攻擊要素 的英文怎麼說

中文拼音 [gōngyāo]
攻擊要素 英文
attack element
  • : Ⅰ動詞1 (攻打) attack; assault; take the offensive 2 (指責別人的過錯; 駁斥別人的議論) accuse; ...
  • : 要動詞1. (求) demand; ask2. (強迫; 威脅) force; coerceⅡ名詞(姓氏) a surname
  • : Ⅰ形容詞1 (本色; 白色) white 2 (顏色單純) plain; simple; quiet 3 (本來的; 原有的) native Ⅱ名...
  • 攻擊 : 1 (進攻) attack; assault; launch an offensive 2 (惡意指責) attack; accuse; charge; slander; v...
  • 要素 : essential factor; key element; part; element; factor
  1. The information safety has the characteristics of the high weakness and danger, delitescence and abruptness, the diversity of the attack sources and the indeterminacy of the guarded object and the asymmetry of the main body of the safety, etc. the contents of information safety are extensive, involving politics, economy, culture, military, science, technology and resources ecosystem etc. the factor which threatens the information safety mainly includes the hackers, network crimes, the network viruses, and the garbage information, etc. the second part thoroughly analyzes the strategic position of the information safety in the national security

    信息安全具有高度脆弱性和風險性、潛伏性和突發性、源的多樣性和防範對象的不確定性、安全主體的不對稱性等特徵。信息安全的內容廣泛,涉及政治、經濟、文化、軍事、科技、資源生態等領域。威脅信息安全的因包括病毒、網路黑客、網路犯罪和垃圾信息等。
  2. Translocation from endocytic compartments to the cytosol is the essential and rate - limiting step in the intoxication process of most toxins such as ricin, diphtheria toxin, shiga toxin and pseudomonas exotoxin ( pe ). a number of these toxins are transported to trans - golgi network ( tgn ), and in many cases such transport to the tgn is required for the translocation and cytotoxicity. in deed, 5 % of the ricin endocytosed by cells has been shown to reach the tgn

    蓖麻毒進入細胞的機理不甚明了,一般認為是rtb先與細胞膜受體結合,主經過受體介導的內吞作用進入吞噬體,然後沿著內體、高爾基體、內質網等逆向分泌途徑,有序地運輸到內質網,最後從內質網轉位進入細胞漿,在胞漿內核糖體,從而抑制蛋白質的合成,導致細胞死亡。
  3. At the begin of the dissertation, we has discussed the state of security on internet, analyzed the factors caused frangibility of internet, and intrude some means used to provide security services for internet

    本文從網路安全的現狀談起,探討了網路安全的主威脅因和相應的手段,同時也歸納了針對這些威脅因手段而採取的提高網路安全的安全措施和技術手段。
  4. The study found that a substance in green tea, a major polyphenol called epigallocatechin gallate ( egcg ) has the ability to block the hiv virus from attacking the immune system

    該研究發現綠茶中主的一種茶多酚,表沒食子兒茶沒食子酸酯( egcg ) ,能夠阻止hiv病毒免疫系統。
  5. The main task of this article contains : ( l ) compares algorithm and encryption and decryption between the widely - used public key encryption system rsa and ecc ; ( 2 ) directing against present elliptic curve attack algorithm, uses sea algorithm to perform choosing of safe elliptic curve and to achieve based on prime field elliptic curve ' s elgamal encryption and decryption and digital signature ; ( 3 ) discusses elliptic curve ' s application on smart card and proposes two identification plans based on eec

    綜上所述,本論文所作的主工作有: ( 1 )對目前應用較廣的公鑰密碼體制rsa和ecc演算法及加解密實現進行比較。 ( 2 )針對目前已有的橢圓曲線演算法,使用sea演算法實現了安全橢圓曲線的選取,實現了基於大數域上的橢圓曲線的elgamal加解密和數字簽名。 ( 3 )討論了橢圓曲線在智能卡上的應用,並提出了兩種基於ecc的身份認證方案。
  6. In conclusion, cognitional preference and the acquisition of social cognition are major factors contribution to children ' s development of aggressive behaviors

    通過這個實驗我們研究了性兒童和非性兒童的社會觀點采擇能力是否有區別,以及年齡因的影摘4響。
  7. You see with water elemental the mage doesn ' t have to cast any non - instant spells to beat you

    正如你所見到的帶著水元的法師不需施放任何非瞬發法術來你。
  8. For the purpose to perfect the risk assessment of major hazard installation, a vulnerability assessment methodology for industrial facilities is developed on the basis of relativity between target selection of attack and certain inherence of industrial facilities ( especially the industrial facilities involve a store of chemical or energy )

    為使重大危險源風險分析更加完善,從者的角度分析工業設施(主指化學物質或能量聚集的工業設施)固有特徵中影響襲目標選擇的諸因,提出易受性指標。
  9. But, though considerable process has been made in the last ten years, digital watermarking is still in its infancy, and much interesting work remains to be done this thesis addresses some problems in the gray - scale image digital watermarking that are summarized below : 1 ) whereas the basic theory of digital watermarking is still very poor, a digital watermarking mathematic model based on imperceptibility and robustness is presented by analysising the characteristic of digital watermarking ; 2 ) based on the model constructed above, by defining the measures of capacity and robustness of digital watermarking, an objective method for evaluating the digital watermarking is introduced and used to analysis some algorithms ; 3 ) whereas geometric distortion always influences the restoration of watermark, we advocate to enhance the robustness against geometric distortion by restoring the image which has been distorted by geometric transformation, and a method is designed for estimating the parameters of geometric transformation ; 4 ) based on the conclusion discussed above, and combined with the masking effects of hvs, a novel public meaningful gray - scale image digital watermarking is designed by analysising the characteristics of image gray - scale interpolation and haar wavelet transformation. the experimental results show that the method is indeed powerful ; 5 ) whereas many image digital watermarking schemes, which embed watermark by modifying the values of pixels in spatial domain and transformed domain, are confronted with the conflict between the imperceptibility and robustness, we advocated to use some stable digital characteristics of host image as watermark and a algorithm based on hermite matrix is designed

    本文重點對灰度圖象數字水印技術進行研究,主工作如下: 1 )鑒于目前數字水印的理論研究比較薄弱的現狀,本文通過分析數字水印的特點,建立了一個數字水印的數學模型,為進一步研究數字水印打下了基礎; 2 )根據以上建立的模型,通過引入容量和穩健度的概念為數字水印提供了一個客觀評價方法,並對一些數字水印演算法進行了分析; 3 )為增強數字水印抵抗幾何的能力,研究了受幾何的圖象的復原問題,並給出了一個計算圖象幾何變換參數的方法; 4 )通過分析圖象灰度插值演算法和haar小波變換的特點,結合hvs的掩蔽效應,設計了一個公開的有意義數字水印演算法,實驗結果表明本演算法具有較強的穩健性; 5 )目前許多水印演算法都是通過在空域或頻域修改象值的方法嵌入水印的,這種方法面臨著透明性和穩健性的矛盾,為解決這個矛盾,本文提出以圖象的某些穩定的數字特徵為水印的觀點,並結合hermite矩陣的特點設計了相應的水印演算法,實驗結果表明該演算法具有較好的穩健性。
  10. Meanwhile, dell ? s competitors are honing their own consumer marketing : hewlett - packard ( hpq ) in recent weeks launched its most aggressive advertising campaign, largely targeting consumers ( see bw online, 05 / 04 / 06, " hp ? s wow factor " )

    與此同時,戴爾的對手也在深入細致地對其自身消費市場進行開發:惠普公司( hpq )近幾周來發動了其最富性的廣告戰,主針對目標消費者(見2006年5月4日《商業周刊》在線的文章, 「惠普的成功因」 ) 。
  11. Those all threaten severely to information security. the thesis starts from tcp / ip protocol, analyzes the frangibility of the protocol and the non - security factors of internet behind it. and then analyzes aggressive ways usually used by hijacker, and then the solutions corresponding to different security requirements are brought forward

    文章從tcp ip協議本身入手,分析了協議本身的脆弱性及由此產生的網路的不安全因,然後論述了黑客的常用手段,接著針對不同的安全需提出了相應的解決辦法。
  12. Voip transmits voice over an open network, and the voice data includes a great deal of important information, so it needs much more securities than the traditional data communications

    網路語音通信系統需考慮的另外一個因是其安全性。網路語音通信是在開放的網路上進行的,因此,它比傳統的語音通信更容易受到
分享友人