攻擊本能 的英文怎麼說

中文拼音 [gōngběnnéng]
攻擊本能 英文
aggressive instinct
  • : Ⅰ動詞1 (攻打) attack; assault; take the offensive 2 (指責別人的過錯; 駁斥別人的議論) accuse; ...
  • : i 名詞1 (草木的莖或根)stem or root of plants 2 (事物的根源)foundation; origin; basis 3 (本錢...
  • : 能名詞(姓氏) a surname
  • 攻擊 : 1 (進攻) attack; assault; launch an offensive 2 (惡意指責) attack; accuse; charge; slander; v...
  • 本能 : instinct; born ability
  1. Poor michaelis had been much kicked, so that hes, and the strong queerly - arched brows, the immobile, compressed mouth ; that momentary but revealed immobility, an immobility, a timelessness which the buddha aims at, and which negroes express sometimes without ever aiming at it ; something old, old, and acquiescent in the race

    可憐的蔑克里斯,因為他受過的冷眼和太多了,所以現在還是處處留神,時時擔心,有點象狗似的尾巴藏在兩腿間。他全憑著他的,尤其是他真厚臉皮,用他的戲劇在社會上層替自己打開了一條路,直至赫然成名。
  2. The study is imitating subulate tool penterite armor fabric by method of test for puncture of paperboard and corrugated fiberboard, and to ascertain the laver of armor fabric for absorb energy and arrestment, and any difference angle to compare the rank of defying ball, for understanding the sharp to the rank of annor fabric defy penterite energy, and penterite deep, the lose energy relation of sharp

    摘要研究是以沖孔強度試驗機測試,模擬尖錐利器穿刺防彈衣,且對于防彈衣層數間的阻抗作用及量吸收的情形,並對各種不同角度的抗彈織物疊層排列作相互比較,進而?解尖錐對防彈衣的抗穿透層數之量及穿透深度、錐度之量耗損之間關系。
  3. Why is internet so frangible ? after analyzing many events of network attacks and invalid intrusions, we found that the frangibility of internet is due to lack of the firewall to protect the network security

    造成internet網路不安全局面的原因很多,網路和非法入侵的手段也很多,但是究其根原因,是缺乏一個保證網路高度安全的防火墻。
  4. Experimental results demonstrate that the algorithms are robust and imperceptive at the attack of noise stain, low - pass filtering and sampling again

    模擬實驗表明,課題提出的各種演算法有效地抵抗白噪聲污染、色噪聲污染、低通濾波和重采樣對水印的
  5. Gives the phantom lancer an edge in combat by allowing him to evade attacks and increasing juxtapose ' s image generation. additionally, it enables his images to generate their own images

    讓幻影長矛手以一定的幾率閃避,提升在中製造幻象的幾率。同時,幻象身也以一定的幾率製造幻象。
  6. Information communication security, beijing, china, nov. 11 - 14, 1997, pp. 217 - 222. 11 michels m, p horster. on the risk of discruption in several multiparty signature schemes

    最後,我們指出chen等人提出的方案不抵抗內部的一個根原因是在實際應用中,不保證所有簽名者操作的「同時」 。
  7. 2 ) a new one time password authentication scheme. the original password authentication is vulnerable to guess attack and server personating attack. to overcome the vulnerability of this scheme, this paper designs a simple and efficient password authentication schema. the enhanced schema can improve the system ' s ability to defend all kinds of the attacks without using any cryptosystems

    2 )新的一次性口令認證機制。針對postgresql原有認證機制具有易遭受口令猜測和服務器端假冒的缺陷,文設計了一種簡單而有效的口令認證機制。該認證機制不需要使用任何加密系統,就有效加強對各種手段的防範力。
  8. His powers culminate into the terrifying phantasm, creating 3 avatars of himself who do full damage to all those who oppose him, confusing the battlefield and wreaking havoc amongst the forces of good

    他的力量達到頂點時會恐怖地幻化分身,製造三個他自己的化身,每個化身都具備等同於體的力來對付與他敵對的人,擾亂戰場並對善良勢力造成極大的破壞。
  9. The new software named " d - gun " for ddos is carried out, which completed in windows 2000 and rethat linux. three characteristics of d - gun are lied out. first, it can complete all steps of attack automatically ; secondly, it support a lot of method of ddos, especially support echo attack method and pulsant attack method

    課題開發完成了一個獨立的分散式拒絕服務軟體,開發平臺是windows2000和redhatlinux ,其特色是跨平臺自動傳播,自動實現ddos的全步驟;支持多種模型,特別是構造了反射拒絕服務和脈動模型,強度高且難追溯;有一定繞過防火墻的力。
  10. My thesis is covered in four parts about analyzing the causes : in the first part, i analyzed the theories about the causes of terrorism by detailing some basic theories in the research realm of the causes of terrorism : such as frustration - aggression theory, intimidation - contagion theory, conflict - function theory, social label theory, cultural conflict theory, sub - culture theory, regime defects theory in international conflict theory, war theory and some opinions of marxism - leninism about terrorism

    論文分四部分對恐怖主義產生的原因進行論述:第一部分:恐怖主義產生原因的理論分析。這一部分是歸納國內外學者對恐怖主義產生原因的理論方面的研究,簡要闡述了目前恐怖主義研究領域的一些基理論: 「挫折?」論;模仿與傳染理論;失范理論;沖突功論;社會標簽論;文明沖突理論;亞文化理論;社會造反理論;國際沖突理論的制度缺陷論;戰爭範式等;這些理論給我們研究恐怖主義提供了新鮮的角度。
  11. They are the “ seeking ” or “ reward ” system ( which motivates the pursuit of pleasure ) ; the “ anger - rage ” system ( which governs angry aggression but not predatory aggression ) ; the “ fear - anxiety ” system ; and the “ panic ” system ( which includes complex instincts such as those that govern social bonding )

    這四種是追求或報償系統(會趨使追求快樂) ;憤怒?暴怒系統(控制憤怒性的而非掠食性的) ;恐懼?焦慮系統;以及恐慌系統(包括控制社會關系的復雜) 。
  12. Security, too, is a key issue for switching the traditional private nforork to vpn. security of mpls wn architectur is analyzed thorouguy in this thesis, including septheion of address space and route, hiding of the mpls core smicture, resistance of attacks, impossibi1ity of 1abe1 spoofing

    安全性是虛擬專用網否取代傳統專用網的關鍵,文對mplsvpn體系結構的安全性進行了深入分析,包括地址空間和路由的隔離、隱藏mpls核心結構、抵抗、抵抗標記欺騙等,從而得出mplsvpn與atm framerelay具有相同安全級別的結論。
  13. A manifester wielding a weapon could use such a claw or bite attack as an off - hand attack or as the primary attack in the round, as desired

    持用武器的顯者可以按意願將輪中這樣的爪抓或嚙咬當作副手或者主要
  14. Rank the threats by criticality, or impact how much damage an attack of this nature can cause and likelihood

    按危險程度(即影響,此種身可造成的損壞程度)和可性對威脅進行評級。
  15. A spell cast from a spell - stalk otherwise resolves normally ; unlike an eye ray, it does not need to make a ranged touch attack to successfully strike a target ( unless the spell itself requires a touch attack )

    通過法梗施展的法術在其他方面和標準法術一樣;跟眼球射線的不同之處在於,無需通過遠程接觸命中目標(除非是法術身需要遠程接觸) 。
  16. When the watermarking bit is destroyed, which position can be judged exactly, and then block checkout and hamming checkout are used to recover it. meanwhile, watermarking can be extracted without the original document and original watermarking information, which is significative copyright information, so it is a public watermarking technology

    時,準確判斷水印比特位受破壞的具體位置,並通過塊校驗和海明校驗將破壞的水印比特位進行適當恢復;同時,提取水印時既不需要原始文,也不需要原始水印,且提取的水印信息是有意義的版權信息,是一種公開水印。
  17. And the analysis also illuminates the structure and machinism of bt net. according to that, the weekness and leak of bt are exposed. after knowing how to download files and how to connect a client of bt, the ways of attack bt net are brought forward

    在通過對客戶端文件下載和連接機制的研究和分析后,文提出了針對bt網路的方式和手段,並通過實驗實際證明了這些會給網路和用戶帶來的後果和影響。
  18. But, though considerable process has been made in the last ten years, digital watermarking is still in its infancy, and much interesting work remains to be done this thesis addresses some problems in the gray - scale image digital watermarking that are summarized below : 1 ) whereas the basic theory of digital watermarking is still very poor, a digital watermarking mathematic model based on imperceptibility and robustness is presented by analysising the characteristic of digital watermarking ; 2 ) based on the model constructed above, by defining the measures of capacity and robustness of digital watermarking, an objective method for evaluating the digital watermarking is introduced and used to analysis some algorithms ; 3 ) whereas geometric distortion always influences the restoration of watermark, we advocate to enhance the robustness against geometric distortion by restoring the image which has been distorted by geometric transformation, and a method is designed for estimating the parameters of geometric transformation ; 4 ) based on the conclusion discussed above, and combined with the masking effects of hvs, a novel public meaningful gray - scale image digital watermarking is designed by analysising the characteristics of image gray - scale interpolation and haar wavelet transformation. the experimental results show that the method is indeed powerful ; 5 ) whereas many image digital watermarking schemes, which embed watermark by modifying the values of pixels in spatial domain and transformed domain, are confronted with the conflict between the imperceptibility and robustness, we advocated to use some stable digital characteristics of host image as watermark and a algorithm based on hermite matrix is designed

    文重點對灰度圖象數字水印技術進行研究,主要工作如下: 1 )鑒于目前數字水印的理論研究比較薄弱的現狀,文通過分析數字水印的特點,建立了一個數字水印的數學模型,為進一步研究數字水印打下了基礎; 2 )根據以上建立的模型,通過引入容量和穩健度的概念為數字水印提供了一個客觀評價方法,並對一些數字水印演算法進行了分析; 3 )為增強數字水印抵抗幾何力,研究了受幾何的圖象的復原問題,並給出了一個計算圖象幾何變換參數的方法; 4 )通過分析圖象灰度插值演算法和haar小波變換的特點,結合hvs的掩蔽效應,設計了一個公開的有意義數字水印演算法,實驗結果表明演算法具有較強的穩健性; 5 )目前許多水印演算法都是通過在空域或頻域修改象素值的方法嵌入水印的,這種方法面臨著透明性和穩健性的矛盾,為解決這個矛盾,文提出以圖象的某些穩定的數字特徵為水印的觀點,並結合hermite矩陣的特點設計了相應的水印演算法,實驗結果表明該演算法具有較好的穩健性。
  19. In this paper, we first introduces two fast elliptic scalar multiplications, signed odd - only comb method and width - w naf method. then, analyze their abilities to resist against power analysis. we also present improved scalar multiplication methods

    文以兩種常見的橢圓曲線快速演算法? ? signedodd - onlycomb演算法和width - wnaf演算法為基礎,對它們進行量分析,分析它們的抗量分析,並提出相應的改進演算法。
  20. According to features of the s and p layers, ability which rijndael algorithm has to resist against differential cryptanalysis and linear cryptanalysis is theoretically discussed, and the principle of square basic attack and two kinds of extension attacks are discribed on the basis of the characteristics of oriented - byte of rijndael algorithm

    根據s層和p層的性,從理論上定量討論了rijndael演算法抵抗差分密碼和線性密碼力。同時,基於rijndael演算法面向位元組結構的特點,闡述了square基及其兩種擴展的原理。
分享友人