法術終結者 的英文怎麼說

中文拼音 [shùzhōngjiēzhě]
法術終結者 英文
spell stopper
  • : Ⅰ名詞1 (由國家制定或認可的行為規則的總稱) law 2 (方法; 方式) way; method; mode; means 3 (標...
  • : 術名詞1. (技藝; 技術; 學術) art; skill; technique 2. (方法; 策略) method; tactics 3. (姓氏) a surname
  • : Ⅰ名詞1 (最後; 末了) end; ending; finish 2 (指人死) death; end 3 (姓氏) a surname Ⅱ形容詞(...
  • : 結動詞(長出果實或種子) bear (fruit); form (seed)
  • : Ⅰ助詞1 (用在形容詞或動詞後面 或帶有形容詞或動詞的詞組後面 表示有此屬性或做此動作的人或事物) 2 ...
  • 法術 : magic arts
  • 終結 : finality; final; end; final stage; wind up; end up終結符 terminal symbol; termination symbol; 終...
  1. First, we have expatiated the working principle, performance parameters and major technologies. farther, we have analyzed the shortcomings of the existing catalog search engine and introduced the clustering analysis and the ant algorithm ; on the basis of this, we discussed the possibility and necessity of the connection between them, which avoids the local optimization of the clustering analysis to a degree. in the end, we appraise the idea that we deal with the information data by the data structure of the binary tree, m - branch tree and tree established by the ant algorithm, which can improve the efficiency of the search engine

    首先闡述了搜索引擎的工作原理,性能指標,主要技;分析了現有目錄式搜索引擎的缺點,接著介紹了聚類分析演算與螞蟻演算的理論,並論述了二合的可能性和必要性,這種合方也在一定程度上克服了聚類分析演算容易陷入局部最優的缺點,最提出了通過使用螞蟻演算建立二叉樹、 m叉樹和樹作為信息數據處理的思想,大大提高了搜索引擎搜索的效率。
  2. Article 19 termination of gestation or performance of ligation operations practised in accordance with the provisions of this law shall be subject to the consent and signing of the person per se

    第十九條依照本規定施行止妊娠或扎手,應當經本人同意,並簽署意見。
  3. Whoever is to terminate gestation or receive ligation operations under this law shall receive such services free of charge

    依照本規定施行止妊娠或扎手的,接受免費服務。
  4. The double - color method and theory for stereodisplay of the torpedo ' s trajectory are presented in this article. program which is using the programming language of visual c + + 6. 0 + mfc + opengl has been compiled. in this program, torpedo can be displayed in stereodisplay mode, which can be controlled adapting to the changing of time and space

    本文提出了魚雷彈道雙色立體顯示技,系統的介紹了魚雷彈道立體顯示的原理和方,並採用visualc + + 6 . 0 + mfc + opengl軟體構編制了相應的程序,使魚雷最能夠直觀的,以圖象信息表示出其隨時間和空間變化過程,即以立體圖象呈現在研究面前,從而能夠更為方便地模擬和計算,對魚雷彈道的研究和設計具有十分重要的意義。
  5. An significant symbol has been used to determine the technique of 3 - d discontinuities network modeling of rock mass is good or not, which is to check whether the model can reappear the reality situation of rock mass or not, in order to make the 3 - d network model to meet the need of the actual rock engineering, the methods to verify the result of the modeling are required, one of the method to be used is to compare the figures between the section of the numerical model and the sampling window of in - situ model, the second method to be used is verify the data set between the numerical model and field data, only if the verification obtained a good precision, then the model can be considered as a efficiency model, and it can be applied into the actual rock engineering

    摘要巖體隨機不連續面三維網路模擬技成熟與否的一個重要標志就是最的網路模型是否能夠較真實地再現巖體的實際情況,為了使三維網路模型的果能夠真正地應用於實際工程,就必須對模擬的果進行必要的檢驗,檢驗的辦就是將模擬出的模型剖面圖形與原型測量窗口的圖形進行圖形對比,或將原型的觀測數據與模型的測試數據進行數據對比,當這種檢驗達到精度時,模擬出的模型為有效模型,可以投入工程實際應用。
  6. It reframes the traceback problem as a polynomial reconstruction problem, and uses techniques from algebraic coding theory to provide robust methods of transmission and restriction. the scheme is a new solution to the traceback problem during a dos attack ; the honeypot for ddos, which is a tool of traceback, lures the attacker to believe that he successfully compromised a slave for his needs, convincingly simulating the architecture of a potential ddos attack ; the source - based approach to ddos defense, which is a useful adjunt to traceback systems, deploys a ddos defense system at source - end networks. attacks are detected by monitoring two - way traffic flows, and the attacks originating from source networks are stopped by rate - limiting ; the routing mechanism based on pushback treats ddos attacks as a congestion - control problem

    最後,就有關ddos攻擊反向追蹤問題,從四個方面對其解決方案進行了研究:在分析比較幾種反向追蹤演算的基礎上,著重研究了代數方編碼反向追蹤信息的方案,該方案把追蹤重構問題當作多項式重構問題,使用代數編碼理論技提供魯棒的傳送和重構方,是dos攻擊過程中的反向追蹤問題的一種新的解決方; ddos陷阱作為反向追蹤的工具,引誘攻擊相信自己成功與所需的傀儡主機通話,令人信服地模擬出潛在ddos攻擊體系構;基於源的ddos防禦方作為反向追蹤有用的補充,將防禦系統部署在源網路,通過監控雙向流量檢測攻擊和限制速率止來自源的攻擊;基於向後倒推的防禦ddos的路由機制把ddos攻擊看作擁塞控制問題,添加功能到每個路由器來檢測並優先丟棄可能屬于攻擊的包,通過向後倒推上級路由器也得到通知而把這樣的包丟棄。
  7. Main content of " hef ( high efficient firewall ) firewall realize mode study " have : ( 1 ) emulation experiment and ipv6 / tunnelbroker model set up through transproxy, explain transproxy method, improved structure of rfc3053 emphatically, act for technology about solution of efficiency, make their suitable for different need of isp of scale ; ( 2 ) on the basis of analysing ipsec agreement security question, to isakmpsa varying load attacks and improves in consulting, carry on form analyses, proved, design vpn high - efficient safe model based on ip / ipsec concept finally ; ( 3 ) on the basis of ids dynamic characteristic of system, for remedy firewall static deficiency of defence, design one method that the two combine, offer a good foundation for high - efficient online security system ; ( 4 ) through theory design and emulation experiment, the above - mentioned three part can make and imbed fire wall of the system for module, offer certain theoretical foundation to domestic fire wall design of product

    《 hef ( highefficientfirewall )防火墻實現模式研究》的主要內容有: ( 1 )通過transproxy模擬實驗及ipv6 / tunnelbroker模型建立,著重闡述transproxy方、改進的rfc3053的構,以及代理技中有關效率的解決方案,使之適用於不同規模的isp的需要; ( 2 )在分析ipsec協議安全性問題基礎上,針對isakmpsa協商中的變換載荷攻擊做出改進,並進行形式化分析、論證,最設計出基於ip / ipsec概念的vpn高效安全模型: ( 3 )基於ids系統的動態特性,為彌補防火墻靜態防禦的不足,設計出兩聯動的方,探索了高效網路安全體系模式研究的新方向; ( 4 ) hef防火墻實現模式的理論研究及模擬實驗,所得三部分研究論均可設計出module ,內嵌入防火墻系統中,為國內防火墻產品的設計提供了一定的理論基礎。
  8. First the article takes regression analytical method to forecast and at last combinatorial technology to forecast the port ' s handling capacity from 2001 to 2010, considering the differences got by the two methods

    論文先用回歸分析和三次指數平滑進行預測,考慮到兩預測果的差別,本文最採用組合預測技對2001 2010年鎮江港口的貨物吞吐量作出了預測。
  9. The following four aspects of information are included : first, government process reengineering is directed by the new government concept, the one aspect is reaffirming the concept of the government, the other aspect is the orientation and goal of the government direct the process reengineering ; two, the background of government process reengineering is the development of many factors such as the social economy, scientific technique etc, especially the widely use of information technique ; third, the government process reengineering is aiming at the operation process of the government, so the thinking of taking the process as the center will be through all the reengineering process ; fourth, the government reengineering is drastically rethinking the management process, that is to emphasize the rebuilding process

    首先,合政府在涉及業務流程的電子政務項目中的典型個案,總分析政府在進行這類項目時表現出來的共性,歸納出企業流程再造在操作層面形成的成熟方。然後,再將二進行比較分析,得出政府進行流程再造時可以採用的微觀方和宏觀策略。通過對政府流程再造的相關理論總與實踐分析,本文試圖尋找一些政府流程再造在操作層面的規律,最的目的在於表達這樣的觀點,即政府治理理念的改變最將映射到業務的微觀層面,在操作層面對信息技的合理應用應該以業務流程為中心來進行。
分享友人