重復侵入 的英文怎麼說

中文拼音 [zhòngqīn]
重復侵入 英文
multiple instrusion
  • : 重Ⅰ名詞(重量; 分量) weight Ⅱ動詞(重視) lay [place put] stress on; place value upon; attach im...
  • : Ⅰ形容詞1 (重復) repeated; double; duplicate 2 (繁復) complex; compound Ⅱ動詞1 (轉過去或轉過...
  • : Ⅰ動詞(侵入) invade; intrude into; infringe upon Ⅱ形容詞(接近) approaching Ⅲ名詞(姓氏) a surname
  • : Ⅰ動詞1 (進來或進去) enter 2 (參加) join; be admitted into; become a member of 3 (合乎) conf...
  • 重復 : 1 repeat; duplicate; reduplicate; iterate 2 repetition; reiteration; gemination; rerun; duplicati...
  1. But all these things, with an account how 300 caribbees came and invaded them, and ruin d their plantations, and how they fought with that whole number twice, and were at first defeated, and three of them kill d ; but at last a storm destroying their enemies cannoes, they famish d or destroy d almost all the rest, and renew d and recover d the possession of their plantation, and still liv d upon the island

    三百來個加勒比土著曾海島,破壞了他們的種植園。他們曾兩次與這些野人作戰,起先被野人打敗了,死了三個人。后來,颳起了風暴,摧毀了土著的獨木舟其餘的野人不是餓死就是被消滅了,這樣才新收了種植園,繼續在島上過日子。
  2. ( 2 ) in serial recall task, four types of error are found, that is omissions, intrusions, movements and repetitions

    ( 2 )小學生在完成系列回憶任務時出現四種錯誤類型,即遺漏錯誤、錯誤、移動錯誤和錯誤。
  3. The differences of omissions between each grade are significant. the difference of movements between grade one and grade five is significant. there is no difference on intrusions and repetitions

    其中,各年級學生的遺漏錯誤率差異顯著,一年級與五年級學生的移動錯誤率差異顯著,錯誤和錯誤無年級差異。
  4. The omissions " proportion of errors of low - score students is higher than that of high - score students, and the difference is significant. the intrussions " proportion errors of low - score students is higher than that of high - score students, and the difference is significant. the movement s " proportion of errors of low - score students is higher than that of high - score students, and the differences between grade one and grade five are significant

    差生的遺漏錯誤率高於優生,各年級的優生與差生差異顯著;差生錯誤率高於優生,各年級的優生與差生差異顯著;差生移動錯誤率高於優生,一年級、五年級優生與差生差異顯著;優生與差生錯誤率差異不顯著。
  5. The research indicates that the each - sided development of stm is uneven balanced although the overall ability of stm for the primary school students increases with the grade advancing. the inhibition of output and the speed of output develop the fastest ; but the suppression of dealing with the irrelevant information and the development of the encoding ability of the temporary characteristics develop relatively late. it shows that intrusions and repetitions have no differences in terms of grades advancing while the proportion

    小學生完成系列回憶任務盯錯誤類型發展的買驗研究從本研究中可以看出,雖然小學生stm整體能力隨年級升高而不斷提高,但stm能力的各側面發展是不平衡的,其中輸出抑制和輸出速度發展最快,而對無關信恩的抑制和暫時特徵編碼能力發展相對較晚,表現為隨年級的升高,錯誤和錯誤無年級差異,而遺漏和移動錯誤錯誤率存在顯著差異。
  6. As for ordinary crime, it has the following three features : ( i ) the action of crime discontinuance should take place in special stage : ( ii ) the discontinuance of crime should be out of the will of the conductor ; ( iii ) the conductor should give up the conduction of crime for ever. and as for special crime discontinuance, it has four features, i. e. except the foregoing three features of ordinary crime discontinuance, the conductor should take effective measures to prevent the result of crime and practically avoid the happening of the crime result. the third part studies the semi - criminal discontinuance

    在犯罪中止的時間性特徵一節中,文章對犯罪預備階段存在犯罪中止的可能性和必要性進行了探討,通過與國外刑法典的規定比較,認為從世界各國刑事立法趨勢來看,犯罪預備階段的中止行為已不宜再作為犯罪中止處罰;此節中,作者還對放棄害和犯罪既遂后能否成立犯罪中止從理論上進行了深地探討,認為放棄害的情形下,還需要同時具備有效性條件才可能成立犯罪中止,而危險犯既遂后自動有效地防止實害結果的發生,應作為一種事後的悔罪表現,而不應歸屬于犯罪中止。
  7. Here and now, face to the embarrassment of our country ’ s environment pirate relief question, due to the result of the environment pirate of charter, the author thought offer the punitive damages to the hostile, serious environmental torts. in this way can correct interests to be damaged to compensate the uneven phenomenon with interests in a certain degree. making inflictors undertake punitive damages, can not only recover the damage of the victim ' s material, spirit, but also let the hostile inflictor undertake to resume cost of the ecological environment, raise it infringe cost, weaken its economic base of infringing

    環境權救濟中引懲罰性賠償,在具體制度建構上應當以有故意或大過失為主觀要件,以權人造成損害作為客觀要件;對環境權懲罰性的權利人、賠償義務人和具體賠償范圍加以界定;在懲罰性賠償金數額的確定上,以受害人所受的人身、財產、精神損失、環境權益的損失等為基礎,結合加害人主觀惡性大小、法律所期望產生的威懾力等因素加以判決;同時也有必要對懲罰性賠償制定相應的最高限額,並建立專門基金的方式對懲罰性賠償制度加以補充,以期更好地保護受害人的利益、恢生態環境。
  8. By using breath gas to replace established blood or urine samples as biomarker source, several advantages would be obtained such as easy in sample collection and operating, unsophisticated in sample ' s composition, less infection risk, non - invasive test, real - time, and easy in repetition tests

    利用呼出氣體替換血液樣本作為生物指針的優點有:簡單方便、呼氣檢體取得容易、呼氣樣品組成較血液或尿液樣品單純、較無感染的危險、不具性、實時性、測試容易等優點。
  9. For the moment, how to prevent network system from illegal attack and destruction, how to protect confidential data from been filched - network security - is becoming more and more important

    但是,如何防止網路系統遭到未授權的非法和破壞,如何保護機要、敏感數據不被竊取或非法制,仍是網路安全中的要問題。
  10. Conclusion ( 1 ) depending on location , size and invading extension of the tumor , above different approaches are adapted selectively which can provide excellent exposure and allow for an aggressive resection of the tumor. ( 2 ) the tumor tissue of the cavenous sinus and foramen lacerum is resected carefully by microsurgery. ( 3 ) the dural deficiecy must be repaired and sutured tightly to avoid craniocerebral fluid leak

    結論( 1 )前或和中顱凹底內外溝通性腫瘤應根據腫瘤大小、位置及犯范圍選擇顱面聯合路、額顳-顳下窩路或額顳-顳下窩路結合面前徑路即可給于充分暴露並能在直視下廣泛切除腫瘤; ( 2 )中顱凹底及海綿竇和破裂孔部的腫瘤應在較高放大倍數手術顯微鏡下仔細分離切除; ( 3 )硬膜的嚴密修是避免腦脊液漏及顱內感染的要關鍵。
  11. In this dissertation, rainfall infiltration, runoff, and soil water redistribution on a hillslope were studied by simulated rainfall experiments, and soil water cycling was investigated by site observation and soil sampling methods. moreover, the reasons for the desiccation of deep soil layer were analyzed, and its assessment indexes and standards were presented. the main results are as follows : ( 1 ) rainfall infiltration into a planar hillslope with a homogeneous isotropic soil could be simply regarded as one - dimensional infiltration process, if soil erosion was prevented

    針對當前該區植被恢建中存在的科學問題,以植被建設的關鍵性限制因素?土壤水分為出發點,通過室內外模擬降雨試驗,研究了坡地降雨滲、產流及土壤水分再分佈規律,同時採用定位觀測和采樣分析相結合的方法,分析了坡地土壤水分的循環與轉化特徵,並初步建立了深層土壤乾燥化程度的評價標準,取得的主要結論如下: ( 1 )在防止土壤蝕的條件下,均質坡地的降雨滲過程可以簡化為一維。
  12. But, we can use information assurance to improve the network ' s security. information assurance focus on the system ' s intrusion detection ability, event reaction ability and the quick restore ability when system has been intruded

    信息保障強調為了保障信息安全,除了要進行信息的安全保護,還應該視提高系統的檢測能力,系統的事件反應能力和系統遭到引起破壞的快速恢能力。
  13. The main research contents are as follovvs : after the analyzing of the process of making train diagram, according with its character, and take into account the trend of innovation, chooses the total solution based on the b / s architecture, 3 - tier operation distributed and 2 - tier data distributed to separate the data from operation and simplify the development and maintenance ; the e - r data model that is accord with the 3nf criterion is designed after analyzing the data structure of the train diagram system. emphasis on the permission security of the distributed system, take the view schema, coupled with the login authentication and permissions validation, to ensure the data accessing domination, and take the synchronization, error control, and restore capability to advance the data security ; on the basis of b / s solution architecture, after comparing the existing transportation technologies, b - isdn and adsl is selected as the major solution architecture based on the package - svvitched networks. furthermore, error control, firewall, and encryption techniques are introduced to prevent the hacker attack and ensure the networks safety

    論文的主要研究內容包括:對目前我國列車運行圖管理體制和編制流程進行詳細分析,根據其「幾上幾下」的特點,並結合未來「網運分離」體制改革的變化預測,選擇採用與之相適應的基於b s體系架構、三層業務分佈、二層數據分佈的整體方案,實現業務與數據的分離,降低開發與應用過程的雜度和總體成本;對列車運行圖系統的數據信息進行分析,設計符合3nf規范的數據e - r關系模型,並著研究處于分散式系統中的列車運行圖數據信息的訪問權限和數據安全問題,提出以視圖模式結合用戶識別權限審定實現數據權限劃分,以並發處理、容錯技術、恢技術提高系統的數據安全性;在基於b s架構的系統整體方案基礎上,對當前多種數據傳輸技術進行分析比較,採用b - isdn為主幹網、 adsl為接端的基於公用數據網路分組交換技術的系統網路體系結構,並針對網路自身安全性和黑客攻擊與問題,詳細討論綜合採用差錯控制、防火墻、數據加密解密等技術手段提高系統的網路安全性能。
  14. The consistently repeated system call sequences in normal process trace were regarded as macros, and then an anomaly detection model based on system call macros markov chain was created

    把正常程序行為產生的系統調用跡中大量有規律的出現的系統調用短序列看成一個個獨立的基本單位(宏) ,並以宏為基本單位構建一個基於馬爾可夫鏈的異常檢測模型。
  15. It is shown that ripper is superior to other algorithms in terms of complexity in computation, classified precision and noisy data adaptability because of its adoption of the repeated incremental reduction mechanism, and it is more suitable to the intrusion detection

    由於ripper分類演算法採用了增量裁減機制,所以在計算雜性、分類精度、噪音數據適應性等方面都優于其它分類演算法,更適用於檢測建模使用。
分享友人