過客病毒 的英文怎麼說

中文拼音 [guòbìng]
過客病毒 英文
passenger virus
  • : 過Ⅰ動詞[口語] (超越) go beyond the limit; undue; excessiveⅡ名詞(姓氏) a surname
  • : Ⅰ名詞1 (疾病; 失去健康的狀態) illness; sickness; disease; malum; nosema; malady; morbus; vitium...
  • : Ⅰ名詞1 (對生物體有害的性質或物質; 毒物) poison; toxin 2 (毒品) drug; narcotics 3 (姓氏) a s...
  • 過客 : passing traveller; transient guest
  • 病毒 : [醫學] virus; inframicrobe (濾過性)
  1. I am a local middle school teacher, the ex - husband also am some big company customer manager, our day passes happily contently, may about 05 years march, always feel the lower part of the body a little itches, but also has the unusual smell, i then arrived the local big hospital to make a comprehensive inspection, crossed several days me to go to the hospital to take the chemical examination result, analyzed the teacher to tell me possibly a question, was called me to consult urology department doctor, i took the lab test report to doctor looked, he said you did not have cleanliness contact, you diagnosed have suffered from the person papilloma virus, was named incisive condyloma

    我是當地一所中學教師,前夫也是某大公司戶經理,我們的日子得幸福美滿,可在05年3月份左右,總是感覺下身有點癢,還有異味,我便到當地大醫院做了一個全面檢查,了幾天我去醫院取化驗結果,化驗師告訴我可能有一點問題,叫我去咨詢一下泌尿科醫生,我把化驗單拿給醫師看了,他說你是不是有不潔性接觸,你確診患上了人乳頭瘤,俗稱尖銳濕疣
  2. Object model guard prompts users with a dialog box when an external program attempts to access their outlook address book or send e - mail on their behalf, which is how insidious viruses such as iloveyou spread

    當外部程序試圖訪問用戶的outlook通訊簿或代替戶發送電子郵件時(陰險的「愛蟲」就是以這種方式傳播的) ,對象模型保護機制將通對話框把這種情況提示給用戶。
  3. Basing on the thorough research and analysis of several essential technologies, we have implemented identity authentication, illegal link, network security aduit and anti - virus detection etc. we used digital certificate to accomplish identity authentication which was based on the study and analyzing of all kinds of authentication. in regard to network security audit, we mainly researched on the distributed model of network security audit and the audit strategy of the rule library. in view of the traditional rule library ’ s flaws, with the formalizing description of audit rule, we proposed a dynamic security audit strategy model which was based on the nature deduction system

    在研究並分析各種認證技術的基礎上,採用基於數字證書的認證方式,實現用戶上網資格審查;針對網路安全審計,重點研究了網路安全審計分散式模型以及基於規則庫的審計策略,並針對傳統審計規則庫的缺陷,通對審計規則進行形式化描述,提出了一種基於自然演繹系統架構的動態安全審計策略模型dsasm ( dynamicsecurityauditstrategymodel ) ,並詳細論述了該模型的定義和推演演算法;通深入研究非法外聯的關鍵技術和檢測模型,提出了基於路由表查找的c / s架構的非法外聯檢測模型;針對檢測,提出了基於主機的防檢測思想,在戶端進行防護。
  4. 8. the report found it probable that the index patient suffering from chronic renal failure had infected a group of residents in block e and subsequently other residents in the same block through the sewage system, person - to - person contact and the use of communal facilities such as lifts and staircases

    8 .報告指出,患有慢性腎衰竭的源頭人很可能是透污水排放系統人與人之間的接觸和使用大廈公用設施如升降機及樓梯首先使部分住感染,然後再感染其他的同座住
  5. The second setting lets the client update its virus signatures through the update server we just setup. please enter your update server ' s ip address according to the figure

    第二個設定,是讓戶端透我們剛設定的更新伺服器,來更新定義。請按圖中指示,並輸入你的更新伺服器的ip地址。
  6. Create an advert suitable for viral marketing to attract new customers and create loyalty amongst ikea ' s young female audience

    創造適合濾性營銷的廣告來吸引新顧並在年輕女性觀眾中創造對宜家的忠誠
  7. In this text the basic theories and the applied truss of the network monitor and control the system are discussed firstly, the inevitability is also analyzed about monitor and control network facing with the frequent safety threaten. then i research each safety aspect of network remote monitor and control system through academic study, engineering practice and a lot of simulation experiment. at the same time i research deeply and systemically in the popular virus problems and the dangerous hacker ' s attack

    本文討論了網路監控系統的基本理論和應用構架,分析了監控網路面臨經常的安全威脅的必然性,然後通理論研究、工程實踐以及大量的模擬實驗,對網路遠程監控系統安全性問題的各個方面進行了廣泛的研究,對其中最常見的計算機問題以及最可能造成嚴重危害的黑攻擊問題進行了深入系統的研究。
  8. You probably know about computer hackers and computer viruses

    你大概聽說計算機黑和計算機
  9. This paper use ga to figure out the complicated scheduling problem ; the main research concentrates on the following several aspects : ( 1 ) by reading a great deal of documents of scheduling problem and ga, the issue that genetic algorithm being adaptive to solve scheduling problem is introduced ; ( 2 ) hybrid genetic algorithm is adopted to solve a multi - objective job scheduling problem on identical parallel machine and a multi - objective job scheduling problem on non identical parallel machine, and the feasibility and validity of the algorithm is approved by numeric experiment ; ( 3 ) based on the heuristic algorithm of maximizing customer ' s satisfaction for single machine, this issue is extended to parallel machine, and then bring forward a heuristic arithmetic and a virus infective hybrid genetic algorithm

    本文應用遺傳演算法求解復雜的生產調度問題;主要在以下幾個方面作了一些研究工作:通大量閱讀各種生產調度和遺傳演算法的文獻,指出了遺傳演算法適合解決生產調度問題。採用混合遺傳演算法應用在求解多目標等同并行多機問題和多目標非等同并行多機問題,並通模擬實驗證明演算法的可行性和有效性。在求解極大化顧滿意數的單機問題的啟發式演算法的基礎上,將此問題擴展為多機問題,提出一種啟發式演算法和一種帶感染的混合遺傳演算法。
  10. We use software that automatically downloads small pieces of data and performs calculations that model how drugs interact with various hiv virus mutations

    戶端軟體將自動的下載小數據塊,並對其分子模型進行各種各樣的抗hiv變化的程模擬。
  11. The security of computer network consists of pretending the invasion of net virus and hackers. we can keep back the net virus using software of anti - virus, such as kv3000 and rising

    對于網路,我們可以通kv300或瑞星殺軟體來對付,那麼對于防範黑的入侵我們能採取什麼樣的措施呢
  12. At last, we apply dcds model to five applications, distributed attack, network probe, file recovery and load balance, are experimented and investigated. the initial results of our experimenting show that our dcds model and implementations are effective and feasible in practice

    針對分散式黑攻擊、大規模入侵、網路探測、文件的災難恢復和負載平衡等五種具體的應用實例,分別給出了具體實現程及其實驗結果,實例應用結果表明,我們提出的解決問題的思路、技術方案及其實現方法是可行性的、有效性的。
分享友人