英语人>网络例句>入侵 相关的搜索结果
网络例句

入侵

与 入侵 相关的网络例句 [注:此内容来源于网络,仅供参考]

There were only three invasive alien plant species out of 24 investigated plant species occurred in core zone, which were clearly lower than those of experimental and buffer zones. The invasive alien plant species accounted for 12.5% of total plant species. The invasive alien plant species with the largest comprehensive values of dominance were Peperomia pellucida and Ageratum conyzoides.

在核心区的样方内共调查到了24种植物,外来入侵植物有3种,占植物总数的12.50%,入侵植物数量明显低于实验区和缓冲区,优势度综合值最大的外来入侵植物是草胡椒Peperomia pellucida和胜红蓟。

Exotic invasiveness and community invisibility are two key factors to study the mechanism of biotic invasion.

外来种的入侵性和生境的可入侵性是研究生物入侵机制的两个关键因素。

During the processes of invasion and displacement,the B biotype has caused considerable damage to a range of crops.

近20年来,B型烟粉虱Bemisia tabaci广泛入侵世界各地,并在一些入侵地取代了危害不严重的土著烟粉虱,对生产造成了巨大的危害,而且入侵区域还在不断扩大。

Seawater intrusion mechanism and its 3D numerical simulation are further explored and researched in this paper. On the basis of the classical theory of fluid mechanics, it built the ideal model of seawater intrusion, and attained the speed in flow field which gradually decreased along with the increasing distance of curvature center along the principal normal in the course of seawater intrusion.

以流体力学经典理论为基础,建立了海水入侵内陆的理想模型,得到在海水入侵内陆的过程中沿弯曲流线的主法线方向,流场中速度随着距曲率中心距离的增大而逐渐减小,根据流线上的速度分布,并可表示出流场中的流线方程,可确定一定条件下海水入侵内陆的速度和方向。

In this paper, we present a detection technology based on intrusion events in order to overcome the shortcomings of high false alert rate, serious redundant alerts and poor expression about the intrusion activities in today's intrusion detection systems. We describe the design ideas about the important methods used in this technology such as multi-sensor data fusion, raw alert distinguishment based on fuzzy rules and so on in detail.

在本文中,我们针对目前入侵检测系统普遍存在的误报率高、报警信息冗余现象严重和对入侵表述能力不强的缺陷,提出了一种基于入侵事件的检测分析技术,详细描述了该技术所采用主要方法的设计思想,如多传感器数据融合以及基于模糊规则的原始报警信息鉴别等。

At first, this paper studies the structure and security situation of electric enterprises information network, then introduces the basic theory of intrusion tolerance. After that, we study the key technology of intrusion tolerance: set up a distributed intrusion detection system model based on mobile agent; study the object replication technology and improve the voting algorithm; analyze and research the elliptic curve encryption system.

论文首先研究了电力企业信息网络结构以及安全现状,接着介绍了入侵容忍的基本理论,然后着重研究了入侵容忍的关键技术:建立了一种基于移动Agent的分布式入侵检测系统模型;研究了对象复制技术,改进了表决算法;分析和研究了椭圆曲线加密体制。

The numerical results show that, after the hot intrusion reaches the cold wall, some accumulates in the cold top corner, since the cold boundary layer flow cannot entrain all of the hot intrusion.

结果表明:当热入侵流抵达腔体冷壁后,由于冷壁无法卷入所有的热入侵流,热入侵流在冷上角堆积并产生一个反向流动,在冷壁边界层附近形成一个顺时针涡,该涡在浮力效应驱动下可返回热壁,并在腔体的冷热壁之间形成了腔体尺度的流体振荡,即内重力波。

It can be used to protect large area network and have relatively good expansibility.

结合网络入侵和主机入侵方面的检测能力,构建了基于智能体的分布式入侵检测系统的体系结构模型。

The article expatiate on a tide for application-IMS, which based on the technique of CIDS. Through analyzing the IMS, we summarize some problems based on the technique of CIDS for application and put forward the relevant resolvents for discussing.

论文阐述了以协同入侵检测技术为核心的一种应用的发展趋势—入侵检测与管理平台,通过对入侵检测与管理平台的简要分析,总结了目前基于协同入侵检测技术的应用存在的问题,并提出了相应的解决方法供探讨。

Some commonly accepted pathways of invasion prediction were discussed, including compilation of invader checklist by the invasion history in other regions, use of species traits as predictors of invasiveness, propagule pressure as determinants of invasion probability, climate-matching as prediction tools of invasion potential, and conference of specialist′s opinions etc.

目前比较被认可的生态预测途径主要包括编辑入侵植物名录利用入侵历史纪录预测、物种特征作为入侵的预测指标、繁殖体压力作为建群概率的决定性因素、环境匹配作为入侵潜力的预测工具及专家意见等,并对物种特征进行了归类和分析。

第3/100页 首页 < 1 2 3 4 5 6 7 8 9 ... > 尾页
推荐网络例句

The absorption and distribution of chromium were studied in ryeusing nutrient culture technique and pot experiment.

采用不同浓度K2CrO4(0,0.4,0.8和1.2 mmol/L)的Hoagland营养液处理黑麦幼苗,测定铬在黑麦体内的亚细胞分布、铬化学形态及不同部位的积累。

By analyzing theory foundation of mathematical morphology in the digital image processing, researching morphology arithmetic of the binary Image, discussing two basic forms for the least structure element: dilation and erosion.

通过分析数学形态学在图像中的理论基础,研究二值图像的形态分析算法,探讨最小结构元素的两种基本形态:膨胀和腐蚀;分析了数学形态学复杂算法的基本原理,把数学形态学的部分并行处理理念引入到家实际应用中。

Have a good policy environment, real estate, secondary and tertiary markets can develop more rapidly and improved.

有一个良好的政策环境,房地产,二级和三级市场的发展更加迅速改善。