英语人>网络例句>intrusion tone 相关的网络例句
intrusion tone相关的网络例句

查询词典 intrusion tone

与 intrusion tone 相关的网络例句 [注:此内容来源于网络,仅供参考]

Although the voice-length of the neutral tone syllable is very short, the tone pattern can be perceived. The neutral tone pitch has two types; I .the neutral tone words can be read in brief, low-drop tone when they appear behind the ~ tone, the 2nd tone and the 4~ tone, the tone pitch is 31; the neutral tone words can be read in brief, half rd high-smooth tone.

关于轻声的调值,目前学术界有两个比较有代表性的观点:1、认为轻声在四个声调之后的音高各不相同。2、认为轻声音节尽管音长短,但它的调型仍然可以感知,调值可归纳为两种情况:(1)轻声在第一声、第二声、第四声后读短促的低降调,调值拟为31。

The severe seawater intrusion exists in certain eel farming factories within Changle, Fuzhou, in certain prawn farm within Jiuzhen county, Zhangzhou, and in certain saltern within Xiuyu district, Putian, all belonging to seawater intrusion in human activity areas. The maximum concentration of Cl and mineralization within those severe intrusion areas are 5629.00 mg/L and 33.16 g/L respectively. The slight seawater intrusion is monitored in Quangang district, Quanzhou, where natural conditions are kept. No seawater intrusion is monitored in Dongchong peninsula, Ningde. No soil salinization is monitored except Zhangzhou where the sand is slightly salinized.

在福州长乐市近岸某鳗鱼养殖片区、漳州漳浦县近岸某对虾养殖片区、莆田市秀屿区某盐田附近监测到严重海水入侵,均属人类开发活动影响区域内的海水入侵,严重入侵区域氯度最高达5629.00 mg/L,矿化度最高达33.16 g/L;在泉州市泉港区某自然村监测到轻度入侵,属自然状态下的海水入侵;在宁德东冲半岛外浒沙滩附近未监测到海水入侵;在漳州断面监测到土壤盐渍化,为轻度盐渍化土,其他断面为非土壤盐渍化土。

Lithologies are mostly sand and carbonate rocks, caps are mud rock, shale and magmatite. Entrap types are anticline, fault block rebuilt by breaking and the screened entrap diapered rock mass. The composition is CO_2, N_2, CH_4, C_2H_6 and He etc. It is magma air source body and its geologic fashions are intrusion and buried volcanic conduit. The relations between gas reservoirs and gas source bodies have three types: magma intrusion-breaking-communicated gas reservoir, magma intrusion-contacted CO_2 reservoir and buried volcanic conduit-contacted gas reservoir. The CO_2 migration in magma intrusion is consisted of fusing and crystallizing phases;it in volcanic conduit is consisted of near-surface effusion and crystallizing phases.The buoyancy of CO_2 in water far more than migration resistance in breaking or chink, CO_2 is easy float upward, the floating can results in differentiation of different density gases and concentration of sealed gas. The gas in sand reservoir firstly migrate into the higher porosity and coefficient of permeability sand, and along with the pressure going up it migrate into the lower. In magma intrusion-breaking-reservoir migration, CO_2 firstly migrate into watered breaking, began gravity differentiation and concentrate, the gas pressure time and again go up, CO_2 migrate into reservoir and concentrate under expansibility as the pressure reach upward a given extend. The CO_2 in reservoir experience four breaking modes: chemistry deposition, dissolution, diffusion and mechanic breaking, the pressure balance can be broken by faulting and the CO_2 will further migrate and form new reservoir.

济阳坳陷已发现的八里泊、阳25、平方王、平南、高青、花17 CO_2气藏主要储集层位有奥陶系、中生界、沙四段、沙三段、沙一段、馆陶组和明化镇组,储集层岩性以砂岩和碳酸盐岩为主,盖层以泥质岩、页岩和岩浆岩为主。;圈闭类型主要为受断裂改造的背斜、断块及刺穿岩体遮挡圈闭。;气体成分主要有CO_2、N_2、CH_4、C_2H_6、He等。;主要气源体为岩浆气源体,气源体的主要地质形式为侵入体和埋藏的火山通道。;气藏和气源体的空间关系有岩浆侵入体一断裂一气藏沟通型、岩浆侵入体-CO_2气储集层接触型和埋藏火山通道-气储集层接触型三种类型。;岩浆侵入体CO_2气运移分为熔融运移阶段和结晶运移阶段,火山通道中CO_2气运移分成近地表喷发阶段和结晶运移阶段。;断裂中,CO_2在水中的浮力远大于运移阻力,CO_2气容易上浮,CO_2在断裂中的易浮性导致不同密度气体的分异和走向上封闭的断裂气体相对富集。;气体在砂岩储集层运移聚集具有选择性,会优先进入孔隙度和渗透率较高的砂岩,随着压力增加,才会进入孔隙度和渗透率较低的砂岩;在岩浆气源体-断裂-储集层空间输导格架下,CO_2气在膨胀力的驱动下,首先进入含水的断裂并重力分异而聚集,气体压力会不断增高,当压力增至一定程度,CO_2气会向高孔隙度、渗透率的储集层运移并聚集。;在岩浆气源体-储集层接触空间输导格架下,CO_2气受膨胀力的驱动直接向储集层运移并聚集。;成藏的CO_2气会经历化学沉淀、溶解、扩散和机械破坏四种破坏方式,会受断裂切割而打破压力平衡,沿断裂进一步运移和聚集成藏。

In these portion,the article begins the study of tone sandhi from the point view of two-character phrases and three-character phrases,which is also the focus and difficult point as well.On the basis of substantial materials of Dingzhou dialect,the author elaborates its rules and principles of tone sandhi of the general phrases and those with light tones,and reiterative location.the author puts his views as follows: 1.The rules of tone sandhi of two- character phrase are simple and unitive. 2.The complex of the phrase with light tones lies in the combination of the first tone and light tone.In the case,there are two different pronunciations in Dingzhou dialect.The author guesses it is the coexist of ancient pronunciations and common spoken Chinese. 3.The tone sandhi of general three-character phrases on the basis of the rules of that of two- character phrases,using the grammar structure of the three-character phrases as the restricted conduction,which function jointly. 4.The rules of tone sandhi of three- character phrases with light tones are restricted only by that of the two- character phrases with light tones and thus are foreign to grammar structure. 5.The tone sandhi of the words with reiterative location has their own system.

这两章中,作者采用直接调查法,社会语言学方法分别从一般字组、含轻声字组和叠音词字组三个方面对定州方言连读变调进行详尽地描写,文章中既有对连读变调的共时性描写,也有对连读变调历时性推测,总的来讲笔者认为定州方言变调具有一定的系统性,主要表现在以下几个方面:两字组连读变调规律简单统一,含轻声字两字组内部规律较为复杂,但是具有很强的一致性;定州方言含轻声两字组变调的复杂性主要表现在阴平+轻声的组合中,在这种情况下,定州方言有两种读音方式,推测它是语音存古现象和普通话语音并存的结果;一般三字组连读变调以两字组连读变调规律为基础,以三字组的语法结构为制约条件,二者共同发生作用;轻声三字组变调规律只受轻声两字组变调规律的制约,与语法结构无关;叠音词的变调规律自成系统。

Intrusion detection analysis technology is the core of intrusion detection system which includes abnormity intrusion detection and abused intrusion detection.

入侵检测分析技术是入侵检测系统的核心,主要可分为异常入侵检测和误用入侵检测。

In this paper, the concept of network security and security structures of OSI and Internet is introduced, and various threats confronting the computer network are also discussed. Several kinds of network information security technologies, including firewall technology, virtual private network, intrusion detection system, data encryption technology, identity authentication and security protocol etc. are also examined. The security of internal network is the biggest problem in the construction of each network. The solution to this problem lies in setting up a firewall. The theory of a firewall and the approach to its actualization is studied. Intrusion detection system, an important part of the computer network security system, has gained extensive attention. IDS monitors the computer and network traffic for intrusion and suspicious activities. It not only detects the intrusion from the extranet hacker, but also the intranet users. The emergence of virtual private network paves the way for realizing secure connection of LAN quickly and at a relatively low cost. The concept, function, key techniques, including the tunnel technology, and the ways to realize VPN are expounded in this paper. Also introduced is the data encrypt network technology, which is called the soul of computer network security, such as digital digest, digital signature, digital certificate, digital encrypt arithmetic and so on. At the same time, the principle and the process of implementing network security by digital certificate and digital signature, the basic principle and characters of security protocols, and finally, three of the security protocols, concerning the security problems in network, IPsec, SLL and SET are analyzed in detail Computer network system should be a system of dynamic defence, both dynamic and static, passive as well as active, and even offensive, combined with management and technology.

本文系统地介绍了网络安全的概念、OSI及Internet的安全体系结构,并讨论了计算机网络面临的各种安全威胁;内部网络的安全问题是每个建网单位面临的最大问题,可以认为防火墙技术是解决网络安全的一个主要手段,本文研究了防火墙的原理及其实现手段;作为一种主动的防御措施,入侵检测系统作为网络系统安全的重要组成部分,得到了广泛的重视,TDS对计算机和网络资源上的恶意使用行为进行识别和响应,不仅检测来自外部的入侵行为,也监督内部用户的未授权活动;虚拟专用网技术的出现,为实现网络间的连接提供了快速安全但又相对便宜的手段,本文较深入的探讨了实现VPN的隧道技术,并对VPN的概念、功能、实现途径、基本构成、关键技术及发展前景等问题进行了全面论述;数据加密技术是网络安全核心技术之一,本文从数据加密算法、数字摘要、数字签名及数字证书等几方面简要介绍了数据加密技术,并分析用数字证书和数字签名实现网络安全的原理和过程;对安全协议的基本原理、主要特点进行了较为深入的研究,并就网络的安全性问题剖析了三种安全协议:IPsec协议、SLL协议和SET协议。

Among the diversity of security technologies, intrusion detection technology is one of the focuses. This thesis at first elicits the situation of nowadays intrusion detection technology and Intrusion Detection System after explaining the basic concept of intrusion detection. Then on the basis of analyzing some representative IDSs the shortcomings existing in traditional IDS are presented, such as being lack of distribute distributivity, flexibility, interoperability etc. Therefore new technologies are needed for explored to improve the overall performance of IDS.

入侵检测系统是目前网络安全领域的一个研究热点,本文首先从入侵检测的基本概念出发,阐述了入侵检测技术以及入侵检测系统的发展现状,通过分析当前一些有代表性的入侵检测系统指出了入侵检测系统存在的一些不足,在很多地方还有待改进,如分布式、灵活性、效率等方面,需要探索新的技术来提高入侵检测系统的整体性能。

However, the difference between Hongge and Xinjie is also apparent, perhaps reflecting the source difference in the mantle. Relative to the Hongge intrusion the Xinjie intrusion is more depleted in Nd isotope ratio and enriched in REE and LILE. The Xinjie intrusion plots in the first quadrant in Sr-Nd diagram, which shows the Sr isotope-enriched and Nd isotope-depleted slightly feature. This indicates that the source of the Xinjie intrusion may had the mantle wedge signature.

但红格、新街岩体的源区又有所不同,新街岩体较红格岩体Nd同位素更亏损,稀土和大离子亲石元素更富集;新街岩体在Sr-Nd相关图上,位于第一象限,显示Sr同位素富集,Nd同位素略亏损特征,指示了新街岩体的源区可能有残留地幔楔的成分。

Although the unique independence, mobility of Mobile Agent can improve the haleness, tolerableness, adaptability and expansi- bility of the intrusion detection system, which induce Mobile Agent has used for intrusion detection system, it is necessary to improve on the intrusion detection system which base on Mobile Agent for questions faced the intrusion detection system.

虽然移动Agent独特的自主性和移动性可以提高入侵检测系统的健壮性和容错性,增强适应性和可扩展性,使得移动Agent技术目前已经用于入侵检测系统,但是考虑目前入侵检测所面临的问题,有必要对基于移动Agent的入侵检测系统改进。

In order to improve the existing generic service oriented intrusion tolerant system in aspect of architecture and function, this paper presents an improved adaptive intrusion tolerant system with improved architecture, functional modules and key techniques. From an overall consideration of the system, mixed with firewall, intrusion detection and other traditional technologies, IAITS combines redundancy, diversity and various fault tolerant techniques, thus enhancing reliability through active replication and secure multicast, reaching tradeoff between system complexity and intrusion tolerance ability by redundant design only in most vulnerable components, and supporting data protection on the basis of architecture with only a little extra cost in software and hardware by making use of topological coherence between application servers group and key share servers group.

本文针对目前面向通用服务的容忍入侵系统在架构和功能上的不足,提出了一种改进的自适应容忍入侵系统,在系统结构、功能模块以及关键技术上做出了改进的设计:从整体上考虑系统结构,将防火墙、入侵检测等传统的安全技术融合到容忍入侵系统的设计中;综合了以冗余与多样性为主的多种容错技术,采用主动复制与安全多播,增强了系统的可靠性;仅在最易受攻击的部件上采用冗余设计,兼顾系统复杂性与容侵能力;利用应用服务器组和密钥服务器组在拓扑结构上的一致性,在基本不增加软硬件开销的情况下,从架构上支持数据保护的功能。

第1/334页 1 2 3 4 5 6 7 8 9 ... > 尾页
相关中文对照歌词
Heat Rising
Mellow Tone
"Why Do You Take That Tone With Me?"
LAMC
Mr. Spindel's Phone Call
Caramel Sundae
In A Mellow Tone
City Of Champions
Clear 'Em Out
Grand Illusion
推荐网络例句

Listen,point and check your answers.

听,指出并且检查你的答案。

Warming needle is one of effective treatment methods for knee arthralgia aggravated by cold,and it is simple,safety,so it should be developed in clinical acupuncture and moxibustion extensively.

但以本院科针灸门诊在2005年1月—2006年6月期间共收治膝痛患者100余例,经过临床的诊断后,其中施以温针治疗的48例,疗效显著,报道如下。1临床资料本组病例48

Some known methods of remnant pump detection and automatic laser shut-down use communications, such as an OSC.

一些已知的残余泵浦检测和自动激光关断的方法利用诸如OSC的通信。