- 更多网络例句与可隐藏的相关的网络例句 [注:此内容来源于网络,仅供参考]
-
It is multimedia and totally customizable, and you can turn off music, hide desktop icon and change transitions.
这是多媒体和完全可定制的,您可以关闭音乐,隐藏桌面图标和变化的过渡。
-
May be discordant with that, sales growth and housing prices are hidden behind the "check-out tide."
可与之不和谐的是,销量增长和房价上涨背后隐藏的却是"退房潮"。
-
We have seen that there are some processes where an observed sequence is probabalistically related to an underlying Markov process.
我们已经看到在一些过程中,可观察序列是在一定概率下与隐藏的马尔科夫过程相关联。
-
An ordinance makes bringing a concealable firearm into the county illegal unless it is registered with the Las Vegas Metropolitan Police Department.
法令规定,将可隐藏的枪枝携入本郡是违法的,除非你向拉斯维加斯市警局办理枪枝登记。
-
A file encrypted with algorithms like PGP are not readable, but everybody knows that there is something hidden.
与类似PGP加密算法的文件不是可读的,但是大家都知道有些事情是隐藏的。
-
Still but the hidden on eliminate fruit skin anguine bug scorpion kind toxin, have the effect of clean disinfection.
还可除去水果表皮上隐藏的蛇虫蝎类的毒素,起到清洁消毒的作用。
-
Based on visual perception and image statistic characteristics, propose new techniques for content-aware key feature measurement, extraction and encryption of vidual media, consolidate foundations of mathematic theories of information hiding and embedding, propose robust capacity models and estimation methods for visual media information hiding and embedding; solve the key problems inherent in digital content certification of visual media, systematically establish controllable content-aware security mechanism of visual media
基于视觉感知和图像统计特性,提出可视媒体基于内容的关键特征度量、提取和加密的新方法;完善信息嵌入与隐藏的数学理论基础,提出高鲁棒性的可视媒体信息嵌入与隐藏的容量模型和方法,解决可视媒体的内容认证问题,系统地建立可控的可视媒体内容安全新机制。
-
The main function of this system is to implement automatic analysis of malicious codes'attacking behavior by the dynamical analyzing method. The system has the flowing characteristics: 1 Automatizing the malicious codes analyzing flow which includes the attack information collection, the attack information analysis and the attack recovery. 2 Collecting comparatively detailed attack information. 3 Detecting many kinds of automatic running techniques of malicious codes. 4 Detecting a kind of attack technique of hiding information in registration table and several kinds of attack techniques of hiding process. 5 Implementing visual show of attack reports. 6 Preventing attack from diffusing by the technique of virtual machine. 7 Detecting some new malicious codes.
该系统的主要功能是对恶意代码的攻击行为进行自动化分析,该系统采用的分析方法是一种恶意代码的动态分析方法,该系统具有以下特点:1实现了恶意代码分析流程自动化,包括攻击信息收集、攻击信息分析和攻击恢复的自动化。2收集较全面的攻击信息。3实现了对恶意代码的多种自启动技术的检测。4实现了检测一种在注册表中进行信息隐藏的攻击技术和几种进程隐藏的攻击技术。5攻击报告可视化显示。6通过虚拟机技术防止攻击扩散。7能够检测到一些新出现的恶意代码。
-
Therefore, based on the research of pathology, aiming at the long-term dissevered between the land use and transportation network system in the urban planning, construction and management fields, and the narrow definition of urban transportation system and matching supply and demand of this contradictions unity, this thesis define the integrated urban land use-transportation system (abbreviation IULTS, urban L-T system or system for short). From the interaction and the spontaneous mutual adjustment phenomena between the land use subsystem and transportation subsystem, this thesis explore the inherent laws and internal mechanism of IULTS evolution behind the phenomena, and proposed system optimization theory and methods from the mechanism of system development and evolution. It is expected that the conclusion can provide a meaningful reference for analyzing and solving traffic problems, and understanding deeply the matter that if IULTS is controllable, how to control and the direction, theory and methods of controlling.
故此,论文立足于对病理的探讨,针对当前城市规划、建设与管理上对土地利用与交通系统长期割裂的状况,及现状城市交通系统的狭义定义,基于供需匹配这一矛盾统一体提出了城市用地-交通综合系统(英文缩写IULTS,简称为城市L-T系统,下文有时直接简称为系统)概念,从系统内用地子系统与交通子系统之间所表现的互馈影响、相互调节现象出发,结合定性分析和定量研究,探究现象背后所隐藏的客观规律,揭示统发展演化所遵循的固有规律与内在机理,从系统发展演化机理上提出系统优化的相关理论与方法,以期研究结论能为从机理上研究、分析、解决交通问题,深入认识系统是否可控、如何可控及控制发展的方向、理论与方法等问题提供了有意义的理论参考。
-
As jockey cum waitress Olive Snook joins a nunnery to mend her broken heart, the Pie Maker who broke it hides Chuck from her Aunt Vivian and mother Lily, who believe she's dead.
当职业骑师兼女侍者奥莉薇史努克,来到女修道院治疗她破碎的心灵时,烤派师傅却泄露巧可隐藏起来的秘密。
- 更多网络解释与可隐藏的相关的网络解释 [注:此内容来源于网络,仅供参考]
-
Projection Painting can also be applied to hidden polygons:投射绘画可使用在隐藏的多边形上
New 'Colorize' tool 色彩化画... | Projection Painting can also be applied to hidden polygons 投射绘画可使用在隐藏的多边形上 | Tiles textures can also be displayed as such in the texture view 重复贴图与贴...
-
Berserker charge:用头猛的向前方冲撞,能打击敌人. 但要注意掌握方向,如果撞在墙上则自己会眩晕
Berserker Charge-----用头猛的向前方冲撞,能打击敌人. 但要注意掌握方向,如果撞在墙上则自己会眩晕 | Eye of the wolf------能发现隐藏的魔法师,以及黑暗中... | Harpoon-----发出一根带绳的矛,可将跑开的敌人拉近身...
-
collapsible:可折叠的
一些高级脚本编制选项包括可以指定可折叠的(collapsible)代码区域(也称作隐藏文本)、编译错误忽略、结果集输出捕获和特定于平台的编译. 启动过程 通过DB2数据库项目属性,您可以指定编译数据连接,以及启动存储过程和参数值.
-
conceal:隐藏
我们可以从攻击者的角度出发,将攻击的步骤可分为探测(PROBE)、攻击(EXPLOIT)和隐藏(CONCEAL). 同时,攻击技术据此可分为探测技术、攻击技术和隐藏技术三大类,并在每类中对各种不同的攻击技术进行细分. (2)网络监听.
-
information hiding:资讯隐藏
作者 [Effective Java] 条款12:将 class 和其成员的可存取性(accessibility)最小化 [精华]这个概念称之为资讯隐藏(information hiding)或封装(encapsulation), 是软体设计的基本信条之ㄧJava 语言用来实现资讯隐藏的设施,
-
Marco Polo:马可波罗
而在本作故事方面,将会以历史上突然消失踪影的"马可波罗"(Marco Polo)船队跟神秘的王国"香格里拉"(Shangri-La)所隐藏的秘宝为主题,带领玩家们一起身入喜玛拉雅的舞台中展开一场比前作更加刺激的冒险传奇.
-
suppresser:镇压者/禁止[删除] 者
suppressant /[医]遏抑剂/抑制剂/压制剂/抑制的/遏抑的/ | suppresser /镇压者/禁止[删除] 者/ | suppressible /可以压制的/可以抑制的/可隐藏的/
-
suppressible:可以压制的/可以抑制的/可隐藏的
suppresser /镇压者/禁止[删除] 者/ | suppressible /可以压制的/可以抑制的/可隐藏的/ | suppression /抑压/镇压/抑制/
-
suppressible:可以抑制的
suppressible 可以压制的 | suppressible 可以抑制的 | suppressible 可隐藏的
-
suppressible:可隐藏的
suppressible 可以抑制的 | suppressible 可隐藏的 | suppressinhibitclampdownquellrepresstyrannize 压制