防禦機理 的英文怎麼說

中文拼音 [fáng]
防禦機理 英文
defense mechanisno
  • : Ⅰ動詞(防鷥) provide against; defend against; guard against Ⅱ名詞1 (防守; 防禦) defence 2 (堤...
  • : machineengine
  • : Ⅰ名詞1 (物質組織的條紋) texture; grain (in wood skin etc ) 2 (道理;事理) reason; logic; tru...
  • 防禦 : defense
  • 機理 : mechanisation; mechanization; mechanism
  1. The way to create a network that is safe at every point has gradually become a very hot topic in network security. " integerated defence system ", a project founded by electronic development funds of ministry of information industry, is a lucubration in this area

    由信息產業部支持的研究課題「網路集成系統」 ,通過對網路中各節點主火墻進行管,在實現多聯合領域進行了探索研究。
  2. 2 ) based on the study and analysis of many security architecture standards, the security region and the defense layer are introduced, the information category, the threatening level and the security protection level ( spl ) are put forward, the methods and requires of the security analysis are discussed in this paper. 3 ) based on the security architecture model and the security analysis, the graded requires of the security management and the security technology is presented, so the security design of the cissa and the choice of security produces can be done conveniently. 4 ) a cooperative communication platform is designed and implemented to ensure the dynamic and cooperative ability of above cissa model

    針對計算信息系統安全體系模型和實施標準的不足,本文緊密圍繞分層、分級、動態以及協同通信平臺等關鍵技術開展研究工作,所做的工作主要集中在: 1 )在深入研究了當前各種流行的安全體系模型基礎上,提出了用於指導計算信息系統安全體系建設的動態縱深安全體系模型; 2 )在對各種安全體系標準進行研究與分析的基礎上,引入了安全域和安全護層次的概念,提出了信息類別、威脅級別和安全保障級別的定義,闡述了進行計算信息系統安全分析的方法和要求; 3 )在安全體系模型和安全分析的基礎上,提出了安全管及安全技術的分級要求,從而便於進行計算信息系統的安全設計以及產品的選型; 4 )設計並基本實現了用於保障上述安全體系動態協同能力的協同通信平臺。
  3. A control study of the psychological defensive mechanism in patients with schizophrenia and patients with neurosis

    精神分裂癥和神經癥患者心制的對照研究
  4. Step by step, the social concern goes into the heart of the impoverished undergraduates. at last, their psychology defensive mechanism is strengthened and they are led into the fine psychology process of ego development

    外界的關懷就這樣一步步地進入貧困生的心靈深處,從而強化了其心制,最終使其走上自我發展的良性心歷程。
  5. Nonspecific cellular defense mechanisms in the lung rest principally on epithelial cell elements and several types of phagocytic cell.

    肺中非特異性細胞防禦機理主要在於表皮細胞和幾種有吞噬作用的細胞。
  6. Ideally, any intervention would fine - tune the inflammatory response ? evoking it just enough to help the body ' s other immune defenses eliminate the bacteria

    想的情況是,找出微調發炎反應的做法,也就是引發不多不少的反應,恰恰足以幫助身體的免疫制,將披衣菌給除去。
  7. Whereafter, based on the analysis on the flood influence for traffic lines, the research is centered on the following parts : firstly, the destroying modes, reasons and mechanism of flooded lines are discussed, and the frameworks and countermeasures of preventing and controlling hazards system are put forward ; secondly, the ways of region forecasting for the landslide are analyzed and the automation of landslide forecast for certain site through visual programming is realized. furthermore, the function of dynamic segmentation in arc view is made use of to realize the forecast result ' s visualization ; thirdly, the reasons and patterns of roadbed subsidence are discussed and the methods of forecasting subsidence based on the gm ( 1, 1 ) model are put forward. then the applications of the arcview software and its extended module on the study of roadbed subsidence are debates upon ; fourthly, an analysis on the sources of flood for traffic lines, which situate in the reservoir coverage area, is given

    接著,論文探討了山區交通線路災害的特點、分類、時間和空間分佈規律以及災害的治原則和對策等;然後,以洪水災害對交通線路的毀壞為主線,重點研究和分析了以下幾個問題:第一,探討了洪水對交通線路的破壞方式,水毀原因以及水毀,並提出了交通線路水毀系統框架和對策;第二,分析了雨季邊坡塌方災害的區段預測方法;通過可視化編程,編制了雨季邊坡塌方災害的工點預報程序,並結合arcview實現了預測結果的可視化;第三,對路基沉陷原因和模式進行了分析,並提出利用gm ( 1 , 1 )模型對路基沉陷區進行分析和預測,最後論述了arcview軟體及其擴展模塊在沉陷區研究分析中的應用;第四,對汛期庫區線路災害的原因進行了分析,並探討了利用數量化論對路基護工程抗洪能力進行預測的意義;第五,提出從風險的角度對交通線路的災減災進行管,對風險估計的相關問題進行了論述,並探討了交通線路水害危險區段的劃分問題。
  8. Denial, displacement, intellectualization, fantasy, compensation, projection, rationalization, reaction formation, regression, repression and sublimation were the defense mechanisms freud identified

    否認、轉移、智化、幻想、補償、保護、合化、反型成,壓制和升華都是一些佛洛依德辨別出的制。
  9. For example, every 25 points of defense skill grants a 1 % dodge chance, 1 % parry chance, 1 % block chance, 1 % increased chance to be missed and 1 % decreased chance to be critically hit by physical attacks

    舉例來說,每25點能能增加1 %閃躲, 1 %招架, 1 %格檔, 1 %不被命中率和1 %不被物攻擊致命一擊的率。
  10. Controlled study on defense mechanism in male violent offenders

    男性少年暴力罪犯心制分析
  11. Influenced by freud ' s defense mechanisms theory and self - psychology, the characteristics - oriented coping theory defines coping as defensive hierarchies and stability across situations in terms of adaptive styles

    受弗洛伊德論和自我心學的影響,特質論認為應對具有層次性和跨情境的穩定性,個體具有應對方式的傾向性先驗地決定了個體行為的適應效果。
  12. Based on the clonal selection theory and immune memory mechanism in the natural immune system, a novel artificial immune system algorithm, clonal strategy algorithm based on the immune memory csaim is proposed in this paper. the algorithm realizes the evolution of antibody population and the evolution of memory unit at the same time, and by using clonal selection operator, the global optimal computation can be combined with the local searching

    人工免疫系統ais是一新的模擬自然免疫系統的計算智能方法,它受生物免疫制的啟發,通過學習外界物質的自然防禦機理,提供噪聲忍耐自組織自學習記憶等進化學習制,結合了分類器神經網路和器推等的特點,因此具有提供解決問題新穎方法的潛力。
  13. It reframes the traceback problem as a polynomial reconstruction problem, and uses techniques from algebraic coding theory to provide robust methods of transmission and restriction. the scheme is a new solution to the traceback problem during a dos attack ; the honeypot for ddos, which is a tool of traceback, lures the attacker to believe that he successfully compromised a slave for his needs, convincingly simulating the architecture of a potential ddos attack ; the source - based approach to ddos defense, which is a useful adjunt to traceback systems, deploys a ddos defense system at source - end networks. attacks are detected by monitoring two - way traffic flows, and the attacks originating from source networks are stopped by rate - limiting ; the routing mechanism based on pushback treats ddos attacks as a congestion - control problem

    最後,就有關ddos攻擊反向追蹤問題,從四個方面對其解決方案進行了研究:在分析比較幾種反向追蹤演算法的基礎上,著重研究了代數方法編碼反向追蹤信息的方案,該方案把追蹤重構問題當作多項式重構問題,使用代數編碼論技術提供魯棒的傳送和重構方法,是dos攻擊過程中的反向追蹤問題的一種新的解決方法; ddos陷阱作為反向追蹤的工具,引誘攻擊者相信自己成功與所需的傀儡主通話,令人信服地模擬出潛在ddos攻擊體系結構;基於源的ddos方法作為反向追蹤有用的補充,將系統部署在源網路,通過監控雙向流量檢測攻擊和限制速率終止來自源的攻擊;基於向後倒推的ddos的路由制把ddos攻擊看作擁塞控制問題,添加功能到每個路由器來檢測並優先丟棄可能屬于攻擊的包,通過向後倒推上級路由器也得到通知而把這樣的包丟棄。
  14. A study of the defense style in high school students

    高中生心制研究
  15. Flood prevention schemes for the yangtze river, yellow river, huai river and hai river shall be formulated by the state flood control headquarters and submitted to the state council for approval

    跨省、自治區、直轄市的其他江河的洪水方案,由有關流域管構會同有關省、自治區、直轄市人民政府制定,報國務院或者國務院授權的有關部門批準。
  16. Our research project is basic condition platform construction project of the national science and technology of the ministry of science and technology. this paper researches the security audit techniques which watch and track actions in network information systems, and develops audit tool software. on the base of technology research, we will constitute technology standards that have own intelligence property, so that we could enhance network recovery capability to protect important computer information systems

    本文課題是科技部國家科技基礎條件平臺建設項目,研究對網路信息系統進行全面監視和對網上行為進行跟蹤的安全審計技術,開發符合信息安全管需要的審計工具軟體,為構建網路安全信息系統提供技術支持,並在技術研究的基礎上研究制定具有自主知識產權且能與國際接軌的技術標準,以提高國內信息網路能力,保護國家關鍵基礎設施,維護國家事務、經濟建設、國建設、尖端科學技術等重要領域的計算信息系統的安全。
  17. Flood prevention schemes for other rivers involving two or more provinces, autonomous regions and municipalities directly under the central government shall be formulated by the relevant river basins administrative agencies in conjunct ion with the relevant people ' s government s of provinces, autonomous regions and municipalities directly under the central government and submitted to the state council or its authorized agency for approval

    跨省、自治區、直轄市的其他江河的洪水方案,由有關流域管構會同有關省、自治區、直轄市人民政府制定,報國務院或者國務院授權的有關部門批準。
  18. As an important innate immune system, and as an important arm of the humoral immune response, the complement system is immediately ready to target and eliminate virus particles, to lysis those virions that have lipoprotein membranes, or to prevent it from entering host cells, or to marker them for destruction by other branch of the immune response. at the same time, the host normal tissue are protected from damaging by complement through recognizing the regulators of complement activation ( rca ) expressed on self cells

    作為體重要的天然免疫系統及特異性體液免疫應答的重要效應系統,補體系統除了具有溶解、清除病毒等致病微生物,阻止病毒進入靶細胞,調病毒的吞噬等重要功能外,還可通過「識別」自身組織細胞表面的補體活化調節蛋白來對自身細胞加以保護,使之不受侵害。
  19. The administrative departments or institutions for seismic work under the people ' s governments at or above the county level located in the key areas for earthquake surveillance and protection shall improve their work in earthquake monitoring, work out plans for short - term and imminent earthquake prediction, establish the system for the tracking of and consultation about earthquake situations and enhance their capability of earthquake monitoring and prediction

    地震重點監視區的縣級以上地方人民政府負責管地震工作的部門或者構,應當加強地震監測工作,制定短期與臨震預報方案,建立震情跟蹤會商制度,提高地震監測預報能力。
  20. It depends on a broad array of intemal defences, such as physical blocks to invading fungi and the production of a range of different anti - microbial compounds, so pathogens find it difficult to evolve ways to evade it

    它依靠廣泛的內部制,例如對侵襲真菌的物阻滯,以及產生一系列不同的抗微生物化合物,因此病原很難發展形成規避它的方式。
分享友人