資料入侵 的英文怎麼說

中文拼音 [liàoqīn]
資料入侵 英文
data break-in
  • : Ⅰ名詞1 (錢財; 費用) money; wealth; expenses 2 (資質) intelligence; endowment 3 (資格) quali...
  • : 名詞1 (材料; 原料) material; stuff 2 (喂牲口用的穀物) feed; fodder 3 (料器) glassware 4 (...
  • : Ⅰ動詞1 (進來或進去) enter 2 (參加) join; be admitted into; become a member of 3 (合乎) conf...
  • : Ⅰ動詞(侵入) invade; intrude into; infringe upon Ⅱ形容詞(接近) approaching Ⅲ名詞(姓氏) a surname
  • 資料 : 1. (生產或生活的必需品) means 2. (依據的材料) data; material
  1. Without the permission of you, we will not offer your materials to others, but unenclosed the influence by hacker s attacking, computer virus invading or government control, etc

    在未經您同意之前,本站不會把您的提供給他人。但不包括黑客攻擊計算機病毒或政府管制等不可抗力造成的影響。
  2. Based on large quantities of measured data, the authors obtained two sorts of indices for monitoring seawater encroachment, viz., hydrochemical monitoring indices composed of ratios of characteristic ratios and electrical indices composed of resistivity and chargeability

    摘要根據大量實測,獲得海水監測的2種指標:由特徵離子比值構成的水化學指標;由電阻率和充電率組成的電法指標。
  3. In this paper, the erosional characteristics along the suizhong sarldy coast of the liaodong bay are analyzed by comparing nautical charts in different periods and analyzing remote sensing images and multi - year field monitoring data, and it is shown from the analysis results that the loose coastal sediments and intense coastal dynamic actions are the basic conditions for the recent coastal erosion, and the decrease in terrigenous material discharged into the sea, marine dynamic actions, coastal engineering structures and offshore sand recovery are the main affecting factors for the coastal retrogradation

    摘要通過不同時期海圖對比、分析遙感圖像和多年現場監測,分析了遼東灣綏中沙質海岸蝕的特點,認為海岸組成物質鬆散與海岸動力作用強烈是本區現代海岸蝕的基本條件;陸源物質海量減少、海動力作用、沿岸工程建築和海上采砂是其海岸蝕退的主要影響因素。
  4. The results of combined internal mineral separates and whole - rock sm - nd isochron age for gabbro dikes from : luobusha, angren and xiubugabu in yarlung zangpo ophilite zone are 177ma, 166ma and 173ma respectively. the 4lar - 39ar step heating spectra of rikangba ophiolite suggest that its formation age is also isoma. it indicates that there was a stronger regionally inagmatism during middle - early jurassic, and the time of i75ma was the main period of the magmatic event of yarlung zangpo ophilite

    對鄔郁盆地嘎扎村組火山巖剖面的年代學研究表明,該區后碰撞期火山巖的~ ( 40 ) ar - ~ ( 39 ) ar年齡為12 ? 14ma ,其中的花崗巖脈的~ ( 40 ) ar - ~ ( 39 ) ar年齡為10 . 84ma ,與岡底斯西段前人研究對比,認為岡底斯帶后碰撞火山巖時代有自西向東逐漸年輕的趨勢。
  5. This paper is based on practical drilling data of drilled irruptive rock body in western sha segment of huimin depression, rock body subfacies in this phrase and seismic, electric logging features in pyrolysis metamorphic belt are analyzed, so as to summarize a set of practical methods, which identify drilled various subfacies and irruptive rock top and bottom boundary by cuttings log and drill time logging

    本文以惠民凹陷西部沙三段已鉆遇巖體的實鉆為依據,嘗試性地對沙三段巖體各亞相帶及熱解觸變質帶的地震、電測響應特徵進行研究,總結出一套較為實用的通過巖屑錄井、鉆時錄井手段識別所鉆遇的各亞相帶和進行巖體頂、底界卡定方法,現場應用效果很好。
  6. The genesis and variation characteristics are suggested on the basis of the analysis of typical groundwater hydro - chemical section monitoring, geographical prospection data and hydro - chemical analysis from more than 100 geological cores

    通過對濰河下游地區100餘個地質鉆孔水化學連續監測分析,闡明了鹹水的特徵,有針對性地提出了鹹水的防治措施。
  7. Accordingly, the effective electrolog information and its preprocess become more important in this paper, the dual laterolog data was corrected through the reversion algorithm on the basis of electrolog theory and the minimum mean square principle

    通過電測井的預處理,可提供原狀地層電阻率、沖洗帶地層電阻率以及泥漿濾液半徑等3個參數。
  8. It is up to you to take precautions to ensure that whatever you select for your use is free of such items as viruses, worms, trojan horses and other items of a destructive nature

    您必須自行注意,以確保您所選擇使用的免於病毒bug木馬程式或其他破壞性
  9. For example, a unit of 60 levy spearmen in the barbarian invasion expansion would have been created by using one character model representing a spearmen and one diffuse texture cloned 60 times to form that one unit

    例如,在野蠻人片中,使用一個表示長槍兵的人物模型和一個表面貼圖,克隆60遍,就創建好了一個有60個徵召長槍兵的單位。
  10. Based on the fractal character of the small watershed topographic feature, the spatial and temporal variation character of sediment yield of the watershed model, the dynamic developing process and fractal character of the topog raphic feature of the watershed model, and the coupling relationship between the sediment yield and the topographic feature of the watershed model are " studied by simulate experiment, fractal theory, high precise photogrammetry and gis technology. the validation research is conducted in chabagou watershed where the observation data of rainfall, sediment and runoff for 11 years is collected. the study provides new theory and method for the topographic feature quantitative research in the prediction model of small watershed sediment yield

    本文依據流域地貌形態所具有的顯著分形特徵,從模擬實驗出發,利用分形理論和方法,結合高精度攝影測量和gis技術,對流域模型蝕產沙時空變異特徵、地貌形態發育過程及其相應的分形特徵、流域模型蝕產沙與地貌形態耦合關系進行了深研究,並以具有11年降雨泥沙徑流觀測的岔巴溝流域為例進行了驗證研究,為實現從單坡面蝕產沙模擬、預報向流域蝕產沙模擬、預報轉化過程中地貌形態參數的提取提供了理論和方法,為黃土高原小流域水土流失綜合治理提供了科學實踐依據。
  11. Since the hong kong bird watching society ' s web site was hacked and had data lost, below formed broken links

    由於香港觀鳥會的網站遭駭客,網上新聞組有好些已不可復得。
  12. Trespass, break into, access, use or attempt to trespass, break into, access or use any parts of our servers, andor any data areas for which you have not been authorised by us ; or

    、強行、連接、使用或者企圖、強行、連接或使用我們的伺服器的任何部分,及或未經我們對閣下發出許可的任何區;
  13. Trespass, break into, access, use or attempt to trespass, break into, access or use any other parts of our servers, and or any data areas for which you have not been authorised by us

    、強行、接通、使用或者企圖、強行、接通或者使用本局伺服器的任何其他部分,及/或未經本局對閣下發出許可的任何區;
  14. Trespass, break into, access, use or attempt to trespass, break into, access or use any other parts of our servers, andor any data areas for which you have not been authorised by us

    、強行、接通、使用或者企圖、強行、接通或者使用本局伺服器的任何其他部分,及或未經本局對閣下發出許可的任何區;
  15. We also calculated the invasion integrative analysis index of exotic harmful plants on the basis of the above results, to order to analyze the invasion status and development direction and determine integrative control of exotic harmful plants

    並根據以上,計算了外來有害植物綜合分析指數,分析外來有害植物現狀以及發展趨勢,為綜合治理外來有害植物提供參考
  16. Crimes include hacking, publication of obscene articles, criminal damage in relation to data, and internet shopping fraud

    電腦罪案的種類包括電腦系統(黑客) 、發布淫褻物品、對電腦進行刑事毀壞及網際網路購物詐騙案等。
  17. Crimes include hacking, publication of obscene articles, criminal damage in relation to data, and internet shopping fraud. computers and the internet have indeed become part of our daily lives

    電腦罪案的種類包括電腦系統黑客發布淫褻物品對電腦進行刑事毀壞及網際網路購物詐騙案等。
  18. As we all new, mud filtrate invasion depth and pollution degree are two important parameters in the optimum perforation design. high frequency isoparametric induction logging is able to quantitatively determine the two parameters

    眾所周知,泥漿深度和污染程度是優化射孔設計中的2個重要參數,高頻等參數感應測井可以定量確定這2個參數。
  19. The integrated analyzing and sorting toward ids data, the accurate forecasting of the intruders and common visitors etc, all come down to the multiple data conformity disposal. therefore, it is vitally important to develop a perfect nonlinear conformity disposal method. however, some favorable characters of ann can content these ids working demands perfectly, in additon, the capability of nonlinear mapping of ann also make sure that the system can execute simple or complex classification and save the information into the coefficent of connecting power, maintain the network robust and fault toleration. so more and more people alter one after another their working focus to the nonlinear mathematic model based on the ann in order to resolve the complex problems in ids system much better

    檢測工作屬于分類識別問題,其中存在著大量的非線性問題,對檢測進行綜合分析與分類,準確判別惡意訪問和正常訪問等都涉及到多的整合處理,因此研製理想的非線性整合處理方法是非常必要的,而神經網路由於其內在的對不確定性的學習與適應能力,恰好能滿足檢測工作分類識別的需求,另外神經網路的非線性映射能力也是保證其成功實現各種簡單或復雜分類的主要原因,它將信息分散式存儲于連結權系數中,使網路具有較高的容錯性和魯棒性。
  20. By means of prototype observation, analysis with materials and theories, and laboratory test, the author deeply analyzed the causes and procedure of canal cross section erosion, and obtained eight causes which resulted the canal deform including flow, seepage, runoff, collapse of bank, dry effect, human activity, wave flush, frozen, and then stressed to discuss the frozen process

    本文通過原型觀測、分析、理論分析、室內試驗對北引渠道變形的成因和發生機理進行了較為深的分析研究,給出了造成北引渠道變形的八大原因:流水引起的變形、滲透引起的沖刷、地表徑流引起的沖刷、滑坡變形、乾燥作用、人類和動物活動的影響、風浪引起的沖刷、凍融蝕,並著重闡述了凍融蝕的機理。
分享友人