軟威脅 的英文怎麼說

中文拼音 [ruǎnwēixié]
軟威脅 英文
soft threat
  • : Ⅰ形容詞1 (質地不硬) soft; flexible; supple; pliable 2 (柔和) soft; mild; gentle 3 (軟弱) we...
  • : Ⅰ名詞(從腋下到腰上的部分) the upper part of the side of the human bodyⅡ動詞(脅迫) coerce; force
  1. The potential applications of amr include both civil and military communication, especially non - cooperative communications and communication confrontation, such as identifying signals, supervising signals, distinguishing interference, electronic confrontation, analyzing military threat, etc. on the basis of our analysis to the existing research on feature abstraction, the related feature abstraction methods are optimized in this paper, resulting several effective methods such as the feature abstraction based on transformation domain, stepped voltage level analysis, normalized carrier - free spectral energy analysis, squared signal and fourth powered signal analysis, etc. both the decision theory based on recognition algorithms and the artificial neural network ( ann ) based on recognition algorithms is analyzed, and the former is selected as it is more appropriate for this research

    調制類型的自動識別廣泛應用於民用通信與軍用通信,尤其是對于非合作性通信、通信對抗,比如:信號確認、信號監控、干擾辨識、電子對抗、體無線電、電子救援、通信對抗、軍事分析等。本論文在分析現有研究的基礎上,借鑒了已有的特徵提取方法,對相關調制類型特徵提取方法進行了優化,使用了一些有效的方法,如基於變換域特徵提取方法、梯層電平分析方法、剔除載波后的歸一化頻域能量分析方法、信號平方后的頻譜分析方法、信號四次方后的頻譜分析方法等。通過對基於決策理論和基於人工神經網路兩種識別演算法進行分析,本論文選擇了較適合的基於決策理論的識別演算法。
  2. But while microsoft may be lagging now, analysts say google should still be very nervous. after all, some of microsoft ' s biggest successes have been in technologies it was late to develop - most notably, its now - dominant internet explorer browser, which trounced the original leader, netscape navigator

    更重要的是, google如此受到歡迎,而且其搜索服務這么簡單方便,這都對用戶產生了巨大的吸引力,從而到微在業界的控制地位,使得微的windows和ie都面臨挑戰。
  3. Case in point : the growing threat of malware infections

    例證:正在增長的惡意體感染的
  4. And we must proclaim and make clear our commitment to the peaceful resolution of the differences between the prc and taiwan

    經濟的侵權行為不只對美國企業造成,對中國的體電影與音樂工業也是一樣。
  5. President clinton and secretary albright demonstrated publicly our commitment to the preservation of those basic freedoms in their meetings last week with martin lee, leader of the political party with most representation in hong kong s legislature

    經濟的侵權行為不只對美國企業造成,對中國的體、電影與音樂工業也是一樣。藉著支持保護智慧財產的承諾,中國將提升其未來吸引外資的能力。
  6. The european union has threatened to impose daily fines on microsoft for allegedly violating an antitrust ruling imposed last year

    歐洲聯盟指責美國微公司違反去年做出的一項反托拉斯裁決,說要每天對微科以罰款。
  7. Since security threats evolve over time, we must not only work to create software that is more resilient to today ' s threats, but also watch for new threats and work aggressively to respond to these as they emerge

    因為安全總是隨著時間推移而不斷進化翻新,所以我們必須不但能夠設計應對當今安全的更有彈性的體,而且要留神新型並且在它們嶄露頭腳時候就能主動出擊。
  8. The analytical software can comprehensively detect these ghost images generated by ghost reflections and simulate the energy attenuation process of ghost beam. the position of ghost image can be picked out, the potential hazard of ghost images to key elements can be verified, and the irradiance at ghost image and key elements can be described

    編制的專門的雜散光分析體能全面捕捉系統中激光束多次殘余反射產生的鬼像,並模擬鬼光束的能量衰減過程,從而找出對光學元件及系統性能存在的鬼像,確定其位置,同時對各光學元件特別是關鍵元件處的能量密度與元件的穩定性進行描述。
  9. Our competitors for iq are investment banks such as goldman sachs and morgan stanley.

    所以反倒是投資銀行領域的高智商企業,如goldman sachs和摩根士丹利對微構成了
  10. This essay analyzed the structural defections of soft strength development in china, from exploring the fundamentational concept and its mutual relations, it pointed out the relativivity of the unbalance of the strength and new round " china threat ", and brought forward the strategic idea and targetting location of developing soft strength in china

    摘要本文從探討硬力量和力量的基本概念及其相互關系入手,分析中國力量發展的結構性缺陷,指出這種力量失衡與新一輪「中國論」產生的相關性;進而根據中國國情和其他大國的歷史經驗,提出中國發展力量的戰略設想和目標定位。
  11. " our nation enters this conflict reluctantly, yet our purpose is sure. the people of the united states and our friends and allies will not live at the mercy of an outlaw regime that threatens the peace with weapons of mass murder

    美國並不願意這場沖突發生,然而我們的目標是明確的,美國人民我們的盟友不會對一個非法的政權心慈手,這個政權正使用大規模殺傷性武器世界和平。
  12. The specification of threat judgement software module for naval surface combat ship command and control system

    水面艦艇指控系統.判斷體模塊規范
  13. Anti - virus and anti - malware software is useful, but as we know, virus signature files must be continually updated to keep a / v software aware of new threats

    反病毒和反病毒體是有益的,但我們都知道,病毒簽名文件必須不斷更新,以保持音頻/視頻體意識到新的
  14. Such is the intensity of the holy war between screwcap and natural cork factions that, as taber chronicles, it precipitated the resignation this year of the british wine trade weekly ' s editor, has led to absurd claims that the rise of screwcaps was a threat to iberian eagles, which nest in cork forests, and has even provoked an intervention from prince charles arguing the case for natural corks on environmental grounds, although the prince, as taber points out, “ may never personally have pulled a cork in his life ”

    金屬螺紋瓶蓋與天然木塞之間的戰爭頗為激烈,正如坦納的記載所顯示,這不僅促使今年某家英國葡萄酒貿易周刊的主編辭職,還導致民間流傳一些荒謬的說法,螺紋瓶蓋的發展對棲息在木森林的伊比利亞鷹構成,甚至還有查爾斯王子出面干預,表示出於環保理由提倡使用天然木塞,不過正如坦納指出的那樣,查爾斯王子「一生中可能從來沒有親自拔過木塞」 。
  15. The essay chose asia - bridge software enterprise as an example. because more and more talent people left the enterprise, which weaken the stability and lowered their products, even threaten the existence and development of the enterprise

    本文選擇的樣本企業?亞橋體,由於人員流失率過高,使得企業穩定性差、整體績效下降,甚至到企業的生存與發展。
  16. Consumers cut spending as the economy weakened and after the iraqi invasion of kuwait on aug. 2raised the specter of war, inflating prices of gasoline and heating oil

    由於經濟疲,同時在伊拉克八月入侵科特引發了戰爭的,因而汽油及取暖燃油漲價以後,消費者乃減少開支。
  17. The developerworks columns by gary and john have been updated and expanded in the book building secure software, which also includes plenty of new material

    ,在那裡, gary和john描述了高水平的緩沖區溢出攻擊,並討論了緩沖區溢出是體安全最大的原因
  18. According to the needs to debug and test the device in laboratory, i bring up a scheme for adding a usb communication interface module in the laser warning device. then i describe how to design and implement this module. the module uses the ez - usb fx series chipset made by cypress as the central component

    本論文在介紹了激光告警器的通信方式的基礎上,針對其在實驗室進行調試與測試的具體需要,提出了在激光告警器上加裝usb通信介面模塊的實現方案;詳細介紹了採用美國cypress公司的ez - usbfx系列晶元作為核心器件的usb通信介面模塊的設計與實現,包括模塊硬體設計、模塊的固件和主機端應用體開發的技術細節,並且對usb通信介面模塊的調試與測試做了相當的描述。
  19. " with the support and approval of the legislature, the hong kong government has allocated funding for investment in both the hardware and software needed to fortify public health infrastructure to prepare for the resurgence of sars and other potential public health threats, " he said

    他說:有賴立法機構的支持及批準,香港政府已經撥款加強投資于公共健康架構的硬體及體建設,以防禦一旦沙士重臨及其他對公共健康有的疾病侵襲。
  20. This thesis bases on the actual need that ensures high - efficient operation of military political work information system and advances the informatization construction of military political work. being directed against the characteristics of the military political work information system and current situation of the development, the article carried on the discussion from four respects of the safe protection : database, network, application software and physics. on the basis of having analyzed on security questions and threats in detail, the article has proposed a series of safeguard procedures separately

    本論文立足於保障我軍政治工作信息系統的高效運轉、推進我軍政治工作信息化建設的現實需要,針對我軍政治工作信息系統的特點和現狀,從政治工作信息系統的數據庫安全防護、網路安全防護、應用體安全防護以及物理安全防護四個方面進行探討,在詳細分析了各自存在的安全問題和面臨的安全的基礎上,有針對性地提出了一系列安全防護措施。
分享友人