首攻法 的英文怎麼說

中文拼音 [shǒugōng]
首攻法 英文
opening leads
  • : Ⅰ名詞1 (頭) head 2 (首領) leader; head; chief 3 (表示方位) aspect 4 (姓氏) a surname Ⅱ動...
  • : Ⅰ動詞1 (攻打) attack; assault; take the offensive 2 (指責別人的過錯; 駁斥別人的議論) accuse; ...
  • : Ⅰ名詞1 (由國家制定或認可的行為規則的總稱) law 2 (方法; 方式) way; method; mode; means 3 (標...
  1. He emphasizes, on the basis of healthy qi, the combination of disease and syndrome differentiation, treatment and prevention ; spleen - nourishing medicines are orally and rectally administered : purging and astringing methods are given

    在扶助正氣的基礎上,強調辨病與辨證相結合,防治並舉;用藥重益氣健脾,採用中藥內服加保留灌腸的方;結合腑病特性,合理應用「下」與「收斂」
  2. Propping up the university boffins theory that tall men areinfact more likely to become the aggressor in conflicts, terrorchiefosama bin laden has been described by the fbi as 6ft 4intall

    蘭開夏中心大學的研究人員認為,事實上,高個子男人更易在矛盾中具有擊性, 「基地」組織領本?拉登據說身高6英尺4英寸( 1 . 93米) 。所以,矮個子人比高個子更有暴力傾向這一說不成立。
  3. He was graduate form conductor department of shanghai conservatory of music. before he studied abroad, he had been the syndic conductor of shanghai symphony orchestra. during his study in colon conservatory, his got the phd of conduct and the master s degree of piano. then he back to china in 1985. after that he hold the post of the chief conductor of shanghai symphony orchestra, and make the orchestra played in german, french, italy, switzerland, us, and janpan etc, and received much prize. in 1987, he was recorded in the cambridge international biography centre as one of the world celebrity

    1969年畢業于上海音樂學院指揮系, 1977年任上海交響樂團常任指揮,后出國深造,在德國科隆音樂學院讀指揮和鋼琴專業,獲得了指揮學博士和鋼琴碩士學位。 1985年學成歸國后,擔任上海交響樂團席指揮,並帶領樂團在德國國義大利瑞士美國日本等國巡迴演出,獲得好評。
  4. In this report, we mainly covered the following aspects of " tissue organ regeneration and replication in situ " : 1 ) procedures of tissue organd regeneration and replication and replication in clnical practice ; 2 ) the discover and existence of potentiald regenerative cell ( prc ) ; 3 ) the proliferation, differentiation and regeneration law of potential law of potential regenerative cells ; 4 ) study procedure on tissue organ regeneration and replication from prcs in vitro based on the model of full skin organ regeneration in situ after extensive in vitro, set up the method and technology of searching life regenerative substance required in tissue organ regeneration and replication in situ. in this study, first, the whole human body is divided into 206 function units, which are the " tissue organ " in regeneration study. then the histology foundation of tissue organ regeneration and replication in situ is set up. in ordre to prove the existence of the potential regenerative cells and their potential baility and function, we established clinical tracking rechnique of skin organ regeneration in situ ; meanwhile, several tissue organ regeneration and replication in vitro models which represent different kinds of runctions were sucessfully set up, with all these techniques and models, we confirmed : 1 ) the existence, function and ability of pptemtoa regenerative cells ; 2 ) the importance of life regenerative substance ; 3 ) the feasibility of tissue organ regeneration and replication in situ ; 4 ) the big value of tissue organ regeneration and replication in situ in life science and medicine progerss. we also showed the possible foreground of capture cancer with this method and technologh. in this report, nearly 200 photographs of several tissue organ regeneration and replication in situ or in vitro demonstrated the whole process of tissue organ and big organ entities regeneration and replication from cells. the results of tissue organ regeneration and replication in situ mainly include : 1 ) whole skin organ regeneration and replication in situ ; 2 ) gastrointestinal mucosa tissue organ regeneration in vitro ; 3 ) hair follicle tissue organ regeneration in situ or in vitro ; 4 ) never tissue organ regeneration in situ ; 5 ) pancreas tissue organ regeneration and replication in vitro ; 5 ) marrow tissue regeneration in vitro ; 6 ) renal glomerulus and tubule tissue organ tugeneraation in vitro ; 7 ) heart muscle regeneration in vitro, etcl. in order to let more and more people know and understand this technology of tissue organd regeneration and replication in situ, herein, for the first time, we publicize the key points of actualizing this technology. also, we publicized the technology procedures and the frame constitute of life substances. we bilieve this is a big contribution to human science

    本研究報告,重點報道了組織器官的原位再生復制的臨床程序,報道了組織潛能再生細胞的發現和存在,以及該細胞的增殖分化和形成組織器官的變化規律.以燒傷后皮膚組織器官的原位再生復制為模型,研究出了體外組織潛能再生細胞復制組織器官的培養方;以體外組織器官的復制為模型,建立了尋找原位組織器官再生復制所需生命物質的方和技術.本研究,先按人體的器官功能,分解為206個功能單位,確立了所復制的人體器官中的組織功能單位為組織器官,從而建立了原位組織器官再生復制的組織學基礎.為了驗證組織潛能再生細胞的再生潛能,建立了皮膚器官原位再生的實體臨床跟蹤技術,同時又建立了能代表有關器官功能類別的代表組織器官的原位和體外復制模型,以多組織器官的成功復制確定潛能再生細胞的作用,確定生命研究再生物質的重要性,確定組織器官原位再生復制的可行性,確定了組織器官原位再生復制的生命科學研究和醫學進步的重大應用價值,同時展示了用此方和技術克癌癥的前景.本研究報告,以近二百幅多個組織器官原位和體外再生復制的實體圖片,展示了潛能再生細胞復制的組織器官和大器官司實體;展示了細胞再生復制器官的全過程.真實的報告了組織器官原位再生復制的成果.所公布的主要成果為:皮膚器官的原位再生復制;胃腸黏膜組織器官的原位和體外再生復制;毛囊組織器官的原位和體外再生復制;神經組織器官的原位復制;胰腺組織器官的體外復制;骨髓組織的體外復制;腎小球小管組織器官的體外復制;心肌的體外復制等.為了讓更多的人學會和掌握組織器官原位再生復制技術,本報告次公布實施技術的重要環節和技術流程;次公布了生命再生物質的框架和組成.作者自費研究成果對人類生命科學的一大貢獻
  5. Representation, classification and global reference name standard of the common security knowledge, are summarized. then a new model of system security trend analysis is presented, which combines vulnerability analysis ( using privilege graph analysis method ) and attack knowledge analysis ( using goal tree analysis method )

    本論文次從信息對抗的角度分析了公共知識獲取和安全趨勢分析的意義,系統總結了公共知識分類、標準與知識描述等方面問題,給出動態防禦系統中公共知識獲取的方,提出了權限圖與擊樹相結合的目標系統安全趨勢分析方
  6. First of all, we bring forward the basic project of tadil, which adapts to combined operations. it is suggested to use tdma ( the abbreviation of time division multiple access ) as the working pattern and utilize the concept of mobile ad hoc network to construct the data link network. aiming at the impact of time delay on data link and the characteristic of cooperative combat under the command of director aircraft, this thesis applies a kind of kalman filtering algorithm in polar coordinates to compensate the error of time delay, and then does the transformation of target motion parameters to obtain the current information of target

    本文結合空軍裝備部某「十五」預研課題,圍繞著戰術數據鏈、多機協同多目標擊、超機動擊、空對地擊這四個方面展開了一系列的研究工作:本文先給出了適應三軍聯合作戰的戰術數據鏈系統的基本方案,建議採用時分多址的工作模式,並利用移動自組織網路的概念構建數據鏈網路,同時針對數據鏈傳輸信息的時間延遲特性和指揮機指揮下的多機協同作戰特點,應用一種極坐標系下的卡爾曼濾波演算對該傳輸延遲誤差進行補償,並在此基礎上進行目標運動參數的轉換,以獲得目標相對于某無人機的當前運動信息,且利用模擬驗證了方的有效性。
  7. We went to the brink of war with france and endured the capture of our capital by british forces.

    我們險些和國打仗,我們忍受了英國軍隊佔我們的府。
  8. Retired icac principal investigator louis cheung who had taken part in the fruit market investigations recalled : " the yau ma tei fruit market was an ideal venue for running a drug trafficking business. it covered a vast area lined with numerous fruit stalls and stands that offered a huge number of heroin " mining hiding points ". most people entering the market were familiar faces, so strangers were easily spotted

    曾參與油麻地果欄案調查工作的前席調查主任張華邦說:油麻地果欄具備地理優勢,佔地廣闊,攤檔數目多,易於埋雷即收藏白粉進出果欄的都是熟人,陌生面孔很易被認出而且內街縱橫交錯兼出入口多,倘若遇到執人員追捕,也易於逃竄,是易守難之地。
  9. However, the technology of manufacture about helical rotor is always the key problem, which blocks its development off since 1994, the cnc research center in shenyang university of technology has pursued research on complex special helical pole. it firstly put forward the non - instantaneous pole envelope method in china, and pursued systemic research on the theory of envelope method and nc programming method, then acquired a lot of achievements. therefore in this thesis the main job is the simulation model built on basis of non - instantaneous pole envelope method and the three - dimension graphic dynamic simulation system

    從1994年起,沈陽工業大學數控研究中心即對復雜異形螺旋面加工進行關研究,在國內先提出了無瞬心包絡加工方,並對其包絡加工原理、數控編程方等多方面進行了系統的研究並取得了一定成果,本文的主要工作即是以無瞬心包絡加工過程為基礎建立的模擬加工模型和三維圖形動態模擬系統。
  10. Then it explains packet validation mechanism, connection maintaince, and with taking the system platform into consideration, design and implement a improved - syncookie model. at last, we design several performance test cases. the test cases show that the high - speed filter can protect away from the syn flood attack effectively, at the same time it has been much more improved than traditional protect ways on the filtering and processing capacity

    該文先對國內外拒絕服務擊威脅以及研究現狀進行分析描述;然後,從拒絕服務擊的方分類、主要手段、常見的防禦及防範方分析研究著手,提出了一種採用tcpproxy與待響應ack隊列相結合的能夠對tcp拒絕服務擊進行有效過濾的方,並用這種方在linux內核中實現了一個高速過濾器,最後進行了相關的性能測試。
  11. It summarize the algorithm model and attack means of the watermark and generalized the existing picture watermark algorithm

    本文先對水印技術進行了概括性介紹,總結了水印演算模型和擊手段,概括了現有的圖像水印演算
  12. This paper also makes brief description of the technical specifications, mechanical structure, major features of the italian beam transporting and erecting machine with type of nicola yj - 550, which was introduced firstly in china and chosen carefully in combination with the site conditions. the future beam erection and relevant design and construction can find the reference from description of this paper in terms of erection process for box beam, working efficiency of the italian beam transporting and erecting machine with type of nicola yj - 550, issues and revelations concerning about box beam erection, special beam erection method to avoid three legs supporting

    採用義大利nicolayj - 550型運架梁一體機進行箱梁架設是結合現場實際開展技術關、精心選定的施工方,該型架橋機為國內次引進,文中就其技術參數、組成結構、主要特點進行了簡要介紹;文中闡述的箱梁架設施工工序、運架梁一體機的作業效益、架梁施工應注意的問題及啟示、架梁施工克服「三條腿」的方等均可作為今後箱梁架設及與箱梁架設相關的設計、施工工作的參考。
  13. An investigation of the rijndael algorithm which is the advanced encryption standard of usa is taken in this thesis. we have focused on developing the cryptographic properties of the rijndael sbox from the viewpoint of boolean function, walsh spectrum and algebraic structures, on the attacks against the reduced variants of rijndael, and on the optimized implementations of rijndael. the key contributions follow below

    本文對美國高級加密標準rijndael演算進行了比較深入的研究,內容包括:從布爾函數、 walsh譜和代數結構的角度對其s盒密碼性質進行的研究,簡化演算擊方以及演算的優化實現問題,主要成果有: 1 、提出求解布爾函數表達式的兩種新方,具有簡潔、易於編程實現、準確而快速的特點,應用於des演算獲得與公開文獻相符的結果,應用於rijndael演算次求出其s盒布爾函數表達式。
  14. That legendary lothar ' s blade that was dropped during the second war. grants + 21 damage, + 10 agility, and a 9 second wind walk

    10點的敏捷, + 21點的擊力,激活后(消耗125點的魔,冷卻時間26秒) : 9秒疾風步(這段時間內擊可多加50偷襲傷害, + 15 %的移動速度) 。
  15. " we have to defend well, then after that, we ' ll have to think how to attack, " admitted essien. " they have pace and pass the ball well.

    艾辛說:我們先要想著怎樣把防守組織好,然後去考慮如何進。他們的腳和傳球做的很好。
  16. Fletcher was first on target for scotland, bundling the ball home after just seven minutes in their 6 - 0 thrashing of the faroe islands

    弗萊徹為蘇格蘭開記錄,開場僅7分鐘就入一球,幫助蘇格蘭6 : 0擊敗羅群島。
  17. Let me first explode the myth about divers being at exceptional risk of shark attack

    先我要先推翻關于潛水者遭受鯊魚擊風險異常高的荒謬說
  18. In this paper, the mechanism, methods of and countermeasures to denial of services attacks are discussed. after that, several packet marking schemes for traceback are reviewed and some improvements to the basic packet marking scheme are given, which reduce the workload and false positive rate in the attack tree reconstruction. knowing that in existing packet marking schemes, router marks packets with fixed probability, which results in that many packets are required in path reconstruction and that attacker could encumber path reconstruction via spoofed marking information

    在本文中,我們先研究了拒絕服務擊的擊機制、方及其對策,並對以包標記的方式追蹤拒絕服務擊的來源的各種方進行了深入的研究,分析了它們各自的優缺點,並對基本包標記方案作了改進,使得其擊路徑重構時的運算量和重構的誤報率在原有基礎上大為降低,達到或超過了其他一些方案的水平。
  19. In regard to the bluetooth combiner, we study the probability distributions between its output and input sequences, with which we analyze its correlation immunity, introduce two representative attack methods and give a whole evaluation on the security of bluetooth combiner

    對藍牙組合生成器,先考察了其輸入輸出序列的基本性質,在此基礎上,研究了它的相關免疫性,介紹了目前有代表性的兩種擊演算,並對藍牙組合生成器的安全性做了總體評價。
  20. This thesis first presents an access level taxonomy and several other taxonomies based on the analyses of previous work, and their taxonomic characteristics used to define a network attack are limited in scope to those features that are observable and measurable at the victim of the attack

    本文先在總結前人研究成果和不足的基礎上提出了訪問權限分類和其他幾種分類,它們的分類特徵限定為擊受害者可以發現和探測的,隨后運用rdf模型將這些分類邏輯組合成為基於受害者的網路擊描述體系。
分享友人