攻擊機制 的英文怎麼說

中文拼音 [gōngzhì]
攻擊機制 英文
aggressive mechanism
  • : Ⅰ動詞1 (攻打) attack; assault; take the offensive 2 (指責別人的過錯; 駁斥別人的議論) accuse; ...
  • : machineengine
  • : Ⅰ動詞1 (製造) make; manufacture 2 (擬訂; 規定) draw up; establish 3 (用強力約束; 限定; 管束...
  • 攻擊 : 1 (進攻) attack; assault; launch an offensive 2 (惡意指責) attack; accuse; charge; slander; v...
  • 機制 : 1 (機器製造或加工的) machine processed; machine made 2 (機器的構造和工作原理; 有機體的構造、功...
  1. Translocation from endocytic compartments to the cytosol is the essential and rate - limiting step in the intoxication process of most toxins such as ricin, diphtheria toxin, shiga toxin and pseudomonas exotoxin ( pe ). a number of these toxins are transported to trans - golgi network ( tgn ), and in many cases such transport to the tgn is required for the translocation and cytotoxicity. in deed, 5 % of the ricin endocytosed by cells has been shown to reach the tgn

    蓖麻毒素進入細胞的理不甚明了,一般認為是rtb先與細胞膜受體結合,主要經過受體介導的內吞作用進入吞噬體,然後沿著內體、高爾基體、內質網等逆向分泌途徑,有序地運輸到內質網,最後從內質網轉位進入細胞漿,在胞漿內核糖體,從而抑蛋白質的合成,導致細胞死亡。
  2. 2 ) a new one time password authentication scheme. the original password authentication is vulnerable to guess attack and server personating attack. to overcome the vulnerability of this scheme, this paper designs a simple and efficient password authentication schema. the enhanced schema can improve the system ' s ability to defend all kinds of the attacks without using any cryptosystems

    2 )新的一次性口令認證。針對postgresql原有認證具有易遭受口令猜測和服務器端假冒的缺陷,本文設計了一種簡單而有效的口令認證。該認證不需要使用任何加密系統,就能有效加強對各種手段的防範能力。
  3. In the french air force, mirage 2000 fighters in operation are : mirage 2000c / b single seater and two seater for air defence ; mirage 2000n, two seater, designed for all weather nuclear penetration at low altitude and very high speed ; and mirage 2000d, which is an upgraded version of the mirage 2000n, for automated bombing using conventional and laser guided munitions ; e type for multi purpose exporting version ; r for single seat day / night eaporting version

    在法國空軍內,現役的幻影2000戰斗為幻影2000c型單座戰斗、 b型雙座戰斗教練、幻影2000n雙座全天候低空高速核以及其改進型d型常規精確導武器、幻影2000e多任務出口型、幻影2000r單座晝夜偵察出口型。
  4. Trojan horse attack mechanism analysis and preventive measures

    基於木馬攻擊機制的防範措施剖析
  5. Without the permission of you, we will not offer your materials to others, but unenclosed the influence by hacker s attacking, computer virus invading or government control, etc

    在未經您同意之前,本站不會把您的資料提供給他人。但不包括黑客計算病毒侵入或政府管等不可抗力造成的影響。
  6. Operations guide : control keyboard and move around the space bar attack from the air drops random items temporarily give you different capacity

    操作指南:鍵盤控左右移動,空格鍵,從空中隨掉下的物品,可暫時賦予你不同的能力
  7. The main content of this thesis is about a simulation of tracking a spot and attacking a target with ir imaging guidance missiles, which includes the establishment the math modeling, the production of the dynamic images by programming, and the use of the broadcast memory sbs technique to accomplish the real - time transmitting of ir image and real - time synthesizing of ir image

    本文論述紅外成像導導彈跟蹤並目標的模擬全過程,建立數學模型,用編程的方法生成目標的動態紅外圖像,利用共享內存光纖網路完成圖像的實時傳送和實時合成。
  8. The mission assignment between the multi - uav. to the multi - uav system, the main problem is the cooperative of multi - uav. this includes the coordination of the arrival time, the attacking direction and the tasks assignment

    對多無人系統來說,最主要的問題是各無人之間的「協調」問題,即多架無人的航路(包括時間和方向等的限)和任務的協調。
  9. Avionics self - protection system is a subsystem of the advanced avionics system, which has the main functions to find hostile radar - guided weapons system and infrared - guided weapons system by using the mothed of radar reconnaissance. and then to countermeasure enemy ' s radar - guided weapon system and infrared - guided weapons system by adoptinging those measures of electric - magnetic jamming ( active countermeasures ), chaff cloud deception jamming ( passive countermeasures ) and ir decoy deception jamming ( passive countermeasures ) so as to protect our airplanes from the hostile attacks this paper have researched deeply for the integrated mode of avionics self - protection system

    航空自衛系統是先進航空電子綜合化系統的一個分系統,其主要功能是通過雷達偵察方式發現敵方雷達導武器系統和紅外製導武器系統,並通過實施電磁干擾(有源干擾) 、箔條雲欺騙式干擾(無源干擾)和紅外誘餌欺騙式干擾(無源干擾)對抗敵方雷達導武器系統、紅外製導武器系統,保護我免受敵方武器系統
  10. The basic mechanism of viral attack is that the viruses replicate themself using the host ' s ( in this case is " our " ) dna genetic replication system

    濾過性病毒人體的基本是病毒能夠通過使用病人身體中的dna基因復系統來復自己。
  11. Simulation studies show that the proposed law in this paper has better guidance accuracy and better dynamic property during pursuit - control processing and it is superior to proportional navigation

    模擬結果表明,給出的導引律在動目標時導精度高、脫靶量小,導引控過程具有良好的動態性,性能明顯優于傳統的比例導引律。
  12. Legendary single version of flash, one of the very tough small games, mouse control movement and attack, hematemesis recommended

    傳奇的單flash版,非常強悍的一款小游戲,鼠標控移動和,吐血推薦!
  13. They research and develop priorities for integrated strike warfare, maritime and land air superiority, strike fighter employment, airborne battle management, combat search and rescue, close air support, and associated planning and support systems

    他們研究了綜合打作戰的優先目標、海上及陸上空、戰斗運用理論、空降戰役管理、戰斗搜索與救援、近距離空中支援等作戰理論,並發展出了相關的規劃支持系統。
  14. The last of planes were attackers carrying bombs and guided conventional munitions

    最後一批起飛的是,他們載著普通炸彈和常規導導彈。
  15. Fourthly, we discuss and simulate the transformation method of relative parameters of ground target based on data link. and then we analyze decision algorithm of air - to - ground attack. especially, we educe three dimensional terminal guidance law of air - to - ground missile in the disturbance of wind, and give the simulation result

    本文也研究了空對地的若干技術,包括對獲得數據鏈指揮下地面目標相對于某當前時刻相關參數的方法進行了闡述及模擬,並在此基礎上討論了單對地面多個目標的決策演算法,同時提出了一種風干擾下空地導彈的三維末導導引律,且利用數字模擬進行了驗證,並指出研究空地導彈導引律時考慮風影響的必要性。
  16. Several mechanisms are provided to assure the system security based on the ultrakernel. separation, multilevel, hardware based access control and code error tolerance mechanisms are well integrated. ( 3 ) a developing platform and a firewall system prototype

    整體採用可生存設計;在系統設計時加入了抗緩沖區溢出攻擊機制和對抗dos攻擊機制;設計了一種容忍代碼錯誤的,另外還採用隔離與分級,並對blp模型進行改進應用。
  17. In this paper, the mechanism, methods of and countermeasures to denial of services attacks are discussed. after that, several packet marking schemes for traceback are reviewed and some improvements to the basic packet marking scheme are given, which reduce the workload and false positive rate in the attack tree reconstruction. knowing that in existing packet marking schemes, router marks packets with fixed probability, which results in that many packets are required in path reconstruction and that attacker could encumber path reconstruction via spoofed marking information

    在本文中,我們首先研究了拒絕服務攻擊機制、方法及其對策,並對以包標記的方式追蹤拒絕服務的來源的各種方法進行了深入的研究,分析了它們各自的優缺點,並對基本包標記方案作了改進,使得其路徑重構時的運算量和重構的誤報率在原有基礎上大為降低,達到或超過了其他一些方案的水平。
  18. Confidential data include file and the control block used to manage the file transfer

    免受密數據包括文件以及管理文件傳送的控塊。
  19. The set of security services offered includes access control, connectionless integrity, data origin authentication, protection against replays, confidentiality, and limited traffic flow confidentiality

    Ipsec協議提供的安全服務集包括存取控、無連接的完整性、數據源鑒別、反重放密性和有限的通信量的密性。
  20. To overcome the shortages of the traditional proportional guidance in attacking maneuvering targets, the paper firstly established the relative motion models for the anti - ship missile and the target in three dimensions, then based on the optimal guidance law for aiming at non maneuvering targets and the sliding - mode control theory, the optimal sliding - mode guidance law in three dimensions, which was more easily - accomplished in engineering, was derived by making the pitch plane and yaw plane superposition

    摘要針對傳統比例導引法動目標的不足,建立了三維空間中反艦導彈和目標的相對運動模型,在研究反艦導彈動目標的最優導律基礎上,利用俯仰和偏航兩個平面相疊加的方法,結合滑模控理論設計了工程上易於實現的三維模型下的反艦導彈最優滑模製導律。
分享友人