整合侵入 的英文怎麼說

中文拼音 [zhěngqīn]
整合侵入 英文
concordant intrusion
  • : Ⅰ形容詞1 (全部在內; 完整) whole; all; complete 2 (整齊) neat; tidy; orderly Ⅱ動詞1 (整理; 整...
  • : 合量詞(容量單位) ge, a unit of dry measure for grain (=1 decilitre)
  • : Ⅰ動詞(侵入) invade; intrude into; infringe upon Ⅱ形容詞(接近) approaching Ⅲ名詞(姓氏) a surname
  • : Ⅰ動詞1 (進來或進去) enter 2 (參加) join; be admitted into; become a member of 3 (合乎) conf...
  • 整合 : commensuration
  1. The ultrabasic bodies are generally concordant intrusions, with related feeder dikes.

    超基性巖一般為具有補給巖墻的整合侵入體。
  2. By physiognomy feature, it could be divided into three types of thermal structure : positive dome model, negative collapse model and border dome core collapse model. based on the depth degree or magma - thermal influenced, it could be divided into five types of thermal structure : ( ancient ) geothermal anomaly focus region model, superficial volcano eruption hydro - thermalism and hypabyssal intrusive model, thermal anticline ( thermal dome ) model, mid - deep intrusive model, deep mantle ( crust ) thermal plume model ; and put forward a perfect model of the thermal structure. there are many interaction system could be induced into a systematic thermal interaction, include : ocean - continent system, basin - mountain interaction, superficial and mid - deep crust - mantle interaction, crust - mantle commingle interaction, vertical thermal interaction ( delamination ) etc.

    依據地貌形態分為三類:正向穹窿型、負向塌陷型、邊隆核陷型:依據巖漿-熱力作用影響的深淺程度或深度分為五類: (古)地熱異常群集區、表淺層火山噴發-熱液活動與淺成型、熱力背斜(熱穹窿) 、中深層型、深部地幔(地殼)熱柱型;提出了熱力構造作用空間分佈的理想模式,將洋陸系統、盆山作用、淺表與中深部殼幔作用、殼幔混、垂向熱力作用(拆沉)等納一個體統一的熱力作用系統中,為盆地動力學研究打開了一個新窗口;研討了熱力構造研究方法。
  3. Nevertheless, in these approaches the contact intethee are charactered sboly ed stiffeess k. and k. " which is not perfect and rigorous in thc vitw of solid mechanics and rather rough for the description of the behavior of the idtfores. in collbet, taken as a contact problem, the principal chatrs of the idtcthees can be reflected : ( l ) the cbntact inifore is of shear strength which implies tha a generic pair of contact points on the inidse will displace coincidentally if the tangential fbrce at this point has not reahed the 1imit resistance, else, relative s1ide betwee the points will occur along the tangental direction. ( 2 ) no matter the relative slide occurs or not, the contact bodies cannot invade each other in any wise

    本論文在對這兩種方法進行認真的分析后,說明它們對不連續面的描述並不理,也無法反映出不連續面的主要力學特性,同時指出,將帶有不連續面的巖土工程問題作為接觸問題計算更為理,它可將不連續面受力變形的主要特點反映出來,即: ( 1 )接觸面具有相應的「抗剪強度」 ,即當接觸面上某一點處的切向應力小於該點處的抵抗強度時,點對共同變形;達到強度時,則沿切向發生相對滑動; ( 2 )在個變形過程中,發生接觸的變形體不能相互
  4. To detect both known and unknown intrusion patterns, the system introduces a blended frame that makes use of both misuse detection approach and anomaly detection approach. the one of the highlight of the architecture is introduction of data mining technique, and the other is introduction of genetic algorithms. the ids uses data mining algorithms to abstract key features of system runtime status from security audit data, and it uses genetic algorithm to select the feature subset to reduce the amount of data that must be obtained from running processes and classified

    本文陳述了所研究系統的主要特點和技術:將智能體( agent )技術應用於檢測系統,解決了傳統檢測系統的集中式解決方案的弊病,充分利用網路資源協同完成檢測任務;利用基於主機和基於網路的數據源,形成一種完的混型的結構,從而能收集到更加全面的信息;使用了異常檢測技術和誤用檢測技術,採用一種混型的結構,既能檢測已知的攻擊模式,又能發現新的攻擊模式。
  5. On the operating design of raas, the paper focused on the change of task _ struct, the design of kernel process kaasd, the timing of raas, the configuration and initialization of raas in the end, the paper evaluate the raas from the aim of system design, the integration with the other secure components of secure os, provide some problems unsolved, such as the expanding to network monitor, the new technology of ids

    對于實時審計分析系統的體運行設計,從操作系統原有數據結構task _ struct的改變,內核進程kaasd的設計, raas的定時和系統的配置和初始化這幾個方面逐個進行敘述。在本文的最後,從raas的達到的目的,與原有安全功能的有效成等方面對該系統作了一個評價,同時提出幾個需要進一步思考的問題,如對網路的擴展,對檢測新技術的引
  6. In view of the sustainable development of agriculture, the synthetic countermeasures, such as " broaden sources of income and reduce expenditure, impoundment and compensation ", adjusting agricultural structure and developing ecological agriculture, to harness the disaster are given

    鑒於此,從農業可持續發展的角度提出實施「開源節流、攔蓄補源」 、調農業結構和發展生態農業是綜防治海水、實現農業可持續發展的重要措施。
  7. The condition of profiles in outer station did n ' t change much in spring cruise, but showed more variable in near - shore stations when observed in different time. fluorescent characteristic per cell can be obtained by flowcytometric analysis. based on fluorescence data of synechococcus of all stations, two distinctly pigment - containing cell types coexisting can be found in some stations of east china sea, which located in all depth of p3, mixlayer of e7, 40 - meter depth of e6 of autumn cruise and in mixlayer of p2 of spring cruise

    通過對流式細胞計測量的細胞熒光結果來看,在秋季的p3 、 e7個混層、 e6站40米層,春季的p2站均發現有兩群不同色素含量的聚球藻( high一pe和low一pe )共存現象,極有可能分別屬于不同品系,春季共存站位位置比秋季時更靠外,表明在秋季p3 、 e7等站位的共存是季節性現象,可能與此季節黑潮次表層水沿陸架坡涌升到中陸架有關,水團的運動及混使從外海遷移而來的high一pe與近岸的low一pe得以共存,在春季,由於長江沖淡水的日漸強盛,在中陸架區的共存區域有所外移。
  8. Such contour lines can be drawn for any structural surface, regular or irregular(e. g. bedding planes, faults, unconformities, dykes, veins or intrusions).

    對于任何構造面,規則的或不規則的(如層面、斷層、不、巖墻、巖脈或體)都可畫出這種等高線。
  9. The defect of products is a element of product liability. in one hand it concerns that if the harmed consumers can be remedied and hi another hand, to determine and classify the defect of products properly is a key step of balancing duty. there are three standards relating to defect of products : subjective standard, objective standard, mixed standard. the author considers that the mixed standard is rather available. defect can be classified into three kinds : designing defect, alerting defect, producing defect. according to the definitation, there are three conditions to determine designing defectthere exists foreseeable danger in products when products are sold ; there may exist alternative resonable design ; the alternative design can reduce or dissolve defect of product. the standard is beneficial for producers. the part also rethinks the rules related to the standard of products defect

    缺陷可分為三類:設計缺陷、警示缺陷和製造缺陷。 《美國權行為法第三次重述產品責任》對設計缺陷和警示缺陷的定義作了調值得注意。依照這一定義,設計缺陷認定需要三個條件:產品在投流通時存在可預見的致損風險;可能存在針對該產品缺陷的理替代設計;理替代設計可以減少或消除該致損風險。
  10. The paper introduces and amends the composite indexes of soil erosion intensity and regional soil erosion intensity and conducts quantitative analysis on spatial relationship of types of land use and soil erosion intensity of whole china territory, the middle and lower areas of liaohe river, headwater area of danjiangkou reservoir of south - north water transfer project of hubei part and 4 regions of huidong county in guangdong based on sum up of general study methods of spatial relationship of land use and soil erosion

    摘要在總結土地利用與土壤蝕空間關系一般研究方法的基礎上,引並修正了土壤蝕強度綜指數和區域土壤蝕強度綜指數,時個中國境內、遼河中下游地區、南水北調丹江口水庫水源區湖北部分和廣東省惠東縣4個區域土地利用類型與土壤蝕強度空間關系進行了定量比較分析。
  11. The system deals with integration of heterogeneous idss so that better security can be provided for network systems, including

    :著重在如何將異質的偵測系統順利,以發揮電腦網路的體防禦效果,包括
  12. This produced a short supply of adequate protection to the investor and presented a practical harm to the sustainable development of securities market. the sixth chapter mainly discusses the civil liabilities arising from manipulation. the legal principle of imposition of liability, the legal basis for a claim for damages and the possible remedies the law will provide are covered

    對操縱證券市場行為的民事責任的定性,筆者在分析同責任說、不當得利返還責任說和獨立責任說的基礎上,力主權責任說,使操縱證券市場行為正式地納權行為法的調軌道,為進一步在理論上探討提供了一個系統理論平臺。
  13. We use uml to describe the whole system architecture, and use colored petri nets to describe intrusions and specify agent design. at last, we build a prototype of this model on java platform. this prototype running in linux / windows environments, and can detect ftp bounce attack

    在本系統建模階段,結了uml建模語言和有色petri網技術,將uml語言用於個檢測系統的動態和靜態建模,而利用有色petri網進行分散式模式的分析,並在此基礎上針對不同的模式構建相應的檢測agent 。
  14. Due to the some normal ids ' s low efficiency, high error report rate, bad self - security, this thesis has given out a new - type hybrid intrusion detection system ( hsids ) design with high efficiently, good self - security, combining the distrubited information gathering with the centralized managerment, and combining the nid and the hid. the detailed design scheme also has been presented. the hsids adopts the " black hole " hidden setting, greatly decreasing the posiblity for hacker to discover and attack the hsids

    在hsids中,採用「黑洞」式隱形設置,可以大大減少hsids系統被黑客發現並攻擊的可能;系統採用的將nid與hid相結的方式可降低信息的漏報與誤報率;改進的檢測演算法提高了檢測引擎的速度;採用開放的檢測規則方便了系統的升級,提升了檢測能力; web方式的安全管理可以很好地控制個監控網路的安全情況;被動防禦與主動防禦相結更有效的防止了者對系統的
  15. In the uk, it takes the principle of the slander system in the common law and forms maturity burden of proof system ; the case of new york times co. v. sullivan in 1964, takes the american media defamation into a new step of adjustment of constitution law, and the american law field also makes an effort to construct a better reasonable burden of proof system besides the tortious law

    英國秉承著傳統普通法在誹謗制度上的原則,形成了一個較為完備的證明責任體系; 1964年的「 《紐約時報》訴薩利文案」則使美國媒體誹謗案件進了憲法調的新階段,美國司法界一直努力在權法體系之外構建一個更理的證明責任制度。
  16. The integrated analyzing and sorting toward ids data, the accurate forecasting of the intruders and common visitors etc, all come down to the multiple data conformity disposal. therefore, it is vitally important to develop a perfect nonlinear conformity disposal method. however, some favorable characters of ann can content these ids working demands perfectly, in additon, the capability of nonlinear mapping of ann also make sure that the system can execute simple or complex classification and save the information into the coefficent of connecting power, maintain the network robust and fault toleration. so more and more people alter one after another their working focus to the nonlinear mathematic model based on the ann in order to resolve the complex problems in ids system much better

    檢測工作屬于分類識別問題,其中存在著大量的非線性問題,對檢測資料進行綜分析與分類,準確判別惡意訪問和正常訪問等都涉及到多資料的處理,因此研製理想的非線性處理方法是非常必要的,而神經網路由於其內在的對不確定性的學習與適應能力,恰好能滿足檢測工作分類識別的需求,另外神經網路的非線性映射能力也是保證其成功實現各種簡單或復雜分類的主要原因,它將信息分散式存儲于連結權系數中,使網路具有較高的容錯性和魯棒性。
  17. We should absorb the advanced countries ' legislative experience and establish the legal adjusting mechanism according to our country ' s legislation, so as to protect our county ' s biology salty

    我國應當吸收、借鑒國際和世界先進國家關於此方面的立法經驗,結我國立法實際,構建外來物種的法律調機制,保護國家生態安全。
  18. Project name study of attack prediction capability of an integrated intrusion detection system based on attack - related knowledge with porbabilistic causal relations

    計畫名稱:以機率因果關聯為基礎的攻擊知識探討偵測系統的攻擊預測能力
  19. The main research contents are as follovvs : after the analyzing of the process of making train diagram, according with its character, and take into account the trend of innovation, chooses the total solution based on the b / s architecture, 3 - tier operation distributed and 2 - tier data distributed to separate the data from operation and simplify the development and maintenance ; the e - r data model that is accord with the 3nf criterion is designed after analyzing the data structure of the train diagram system. emphasis on the permission security of the distributed system, take the view schema, coupled with the login authentication and permissions validation, to ensure the data accessing domination, and take the synchronization, error control, and restore capability to advance the data security ; on the basis of b / s solution architecture, after comparing the existing transportation technologies, b - isdn and adsl is selected as the major solution architecture based on the package - svvitched networks. furthermore, error control, firewall, and encryption techniques are introduced to prevent the hacker attack and ensure the networks safety

    論文的主要研究內容包括:對目前我國列車運行圖管理體制和編制流程進行詳細分析,根據其「幾上幾下」的特點,並結未來「網運分離」體制改革的變化預測,選擇採用與之相適應的基於b s體系架構、三層業務分佈、二層數據分佈的體方案,實現業務與數據的分離,降低開發與應用過程的復雜度和總體成本;對列車運行圖系統的數據信息進行分析,設計符3nf規范的數據e - r關系模型,並著重研究處于分散式系統中的列車運行圖數據信息的訪問權限和數據安全問題,提出以視圖模式結用戶識別權限審定實現數據權限劃分,以並發處理、容錯技術、恢復技術提高系統的數據安全性;在基於b s架構的系統體方案基礎上,對當前多種數據傳輸技術進行分析比較,採用b - isdn為主幹網、 adsl為接端的基於公用數據網路分組交換技術的系統網路體系結構,並針對網路自身安全性和黑客攻擊與問題,詳細討論綜採用差錯控制、防火墻、數據加密解密等技術手段提高系統的網路安全性能。
  20. Considering flaws of other types of firewalls, i integrate the firework techniques with the security supervision system of networks in aim to improve the ability of fireworks to foil the invasion of hackers or computer bugs and to supervise the whole system at any time

    由於防火墻具有不足之處,現將防火墻和網路安全監測系統結起來,則能克服現行網路安全防護系統無法對黑客及病毒攻擊行為實時進行監控識別的缺陷,擔負起個網路系統的安全防護任務。
分享友人