辨別操作 的英文怎麼說

中文拼音 [bānbiécāozuò]
辨別操作 英文
discriminated operant
  • : Ⅰ動詞(辨別; 分辨; 明察) distinguish; discriminate; differentiate; recognize Ⅱ名詞(姓氏) a surname
  • : 別動詞[方言] (改變) change (sb. 's opinion)
  • : Ⅰ動詞1 (抓在手裡; 拿; 掌握) hold; grasp 2 (做; 從事) act; do; operate 3 (用某種語言、方言說...
  • 辨別 : differentiate; distinguish; discriminate
  • 操作 : 1 (按照一定的程序和技術要求進行活動) operate; manipulate; handle 2 (所進行的若干連續生產活動的...
  1. Because authentication is apart from data transpoart later and the authentication has no time stamp or nonce, when received information the bluetooth device does n ' t tell from the information is new or out of date. so authentication is easy attacked by so called middle man. we may solve this by introduce time idea at authentication. one is operate the bluetooth device address and bluetooth clock and take the value as bluetooth device, the other is start a timer at authentication

    由於鑒權過程和後面的數據傳輸是分開的,同時鑒權過程又沒有時間戳或現時,藍牙設備收到信息后不能所收到的信息是新的信息還是過時的信息,所以鑒權過程易受「中間人」攻擊。可以在鑒權過程中引入時間概念,一是將藍牙時鐘與藍牙設備地址進行某些后的值為鑒權時的藍牙設備地址輸入;二是在鑒權開始時啟動定時器。
  2. This paper has a further study on the key technology called validity maintenance mechanism in semantic feature modeling in order to maintain the intent of designers and satisfy them. the method combines geometry model and semantic feature modeling, setting up new feature representation 、 cell element naming and identification method. in the meantime, a history - independence interactive feature boundary re - evaluation algorithm is presented based on feature editing. moreover, the validity recovery mechanism after invalid feature operation can maintain the original feature model. the above ideas have been realized on hust - caid ( computer aided industry design system developed by harbin university of science and technology ) preliminarily

    為了能夠正確地維護設計者的設計意圖和滿足用戶的需求,本文在原有造型的基礎上對語義特徵造型中的關鍵技術即有效性維護機制進行深入的研究,將幾何模型,語義特徵模型結合起來統一進行研究,建立了語義特徵造型在產品模型設計過程中特徵表示方法的新理論、細胞元素命名方法和機制,同時對系統原有特徵編輯過程進行了研究,提出了獨立於歷程樹的特徵邊界重構演算法以及模型無效時的有效性恢復方法。
  3. Intrusive action or the illegal operation of possibly occurring is distinguished to the various states that the main engine intruding checkout system can monitor the main engine at real time, and voluntarily stops the illegal operation when intruding the action to occur, and the protection main engine system is not intruded

    摘要主機入侵檢測系統可以實時監測主機的各種狀態,可能發生的入侵行為或非法,在入侵行為發生的時候自動阻斷非法,保護主機系統不受入侵。
分享友人