終結一擊 的英文怎麼說

中文拼音 [zhōngjiē]
終結一擊 英文
complete shot
  • : Ⅰ名詞1 (最後; 末了) end; ending; finish 2 (指人死) death; end 3 (姓氏) a surname Ⅱ形容詞(...
  • : 結動詞(長出果實或種子) bear (fruit); form (seed)
  • 終結 : finality; final; end; final stage; wind up; end up終結符 terminal symbol; termination symbol; 終...
  1. The yankees, who scored 26 runs in their two victories over the angels, capped the scoring in the seventh on pinch hitter miguel cairo ' s two - run single

    洋基在前兩場贏天使的賽事中已狂得26分,這場比賽到了第七局時又由替補壘手開羅出帶有2分打點的安打,漂亮這次的大量取分。
  2. The simulation results indicate, deep - trench junction termination with certain width, depth and filling with isolated dielectric can increase the avalanche breakdown voltage of devices to above 95 % of the ideal value

    果表明:具有定寬度、深度且填充絕緣介質的深阱構,阻止了的橫向擴展,並能將器件的雪崩穿電壓提高到理想值的95以上。
  3. De la hoya scored an emphatic sixth round stoppage of “ el matador, ” a beating so intense that mayorga decided to skip the post - fight press conference altogether

    德?拉?霍亞用強有力的分值,于第六回合「鬥牛士」 ? ?打如此密集,以致馬約加決定跳過了與他們起的賽后新聞發布會(露面的機會) 。
  4. And then some terminal techniques on pic, devices simulation theory, resurfs effect and medici software are presented. at last three kinds of high voltage power devices have been designed and simulated. based on the analysis of the breakdown voltage and electric field distribution of the high power devices, the key physics and structural parameters effects on the breakdown voltage are found

    本文首先介紹了國內外功率集成電路的發展狀況,然後介紹了高壓集成電路中的幾種端技術、 resurf效應、器件模擬的基本理論和medici器件模擬軟體,最後對三種型號的高壓功率器件的穿特性進行了分析和計算機模擬,指出了影響器件電壓的關鍵的物理和構參數,並對這三種型號的器件進行模擬,得出的電特性曲線和參數基本上與公司給出的致。
  5. This paper provides security analysis of a mutual authentication and key establishing protocol based on elliptic curve cryptography for wireless communication, which can withstand the above attacks and can be used in wireless terminals

    合橢圓曲線密碼體制優點的基礎上,提出種適于無線通信網路中的相互認證和密鑰建立協議,不僅能有效防止上述攻,還適于在無線端設備上應用。
  6. I went to the woods, because i wanted to live deliberately, i wanted to live deep, and suck out all the marrow of life, and not when i had come to die, discover that i had not lived

    我步入叢林,因為我希望生活得有意義,我希望活得深刻,汲取生命中所有的精華,把非生命的切都潰,以免在我生命時,發現自己從來沒有活過
  7. It reframes the traceback problem as a polynomial reconstruction problem, and uses techniques from algebraic coding theory to provide robust methods of transmission and restriction. the scheme is a new solution to the traceback problem during a dos attack ; the honeypot for ddos, which is a tool of traceback, lures the attacker to believe that he successfully compromised a slave for his needs, convincingly simulating the architecture of a potential ddos attack ; the source - based approach to ddos defense, which is a useful adjunt to traceback systems, deploys a ddos defense system at source - end networks. attacks are detected by monitoring two - way traffic flows, and the attacks originating from source networks are stopped by rate - limiting ; the routing mechanism based on pushback treats ddos attacks as a congestion - control problem

    最後,就有關ddos攻反向追蹤問題,從四個方面對其解決方案進行了研究:在分析比較幾種反向追蹤演算法的基礎上,著重研究了代數方法編碼反向追蹤信息的方案,該方案把追蹤重構問題當作多項式重構問題,使用代數編碼理論技術提供魯棒的傳送和重構方法,是dos攻過程中的反向追蹤問題的種新的解決方法; ddos陷阱作為反向追蹤的工具,引誘攻者相信自己成功與所需的傀儡主機通話,令人信服地模擬出潛在ddos攻體系構;基於源的ddos防禦方法作為反向追蹤有用的補充,將防禦系統部署在源網路,通過監控雙向流量檢測攻和限制速率止來自源的攻;基於向後倒推的防禦ddos的路由機制把ddos攻看作擁塞控制問題,添加功能到每個路由器來檢測並優先丟棄可能屬于攻的包,通過向後倒推上級路由器也得到通知而把這樣的包丟棄。
  8. The pursuit of the russian army, on which napoleon laid so much stress, led to an unheard - of result. the french generals lost sight of the sixty thousand men of the russian army, and it was only, in the words of thiers, thanks to the skill, and apparently also the genius, of murat that they succeeded at last in finding, like a lost pin, this army of sixty thousand men

    俄國軍隊是拿破崙非常關心的事,但果造成聞所未聞的怪現象,法國將軍們不知道六萬名俄國軍隊的去向,據梯也爾說,由於繆拉的精明,顯然也由於他的天才,才于像找到根針樣找到了俄國軍隊。
  9. The grade creep of dvd changes to on behalf product, local market originally contain evd with the high and pure dvd two greatest camp opposing camps. the country is beautiful and this time to secretly operate the hdv, not difficult think the elephant, its once depend on the high and pure for form alliancing, hdv with its producing in house of mighty sale terminal and power station the electricity match the usage, and it be heavy to will be doubtless for the evd a shot

    對于dvd的升級換代產品,國內市場本來就有evd和高清dvd兩大陣營對壘。國美此番暗中操作hdv ,不難想象,其旦依靠強大的銷售端與彩電廠家盟,將hdv與其生產的高清彩電配合使用,對于evd無疑將是沉重
  10. Experiment results show that, with the increase of frequency and swing, the dispersing, physical and flame retardant performances are improved greatly, tension strength, impact strength and oxygen index have increased about 32 %, 39 % and 10 %, and finally arrive a steady value

    實驗果表明:隨著振動頻率和振幅的增加,無機阻燃劑的分散性能、製品的力學性能和阻燃性能也會相應增加,拉伸強度、沖強度和氧指數可分別提高約32 % , 39 %和10 % ,但其增加的速度是逐漸減少的,並最達到個穩定值。
  11. Clark has a new move called " shining wizard ", a running grab. his ultra aregentia ' s finish move has changed

    克拉克有新招叫「光明向導」 ,個跑摔,他的超級阿根廷攻出招變化。
  12. Main content of " hef ( high efficient firewall ) firewall realize mode study " have : ( 1 ) emulation experiment and ipv6 / tunnelbroker model set up through transproxy, explain transproxy method, improved structure of rfc3053 emphatically, act for technology about solution of efficiency, make their suitable for different need of isp of scale ; ( 2 ) on the basis of analysing ipsec agreement security question, to isakmpsa varying load attacks and improves in consulting, carry on form analyses, proved, design vpn high - efficient safe model based on ip / ipsec concept finally ; ( 3 ) on the basis of ids dynamic characteristic of system, for remedy firewall static deficiency of defence, design one method that the two combine, offer a good foundation for high - efficient online security system ; ( 4 ) through theory design and emulation experiment, the above - mentioned three part can make and imbed fire wall of the system for module, offer certain theoretical foundation to domestic fire wall design of product

    《 hef ( highefficientfirewall )防火墻實現模式研究》的主要內容有: ( 1 )通過transproxy模擬實驗及ipv6 / tunnelbroker模型建立,著重闡述transproxy方法、改進的rfc3053的構,以及代理技術中有關效率的解決方案,使之適用於不同規模的isp的需要; ( 2 )在分析ipsec協議安全性問題基礎上,針對isakmpsa協商中的變換載荷攻做出改進,並進行形式化分析、論證,最設計出基於ip / ipsec概念的vpn高效安全模型: ( 3 )基於ids系統的動態特性,為彌補防火墻靜態防禦的不足,設計出兩者聯動的方法,探索了高效網路安全體系模式研究的新方向; ( 4 ) hef防火墻實現模式的理論研究及模擬實驗,所得三部分研究論均可設計出module ,內嵌入防火墻系統中,為國內防火墻產品的設計提供了定的理論基礎。
  13. The advantage of our method is its simplicity, practicability and small calculation. we can obtain the bv - distance curve from the results of the breakdown - characteristic simulation of a simple single - ring model. then we can obtain the complete flr termination structure form this curve

    我們的方法優點在於簡單實用,計算量小,通過對個簡單單場限環模型做穿特性模擬得到bv - distance曲線,我們就可以查找得到完整的場限環構。
  14. Then, to facilitate error correction, highly accurate word alternatives are suggested by combining speech data with statistical predictive data. as a result, the desired word can be selected with a minimum number of keystrokes

    然後,為方便糾錯,語音識別數據和統計預測數據合在起,極大地提高了選詞精度,最以最少的鍵次數找到想要的單詞。
  15. While better techniques exist, this is still a highly effective way to narrow a large program of tens or hundreds of thousands of lines into just a few hundred " potential problems. " in a later column, we ll show you a quick - and - dirty scanning tool based on this approach, and give you an idea of how it was built

    服務策略指明應該將請求轉發到哪個(哪些)服務器,以及如何裁決來自這個(這些)服務器的果以做出最響應。策略還定義了外部攻觸發器的標準,代理服務器生成這標準並將其傳遞到自適應重配置模塊( arm ) 。
分享友人