文化侵入 的英文怎麼說

中文拼音 [wénhuàqīn]
文化侵入 英文
culture invasion
  • : Ⅰ名詞1 (字) character; script; writing 2 (文字) language 3 (文章) literary composition; wri...
  • : Ⅰ動詞(侵入) invade; intrude into; infringe upon Ⅱ形容詞(接近) approaching Ⅲ名詞(姓氏) a surname
  • : Ⅰ動詞1 (進來或進去) enter 2 (參加) join; be admitted into; become a member of 3 (合乎) conf...
  • 文化 : 1. (精神財富) civilization; culture 2. (知識) education; culture; schooling; literacy
  1. This kind of investigations have acquired some accomplishments at present, but much of these accomplishments were limited to resolve certain frondose application using certain fixed network model and were far from satisfying the minimizing forecasting faults demands of ids improving. the purpose of this theme is to establish a multi - net - model and make it generally applicable during the arithmetic realization process to content all application demands and thus minimize forecasting faults in the end of this article applying the advanced bp network to the es in ids minimized the false forecasting, further more it discussed the process of using visual c + + to realize these networks

    目前,這方面的研究已有了部分成果,但大多隻局限於應用一種固定的網路模型來解決某一具體的應用,還遠遠不能滿足檢測漏報和誤報率高的問題,本的研究目的就是要建立一種靈活的網路模型,並在演算法實現過程中使其具有通用性,以滿足各種應用的需要,尤其是使檢測的漏報率和誤報率趨于最小
  2. A group called " non a halloween " set up to fight the trend, which it saw as an unwelcome intrusion fostered by purely commercial interests, even wound itself up last year. " there was no need for the group to exist any more, " former president arnaud guyot - jeannin told reuters. during the 20th century, it became firmly established in the united states, marked by hollowed out pumpkin heads and children dressed as ghosts demanding " trick or treat " from passers - by

    為阻止萬聖節在法國的進一步流行,那裡在幾年前還曾經出現過一個名叫「人人不過萬聖節」的民間組織,按照他們的觀點,這個節日不過是在赤裸裸的商業利益驅使下而產生的一種令人厭煩的而已,有趣的是,該組織已經在去年宣布完成了自己的「歷史使命」並就地解散。
  3. With the development of economic and enhancement of international communication the phenomenon of inbreak caused by outer species have became worse and worse

    隨著經濟的快速發展以及國際交流的不斷加強,外來物種的現象日益嚴重,給我國的經濟、、生態以及人類的健康造成了重大的危害。
  4. After comparing in detail the current popular 24 idss or ids prototypes from the aspects of the granularity, methods, and tune of detection, data - collection, and data - processing, we find out the problems in the most of the current idss that they are generally platform dependent, inefficient in detection methods, lack intelligent in data analysis, inextensible as the network configurations changed or upgraded, and inadaptive when the new attack methods emerge

    首先從數據來源、數據處理周期、數據收集和分析、檢測方法、系統運行平臺等七個方面對當前較具有影響力的24種檢測系統或原型進行了詳細的比較,分析了現有檢測系統在系統平臺的異構性、系統檢測方法的效率、數據分析的智能性、面臨新的方法時的適應性和網路配置發生變時的可擴展性等方面的不足和問題。
  5. Automated response to intrusions has become a major issue in defending cri tical systems because the traditional network security components run short of cooperation and automation. the system is requested to have the capability to cooperatively react without human intervention. an infrastructure that supports collaboration between security components is critically needed

    由於傳統的網路安全組件在檢測與響應方面缺少協作,自動程度低甚至需要人工配置,而者卻可能在計算速度等方面大做章,所以對網路的自動響應已經成為關鍵系統防護中的首要問題,也就是說,我們要求系統在無人參與的情況下,具有協同檢測和自動響應的能力。
  6. Before september 18 ( superscript th ) incident, " life weekly " paid attention to japanese aggression against china with keen insight and deeply analyzed the reasons for japanese invasion of china : many factors such as japan ' s economy, politic and culture, which " life weekly " regarded as internal reasons for japanese aggression, while it held that the weakness of china was an inportant external reason for the invasion of japan

    「九?一八事變」前, 《生活》周刊以敏銳的觀察力,關注日本對中國的略,並對日本華的原因作了深分析,認為日本華的內在原因是其國內經濟、政治、等諸多因素影響、作用的結果,而中國自身國力的孱弱則是招致日本略的重要外因。
  7. Child culture, in the person of big bird and barney the dinosaur, invades the home and takes over the conversation and the television, and child activities dominate evenings and weekends

    以「大鳥』 』和「巴尼恐龍」為代表的兒童文化侵入了家庭,成為人們的談資,霸佔了熒屏;兒童活動主宰晚上和周末的時間。
  8. Entering the new historical times and developing stages of all - out efforts to construct a well - to - do society in our country, in the face of the negative effect produced toward our country ' s advanced culture development by swift and violently developing of economic globalization and information networking of the world, in the face of the quickening of market economy paces of reform and opening - up once in our country cause social life diversification and interests subject pluralism which inevitably takes shadow on the agitation and infiltration of different mind and culture, in the face of the spiritual culture need which the people increase day by day, in the face of the influence owing to western capitalist class and westernization and strategy of splitting up that hostile force adopt of decadent ideology, the advanced ideological ethical culture in contemporary china is not only confronted with historic opportunities and advantageous condition to accelerate its development, but also faced with austere challenge and trial

    在我國進全面建設小康社會的新的歷史時期和發展階段,面對世界經濟全球和信息網路的迅猛發展對我國先進發展所產生的影響,面對我國改革開放和市場經濟步伐的加快導致社會生活多樣和利益主體多元所必然引起的各種思想的相互激蕩、相互滲透,面對人民群眾日益增長的精神需要,面對西方資產階級腐朽思想的蝕和敵對勢力所採取的「西」 、 「分」的戰略圖謀,當代中國先進思想道德既面臨加快發展的歷史機遇和有利條件,也面臨十分嚴峻的挑戰和考驗。大力發展先進思想道德,對于促進中國先進的發展,為改革開放和現代建設提供正確的指導思想和強大的精神動力,具有重要的戰略意義。
  9. The arguments concentrate on two aspects primarily, one is whether the defense ’ s limit should be included in the concept of justifiable defense or not, the other is whether justifiable defense must do harm to the people who infringe the law or not. about the first question, someone oppose nominally and consider that the defense ’ s limit should not appear in the literal statement of the concept of justifiable defense, others oppose substantively and consider that the defense ’ s limit is not the element of justifiable defense and excessive defense should be bring into category of justifiable defense. in my opinion, the former standpoint apprehends the legal rules of justifiable defense solely and not associate with the legal rules of excessive defense

    認為:防衛限度條件應當納正當防衛的概念,損害性不是正當防衛的必然要求;正當防衛是由人的自我防衛這一自然權利接受法律的洗禮以後形成的法定權利,自然權利屬性和階級性都是正當防衛的正當根據;正當防衛中的不法害包括緊迫的犯罪或者違法行為,不法害中的「不法」是主客觀相統一的不法;正當防衛的主觀條件是基於對不法害的認識而決意實施防衛行為的心態,特定的防衛目的不是正當防衛的主觀條件。
  10. On the operating design of raas, the paper focused on the change of task _ struct, the design of kernel process kaasd, the timing of raas, the configuration and initialization of raas in the end, the paper evaluate the raas from the aim of system design, the integration with the other secure components of secure os, provide some problems unsolved, such as the expanding to network monitor, the new technology of ids

    對于實時審計分析系統的整體運行設計,從操作系統原有數據結構task _ struct的改變,內核進程kaasd的設計, raas的定時和系統的配置和初始這幾個方面逐個進行敘述。在本的最後,從raas的達到的目的,與原有安全功能的有效合成等方面對該系統作了一個評價,同時提出幾個需要進一步思考的問題,如對網路的擴展,對檢測新技術的引
  11. Groundwater level prediction is also a very important field in groundwater environment prediction. land subsidence, encroachment of sea water and deterioration of water quality and so on by artificial development have relation to sustained drop of groundwater level. after groundwater level change mechanism was analyzed, the establishment method of groundwater level prediction regression analysis model was explored. and the groundwater level development trend of some planning region with the model was predicted according to its change characters of groundwater level, wath ' s more, the prediction results was analyzed

    地下水位的預測也是地下水環境預測的重要內容,地下水在開采過程中所產生的地面沉陷、海水、水質惡等現象均與地下水位持續下降有關,本在對地下水位變機理分析的基礎上,探討了地下水水位預測回歸分析模型的建立方法,並針對某規劃區地下水位變的特點,應用該模型對該規劃區地下水位發展趨勢進行了預測,並對預測結果進行了分析。
  12. With the very low water to cement ratio, rpc has ultra - high strength high ductility and low permeability. in this paper, the compressive strength of rpc can reach to a high point with the number approximately 135mpa. as illustrated from the study results, we can approve some fundamental conclusions : there are big effects on rpc with deferent kinds and properties of raw materials and deferent curing conditions ; stress - strain curve shows the process of destroy with rpc samples ; x - ray diffraction analysis indicates that heat treatment at temperatures 90 accelerate the hydration of rpc sharply, therefore, mechanical and microstructural properties of rpc are highly dependent on heat treatment ; it is believed that rpc materials have excellent resistance to chloride permeability ; during the heat treatment, the shrinkage of rpc developed quickly because of chemical reactions ; the rpc with slag mostly has the advantage of rpc without slag about resistance to solutions corrosion

    研究結果表明:通過對rpc各組分摻量變的研究,可以找到rpc的最優配合比;試件成型后的熱養護制度對rpc的性能影響巨大; rpc的抗壓應力?應變曲線可以反映出試件受破壞時微裂紋的擴展情況,剛纖維的摻可以大幅改善rpc的韌性; rpc在成型后存在較大的收縮,而其中的學收縮要遠遠大於乾燥收縮; rpc具有很強的抗氯離子滲透性能,漿體的密實度很高;通過x射線衍射實驗,可以發現rpc的膠凝體中ch晶體已經幾乎不存在,膠凝體主要由c - s - h凝膠和未水水泥顆粒組成;在抗溶液蝕的實驗中,摻礦渣rpc的抗溶液蝕性能在絕大多數情況下要好於不摻礦渣試件,酸、堿溶液和浙江工業大學碩士學位論摘要一些鹽溶液都會對rpc的結構產生蝕作用,但是機理各有不同。
  13. The french people, who tend to wear their cultural hearts on their sleeves, howled about yankee cultural imperialism when disney managed to buy 1, 950 hectares ( 4, 400 acres ) of prime farmland for a fraction of the market price after the government used its right to eminent domain to find mickey and his friends a home

    當法國政府行使它的徵用權,將一塊1950公頃的主要農用地以遠遠低於市價轉賣給迪斯尼時,擁戴自己的法國人群起抗議美國
  14. This sacred buddhist site, popularly known as the city of senkadagalapura, was the last capital of the sinhala kings whose patronage enabled the dinahala culture to flourish for more than 2, 500 years until the occupation of sri lanka by the british in 1815

    康提古城是一個聞名遐邇的佛教聖地,這里曾是孕育了長達兩千五百多年的辛哈拉王朝末期時的首府, 1815年時,由於英國人的,辛哈拉王朝滅亡。
  15. Unlike most of western europe, ireland never experienced the barbarian invasions of the early medieval period and, partly as a result, the sixth and seventh centuries saw a flowering of irish art, learning and culture centering on the monasteries

    與大多數西歐國家不同,愛爾蘭從未經歷過中世紀早期的野蠻,作為部分原因,在6世紀和7世紀,以寺院為中心的愛爾蘭藝術、學術和得到了空前繁榮。
  16. Meanwhile, in the areas of economy, culture, science and education etc, a new system of social equity which is innovative and efficient has not been established comprehensively. the infringement of farmers " economic rights exists in various aspects, e. g. the insufficient supply of public services in rural areas, the low comparative advantage in agriculture, the comparative decline of farmers " income, the slow transit of redundant rural labors, the over - heavy burdens on farmers

    違背社會公小的川有制度仍然普近存在,而在經濟、、科技、教育等各方仰,創新的、高效的、真正體現社會公正的新制度安排尚未全面形成,直接導致農村公共產品供給不足、農業比較利益低下、農民收相對下降、農業剩餘勞動力轉移緩慢、農民負擔過重等害農民經濟權益現象。
  17. To solve these problems, this thesis proposed a new model for the intrusion detection system that based on the data mining. we have discussed some key technical problems and related solutions. we apply some existing algorithms of association analysis, sequence pattern analysis, and data classification to the intrusion detection system

    針對這些問題,本採用了一種基於數據挖掘技術建立檢測系統的方法,討論了該系統實現中的關鍵技術及解決方法,將現有的數據挖掘演算法中的關聯分析、序列模式分析、分類等演算法應用於檢測系統,對行為提取特徵、建立規則,通過對審計數據的處理與這些特徵進行匹配,檢測,以形成智能檢測系統。
  18. It is well known that where the white man has invaded a primitive culture, the most destructive effects have come not from physical weapons but from ideas

    眾所周知,凡是白人原始的地方,破壞作用最大的不是殺人的武器,而是思想。
  19. The main research contents are as follovvs : after the analyzing of the process of making train diagram, according with its character, and take into account the trend of innovation, chooses the total solution based on the b / s architecture, 3 - tier operation distributed and 2 - tier data distributed to separate the data from operation and simplify the development and maintenance ; the e - r data model that is accord with the 3nf criterion is designed after analyzing the data structure of the train diagram system. emphasis on the permission security of the distributed system, take the view schema, coupled with the login authentication and permissions validation, to ensure the data accessing domination, and take the synchronization, error control, and restore capability to advance the data security ; on the basis of b / s solution architecture, after comparing the existing transportation technologies, b - isdn and adsl is selected as the major solution architecture based on the package - svvitched networks. furthermore, error control, firewall, and encryption techniques are introduced to prevent the hacker attack and ensure the networks safety

    的主要研究內容包括:對目前我國列車運行圖管理體制和編制流程進行詳細分析,根據其「幾上幾下」的特點,並結合未來「網運分離」體制改革的變預測,選擇採用與之相適應的基於b s體系架構、三層業務分佈、二層數據分佈的整體方案,實現業務與數據的分離,降低開發與應用過程的復雜度和總體成本;對列車運行圖系統的數據信息進行分析,設計符合3nf規范的數據e - r關系模型,並著重研究處于分散式系統中的列車運行圖數據信息的訪問權限和數據安全問題,提出以視圖模式結合用戶識別權限審定實現數據權限劃分,以並發處理、容錯技術、恢復技術提高系統的數據安全性;在基於b s架構的系統整體方案基礎上,對當前多種數據傳輸技術進行分析比較,採用b - isdn為主幹網、 adsl為接端的基於公用數據網路分組交換技術的系統網路體系結構,並針對網路自身安全性和黑客攻擊與問題,詳細討論綜合採用差錯控制、防火墻、數據加密解密等技術手段提高系統的網路安全性能。
  20. Up to now, there is no united technical standard of maifan stone ' s determine the nature which is used to define the material of maifan stone, it is a semi - weathering material of mid - acidic intrusive rock, it contains many trace elements which are important to human being

    在對前人研究全面分析的基礎上,根據麥飯石的用途,首先提出了一個確定麥飯石材料的定性標準,即一種鈣堿性的中酸性巖的半風物。
分享友人