hidden computer 中文意思是什麼

hidden computer 解釋
隱式計算機
  • hidden : adj 隱藏的;秘密的;神秘的。 A hidden danger 隱患。 A hidden meaning 言外之意。 A hidden micropho...
  • computer : n. 1. 計算者。2. (電子)計算機;計量器。-ism 電子計算機主義〈認為電子計算機萬能等〉。-erite, -nik 計算機專家;計算機工作者。
  1. Next, this paper introduces four kinds of hidden information security trouble existed in network media by detailed cases, which is, false and harmful information spreading ; consequent taking place of network leakage of confidential information ; the overflow of computer virus ; and hacker attack and network information campaigns

    網路媒體作為一個新生事物,針對網路媒體的法律法規的相對滯后,大眾對網路媒體概念也相對模糊混亂,這也使網路媒體面臨的安全問題得不到足夠的重視,缺乏相應的解決方法。
  2. Computer program hidden in another computer program with the purpose of ? destroying software or collecting information about the use of the computer

    它是一個破壞計算機軟體和竊取計算機用戶的計算機木馬程序。
  3. Text : on july 27th, gongbei customs were suspicious of a red car and its occupants and upon a screening inspection discovered 150 computer hard disks hidden in side panels of the car

    7月27日,拱北海關發現一輛入境的紅色小汽車有走私嫌疑,經車載移動式車輛查驗系統掃描后,在汽車兩側的暗格中查獲電腦盤150個。
  4. Rule # 64 : knowledge is often revised by simulations or testing, but computer models have hidden flaws not the least of which is poor input data

    認識總是被模擬和測試所修改,但計算機模型並不會僅僅因為數據輸入錯誤而隱蓋某些缺陷。
  5. With the coming of information age, more and more people realize the importance of information. useful information hidden in plenty of data needs mining energently. the technology of data mining arises and develops unders such circumstance. the main tast of data mining is to extract or mine the useful information from the data. we can get great amount of data from the computer transaction every day. the data is very useful for us to make decisions on management. the paper concludes and introduces association rule about its concept, sort, model and step for mining the data, measure and some basic algorithm on the basis of the at research. at the same time, we analyse hopfield - network ' smodel, character, energy - function, movement - equation and so on. moreover, to the requirement of the system of information of computer - saling, we have done the following and there are good result. fisrt, considering the weight and constraint, we propose the algorithm for the weighted and constraint association rule

    本文首先對數據挖掘中的關聯規則和神經網路的已有成果作了詳細深入的調研,歸納和整理了關聯規則的概念、分類、關聯規則挖掘的模型與步驟、關聯規則的度量方法以及一些基本演算法;還歸納和整理了hopfield網路的模型、特徵、能量函數、運動方程等,並在此基礎上,結合電腦賣場信息支持系統提出的需求,做了如下工作,並取得了一定的成果和成效: ( 1 )考慮加權與約束兩種情況,提出了既帶權重又帶約束的關聯規則提取演算法。
  6. The natural line drawing is the one with hidden - parts - eliminated. based on the correlative constraints between vertices and straight lines on a planar object, we have proposed a new recursive method for computer interpretation of line drawings under orthographically axonometric projection

    在建立了相關約束關系式的基礎上,提出一種基於點與直線的相對位置關系遞歸解釋線框圖的新方法,主要針對的是正軸測投影線框圖的計算機解釋。
  7. Local installation source is a setup feature that, when a user installs office 2003 from a cd or from a compressed cd image on the network, copies required installation files to a hidden folder on the local computer

    本地安裝源是一個安裝功能,當用戶通過cd或網路上的壓縮cd映像安裝office 2003時,它會將安裝所需的文件復制到本地計算機的一個隱藏文件夾中。
  8. Life and death fate, a series of the second game : the single - game doubles, the choice of singles or doubles. game has always maintained at least two role players, in addition to the players singles, the role from the other computer controlled, and computer gamers with automatic protection functions, it is worth recalling that the game is a hidden figure he found the clearance will greatly increase the chances of success

    生死宿命系列游戲之第二話:本游戲可單雙打,無論選擇單打或者雙打,游戲始終保持著最少兩個玩家角色,單打時除玩家外,另外角色則由電腦操控,而且電腦有自動保護玩家的功能,值得提醒的是,在游戲中有一隱藏人物,找到了他會大大增加過關的勝算。
  9. Introduction : life and death fate, a series of the second game : the single - game doubles, the choice of singles or doubles. game has always maintained at least two role players, in addition to the players singles, the role from the other computer controlled, and computer gamers with automatic protection functions, it is worth recalling that the game is a hidden figure he found the clearance will greatly increase the chances of success

    生死宿命系列游戲之第二話:本游戲可單雙打,無論選擇單打或者雙打,游戲始終保持著最少兩個玩家角色,單打時除玩家外,另外角色則由電腦操控,而且電腦有自動保護玩家的功能,值得提醒的是,在游戲中有一隱藏人物,找到了他會大大增加過關的勝算。
  10. In computer security, a computer program with an apparently or actually useful function that contains additional ( hidden ) functions that surreptitiously exploit the legitimate authorizations of the invoking process to the detriment of security

    在計算機安全學中,一種計算機程序,表面上或實際上有某種有用的功能,而含有附加的(隱藏的)可能利用了調用進程的合法特許來危害系統安全的功能。
  11. Integer solution of government networks security aiming at hidden trouble of network security is studied thoroughly in this paper, such as host computer of government network may be attacked by illegal in break, sensitivity data may be revealed or modified, information of intranet to internet may be wiretapped or tampered, etc. firstly, the security of government network, consisting of security analysis of risk, requirement, strategy and target of government are analyzed

    本文針對電子政務系統網路中的主機可能會受到非法入侵者的攻擊,網路中的敏感數據有可能泄露或被修改,從內部網向公網傳送的信息可能被他人竊聽或篡改、系統工作效率可能受到嚴重影響等安全隱患,對電子政務系統網路安全整體解決方案進行了深入研究。
  12. Performance improvement of software can save large amount of money on the one hand through avoiding unnesseccery hardware investment and upgrade ; on the other hand, performance improvement can help us exploring the hidden characteristics of the computer system, so we can reach the performance limitation as possible as we can

    軟體性能的改善從經濟上可以節約大量的財力和物力,避免不必要的硬體系統升級和軟體系統的變革性升級;從技術上,可以探索計算機系統的性能特徵,性能極限,為工業生產提供有力的支持。
  13. With the development of computer network techniques and science technology, information industry and it ' s use have expanded greatly, enterprise ( for instance, government, finance, telegraphy. etc ) and personal user have depended on networks more and more larger, at the same time, such has brighten lots of information security in hidden trouble, network security is increasingly paid attention to and concerned about, it is critical problem how to protect security in networks and information system

    隨著科技進步和計算機網路技術的飛速發展,信息產業及其應用得到了巨大發展,政府、金融、電信等企事業單位及個人用戶等對網路的依賴程度越來越高,同時也由此帶來了信息安全的隱患,如何保障網路與信息系統的安全已經成為人們高度重視的問題。
  14. Theoretical analysis and results of computer simulation show that the proposed method is not only feasible but also simple comparing with classic method. secondly, in connection of hidden danger in security due to symmetric system, a novel encoding techniques is proposed with spherical wave illumination based on asymmetric system

    其次,針對現有光學加密系統的對稱性給系統安全性能所帶來的隱患,在4f系統的基礎上,不增加系統元件的情況下,提出了一種用球面波照射非對稱準傅立葉變換系統進行光學圖像加密的新方法。
  15. In computer security, a hidden software or hardware mechanism that permits system protection mechanisms to be circumvented. it is activated in some nonapparent manner

    在計算機安全學中,使系統保護機制用陷阱隱藏起來的一種隱藏的軟體或硬體機構。它通常以不透明方式工作。
  16. This will protect you from the malware that travels in hidden web page code, self - sending viruses that implant themselves on your computer through holes in the operating system, and any of a number of other ways they could travel

    這將保護你從惡意軟體游記隱藏網頁代碼,自我發送病毒植入自己的電腦上的通孔的操作系統,和任何其他一些方法,他們可以旅行
  17. At present, the public security and traffic police computer network ’ s main technical measures taken to deal with the network security are the firewall, the security route, cryptographic application and etc. they are useful to prevent the unauthorized access to some extent, but the main hidden defect of public security and traffic police network is from the authorized users ’ mistake or vicious operation

    目前,公安交警計算機網路解決網路安全主要採取的技術手段有防火墻、安全路由器、加密應用等。它們對防止系統非法入侵有一定的效果。而交警網路的主要安全隱患是來自內部合法用戶的誤操作或惡意操作。
分享友人