模擬陷阱 的英文怎麼說

中文拼音 [xiànjǐng]
模擬陷阱 英文
emulator trap
  • : 模名詞1. (模子) mould; pattern; matrix 2. (姓氏) a surname
  • : 動詞1. (設計; 起草) draw up; draft 2. (打算; 想要) intend; plan 3. (模仿) imitate
  • : Ⅰ名詞1 (陷阱) pitfall; trap2 (缺點) defect; deficiency Ⅱ動詞1 (掉進) get stuck or bogged do...
  • : 名詞(捕野獸用的陷坑) trap; pitfall; pit
  • 模擬 : imitate; simulate; analog; analogy; imitation; simulation模擬艙 boilerplate; 模擬電路 [電學] circ...
  • 陷阱 : pitfall; pit; trap; gin; deadfall; snare
  1. The effect of the traps in the epitaxial layer is analyzed using the medici simulator and shockley - read ? hall model, which indicates the ppc is independent of the traps in the epitaxial layer

    利用medici軟體和shockley - read - hall型研究了體內對ppc效應的影響,結果表明體內與ppc效應無關系。
  2. On this condition, based on the experimental results gotten by the microwave absorption dielectric - spectrum measure technique, the photographic process at room temperature in agcl cubic microcrystals doped with k4fe ( cn ) 6 is simulated. through the optimization of simulating parameters, not only the cross - section and trap depth of the shallow electron trap induced by the dopant, but also the optimal doping amount is obtained

    在此基礎上,以微波吸收介電譜檢測技術的實驗結果為依據,對摻有k _ 4fe ( cn ) _ 6的agcl立方體微晶在室溫下的曝光過程進行了,通過調節參數,不但計算出由摻雜劑引入的淺電子的俘獲截面和深度,而且得到了這種摻雜乳劑的最佳摻雜濃度。
  3. It reframes the traceback problem as a polynomial reconstruction problem, and uses techniques from algebraic coding theory to provide robust methods of transmission and restriction. the scheme is a new solution to the traceback problem during a dos attack ; the honeypot for ddos, which is a tool of traceback, lures the attacker to believe that he successfully compromised a slave for his needs, convincingly simulating the architecture of a potential ddos attack ; the source - based approach to ddos defense, which is a useful adjunt to traceback systems, deploys a ddos defense system at source - end networks. attacks are detected by monitoring two - way traffic flows, and the attacks originating from source networks are stopped by rate - limiting ; the routing mechanism based on pushback treats ddos attacks as a congestion - control problem

    最後,就有關ddos攻擊反向追蹤問題,從四個方面對其解決方案進行了研究:在分析比較幾種反向追蹤演算法的基礎上,著重研究了代數方法編碼反向追蹤信息的方案,該方案把追蹤重構問題當作多項式重構問題,使用代數編碼理論技術提供魯棒的傳送和重構方法,是dos攻擊過程中的反向追蹤問題的一種新的解決方法; ddos作為反向追蹤的工具,引誘攻擊者相信自己成功與所需的傀儡主機通話,令人信服地出潛在ddos攻擊體系結構;基於源的ddos防禦方法作為反向追蹤有用的補充,將防禦系統部署在源網路,通過監控雙向流量檢測攻擊和限制速率終止來自源的攻擊;基於向後倒推的防禦ddos的路由機制把ddos攻擊看作擁塞控制問題,添加功能到每個路由器來檢測並優先丟棄可能屬于攻擊的包,通過向後倒推上級路由器也得到通知而把這樣的包丟棄。
  4. The effect of a few important geometrical and physical parameters which include the length of the active region, the thickness of the active region, bulk traps, interface traps, on the tft ( thin film transistor ) characteristics of polycrystalline silicon has been investigated by using advanced two dimensional device simulation program medici

    摘要利用高級二維器件程序medici分析了多晶矽薄膜晶體管有源區的長度、體內、界面、柵氧化層厚度等幾何參數及物理參數,並研究了這些參數對薄膜晶體管特性的影響。
分享友人