整合侵入體 的英文怎麼說

中文拼音 [zhěngqīn]
整合侵入體 英文
concordant intrusion
  • : Ⅰ形容詞1 (全部在內; 完整) whole; all; complete 2 (整齊) neat; tidy; orderly Ⅱ動詞1 (整理; 整...
  • : 合量詞(容量單位) ge, a unit of dry measure for grain (=1 decilitre)
  • : Ⅰ動詞(侵入) invade; intrude into; infringe upon Ⅱ形容詞(接近) approaching Ⅲ名詞(姓氏) a surname
  • : Ⅰ動詞1 (進來或進去) enter 2 (參加) join; be admitted into; become a member of 3 (合乎) conf...
  • : 體構詞成分。
  • 整合 : commensuration
  1. The ultrabasic bodies are generally concordant intrusions, with related feeder dikes.

    超基性巖一般為具有補給巖墻的整合侵入體
  2. By physiognomy feature, it could be divided into three types of thermal structure : positive dome model, negative collapse model and border dome core collapse model. based on the depth degree or magma - thermal influenced, it could be divided into five types of thermal structure : ( ancient ) geothermal anomaly focus region model, superficial volcano eruption hydro - thermalism and hypabyssal intrusive model, thermal anticline ( thermal dome ) model, mid - deep intrusive model, deep mantle ( crust ) thermal plume model ; and put forward a perfect model of the thermal structure. there are many interaction system could be induced into a systematic thermal interaction, include : ocean - continent system, basin - mountain interaction, superficial and mid - deep crust - mantle interaction, crust - mantle commingle interaction, vertical thermal interaction ( delamination ) etc.

    依據地貌形態分為三類:正向穹窿型、負向塌陷型、邊隆核陷型:依據巖漿-熱力作用影響的深淺程度或深度分為五類: (古)地熱異常群集區、表淺層火山噴發-熱液活動與淺成型、熱力背斜(熱穹窿) 、中深層型、深部地幔(地殼)熱柱型;提出了熱力構造作用空間分佈的理想模式,將洋陸系統、盆山作用、淺表與中深部殼幔作用、殼幔混、垂向熱力作用(拆沉)等納一個統一的熱力作用系統中,為盆地動力學研究打開了一個新窗口;研討了熱力構造研究方法。
  3. Nevertheless, in these approaches the contact intethee are charactered sboly ed stiffeess k. and k. " which is not perfect and rigorous in thc vitw of solid mechanics and rather rough for the description of the behavior of the idtfores. in collbet, taken as a contact problem, the principal chatrs of the idtcthees can be reflected : ( l ) the cbntact inifore is of shear strength which implies tha a generic pair of contact points on the inidse will displace coincidentally if the tangential fbrce at this point has not reahed the 1imit resistance, else, relative s1ide betwee the points will occur along the tangental direction. ( 2 ) no matter the relative slide occurs or not, the contact bodies cannot invade each other in any wise

    本論文在對這兩種方法進行認真的分析后,說明它們對不連續面的描述並不理,也無法反映出不連續面的主要力學特性,同時指出,將帶有不連續面的巖土工程問題作為接觸問題計算更為理,它可將不連續面受力變形的主要特點反映出來,即: ( 1 )接觸面具有相應的「抗剪強度」 ,即當接觸面上某一點處的切向應力小於該點處的抵抗強度時,點對共同變形;達到強度時,則沿切向發生相對滑動; ( 2 )在個變形過程中,發生接觸的變形不能相互
  4. To detect both known and unknown intrusion patterns, the system introduces a blended frame that makes use of both misuse detection approach and anomaly detection approach. the one of the highlight of the architecture is introduction of data mining technique, and the other is introduction of genetic algorithms. the ids uses data mining algorithms to abstract key features of system runtime status from security audit data, and it uses genetic algorithm to select the feature subset to reduce the amount of data that must be obtained from running processes and classified

    本文陳述了所研究系統的主要特點和技術:將智能( agent )技術應用於檢測系統,解決了傳統檢測系統的集中式解決方案的弊病,充分利用網路資源協同完成檢測任務;利用基於主機和基於網路的數據源,形成一種完的混型的結構,從而能收集到更加全面的信息;使用了異常檢測技術和誤用檢測技術,採用一種混型的結構,既能檢測已知的攻擊模式,又能發現新的攻擊模式。
  5. On the operating design of raas, the paper focused on the change of task _ struct, the design of kernel process kaasd, the timing of raas, the configuration and initialization of raas in the end, the paper evaluate the raas from the aim of system design, the integration with the other secure components of secure os, provide some problems unsolved, such as the expanding to network monitor, the new technology of ids

    對于實時審計分析系統的運行設計,從操作系統原有數據結構task _ struct的改變,內核進程kaasd的設計, raas的定時和系統的配置和初始化這幾個方面逐個進行敘述。在本文的最後,從raas的達到的目的,與原有安全功能的有效成等方面對該系統作了一個評價,同時提出幾個需要進一步思考的問題,如對網路的擴展,對檢測新技術的引
  6. Such contour lines can be drawn for any structural surface, regular or irregular(e. g. bedding planes, faults, unconformities, dykes, veins or intrusions).

    對于任何構造面,規則的或不規則的(如層面、斷層、不、巖墻、巖脈或)都可畫出這種等高線。
  7. The system deals with integration of heterogeneous idss so that better security can be provided for network systems, including

    :著重在如何將異質的偵測系統順利,以發揮電腦網路的防禦效果,包括
  8. In the uk, it takes the principle of the slander system in the common law and forms maturity burden of proof system ; the case of new york times co. v. sullivan in 1964, takes the american media defamation into a new step of adjustment of constitution law, and the american law field also makes an effort to construct a better reasonable burden of proof system besides the tortious law

    英國秉承著傳統普通法在誹謗制度上的原則,形成了一個較為完備的證明責任系; 1964年的「 《紐約時報》訴薩利文案」則使美國媒誹謗案件進了憲法調的新階段,美國司法界一直努力在權法系之外構建一個更理的證明責任制度。
  9. The main research contents are as follovvs : after the analyzing of the process of making train diagram, according with its character, and take into account the trend of innovation, chooses the total solution based on the b / s architecture, 3 - tier operation distributed and 2 - tier data distributed to separate the data from operation and simplify the development and maintenance ; the e - r data model that is accord with the 3nf criterion is designed after analyzing the data structure of the train diagram system. emphasis on the permission security of the distributed system, take the view schema, coupled with the login authentication and permissions validation, to ensure the data accessing domination, and take the synchronization, error control, and restore capability to advance the data security ; on the basis of b / s solution architecture, after comparing the existing transportation technologies, b - isdn and adsl is selected as the major solution architecture based on the package - svvitched networks. furthermore, error control, firewall, and encryption techniques are introduced to prevent the hacker attack and ensure the networks safety

    論文的主要研究內容包括:對目前我國列車運行圖管理制和編制流程進行詳細分析,根據其「幾上幾下」的特點,並結未來「網運分離」制改革的變化預測,選擇採用與之相適應的基於b s系架構、三層業務分佈、二層數據分佈的方案,實現業務與數據的分離,降低開發與應用過程的復雜度和總成本;對列車運行圖系統的數據信息進行分析,設計符3nf規范的數據e - r關系模型,並著重研究處于分散式系統中的列車運行圖數據信息的訪問權限和數據安全問題,提出以視圖模式結用戶識別權限審定實現數據權限劃分,以並發處理、容錯技術、恢復技術提高系統的數據安全性;在基於b s架構的系統方案基礎上,對當前多種數據傳輸技術進行分析比較,採用b - isdn為主幹網、 adsl為接端的基於公用數據網路分組交換技術的系統網路系結構,並針對網路自身安全性和黑客攻擊與問題,詳細討論綜採用差錯控制、防火墻、數據加密解密等技術手段提高系統的網路安全性能。
  10. Firstly, the thesis analyzes the goal of computer network security and the security threat of network faced, and then introduces several traditional security techniques such as data encryption techniques and firework techniques. it analyzes the problems of these traditional security techniques and brings forward combine intrusion detection system ( ids ) and the traditional network security techniques to create multi - layers recovery system. it indicates the status in security domain and its significance of ids

    本論文在分析了計算機網路安全的目標以及網路所面臨的安全威脅基礎上,討論了幾種傳統的計算機網路安全技術,如數據加密技術、防火墻技術等,並分析了傳統網路安全技術存在的不足,在此基礎上提出了以檢測技術與傳統的計算機網路安全技術相結的多層次防禦系,指出了檢測系統在個安全領域中的地位以及研究ids的重要意義。
  11. The first phase construction of group networking security determined the organizing framework of security management, established integrated security strategy and networking security management system, and solved the problem of uniform defense and concentrated control for the w hole network virus, the security problem of transmission of the ddn special line, and the problem of accessing control of the important networks and networking servers by combining with corresponding security technique, anti - virus technique, firewall technique, invasion detected technique, and risk evaluation technique, etc, and implemented the security defenses for the weakest level ( transmission security of inter - region mainline network ) and kernel level ( multi - lans in first class secret units ) in the system

    集團網路安全一期建設確定了安全管理組織機構、制定了安全策略和網路安全管理制度,並結相應安全技術防病毒技術、防火墻技術、檢測技術、風險評估技術等,解決了全網病毒的統一防範集中控管問題、 ddn專線上的傳輸安全問題、重要網路及網路服務器的訪問控制問題等。實現了系統的最薄弱層(跨地域主幹網路傳輸安全) 、核心層(多個一級保密單位局域網)的安全防範。
分享友人