攻擊性本能 的英文怎麼說

中文拼音 [gōngxìngběnnéng]
攻擊性本能 英文
instinct of aggression
  • : Ⅰ動詞1 (攻打) attack; assault; take the offensive 2 (指責別人的過錯; 駁斥別人的議論) accuse; ...
  • : Ⅰ名詞1 (性格) nature; character; disposition 2 (性能; 性質) property; quality 3 (性別) sex ...
  • : i 名詞1 (草木的莖或根)stem or root of plants 2 (事物的根源)foundation; origin; basis 3 (本錢...
  • : 能名詞(姓氏) a surname
  • 攻擊性 : aggressiveness
  • 攻擊 : 1 (進攻) attack; assault; launch an offensive 2 (惡意指責) attack; accuse; charge; slander; v...
  • 本能 : instinct; born ability
  1. 2 ) a new one time password authentication scheme. the original password authentication is vulnerable to guess attack and server personating attack. to overcome the vulnerability of this scheme, this paper designs a simple and efficient password authentication schema. the enhanced schema can improve the system ' s ability to defend all kinds of the attacks without using any cryptosystems

    2 )新的一次口令認證機制。針對postgresql原有認證機制具有易遭受口令猜測和服務器端假冒的缺陷,文設計了一種簡單而有效的口令認證機制。該認證機制不需要使用任何加密系統,就有效加強對各種手段的防範力。
  2. They are the “ seeking ” or “ reward ” system ( which motivates the pursuit of pleasure ) ; the “ anger - rage ” system ( which governs angry aggression but not predatory aggression ) ; the “ fear - anxiety ” system ; and the “ panic ” system ( which includes complex instincts such as those that govern social bonding )

    這四種是追求或報償系統(會趨使追求快樂) ;憤怒?暴怒系統(控制憤怒而非掠食) ;恐懼?焦慮系統;以及恐慌系統(包括控制社會關系的復雜) 。
  3. Security, too, is a key issue for switching the traditional private nforork to vpn. security of mpls wn architectur is analyzed thorouguy in this thesis, including septheion of address space and route, hiding of the mpls core smicture, resistance of attacks, impossibi1ity of 1abe1 spoofing

    安全是虛擬專用網否取代傳統專用網的關鍵,文對mplsvpn體系結構的安全進行了深入分析,包括地址空間和路由的隔離、隱藏mpls核心結構、抵抗、抵抗標記欺騙等,從而得出mplsvpn與atm framerelay具有相同安全級別的結論。
  4. The basic mechanism of viral attack is that the viruses replicate themself using the host ' s ( in this case is " our " ) dna genetic replication system

    濾過病毒人體的基機制是病毒夠通過使用病人身體中的dna基因復制系統來復制自己。
  5. Being a widely utilized public ip platform, it is susceptible to security attacks of all nature, as outlined in the following areas : the open nature of the ip internet systems - increase of foreign attacks, for example dos / ddos attacks ; the current weakness of the existing operating system ' s internet protocol ; mainframe, and lack of an evaluation standard for back office systems, the inevitable problem of illegal internal access, the lack of guidelines for record keeping and post attack documentation processes, hi addition, still in existence, are managerial problems including the lack of securit y knowledge amongst the workforce and the inexistence of a complete set of security guidelines. to guarantee china telecom ' s 163 / 169 system ' s reliable functions, to protect the user ' s interests, at the same time, insuring quality service, it is necessary to adapt p2dr model as a solution to the current security issues. supported by the modern secure theory and made the secure implementation abundant project practices, this paper gives the general secure design for the chongqing public ip network using p2dr secure model

    中國電信建設的公眾ip網對我國internet的發展起著決定作用,重慶電信163 / 169網際網路是國家骨幹網在地的延伸,擁有7個核心節點(採用cisco12012 、 2 * 2 . 5gdpt環) ,三十八個匯接節點,提供寬帶,窄帶多種接入方式的公眾ip網,現擁有近20萬用戶,佔全市網際網路用戶四分之三以上,作為這樣一個擁有眾多用戶,開放的ip平臺,會受到各種各樣的安全威脅,主要表現在ip網路的開放,來自外部的增多,如dos / ddos;所使用的操作系統運行的網路協議自身的脆弱;主機、網路設備的配置是否缺乏評估手段;不可避免的內部非法訪問;缺乏必要的審計作為犯罪取證,出此之外,還有管理上的一些問題,如人員安全意識不強,安全制度不夠健全等多方面原因。
  6. Rank the threats by criticality, or impact how much damage an attack of this nature can cause and likelihood

    按危險程度(即影響,此種身可造成的損壞程度)和可對威脅進行評級。
  7. But this presents some risk, because a malicious user could insert inappropriate data, or attempt a script injection attack, using the ability to edit string - typed properties. as a security practice, if you create custom

    不過,這一功帶來了一定的風險,因為惡意用戶可以藉助此功編輯字元串類型的屬,從而插入不恰當的數據或者試圖發起腳注入式
  8. On one hand, america should strike the international terrorism and prevent the proliferation of massive destructive weapons. america has expressed that it would make pre _ emptive action and prevent attack on some so - called " evil axis ", " rogue country " and so on. on the other hand, america still inherits the ideology of the " cold war " and embeds the challenge from the traditional great nations to guard against and restrain the rise of the regional great nations

    美國從其自身利益出發,對其安全觀進行了深刻的反思,美國土是否安全的信念開始動搖,美國重新找到了全球戰略的對手,美國對當前最危險的敵人與威脅的排名次序發生了變化,美國的對外政策也隨之發生了重大調整: 「反恐」成為美國對外政策的中心,確保土「絕對安全」成為美國對外政策所追求的優先目標,美國一方面要打國際恐怖主義,防止大規模殺傷武器的擴散,表示要對國際恐怖主義與所謂的「邪惡軸心」 、 「無賴國家」等進行先發制人的預防;另一方面,美國依然沿襲冷戰思維,念念不忘防範地區大國的崛起有可對其構成的挑戰。
  9. The main work of this thesis include the following aspects : ( 1 ) after deeply analyzing and probing the one - time password authentication technology, aiming for the deficiency of the extant systems of one - time password authentication, this thesis proposes an improved one - time password authentication schenism, which can efficiently resist the small - number attack and replay attack. what ' s more, during implementation the improved authentication mechanism does not require the user in the client end to install any software or to modify any configuration

    文主要做了以下幾個方面的工作: ( 1 )對一次口令認證技術進行了深入的分析和探討,針對現存一次口令認證系統不抵禦小數的安全漏洞,提出一種改進的一次口令認證機制,這種認證機制夠有效地抵禦小數和重放,而且使用時不需要客戶端做任何設置和安裝任何軟體。
  10. This paper analyzes and develops the existing risk analysis model bases on term rewriting system. it divides the group of assets into critical and normal subset, and performs the analysis in separate procedure. this reduces the system complexity, guarantee the priority of the critical assets ; it also introduces and / or attack tree into the attack scenario, cut down the system requirement of space, and provides support for both the coming graph rewriting model and decision selection algorithm

    文針對項重寫風險分析模型中資產的關鍵級別,劃分出關鍵資產,通過分步的風險分析,實現不僅可以降低系統復雜度,還有效保證關鍵資產的優先處理;引入了與或樹構建場景,節約了運行所需的空間,為后來的決策選擇打下基礎,同時也為以後的圖重寫的風險分析提供依據。
  11. After analyzing the distribution of most attack packet size and the distribution of small packet percentage in normal datasets, a based on small packet threshold adaptive sampling method is proposed to promote the capacity of capturing attack packets. sampling strategy adjusts automatically according to the variation of small packet in order to capture more attack packets

    為了提高報文的捕獲,在分析了報文大小分佈和小報文在正常數據中的比例分佈的基礎上,文提出了基於小報文閾值的自適應采樣演算法,監測小報文的變化情況動態地調整采樣策略,更多地捕獲報文,為後期的分析和處理打下良好的基礎。
  12. Normal behavior and anomaly are distinguished on the basis of observed datum such as network flows and audit records of host. when a training sample set is unlabelled and unbalanced, attack detection is treated as outlier detection or density estimation of samples and one - class svm of hypersphere can be utilized to solve it. when a training sample set is labelled and unbalanced so that the class with small size will reach a much high error rate of classification, a weighted svm algorithm, i

    針對訓練樣是未標定的不均衡數據集的情況,把檢測問題視為一個孤立點發現或樣密度估計問題,採用了超球面上的one - classsvm演算法來處理這類問題;針對有標定的不均衡數據集對于數目較少的那類樣分類錯誤率較高的情況,引入了加權svm演算法-雙v - svm演算法來進行異常檢測;進一步,基於1998darpa入侵檢測評估數據源,把兩分類svm演算法推廣至多分類svm演算法,並做了多分類svm演算法比較實驗。
  13. Experimental results show that the proposed techniques have good imperceptibility and can survive of common image processing operations and jpeg lossy compression with high robustness. the second one considered the watermarking system as a special digital communication system and introduced the ecc as channel coding technique. by using the turbo coding technique, we are able to reduce the watermark bit error rate and improve the robustness of the watermark so as to make counterfeiting attacks more difficult

    文在保證水印不可見的基礎上和載體圖像的允許降質范圍內,利用rbf神經網路技術實現數字水印信息的最大強度嵌入以增強數字水印抵禦各種惡意的穩健;在通信論和信息論模型基礎上,引入ecc (差錯控制編碼)技術降低水印的誤碼率,使得提取水印信息更加可靠,使可的水印變得更加困難,從而獲得更好的水印穩健和可靠
  14. But, though considerable process has been made in the last ten years, digital watermarking is still in its infancy, and much interesting work remains to be done this thesis addresses some problems in the gray - scale image digital watermarking that are summarized below : 1 ) whereas the basic theory of digital watermarking is still very poor, a digital watermarking mathematic model based on imperceptibility and robustness is presented by analysising the characteristic of digital watermarking ; 2 ) based on the model constructed above, by defining the measures of capacity and robustness of digital watermarking, an objective method for evaluating the digital watermarking is introduced and used to analysis some algorithms ; 3 ) whereas geometric distortion always influences the restoration of watermark, we advocate to enhance the robustness against geometric distortion by restoring the image which has been distorted by geometric transformation, and a method is designed for estimating the parameters of geometric transformation ; 4 ) based on the conclusion discussed above, and combined with the masking effects of hvs, a novel public meaningful gray - scale image digital watermarking is designed by analysising the characteristics of image gray - scale interpolation and haar wavelet transformation. the experimental results show that the method is indeed powerful ; 5 ) whereas many image digital watermarking schemes, which embed watermark by modifying the values of pixels in spatial domain and transformed domain, are confronted with the conflict between the imperceptibility and robustness, we advocated to use some stable digital characteristics of host image as watermark and a algorithm based on hermite matrix is designed

    文重點對灰度圖象數字水印技術進行研究,主要工作如下: 1 )鑒于目前數字水印的理論研究比較薄弱的現狀,文通過分析數字水印的特點,建立了一個數字水印的數學模型,為進一步研究數字水印打下了基礎; 2 )根據以上建立的模型,通過引入容量和穩健度的概念為數字水印提供了一個客觀評價方法,並對一些數字水印演算法進行了分析; 3 )為增強數字水印抵抗幾何力,研究了受幾何的圖象的復原問題,並給出了一個計算圖象幾何變換參數的方法; 4 )通過分析圖象灰度插值演算法和haar小波變換的特點,結合hvs的掩蔽效應,設計了一個公開的有意義數字水印演算法,實驗結果表明演算法具有較強的穩健; 5 )目前許多水印演算法都是通過在空域或頻域修改象素值的方法嵌入水印的,這種方法面臨著透明和穩健的矛盾,為解決這個矛盾,文提出以圖象的某些穩定的數字特徵為水印的觀點,並結合hermite矩陣的特點設計了相應的水印演算法,實驗結果表明該演算法具有較好的穩健
  15. Finally, we proposed a novel improved self - adaptive algorithms and testified its combining encryption effect with its position and energy information. in part two of this thesis, we analyze the dynamic states of an image caused by image iteration, as a result we point out that the holographicity exists with chaotic characters simultaneously during image scrambling

    隨后,我們分析純位置移動演算法的弱點並作了改進,給出了一種新的自適應圖像置亂加密演算法,經過演算法加密的圖像可以有效地防止已知明文的,並具有很好的完整保護功,亦可用於圖像驗證。
  16. To answer this question, a bispecific, trifunctional antibody constructs which can not only target block virus incorporated rca, but also can induce complement activation by it ' s fc fragment were designed and constructed and iv the role of this kind of bispecific antibody in virus neutralization was studied. 1. to test our idea, human immunodeficient virus ( hiv ) and enveloped extracellular virus ( eev ) of vaccinia virus ( vv ) were selected in our study because of their complex immune evasion stratiges, their threaten to humans, and because both these two kinds of virus can escape complement attack by incorporating host rca into their envelope

    以嚴重危害人類健康,且具有復雜免疫逃避機制的有包膜的hiv病毒及痘苗病毒的eev病毒為研究對象,首先對它們逃避補體的現象進行了驗證,探討了宿主膜補體調節蛋白cd55 、 cd59與hiv病毒及eev病毒免疫逃避的關系,評價了病毒結合的這兩種補體調節蛋白作為研究提出的,通過消除病毒逃避補體的機制來恢復病毒對補體的敏感,提高補體抗病毒效率這一抗病毒策略的靶點的可
  17. Through constructs the model, we discovered that in the output competition the debt can cause the company to have more aggressive, but in price competition we must differentiated the different situation to judgment, then the article has discussed the effect of product market competition on the company financing ability and financing choice. based on the data of listed - company financial state from 1998 year to 2004 year in shanghai and shenzhen stock market, the article descriptive statistic the listed - company ’ s business - line competition condition and the characteristic of listed - company capital structure

    文從產品市場競爭的產量競爭和價格競爭出發,研究了債務融資在cournot產量競爭和bertrand價格競爭中的作用,通過構建模型發現:在產量競爭中,債務使企業更具;而在價格競爭中,則應區分不同的情況進行判斷,文接著探討了產品市場競爭對企業融資力和融資選擇的影響。
  18. In this paper, we first introduces two fast elliptic scalar multiplications, signed odd - only comb method and width - w naf method. then, analyze their abilities to resist against power analysis. we also present improved scalar multiplication methods

    文以兩種常見的橢圓曲線快速演算法? ? signedodd - onlycomb演算法和width - wnaf演算法為基礎,對它們進行量分析,分析它們的抗量分析,並提出相應的改進演算法。
  19. Besides, the module to defend illegal attack should also be integrated in stb to ensure secure broadcasting. so it is a key point for the stb developers to develop effective system with high security and independent intellectual property according to national requirements in defending illegal attack

    另外為了滿足電視臺前端安全播出的需求,研發階段也需要將防非功模塊集成到機頂盒中,根據國家廣電總局制定的防非法要求,開發高安全、具有自主知識產權的有效防非監控系統是機頂盒開發商研發的重點。
  20. Standardized stories were used as measures to determine the subjects " social cognitional abilities of possession, attribution, intentional perception and social perspective taking. furthermore, we created three scenarios of companion activities to study the different reaction of aggressive behaviors between aggressive children and non - aggressive children. in the first scenario, subjects played with two companions who were doing fighting games

    我們推斷,當兒童具有了判斷別人行為意圖的力時(小班和中班兒章不具有判斷別人行為意圖的力) ,兒童傾向于把別人的行為判斷為意圖,即使別人的行為根沒有意圖,而非兒章則做出較客觀的判斷。
分享友人