自傳自攻 的英文怎麼說

中文拼音 [zhuàngōng]
自傳自攻 英文
self-toss and attack
  • : Ⅰ代詞(自己) self; oneself; one s own Ⅱ副詞(自然;當然) certainly; of course; naturally; willin...
  • : 傳名詞1 (解釋經文的著作) commentaries on classics 2 (傳記) biography 3 (敘述歷史故事的作品)...
  • : Ⅰ動詞1 (攻打) attack; assault; take the offensive 2 (指責別人的過錯; 駁斥別人的議論) accuse; ...
  • 自傳 : autobiography自傳體 the autobiographical type; autobiography
  1. In an asw mission a platform is tasked to classify, localize, and potentially attack a suspected threat detected by ownship ' s sensors or by sources external to ownship

    在一個asw任務里一個平臺的任務是分類、定位和潛伏地擊一個己船隻的感器探測到的或者是外部來源探測到的可疑威脅。
  2. Introduction : game on : the legendary figure indianan jones will win their treasures, started adventure

    略:游戲介紹:奇式的人物印地安納瓊斯將奪取己的寶藏,開始大冒險吧!
  3. So security and safeguarding of information on computer networks has become one of the most import problems, because of the diversity of network ' s connection, the asymmetry of terminal ' s distribution, the interconnection of computer and the attack of hacker, cracker and vicious software. it is more important for military ' s automation commanding network and banks whose network communicates sensitive data. thus we should apply sufficient safeguarding to these networks, otherwise the computer network will be useless, even jeopard the national security

    但由於計算機網路具有連接形式多樣性、終端分佈不均勻性和網路的開放性、互連性等特徵,致使網路易受黑客、駭客、惡意軟體和其它不軌的擊,所以網上信息的安全和保密是一個至關重要的問題。對于軍用的動化指揮網路和銀行等輸敏感數據的計算機網路系統而言,其網上信息的安全和保密尤為重要。因此,上述的網路必須有足夠強的安全措施,否則該網路將是個無用、甚至會危及國家安全的網路。
  4. The new software named " d - gun " for ddos is carried out, which completed in windows 2000 and rethat linux. three characteristics of d - gun are lied out. first, it can complete all steps of attack automatically ; secondly, it support a lot of method of ddos, especially support echo attack method and pulsant attack method

    本課題開發完成了一個獨立的分散式拒絕服務擊軟體,開發平臺是windows2000和redhatlinux ,其特色是跨平臺播,動實現ddos擊的全步驟;支持多種擊模型,特別是構造了反射拒絕服務擊和脈動擊模型,擊強度高且難追溯;有一定繞過防火墻的能力。
  5. The game was in slovakia, the goal a header from a left - wing cross

    比賽在斯洛伐克進行,助左邊路的中。
  6. Denial of service attacks ( dos ) use a networked computer or computers to bombard another networked computer or server communication traffic with the intention of disrupting or rendering the latter inoperable, or enabling unauthorized access

    妨礙信息送的擊是利用一部或多部聯網電腦連珠炮發地向另一部聯網電腦或伺服器送大量資料,意圖擾亂其運作、令其無法運作或擅接達。
  7. Specification for self - tapping screws and metallic drive screws

    螺釘及金屬動螺釘規范
  8. Thread forming and thread cutting tapping screws and metallic drive screws, inch series

    螺釘絲螺釘和金屬動螺桿
  9. Newly released and custom written keyloggers designed for specific attacks, will not normally be blocked by conventional signature detection methods

    最新釋放的殊特了為及以的擊目的而採取定義編寫設計器取竊碼密的,將很難通過統的特徵碼偵測方較。
  10. Clinton hasn ' t the slightest doubt that he ' s the victim of a gop attack machine that announced on capitol hill its intention to impeach him long before he gave them the monica lewinsky story to exploit

    柯林頓堅信己是共和黨宣擊機器的犧牲品,他們早在利用他和萊溫斯基的事大做文章之前,就在國會山宣布了要彈劾他的打算。
  11. Graduated from agriculture dept. of beijing agriculture university ( current china agriculture university ) in 1958. is engaged in the crops heredity breeding scientific research for 42 years, and she attains the national province department successively, the city scientific research achievement 12 items years, including a national invention third prize item, publishes research paper 15 in province several above publications. from 1991 until now, continuously two sessions are awarded shandong province by the shandong province government the specialized technical best pick of the crop talented person

    1958年北京農業大學(現中國農業大學)農學系畢業,從事作物遺育種科學研究42年,先後承擔國家「六五」 、 「七五」 、 「八五」 、 「九五」重點科技關研究課題及國際原子能機構合作研究項目,先後獲國家省部、市科研成果12項,其中國家發明三等獎一項,在省幾以上刊物發表研究論文15篇,1991年至今,連續兩屆被山東省政府授予山東省專業技術拔尖人才, 1991年,首批被批準獲國務院政府特殊津貼, 1993年被評為山東省三八紅旗手,巾幗科技先進工作者,山東省優秀科技工作者, 1995年被山東省政府授予山東省勞動模範稱號, 1998年榮獲全國五一勞動獎章。
  12. First of all, we bring forward the basic project of tadil, which adapts to combined operations. it is suggested to use tdma ( the abbreviation of time division multiple access ) as the working pattern and utilize the concept of mobile ad hoc network to construct the data link network. aiming at the impact of time delay on data link and the characteristic of cooperative combat under the command of director aircraft, this thesis applies a kind of kalman filtering algorithm in polar coordinates to compensate the error of time delay, and then does the transformation of target motion parameters to obtain the current information of target

    本文結合空軍裝備部某「十五」預研課題,圍繞著戰術數據鏈、多機協同多目標擊、超機動擊、空對地擊這四個方面展開了一系列的研究工作:本文首先給出了適應三軍聯合作戰的戰術數據鏈系統的基本方案,建議採用時分多址的工作模式,並利用移動組織網路的概念構建數據鏈網路,同時針對數據鏈輸信息的時間延遲特性和指揮機指揮下的多機協同作戰特點,應用一種極坐標系下的卡爾曼濾波演算法對該輸延遲誤差進行補償,並在此基礎上進行目標運動參數的轉換,以獲得目標相對于某無人機的當前運動信息,且利用模擬驗證了方法的有效性。
  13. His appearance in the flesh ended the rumors about his death.

    他親露面使說他死亡的謠言不滅。
  14. Ballack demonstrated his immense commitment by dispossessing steven davis in the 32nd minute and turned quickly to whip the ball in from the right, with lampard heading home his seventh goal of the season

    第32分鐘晃過史蒂夫戴維斯,然後迅速轉身將球從右側中,助蘭帕德頭球門完成了他在本賽季的第七顆進球,一連串動作里,巴拉克展示了己無窮的潛力。
  15. His appearance in the flesh ended the rumours about his death

    他親露面使說他死亡的謠言不
  16. 003601211 ) and hebei province ' s tackling key problem plan " the study of agv accurate navigation used in material automation transportation " ( no. 00547001d - 18 ). this thesis mainly focuses on the stereo vision technique used for the mobile robot, the main work includes : 1

    在天津市然科學基金「面向復雜任務的移動機器人系統技術研究」 (項目編號: 003601211 )和河北省關計劃「用於物料輸的主車精確導航的研究」 (項目編號: 00547001d - 18 )的支持下,本文對移動機器人的立體視覺技術進行了較為系統深入的研究,本文的主要工作包括: 1
  17. With the increasing sophistication, diversification and automatization of network attack tricks, traditional intrusion detection systems ( ids ) ca n ' t any longer meet the need of security

    隨著網路擊手段的日益復雜化、多樣化和動化,統的入侵檢測系統( ids )已不能滿足安全需求。
  18. Japan had offered little until then but they almost sneaked a goal when gilberto silva very nearly turned akira kaja ' s cross into his own net after the right - back had been slipped in by mitsuo ogasawara

    第24分鐘:直到現在日本還很少有進的機會,但他們差點就率先進球,小笠原滿男晃過右後衛,加地亮的中險些被吉爾伯托?席爾瓦撞入家大門。
  19. It reframes the traceback problem as a polynomial reconstruction problem, and uses techniques from algebraic coding theory to provide robust methods of transmission and restriction. the scheme is a new solution to the traceback problem during a dos attack ; the honeypot for ddos, which is a tool of traceback, lures the attacker to believe that he successfully compromised a slave for his needs, convincingly simulating the architecture of a potential ddos attack ; the source - based approach to ddos defense, which is a useful adjunt to traceback systems, deploys a ddos defense system at source - end networks. attacks are detected by monitoring two - way traffic flows, and the attacks originating from source networks are stopped by rate - limiting ; the routing mechanism based on pushback treats ddos attacks as a congestion - control problem

    最後,就有關ddos擊反向追蹤問題,從四個方面對其解決方案進行了研究:在分析比較幾種反向追蹤演算法的基礎上,著重研究了代數方法編碼反向追蹤信息的方案,該方案把追蹤重構問題當作多項式重構問題,使用代數編碼理論技術提供魯棒的送和重構方法,是dos擊過程中的反向追蹤問題的一種新的解決方法; ddos陷阱作為反向追蹤的工具,引誘擊者相信己成功與所需的傀儡主機通話,令人信服地模擬出潛在ddos擊體系結構;基於源的ddos防禦方法作為反向追蹤有用的補充,將防禦系統部署在源網路,通過監控雙向流量檢測擊和限制速率終止來源的擊;基於向後倒推的防禦ddos的路由機制把ddos擊看作擁塞控制問題,添加功能到每個路由器來檢測並優先丟棄可能屬于擊的包,通過向後倒推上級路由器也得到通知而把這樣的包丟棄。
  20. Cole ' s autobiography is expected to contain severe criticism of his boyhood club, with the 25 - year - old still holding a grudge against the gunners hierarchy for the distasteful events of last season when he was found guilty of an illegal approach to london rivals chelsea

    科爾德披露了對於他年少踢球的俱樂部嚴厲的擊,這名25歲的球員仍然成為槍手中被懷疑的對象因為上賽季那次與倫敦死敵切爾西的觸犯法律的接觸。
分享友人