資料入侵 的英文怎麼說
中文拼音 [zīliàorùqīn]
資料入侵
英文
data break-in- 資 : Ⅰ名詞1 (錢財; 費用) money; wealth; expenses 2 (資質) intelligence; endowment 3 (資格) quali...
- 料 : 名詞1 (材料; 原料) material; stuff 2 (喂牲口用的穀物) feed; fodder 3 (料器) glassware 4 (...
- 入 : Ⅰ動詞1 (進來或進去) enter 2 (參加) join; be admitted into; become a member of 3 (合乎) conf...
- 侵 : Ⅰ動詞(侵入) invade; intrude into; infringe upon Ⅱ形容詞(接近) approaching Ⅲ名詞(姓氏) a surname
- 資料 : 1. (生產或生活的必需品) means 2. (依據的材料) data; material
-
Without the permission of you, we will not offer your materials to others, but unenclosed the influence by hacker s attacking, computer virus invading or government control, etc
在未經您同意之前,本站不會把您的資料提供給他人。但不包括黑客攻擊計算機病毒侵入或政府管制等不可抗力造成的影響。Based on large quantities of measured data, the authors obtained two sorts of indices for monitoring seawater encroachment, viz., hydrochemical monitoring indices composed of ratios of characteristic ratios and electrical indices composed of resistivity and chargeability
摘要根據大量實測資料,獲得海水入侵監測的2種指標:由特徵離子比值構成的水化學指標;由電阻率和充電率組成的電法指標。In this paper, the erosional characteristics along the suizhong sarldy coast of the liaodong bay are analyzed by comparing nautical charts in different periods and analyzing remote sensing images and multi - year field monitoring data, and it is shown from the analysis results that the loose coastal sediments and intense coastal dynamic actions are the basic conditions for the recent coastal erosion, and the decrease in terrigenous material discharged into the sea, marine dynamic actions, coastal engineering structures and offshore sand recovery are the main affecting factors for the coastal retrogradation
摘要通過不同時期海圖對比、分析遙感圖像和多年現場監測資料,分析了遼東灣綏中沙質海岸侵蝕的特點,認為海岸組成物質鬆散與海岸動力作用強烈是本區現代海岸侵蝕的基本條件;陸源物質入海量減少、海動力作用、沿岸工程建築和海上采砂是其海岸蝕退的主要影響因素。The results of combined internal mineral separates and whole - rock sm - nd isochron age for gabbro dikes from : luobusha, angren and xiubugabu in yarlung zangpo ophilite zone are 177ma, 166ma and 173ma respectively. the 4lar - 39ar step heating spectra of rikangba ophiolite suggest that its formation age is also isoma. it indicates that there was a stronger regionally inagmatism during middle - early jurassic, and the time of i75ma was the main period of the magmatic event of yarlung zangpo ophilite
對鄔郁盆地嘎扎村組火山巖剖面的年代學研究表明,該區后碰撞期火山巖的~ ( 40 ) ar - ~ ( 39 ) ar年齡為12 ? 14ma ,侵入其中的花崗巖脈的~ ( 40 ) ar - ~ ( 39 ) ar年齡為10 . 84ma ,與岡底斯西段前人研究資料對比,認為岡底斯帶后碰撞火山巖時代有自西向東逐漸年輕的趨勢。This paper is based on practical drilling data of drilled irruptive rock body in western sha segment of huimin depression, rock body subfacies in this phrase and seismic, electric logging features in pyrolysis metamorphic belt are analyzed, so as to summarize a set of practical methods, which identify drilled various subfacies and irruptive rock top and bottom boundary by cuttings log and drill time logging
本文以惠民凹陷西部沙三段已鉆遇侵入巖體的實鉆資料為依據,嘗試性地對沙三段侵入巖體各亞相帶及熱解觸變質帶的地震、電測響應特徵進行研究,總結出一套較為實用的通過巖屑錄井、鉆時錄井手段識別所鉆遇的各亞相帶和進行侵入巖體頂、底界卡定方法,現場應用效果很好。The genesis and variation characteristics are suggested on the basis of the analysis of typical groundwater hydro - chemical section monitoring, geographical prospection data and hydro - chemical analysis from more than 100 geological cores
通過對濰河下游地區100餘個地質鉆孔水化學連續監測資料分析,闡明了鹹水入侵的特徵,有針對性地提出了鹹水入侵的防治措施。Accordingly, the effective electrolog information and its preprocess become more important in this paper, the dual laterolog data was corrected through the reversion algorithm on the basis of electrolog theory and the minimum mean square principle
通過電測井資料的預處理,可提供原狀地層電阻率、沖洗帶地層電阻率以及泥漿濾液侵入半徑等3個參數。It is up to you to take precautions to ensure that whatever you select for your use is free of such items as viruses, worms, trojan horses and other items of a destructive nature
您必須自行注意,以確保您所選擇使用的資料免於病毒bug木馬程式或其他破壞性入侵。For example, a unit of 60 levy spearmen in the barbarian invasion expansion would have been created by using one character model representing a spearmen and one diffuse texture cloned 60 times to form that one unit
例如,在野蠻人入侵資料片中,使用一個表示長槍兵的人物模型和一個表面貼圖,克隆60遍,就創建好了一個有60個徵召長槍兵的單位。Based on the fractal character of the small watershed topographic feature, the spatial and temporal variation character of sediment yield of the watershed model, the dynamic developing process and fractal character of the topog raphic feature of the watershed model, and the coupling relationship between the sediment yield and the topographic feature of the watershed model are " studied by simulate experiment, fractal theory, high precise photogrammetry and gis technology. the validation research is conducted in chabagou watershed where the observation data of rainfall, sediment and runoff for 11 years is collected. the study provides new theory and method for the topographic feature quantitative research in the prediction model of small watershed sediment yield
本文依據流域地貌形態所具有的顯著分形特徵,從模擬實驗出發,利用分形理論和方法,結合高精度攝影測量和gis技術,對流域模型侵蝕產沙時空變異特徵、地貌形態發育過程及其相應的分形特徵、流域模型侵蝕產沙與地貌形態耦合關系進行了深入研究,並以具有11年降雨泥沙徑流觀測資料的岔巴溝流域為例進行了驗證研究,為實現從單坡面侵蝕產沙模擬、預報向流域侵蝕產沙模擬、預報轉化過程中地貌形態參數的提取提供了理論和方法,為黃土高原小流域水土流失綜合治理提供了科學實踐依據。Since the hong kong bird watching society ' s web site was hacked and had data lost, below formed broken links
由於香港觀鳥會的網站遭駭客入侵,網上新聞組有好些資料已不可復得。Trespass, break into, access, use or attempt to trespass, break into, access or use any parts of our servers, andor any data areas for which you have not been authorised by us ; or
侵入、強行入侵、連接、使用或者企圖侵入、強行入侵、連接或使用我們的伺服器的任何部分,及或未經我們對閣下發出許可的任何資料區;Trespass, break into, access, use or attempt to trespass, break into, access or use any other parts of our servers, and or any data areas for which you have not been authorised by us
侵入、強行入侵、接通、使用或者企圖侵入、強行入侵、接通或者使用本局伺服器的任何其他部分,及/或未經本局對閣下發出許可的任何資料區;Trespass, break into, access, use or attempt to trespass, break into, access or use any other parts of our servers, andor any data areas for which you have not been authorised by us
侵入、強行入侵、接通、使用或者企圖侵入、強行入侵、接通或者使用本局伺服器的任何其他部分,及或未經本局對閣下發出許可的任何資料區;We also calculated the invasion integrative analysis index of exotic harmful plants on the basis of the above results, to order to analyze the invasion status and development direction and determine integrative control of exotic harmful plants
並根據以上資料,計算了外來有害植物綜合分析指數,分析外來有害植物入侵現狀以及發展趨勢,為綜合治理外來有害植物提供參考資料。Crimes include hacking, publication of obscene articles, criminal damage in relation to data, and internet shopping fraud
電腦罪案的種類包括入侵電腦系統(黑客) 、發布淫褻物品、對電腦資料進行刑事毀壞及網際網路購物詐騙案等。Crimes include hacking, publication of obscene articles, criminal damage in relation to data, and internet shopping fraud. computers and the internet have indeed become part of our daily lives
電腦罪案的種類包括入侵電腦系統黑客發布淫褻物品對電腦資料進行刑事毀壞及網際網路購物詐騙案等。As we all new, mud filtrate invasion depth and pollution degree are two important parameters in the optimum perforation design. high frequency isoparametric induction logging is able to quantitatively determine the two parameters
眾所周知,泥漿侵入深度和污染程度是優化射孔設計中的2個重要參數,高頻等參數感應測井資料可以定量確定這2個參數。The integrated analyzing and sorting toward ids data, the accurate forecasting of the intruders and common visitors etc, all come down to the multiple data conformity disposal. therefore, it is vitally important to develop a perfect nonlinear conformity disposal method. however, some favorable characters of ann can content these ids working demands perfectly, in additon, the capability of nonlinear mapping of ann also make sure that the system can execute simple or complex classification and save the information into the coefficent of connecting power, maintain the network robust and fault toleration. so more and more people alter one after another their working focus to the nonlinear mathematic model based on the ann in order to resolve the complex problems in ids system much better
入侵檢測工作屬于分類識別問題,其中存在著大量的非線性問題,對入侵檢測資料進行綜合分析與分類,準確判別惡意訪問和正常訪問等都涉及到多資料的整合處理,因此研製理想的非線性整合處理方法是非常必要的,而神經網路由於其內在的對不確定性的學習與適應能力,恰好能滿足入侵檢測工作分類識別的需求,另外神經網路的非線性映射能力也是保證其成功實現各種簡單或復雜分類的主要原因,它將信息分散式存儲于連結權系數中,使網路具有較高的容錯性和魯棒性。By means of prototype observation, analysis with materials and theories, and laboratory test, the author deeply analyzed the causes and procedure of canal cross section erosion, and obtained eight causes which resulted the canal deform including flow, seepage, runoff, collapse of bank, dry effect, human activity, wave flush, frozen, and then stressed to discuss the frozen process
本文通過原型觀測、資料分析、理論分析、室內試驗對北引渠道變形的成因和發生機理進行了較為深入的分析研究,給出了造成北引渠道變形的八大原因:流水引起的變形、滲透引起的沖刷、地表徑流引起的沖刷、滑坡變形、乾燥作用、人類和動物活動的影響、風浪引起的沖刷、凍融侵蝕,並著重闡述了凍融侵蝕的機理。分享友人