正在實施的恐怖主義事件之後,以加強應急管理和國土安全政策及程序,以及整合的危機管理和後果管理活動。
  9. A group - key distribution protocol is designed which has the capability of self - recovery and coalition - attack - resisting, particularly suitable for highly lossy transmission environment such as wireless sensor networks

    摘要構造一個具有自能力和抵禦合謀能力的組群密鑰發布協議,該協議特別適合於高度易失傳輸環境,例如無線傳感器網路。
  10. Experiment results show that this algorithm can restore distortion caused by global and local or no - linear geometrical attack, and it is practical and effective

    實驗結果表明,該演算法可以從全局和局部或非線性幾何失真,是實用和有效的。
  11. From these results we can conclude that host cellular protein cd55, cd59 are incorporated into eev and hiv out membrane and mediated virus resisitance to complement attack. at the same time, the results suggest that virus incorporated cd55 and cd59 can be used as the target in the strategy aimed at target blocking rca on virions and enhancing the anti virus effects of complement. 2

    Cd55 、 cd59的中和性抗體能夠發揮消除病毒的補體逃避機制,病毒對補體的敏感性的實驗結果提示,這兩種補體調節蛋白可以作為以消除病毒逃避補體的機制、病毒對補體的敏感性,提高補體抗病毒效率為目標的抗病毒策略的靶點。
  12. To answer this question, a bispecific, trifunctional antibody constructs which can not only target block virus incorporated rca, but also can induce complement activation by it ' s fc fragment were designed and constructed and iv the role of this kind of bispecific antibody in virus neutralization was studied. 1. to test our idea, human immunodeficient virus ( hiv ) and enveloped extracellular virus ( eev ) of vaccinia virus ( vv ) were selected in our study because of their complex immune evasion stratiges, their threaten to humans, and because both these two kinds of virus can escape complement attack by incorporating host rca into their envelope

    以嚴重危害人類健康,且具有雜免疫逃避機制的有包膜的hiv病毒及痘苗病毒的eev病毒為研究對象,首先對它們逃避補體的現象進行了驗證,探討了宿主膜補體調節蛋白cd55 、 cd59與hiv病毒及eev病毒免疫逃避的關系,評價了病毒結合的這兩種補體調節蛋白作為本研究提出的,通過消除病毒逃避補體的機制來病毒對補體的敏感性,提高補體抗病毒效率這一抗病毒策略的靶點的可能性。
  13. Paralyzing touch iii - counterattack that stuns your opponent for 25 seconds or until they are hit. can only be used after a dodge

    打暈目標25秒,只能在一次成功閃避后使用。目標受
  14. Clients automatically try alternate servers ; if all servers are down, clients do exponential backoff to avoid flooding the servers when they come back up

    客戶端能自動對每個服務器輪流嘗試連接;如果所有的服務器都出問題了,客戶端會備份結果並暫停與服務器的連接,以免服務器運作時對服務器造成泛洪式
  15. The main research contents are as follovvs : after the analyzing of the process of making train diagram, according with its character, and take into account the trend of innovation, chooses the total solution based on the b / s architecture, 3 - tier operation distributed and 2 - tier data distributed to separate the data from operation and simplify the development and maintenance ; the e - r data model that is accord with the 3nf criterion is designed after analyzing the data structure of the train diagram system. emphasis on the permission security of the distributed system, take the view schema, coupled with the login authentication and permissions validation, to ensure the data accessing domination, and take the synchronization, error control, and restore capability to advance the data security ; on the basis of b / s solution architecture, after comparing the existing transportation technologies, b - isdn and adsl is selected as the major solution architecture based on the package - svvitched networks. furthermore, error control, firewall, and encryption techniques are introduced to prevent the hacker attack and ensure the networks safety

    論文的主要研究內容包括:對目前我國列車運行圖管理體制和編制流程進行詳細分析,根據其「幾上幾下」的特點,並結合未來「網運分離」體制改革的變化預測,選擇採用與之相適應的基於b s體系架構、三層業務分佈、二層數據分佈的整體方案,實現業務與數據的分離,降低開發與應用過程的雜度和總體成本;對列車運行圖系統的數據信息進行分析,設計符合3nf規范的數據e - r關系模型,並著重研究處于分散式系統中的列車運行圖數據信息的訪問權限和數據安全問題,提出以視圖模式結合用戶識別權限審定實現數據權限劃分,以並發處理、容錯技術、技術提高系統的數據安全性;在基於b s架構的系統整體方案基礎上,對當前多種數據傳輸技術進行分析比較,採用b - isdn為主幹網、 adsl為接入端的基於公用數據網路分組交換技術的系統網路體系結構,並針對網路自身安全性和黑客與侵入問題,詳細討論綜合採用差錯控制、防火墻、數據加密解密等技術手段提高系統的網路安全性能。
  16. And you can see with our photon cannons back online

    你看到了我們的炮臺又了對敵
  17. In order to make these tests a priority, prevent more attacks, and to bring sog back online as soon as possible, we have decided to shut the servers down until thursday, december 29th

    考慮到重視目前的測試、防止更多的並且盡快將sog正常,我們決定關閉服務器, 12月29日(星期四)繼續開服。
  18. Stamina : this upgradeable skill increases the rate the stamina bar refills allowing knights to run faster, longer, and to chain more stance attacks

    體力:這項可升級的能力可以加快體力的速度,讓騎士能夠跑的更快更遠,以及做出更多連續的
  19. When recovering watermark information, only part content of the database is needed. the experiments results show that the safety and robustness are improved. even if the attacker knows the embedded algorithm, only the shared watermark information can be got, and the original watermark can ’ t be recovered

    本文提出了基於中國剩餘定理的數據庫水印演算法,實現了基於數據庫的部分內容水印信息,者即使知道水印嵌入演算法,也只能提取出經過分存后的水印信息,無法出原始水印。
  20. Kerberos is essentially a secure network authentication protocol that employs a system of shared secret keys and is able to provide robust security against impersonation and reply attacks

    Kerberos實際上是一種安全網路認證協議,採用共享密鑰的系統,並且能提供健壯的安全性,以防止偽裝恢復攻擊
分享友人