進攻弱點 的英文怎麼說

中文拼音 [jìngōngruòdiǎn]
進攻弱點 英文
hit a blot
  • : 進構詞成分。
  • : Ⅰ動詞1 (攻打) attack; assault; take the offensive 2 (指責別人的過錯; 駁斥別人的議論) accuse; ...
  • : Ⅰ形容詞1 (氣力小; 勢力差) weak; feeble 2 (年幼) young 3 (差; 不如) inferior 4 (接在分數或...
  • : Ⅰ名詞1 (液體的小滴) drop (of liquid) 2 (細小的痕跡) spot; dot; speck 3 (漢字的筆畫「、」)...
  • 進攻 : attack; assault; offensive
  1. That is to say, we should tell the red army and the people in the base area clearly, resolutely and fully that the enemy ' s offensive is inevitable and imminent and will do serious harm to the people, but at the same time, we should tell them about his weaknesses, the factors favourable to the red army, our indomitable will to victory and our general plan of work

    這即是說,明確、堅決而充分地告訴紅軍人員和根據地的人民,關于敵人的必然性和迫切性,敵人危害人民的嚴重性,同時,關于敵人的,紅軍的優良條件,我們一定要勝利的志願,我們工作的方向等。
  2. We laid special stress on analyzing the secure development of web. to design a secure web system, an secure enhanced model was build, which we called ira model

    接著對web體系結構各環節的脆行深入分析,介紹可能遭到的擊類型和具體方法,並在此基礎上提出了增強安全web系統解決方案。
  3. Netradar system is an important research subject in the area of internet security. it ' s aim is to detect the foundational terminals of and the route to a certain aimed intranet ; to scan the softwares that run on the terminals ; to find the services which are provided by the terminals ; to determine the vulnerabilities of the services and the distribution of the vulnerabilities. ater all the above have fmished, the netrada system attacks the vital terminals or the vulnerable terminals and controls them automatically

    網路雷達系統( netradar )是網路安全領域的一個研究課題,該課題的研究目標包括三個方面:探測接入internet的特定目標網路的基礎設施、到達該目標網路的路徑;掃描支撐目標網路運行的軟體實體的類型、提供的服務、探測出其軟體實體的漏洞和脆分佈等信息;根據目標網路的基礎設施構架、拓撲信息、漏洞和脆分佈等信息,有針性對的選取關鍵設備或者防護較的設備擊與控制。
  4. The lakers rallied to take an 80 - 79 lead, but iverson drove the lane, and when two lakers collapsed on him, he kicked the ball to eduardo najera, who hit a 3 - pointer

    湖人球員多開花,在比分上以一分的微優勢領先掘金的79分。艾弗森帶球突入內線,在遭遇到兩名對手的包夾后將球分給隊友,助納胡拉投一記三分球。
  5. But, though considerable process has been made in the last ten years, digital watermarking is still in its infancy, and much interesting work remains to be done this thesis addresses some problems in the gray - scale image digital watermarking that are summarized below : 1 ) whereas the basic theory of digital watermarking is still very poor, a digital watermarking mathematic model based on imperceptibility and robustness is presented by analysising the characteristic of digital watermarking ; 2 ) based on the model constructed above, by defining the measures of capacity and robustness of digital watermarking, an objective method for evaluating the digital watermarking is introduced and used to analysis some algorithms ; 3 ) whereas geometric distortion always influences the restoration of watermark, we advocate to enhance the robustness against geometric distortion by restoring the image which has been distorted by geometric transformation, and a method is designed for estimating the parameters of geometric transformation ; 4 ) based on the conclusion discussed above, and combined with the masking effects of hvs, a novel public meaningful gray - scale image digital watermarking is designed by analysising the characteristics of image gray - scale interpolation and haar wavelet transformation. the experimental results show that the method is indeed powerful ; 5 ) whereas many image digital watermarking schemes, which embed watermark by modifying the values of pixels in spatial domain and transformed domain, are confronted with the conflict between the imperceptibility and robustness, we advocated to use some stable digital characteristics of host image as watermark and a algorithm based on hermite matrix is designed

    本文重對灰度圖象數字水印技術行研究,主要工作如下: 1 )鑒于目前數字水印的理論研究比較薄的現狀,本文通過分析數字水印的特,建立了一個數字水印的數學模型,為一步研究數字水印打下了基礎; 2 )根據以上建立的模型,通過引入容量和穩健度的概念為數字水印提供了一個客觀評價方法,並對一些數字水印演算法行了分析; 3 )為增強數字水印抵抗幾何擊的能力,研究了受幾何擊的圖象的復原問題,並給出了一個計算圖象幾何變換參數的方法; 4 )通過分析圖象灰度插值演算法和haar小波變換的特,結合hvs的掩蔽效應,設計了一個公開的有意義數字水印演算法,實驗結果表明本演算法具有較強的穩健性; 5 )目前許多水印演算法都是通過在空域或頻域修改象素值的方法嵌入水印的,這種方法面臨著透明性和穩健性的矛盾,為解決這個矛盾,本文提出以圖象的某些穩定的數字特徵為水印的觀,並結合hermite矩陣的特設計了相應的水印演算法,實驗結果表明該演算法具有較好的穩健性。
  6. Finally, we proposed a novel improved self - adaptive algorithms and testified its combining encryption effect with its position and energy information. in part two of this thesis, we analyze the dynamic states of an image caused by image iteration, as a result we point out that the holographicity exists with chaotic characters simultaneously during image scrambling

    隨后,我們分析純位置移動演算法的並作了改,給出了一種新的自適應圖像置亂加密演算法,經過本演算法加密的圖像可以有效地防止已知明文的擊,並具有很好的完整性保護功能,亦可用於圖像驗證。
  7. After summarizing related researches on computer go, we make thorough study on some key problems in this dissertation. the innovative points are as follows : 1 , influence model is constructed to scale the influence that stones make, to estimate the areas of two players, and to divide stones into groups. according to the game situation evaluation based on influence model, the system can choose the key position of attack or defense

    本文在對相關文獻行了全面綜述后,圍繞計算機圍棋中的若干關鍵問題行了深入研究,主要的創新性內容如下: 1 ,建立棋子的影響模型,將棋子向棋盤其它部分輻射的影響量化,從而判斷對弈雙方的控制領域,並據此將棋子分塊,組成戰斗的基本單位,通過對棋塊強程度的分析,產生防著
  8. Palpatine has long since recognized these vulnerabilities and as of attack of the clones, is clearly manipulating them

    帕爾帕丁早已意識到這些,而且到《克隆人的》為止,他很明顯地熟練地利用著阿納金的這些
分享友人