防潛網 的英文怎麼說

中文拼音 [fángqiánwǎng]
防潛網 英文
anti submarine net
  • : Ⅰ動詞(防鷥) provide against; defend against; guard against Ⅱ名詞1 (防守; 防禦) defence 2 (堤...
  • : Ⅰ動詞1 (隱在水下) go underwater; hide under water; dive 2 (隱藏) hide3 [書面語](涉水) wade ...
  • : Ⅰ名詞1 (捕魚捉鳥的器具) net 2 (像網的東西) thing which looks like a net 3 (像網一樣的組織或...
  1. The information safety has the characteristics of the high weakness and danger, delitescence and abruptness, the diversity of the attack sources and the indeterminacy of the guarded object and the asymmetry of the main body of the safety, etc. the contents of information safety are extensive, involving politics, economy, culture, military, science, technology and resources ecosystem etc. the factor which threatens the information safety mainly includes the hackers, network crimes, the network viruses, and the garbage information, etc. the second part thoroughly analyzes the strategic position of the information safety in the national security

    信息安全具有高度脆弱性和風險性、伏性和突發性、攻擊源的多樣性和範對象的不確定性、安全主體的不對稱性等特徵。信息安全的內容廣泛,涉及政治、經濟、文化、軍事、科技、資源生態等領域。威脅信息安全的因素主要包括病毒、路黑客、路犯罪和垃圾信息等。
  2. Based on the clonal selection theory and immune memory mechanism in the natural immune system, a novel artificial immune system algorithm, clonal strategy algorithm based on the immune memory csaim is proposed in this paper. the algorithm realizes the evolution of antibody population and the evolution of memory unit at the same time, and by using clonal selection operator, the global optimal computation can be combined with the local searching

    人工免疫系統ais是一新的模擬自然免疫系統的計算智能方法,它受生物免疫機制的啟發,通過學習外界物質的自然禦機理,提供噪聲忍耐自組織自學習記憶等進化學習機制,結合了分類器神經路和機器推理等的特點,因此具有提供解決問題新穎方法的力。
  3. It reframes the traceback problem as a polynomial reconstruction problem, and uses techniques from algebraic coding theory to provide robust methods of transmission and restriction. the scheme is a new solution to the traceback problem during a dos attack ; the honeypot for ddos, which is a tool of traceback, lures the attacker to believe that he successfully compromised a slave for his needs, convincingly simulating the architecture of a potential ddos attack ; the source - based approach to ddos defense, which is a useful adjunt to traceback systems, deploys a ddos defense system at source - end networks. attacks are detected by monitoring two - way traffic flows, and the attacks originating from source networks are stopped by rate - limiting ; the routing mechanism based on pushback treats ddos attacks as a congestion - control problem

    最後,就有關ddos攻擊反向追蹤問題,從四個方面對其解決方案進行了研究:在分析比較幾種反向追蹤演算法的基礎上,著重研究了代數方法編碼反向追蹤信息的方案,該方案把追蹤重構問題當作多項式重構問題,使用代數編碼理論技術提供魯棒的傳送和重構方法,是dos攻擊過程中的反向追蹤問題的一種新的解決方法; ddos陷阱作為反向追蹤的工具,引誘攻擊者相信自己成功與所需的傀儡主機通話,令人信服地模擬出在ddos攻擊體系結構;基於源的ddos禦方法作為反向追蹤有用的補充,將禦系統部署在源路,通過監控雙向流量檢測攻擊和限制速率終止來自源的攻擊;基於向後倒推的禦ddos的路由機制把ddos攻擊看作擁塞控制問題,添加功能到每個路由器來檢測並優先丟棄可能屬于攻擊的包,通過向後倒推上級路由器也得到通知而把這樣的包丟棄。
  4. This part emphasizes the synthesis of nanoarrays, aiming at controlling the size and distance of nanocrystallites using calixarene derivatives by altering the size, length and chemical structure of the organic molecules ; 2. this part emphasizes in situ synthesis strategy for fabrication of polymer network of zns based nanopowder, aiming at size controls, coating and preventing agglomeration following " one - pot " synthesis ; this method fits to low cost, large scale production ; 3. according to development in zno nanomaterials, we first report on the synthesis, characterization of amorphous zno, aiming at describing the principles and approaches of synthesis techniques, optical properties, spatial structure and doped effect ; the amorphous zno displays cage - like structure, showing a strong ultraviolet emission while the visible emission is nearly fully quenched, a potential uv - emission material ; 4

    本論文以量子結構自組裝為出發點,提出利用杯芳烴及其衍生物的化學受限反應實現尺寸可調半導體納米粒子自組裝;提出有機聚合路原位組裝zns基納米熒光粉方法,把熒光粉的納米化、包敷、團聚在「一鍋」反應中完成,適于低成本,批量生產;根據當前zno的研究情況,我們首次合成了非晶zno ,研究了它的光學性質,確定了它的結構,並對其摻雜進行了初步的研究,非晶zno表現出強的深紫外發光特性,而可見發射非常弱,是一種有巨大在應用價值的深紫外發光材料;利用非晶zno的亞穩特性,對晶化過程中非晶zno納米晶zno三維受限量子結構特性,界面特性進行了深入的研究;利用固相熱分解一般受擴散控制特性,實現了尺寸可控的zno三維量子結構的自組裝;利用非晶zno的高度分散性,容易均勻成膜特性,實現了非晶籽晶誘導低溫液相外延自組裝生長高取向zno晶體薄膜。
  5. In this paper, a new way of self - protecting network from attacker when network is in potential risk within campus network is proposed which could potentially protect the network security

    這里要實現的路自禦攻擊系統是一種在校園路受到內部在的安全威脅時,如何及時將有害攻擊源或被感染源隔離起來,及時通知用戶採取安全措施,從而保證路安全穩定運行。
  6. The oil field exploiting impacts on water resources are analyzed in this paper, points out that the current situation of water pollution as follow : the surface water have greatly polluted, the quality of the phreatic water is going worsen, and the deep groundwater quality is not be good, and make out the main pollutants, then utilizes the artificial neural network analyses the collected water quality information data and predicts the water quality in the daqing area, makes a reasonable assessment, which will present theoretic basis for water resources protection and pollutant prevention in oil field

    摘要首先分析了油田開采對大慶地區水資源的影響,指出水污染現狀:地表水嚴重污染,水水質趨于惡化,深層地下水水質不佳,同時指出水污染的主要污染物,並運用人工神經路度對長期收集的水質監測資料進行了分析和預測,對該區水資源水質做出了比較合乎實際的評價,為油田水資源的保護和污染治工作提供了理論依據。
分享友人