特技攻擊 的英文怎麼說

中文拼音 [gōng]
特技攻擊 英文
acrobatic attack
  • : Ⅰ形容詞(特殊; 超出一般) particular; special; exceptional; unusual Ⅱ副詞1 (特別) especially; v...
  • : 名詞(技能; 本領) skill; ability; trick; technique
  • : Ⅰ動詞1 (攻打) attack; assault; take the offensive 2 (指責別人的過錯; 駁斥別人的議論) accuse; ...
  • 特技 : 1 (特殊技能) stunt; trick2 [電影] special effects特技場景 trick scene; 特技飛行 aerobatics; aer...
  • 攻擊 : 1 (進攻) attack; assault; launch an offensive 2 (惡意指責) attack; accuse; charge; slander; v...
  1. The information safety has the characteristics of the high weakness and danger, delitescence and abruptness, the diversity of the attack sources and the indeterminacy of the guarded object and the asymmetry of the main body of the safety, etc. the contents of information safety are extensive, involving politics, economy, culture, military, science, technology and resources ecosystem etc. the factor which threatens the information safety mainly includes the hackers, network crimes, the network viruses, and the garbage information, etc. the second part thoroughly analyzes the strategic position of the information safety in the national security

    信息安全具有高度脆弱性和風險性、潛伏性和突發性、源的多樣性和防範對象的不確定性、安全主體的不對稱性等徵。信息安全的內容廣泛,涉及政治、經濟、文化、軍事、科、資源生態等領域。威脅信息安全的因素主要包括病毒、網路黑客、網路犯罪和垃圾信息等。
  2. In other words, archangels can either move / attack in the regular way, or the player can select resurrect special ability and use it on a stack of friendly units

    也就是說,大天使通常可以移動或,而玩家可以手動選擇復活並對一個本方分隊使用。
  3. Dread knight will need to properly use her stances, lifetaps, fear spells, special attacks and tactical maneuvers to fulfill her various group roles

    恐懼騎士應當適當地使用姿態,吸血,恐嚇能,和戰術機動去完成他在各種團隊中的角色。
  4. To detect both known and unknown intrusion patterns, the system introduces a blended frame that makes use of both misuse detection approach and anomaly detection approach. the one of the highlight of the architecture is introduction of data mining technique, and the other is introduction of genetic algorithms. the ids uses data mining algorithms to abstract key features of system runtime status from security audit data, and it uses genetic algorithm to select the feature subset to reduce the amount of data that must be obtained from running processes and classified

    本文陳述了所研究系統的主要點和術:將智能體( agent )術應用於入侵檢測系統,解決了傳統入侵檢測系統的集中式解決方案的弊病,充分利用網路資源協同完成入侵檢測任務;利用基於主機和基於網路的數據源,形成一種完整的混合型的結構,從而能收集到更加全面的信息;使用了異常檢測術和誤用檢測術,採用一種混合型的結構,既能檢測已知的模式,又能發現新的模式。
  5. Scientists at newcastle university have developed a cancer fighting technology which uses ultra - violet light to activate antibodies which very specifically attack tumours

    紐卡斯爾大學的科學家開發了一種對抗癌癥的新術,這種術是用紫外光激活能異性腫瘤的抗體。
  6. In chapter 2, a general digital watermarking frame is presented, including the generation, embedding and detection of watermark. in chapter 3, the concept of watermarking channel is presented, the modes of watermarking channel and image dct coefficients is proposed, the capacity of watermarking channel is evaluated by embedding watermarks to selected still image dct coefficients in direct spread spectrum. in chapter 4, a watermarking algorithms based wavelet multi - resolution is presented, by conjunction with human visual model, it keeps invisibility of watermark in host image and need not original image during detection

    數字水印是一種新的數字媒體保護術,它是將定的信息(如版權信息、秘密消息等)嵌入到圖象、語音、視頻等各種數字媒體中,以達到版權保護等目的,同時,這種信息對宿主媒體的影響不足以引起人們的注意且有定的恢復方法,此信息對非法接收者應該是不可見的,本文主要對數字水印的一般框架,靜止圖象dct系數的理論容量,圖象水印的嵌入和檢測,數字媒體防篡改以及數字水印的等問題進行了研究,提出了兩個新的水印算演算法。
  7. Some spells and special abilities ( such as unholy blight and whirlwind blast ) deal damage as well as produce other effects

    某些法術和能(如邪惡破壞和旋風)對付傷害時還能產生別的效果。
  8. Sword specialization : this talent ' s free extra attacks can no longer trigger additional extra attacks

    劍類武器專精:由效而來的額外,不會觸發另一次的額外
  9. The design difficulties and characteristics about the reconnaissance uav, the attack uav, the micro uav, the vertical / short range take - off uav and the ucavs are presented

    針對目前己有的幾種作戰無人機,分析了偵察型無人機、型無人機、微型無人機、垂直短距起降無人機、無人作戰平臺等的設計點和術難點。
  10. Then according to system simulation technology, the overall air - to - ground attack simulation plan is made with the thought of models and layers. after that, the mathematical models of main parts in the simulation are made such as aircraft body, propulsive system, flight control system, fire control system, bomb and air - to - ground missile. on the basis of these mathematical models, using the object - oriented design methodology, a set of air - to - ground attack real - time visual simulation software is developed. this software can be used to aid aircraft design, research of air - to - ground attack tactics and flight training

    本文首先介紹了現代戰爭中空對地術裝備及其點,計算機模擬術的發展以及面向對象的軟體設計思想;而後使用系統模擬術,依據分層、模塊化設計思想,制定了空對地模擬系統總體設計方案;之後根據目前術狀況,建立了戰斗機機體、推進系統、飛控系統、火控系統、航空炸彈、空地導彈等子系統數學模型;在此基礎上,利用面向對象的軟體設計思想,在基於pc的平臺上開發了一套對地視景模擬軟體,實現了戰斗機對地實時視景模擬。
  11. Firstly it uses data mining and statistic algorithms to detect dos attacks, and then determines the feature of attack flows, lastly uses various defense methods to weaken or eliminate the effect of attacks. the system ensures that when the network or victim systems are being attacked, they can continue to serve legitimate users

    它利用數據挖掘和統計演算法等檢測術檢測dos,確定流量的徵,並採取多種防禦措施來削弱和消除流量對網路和系統的影響,確保在發生的情況下,仍能為合法用戶提供服務。
  12. Also, as the combination of action unit and detection unit, it is very flexible, agile and aggressive and becomes one of the key technologies in warfare. the study in this paper is performed around the key problems of the technology of location and tracking with network of passive airborne radars

    機載無源雷達組網作為無源探測和雷達組網的結合兼具二者共同的點,同時又可以實現偵察平臺與作戰平臺相結合,具有很強的機動性、靈活性和性,將是今後戰爭中所依賴的關鍵術之一。
  13. Abstract : have connected with ir target signature research, this paper deals with the principle and realization for the ir imaging terminal - guidance technology of an air - to - air missile in clutter backgrounds. the radiation signature of clutter earth backgrounds is analyzed, and the comprehensive analysis of the target ir radiation signature types of a military jet fighter as the mainly attacked target for air - to - air missile is gave. also we discusses the extraction and algorithm for target ir signature

    文摘:本文結合對目標紅外性的研究,論述了在復雜背景條件下空-空彈紅外成像末制導術的原理和實現,分析了地面背景的輻射和散射的徵;綜合分析了軍用噴氣式戰斗機作為主要被對象的紅外輻射性,並給出了目標紅外徵提取的多種方法和演算法
  14. Upgrade hr - v, your robot companion, with armor, weapons and special equipment. command hr - v to perform offensive and defensive tactical combat maneuvers, or combine your efforts and unleash special attack combos

    玩家要對你自己的游戲搭檔? ? hr - v :一名身穿盔甲、攜帶武器和殊裝備的機器人進行各種屬性的升級。命令hr - v使用帶有進性和防禦性的戰鬥巧,或者憑借你自身的努力來給予強有力的
  15. Solo battles with monsters aren ‘ t especially exciting either ; they mostly boil down to either setting your character to auto - attack, then sitting back and watching ( while periodically using special abilities ), or to casting as many attack spells from as far away as possible until monsters can catch up with you

    單人與怪物戰斗並不會別令人興奮;大部分的情況不是叫你的角色自動,然後坐著等結果(有時周期性的使用一些能) ,就是在怪物打到你之前,離得越遠越好,然後盡量丟出更多的魔法。
  16. Solo battles with monsters aren ‘ t especially exciting either ; they mostly boil down to either setting your character to auto - attack , then sitting back and watching ( while periodically using special abilities ) , or to casting as many attack spells from as far away as possible until monsters can catch up with you

    單人與怪物戰斗並不會別令人興奮;大部分的情況不是叫你的角色自動,然後坐著等結果(有時周期性的使用一些能) ,就是在怪物打到你之前,離得越遠越好,然後盡量丟出更多的魔法。
  17. But, though considerable process has been made in the last ten years, digital watermarking is still in its infancy, and much interesting work remains to be done this thesis addresses some problems in the gray - scale image digital watermarking that are summarized below : 1 ) whereas the basic theory of digital watermarking is still very poor, a digital watermarking mathematic model based on imperceptibility and robustness is presented by analysising the characteristic of digital watermarking ; 2 ) based on the model constructed above, by defining the measures of capacity and robustness of digital watermarking, an objective method for evaluating the digital watermarking is introduced and used to analysis some algorithms ; 3 ) whereas geometric distortion always influences the restoration of watermark, we advocate to enhance the robustness against geometric distortion by restoring the image which has been distorted by geometric transformation, and a method is designed for estimating the parameters of geometric transformation ; 4 ) based on the conclusion discussed above, and combined with the masking effects of hvs, a novel public meaningful gray - scale image digital watermarking is designed by analysising the characteristics of image gray - scale interpolation and haar wavelet transformation. the experimental results show that the method is indeed powerful ; 5 ) whereas many image digital watermarking schemes, which embed watermark by modifying the values of pixels in spatial domain and transformed domain, are confronted with the conflict between the imperceptibility and robustness, we advocated to use some stable digital characteristics of host image as watermark and a algorithm based on hermite matrix is designed

    本文重點對灰度圖象數字水印術進行研究,主要工作如下: 1 )鑒于目前數字水印的理論研究比較薄弱的現狀,本文通過分析數字水印的點,建立了一個數字水印的數學模型,為進一步研究數字水印打下了基礎; 2 )根據以上建立的模型,通過引入容量和穩健度的概念為數字水印提供了一個客觀評價方法,並對一些數字水印演算法進行了分析; 3 )為增強數字水印抵抗幾何的能力,研究了受幾何的圖象的復原問題,並給出了一個計算圖象幾何變換參數的方法; 4 )通過分析圖象灰度插值演算法和haar小波變換的點,結合hvs的掩蔽效應,設計了一個公開的有意義數字水印演算法,實驗結果表明本演算法具有較強的穩健性; 5 )目前許多水印演算法都是通過在空域或頻域修改象素值的方法嵌入水印的,這種方法面臨著透明性和穩健性的矛盾,為解決這個矛盾,本文提出以圖象的某些穩定的數字徵為水印的觀點,並結合hermite矩陣的點設計了相應的水印演算法,實驗結果表明該演算法具有較好的穩健性。
  18. After studying many relative books and combining with my own understanding, i write this thesis. this thesis includes : the meaning & characteristics of network security ; threatening & attacking that the computer network faces ; general measures to protect network security ; brief introduction, classification and relationships to network security technology ; general description and key technology of fire proofing ( package filtrate technology, delegating technology, nat technology ) ; the constructive type of fire proofing ( filter route ware, multi - port host computer, host computer screen, subnet screen etc. ) ; the examples of the constructive application of fire proofing ; the future developing trend of fire proofing technology and products, etc. so, net security and fireproof technology are the title of this paper

    綜上原因,本文將「網路安全」和「防火墻術」組在一起形成本論文題目。本論文是筆者在研讀許多相關文獻並結合自己理解基礎上寫成的,主要內容為:網路安全含義及徵、計算機網路所面臨的威脅和、保障網路安全的一般措施;網路安全術的簡介、分類及關系;防火墻概論、防火墻關鍵術(包過濾術、代理術、 nat術等) ;防火墻的構建類型(過濾路由器、多埠主機、主機屏蔽、子網屏蔽等) ;防火墻的構建應用舉例;防火墻術的未來發展趨勢及產品等。
  19. Main content of " hef ( high efficient firewall ) firewall realize mode study " have : ( 1 ) emulation experiment and ipv6 / tunnelbroker model set up through transproxy, explain transproxy method, improved structure of rfc3053 emphatically, act for technology about solution of efficiency, make their suitable for different need of isp of scale ; ( 2 ) on the basis of analysing ipsec agreement security question, to isakmpsa varying load attacks and improves in consulting, carry on form analyses, proved, design vpn high - efficient safe model based on ip / ipsec concept finally ; ( 3 ) on the basis of ids dynamic characteristic of system, for remedy firewall static deficiency of defence, design one method that the two combine, offer a good foundation for high - efficient online security system ; ( 4 ) through theory design and emulation experiment, the above - mentioned three part can make and imbed fire wall of the system for module, offer certain theoretical foundation to domestic fire wall design of product

    《 hef ( highefficientfirewall )防火墻實現模式研究》的主要內容有: ( 1 )通過transproxy模擬實驗及ipv6 / tunnelbroker模型建立,著重闡述transproxy方法、改進的rfc3053的結構,以及代理術中有關效率的解決方案,使之適用於不同規模的isp的需要; ( 2 )在分析ipsec協議安全性問題基礎上,針對isakmpsa協商中的變換載荷做出改進,並進行形式化分析、論證,最終設計出基於ip / ipsec概念的vpn高效安全模型: ( 3 )基於ids系統的動態性,為彌補防火墻靜態防禦的不足,設計出兩者聯動的方法,探索了高效網路安全體系模式研究的新方向; ( 4 ) hef防火墻實現模式的理論研究及模擬實驗,所得三部分研究結論均可設計出module ,內嵌入防火墻系統中,為國內防火墻產品的設計提供了一定的理論基礎。
  20. Ssl handshake protocol and the security of ssl are described in detail. then, the system design plan, critical technology and implement method of a secure web system based on java are proposed. in the end, the author points out the work should be improved in the future

    然後分析了ssl協議,著重分析了ssl握手協議及ssl協議各部分的安全性和抗能力,並在ssl ( securesocketslayer )協議的研究基礎上,詳細介紹了一個基於java的ssl安全web系統的設計方案、點與實現方法。
分享友人