特技攻擊 的英文怎麼說
中文拼音 [tèjìgōngjī]
特技攻擊
英文
acrobatic attack- 特 : Ⅰ形容詞(特殊; 超出一般) particular; special; exceptional; unusual Ⅱ副詞1 (特別) especially; v...
- 技 : 名詞(技能; 本領) skill; ability; trick; technique
- 攻 : Ⅰ動詞1 (攻打) attack; assault; take the offensive 2 (指責別人的過錯; 駁斥別人的議論) accuse; ...
- 特技 : 1 (特殊技能) stunt; trick2 [電影] special effects特技場景 trick scene; 特技飛行 aerobatics; aer...
- 攻擊 : 1 (進攻) attack; assault; launch an offensive 2 (惡意指責) attack; accuse; charge; slander; v...
-
The information safety has the characteristics of the high weakness and danger, delitescence and abruptness, the diversity of the attack sources and the indeterminacy of the guarded object and the asymmetry of the main body of the safety, etc. the contents of information safety are extensive, involving politics, economy, culture, military, science, technology and resources ecosystem etc. the factor which threatens the information safety mainly includes the hackers, network crimes, the network viruses, and the garbage information, etc. the second part thoroughly analyzes the strategic position of the information safety in the national security
信息安全具有高度脆弱性和風險性、潛伏性和突發性、攻擊源的多樣性和防範對象的不確定性、安全主體的不對稱性等特徵。信息安全的內容廣泛,涉及政治、經濟、文化、軍事、科技、資源生態等領域。威脅信息安全的因素主要包括病毒、網路黑客、網路犯罪和垃圾信息等。In other words, archangels can either move / attack in the regular way, or the player can select resurrect special ability and use it on a stack of friendly units
也就是說,大天使通常可以移動或攻擊,而玩家可以手動選擇復活特技並對一個本方分隊使用。Dread knight will need to properly use her stances, lifetaps, fear spells, special attacks and tactical maneuvers to fulfill her various group roles
恐懼騎士應當適當地使用姿態,吸血,恐嚇技能,特殊攻擊和戰術機動去完成他在各種團隊中的角色。To detect both known and unknown intrusion patterns, the system introduces a blended frame that makes use of both misuse detection approach and anomaly detection approach. the one of the highlight of the architecture is introduction of data mining technique, and the other is introduction of genetic algorithms. the ids uses data mining algorithms to abstract key features of system runtime status from security audit data, and it uses genetic algorithm to select the feature subset to reduce the amount of data that must be obtained from running processes and classified
本文陳述了所研究系統的主要特點和技術:將智能體( agent )技術應用於入侵檢測系統,解決了傳統入侵檢測系統的集中式解決方案的弊病,充分利用網路資源協同完成入侵檢測任務;利用基於主機和基於網路的數據源,形成一種完整的混合型的結構,從而能收集到更加全面的信息;使用了異常檢測技術和誤用檢測技術,採用一種混合型的結構,既能檢測已知的攻擊模式,又能發現新的攻擊模式。Scientists at newcastle university have developed a cancer fighting technology which uses ultra - violet light to activate antibodies which very specifically attack tumours
紐卡斯爾大學的科學家開發了一種對抗癌癥的新技術,這種技術是用紫外光激活能特異性攻擊腫瘤的抗體。In chapter 2, a general digital watermarking frame is presented, including the generation, embedding and detection of watermark. in chapter 3, the concept of watermarking channel is presented, the modes of watermarking channel and image dct coefficients is proposed, the capacity of watermarking channel is evaluated by embedding watermarks to selected still image dct coefficients in direct spread spectrum. in chapter 4, a watermarking algorithms based wavelet multi - resolution is presented, by conjunction with human visual model, it keeps invisibility of watermark in host image and need not original image during detection
數字水印是一種新的數字媒體保護技術,它是將特定的信息(如版權信息、秘密消息等)嵌入到圖象、語音、視頻等各種數字媒體中,以達到版權保護等目的,同時,這種信息對宿主媒體的影響不足以引起人們的注意且有特定的恢復方法,此信息對非法接收者應該是不可見的,本文主要對數字水印的一般框架,靜止圖象dct系數的理論容量,圖象水印的嵌入和檢測,數字媒體防篡改以及數字水印的攻擊等問題進行了研究,提出了兩個新的水印算演算法。Some spells and special abilities ( such as unholy blight and whirlwind blast ) deal damage as well as produce other effects
某些法術和特殊技能(如邪惡破壞和旋風攻擊)對付傷害時還能產生別的效果。Sword specialization : this talent ' s free extra attacks can no longer trigger additional extra attacks
劍類武器專精:由技能特效而來的額外攻擊,不會觸發另一次的額外攻擊。The design difficulties and characteristics about the reconnaissance uav, the attack uav, the micro uav, the vertical / short range take - off uav and the ucavs are presented
針對目前己有的幾種作戰無人機,分析了偵察型無人機、攻擊型無人機、微型無人機、垂直短距起降無人機、無人作戰平臺等的設計特點和技術難點。Then according to system simulation technology, the overall air - to - ground attack simulation plan is made with the thought of models and layers. after that, the mathematical models of main parts in the simulation are made such as aircraft body, propulsive system, flight control system, fire control system, bomb and air - to - ground missile. on the basis of these mathematical models, using the object - oriented design methodology, a set of air - to - ground attack real - time visual simulation software is developed. this software can be used to aid aircraft design, research of air - to - ground attack tactics and flight training
本文首先介紹了現代戰爭中空對地攻擊的技術裝備及其特點,計算機模擬技術的發展以及面向對象的軟體設計思想;而後使用系統模擬技術,依據分層、模塊化設計思想,制定了空對地攻擊模擬系統總體設計方案;之後根據目前技術狀況,建立了戰斗機機體、推進系統、飛控系統、火控系統、航空炸彈、空地導彈等子系統數學模型;在此基礎上,利用面向對象的軟體設計思想,在基於pc的平臺上開發了一套對地攻擊視景模擬軟體,實現了戰斗機對地攻擊實時視景模擬。Firstly it uses data mining and statistic algorithms to detect dos attacks, and then determines the feature of attack flows, lastly uses various defense methods to weaken or eliminate the effect of attacks. the system ensures that when the network or victim systems are being attacked, they can continue to serve legitimate users
它利用數據挖掘和統計演算法等檢測技術檢測dos攻擊,確定攻擊流量的特徵,並採取多種防禦措施來削弱和消除攻擊流量對網路和系統的影響,確保在攻擊發生的情況下,仍能為合法用戶提供服務。Also, as the combination of action unit and detection unit, it is very flexible, agile and aggressive and becomes one of the key technologies in warfare. the study in this paper is performed around the key problems of the technology of location and tracking with network of passive airborne radars
機載無源雷達組網作為無源探測和雷達組網的結合兼具二者共同的特點,同時又可以實現偵察平臺與作戰平臺相結合,具有很強的機動性、靈活性和攻擊性,將是今後戰爭中所依賴的關鍵技術之一。Abstract : have connected with ir target signature research, this paper deals with the principle and realization for the ir imaging terminal - guidance technology of an air - to - air missile in clutter backgrounds. the radiation signature of clutter earth backgrounds is analyzed, and the comprehensive analysis of the target ir radiation signature types of a military jet fighter as the mainly attacked target for air - to - air missile is gave. also we discusses the extraction and algorithm for target ir signature
文摘:本文結合對目標紅外特性的研究,論述了在復雜背景條件下空-空彈紅外成像末制導技術的原理和實現,分析了地面背景的輻射和散射的特徵;綜合分析了軍用噴氣式戰斗機作為主要被攻擊對象的紅外輻射特性,並給出了目標紅外特徵提取的多種方法和演算法Upgrade hr - v, your robot companion, with armor, weapons and special equipment. command hr - v to perform offensive and defensive tactical combat maneuvers, or combine your efforts and unleash special attack combos
玩家要對你自己的游戲搭檔? ? hr - v :一名身穿盔甲、攜帶武器和特殊裝備的機器人進行各種屬性的升級。命令hr - v使用帶有進攻性和防禦性的戰鬥技巧,或者憑借你自身的努力來給予強有力的特殊攻擊。Solo battles with monsters aren ‘ t especially exciting either ; they mostly boil down to either setting your character to auto - attack, then sitting back and watching ( while periodically using special abilities ), or to casting as many attack spells from as far away as possible until monsters can catch up with you
單人與怪物戰斗並不會特別令人興奮;大部分的情況不是叫你的角色自動攻擊,然後坐著等結果(有時周期性的使用一些技能) ,就是在怪物打到你之前,離得越遠越好,然後盡量丟出更多的攻擊魔法。Solo battles with monsters aren ‘ t especially exciting either ; they mostly boil down to either setting your character to auto - attack , then sitting back and watching ( while periodically using special abilities ) , or to casting as many attack spells from as far away as possible until monsters can catch up with you
單人與怪物戰斗並不會特別令人興奮;大部分的情況不是叫你的角色自動攻擊,然後坐著等結果(有時周期性的使用一些技能) ,就是在怪物打到你之前,離得越遠越好,然後盡量丟出更多的攻擊魔法。But, though considerable process has been made in the last ten years, digital watermarking is still in its infancy, and much interesting work remains to be done this thesis addresses some problems in the gray - scale image digital watermarking that are summarized below : 1 ) whereas the basic theory of digital watermarking is still very poor, a digital watermarking mathematic model based on imperceptibility and robustness is presented by analysising the characteristic of digital watermarking ; 2 ) based on the model constructed above, by defining the measures of capacity and robustness of digital watermarking, an objective method for evaluating the digital watermarking is introduced and used to analysis some algorithms ; 3 ) whereas geometric distortion always influences the restoration of watermark, we advocate to enhance the robustness against geometric distortion by restoring the image which has been distorted by geometric transformation, and a method is designed for estimating the parameters of geometric transformation ; 4 ) based on the conclusion discussed above, and combined with the masking effects of hvs, a novel public meaningful gray - scale image digital watermarking is designed by analysising the characteristics of image gray - scale interpolation and haar wavelet transformation. the experimental results show that the method is indeed powerful ; 5 ) whereas many image digital watermarking schemes, which embed watermark by modifying the values of pixels in spatial domain and transformed domain, are confronted with the conflict between the imperceptibility and robustness, we advocated to use some stable digital characteristics of host image as watermark and a algorithm based on hermite matrix is designed
本文重點對灰度圖象數字水印技術進行研究,主要工作如下: 1 )鑒于目前數字水印的理論研究比較薄弱的現狀,本文通過分析數字水印的特點,建立了一個數字水印的數學模型,為進一步研究數字水印打下了基礎; 2 )根據以上建立的模型,通過引入容量和穩健度的概念為數字水印提供了一個客觀評價方法,並對一些數字水印演算法進行了分析; 3 )為增強數字水印抵抗幾何攻擊的能力,研究了受幾何攻擊的圖象的復原問題,並給出了一個計算圖象幾何變換參數的方法; 4 )通過分析圖象灰度插值演算法和haar小波變換的特點,結合hvs的掩蔽效應,設計了一個公開的有意義數字水印演算法,實驗結果表明本演算法具有較強的穩健性; 5 )目前許多水印演算法都是通過在空域或頻域修改象素值的方法嵌入水印的,這種方法面臨著透明性和穩健性的矛盾,為解決這個矛盾,本文提出以圖象的某些穩定的數字特徵為水印的觀點,並結合hermite矩陣的特點設計了相應的水印演算法,實驗結果表明該演算法具有較好的穩健性。After studying many relative books and combining with my own understanding, i write this thesis. this thesis includes : the meaning & characteristics of network security ; threatening & attacking that the computer network faces ; general measures to protect network security ; brief introduction, classification and relationships to network security technology ; general description and key technology of fire proofing ( package filtrate technology, delegating technology, nat technology ) ; the constructive type of fire proofing ( filter route ware, multi - port host computer, host computer screen, subnet screen etc. ) ; the examples of the constructive application of fire proofing ; the future developing trend of fire proofing technology and products, etc. so, net security and fireproof technology are the title of this paper
綜上原因,本文將「網路安全」和「防火墻技術」組在一起形成本論文題目。本論文是筆者在研讀許多相關文獻並結合自己理解基礎上寫成的,主要內容為:網路安全含義及特徵、計算機網路所面臨的威脅和攻擊、保障網路安全的一般措施;網路安全技術的簡介、分類及關系;防火墻概論、防火墻關鍵技術(包過濾技術、代理技術、 nat技術等) ;防火墻的構建類型(過濾路由器、多埠主機、主機屏蔽、子網屏蔽等) ;防火墻的構建應用舉例;防火墻技術的未來發展趨勢及產品等。Main content of " hef ( high efficient firewall ) firewall realize mode study " have : ( 1 ) emulation experiment and ipv6 / tunnelbroker model set up through transproxy, explain transproxy method, improved structure of rfc3053 emphatically, act for technology about solution of efficiency, make their suitable for different need of isp of scale ; ( 2 ) on the basis of analysing ipsec agreement security question, to isakmpsa varying load attacks and improves in consulting, carry on form analyses, proved, design vpn high - efficient safe model based on ip / ipsec concept finally ; ( 3 ) on the basis of ids dynamic characteristic of system, for remedy firewall static deficiency of defence, design one method that the two combine, offer a good foundation for high - efficient online security system ; ( 4 ) through theory design and emulation experiment, the above - mentioned three part can make and imbed fire wall of the system for module, offer certain theoretical foundation to domestic fire wall design of product
《 hef ( highefficientfirewall )防火墻實現模式研究》的主要內容有: ( 1 )通過transproxy模擬實驗及ipv6 / tunnelbroker模型建立,著重闡述transproxy方法、改進的rfc3053的結構,以及代理技術中有關效率的解決方案,使之適用於不同規模的isp的需要; ( 2 )在分析ipsec協議安全性問題基礎上,針對isakmpsa協商中的變換載荷攻擊做出改進,並進行形式化分析、論證,最終設計出基於ip / ipsec概念的vpn高效安全模型: ( 3 )基於ids系統的動態特性,為彌補防火墻靜態防禦的不足,設計出兩者聯動的方法,探索了高效網路安全體系模式研究的新方向; ( 4 ) hef防火墻實現模式的理論研究及模擬實驗,所得三部分研究結論均可設計出module ,內嵌入防火墻系統中,為國內防火墻產品的設計提供了一定的理論基礎。Ssl handshake protocol and the security of ssl are described in detail. then, the system design plan, critical technology and implement method of a secure web system based on java are proposed. in the end, the author points out the work should be improved in the future
然後分析了ssl協議,著重分析了ssl握手協議及ssl協議各部分的安全性和抗攻擊能力,並在ssl ( securesocketslayer )協議的研究基礎上,詳細介紹了一個基於java的ssl安全web系統的設計方案、技術特點與實現方法。分享友人