英语人>网络例句>入侵 相关的搜索结果
网络例句

入侵

与 入侵 相关的网络例句 [注:此内容来源于网络,仅供参考]

In his latest painting SEAL EVIL MONSTER I, he extends the"SEAL EVIL" spirit which used to be carved on Qing generals' cold steel as an encouragement during the war between the Qing Dynasty and the Eight Power Allied Force. He regarded his paintings as castigation to the contemporary to carry forward the traditional culture, and defend the cultural invasion of Western ideology.

在新作《敕魔兽1》中,他延伸了反抗八国联军时,清军将领刻在武器兵刃上的"敕魔"二字的精神,表达了他鞭挞当代人要发扬传统文化,抵御西方意识形态上的文化入侵的愿望。

The Catskill Mountains Many people see UFOs and report alien encounters in the Catskills. Silent Invasion 1991 - a book by Ellen Crystall - discusses over 100 UFO sightings and encounters in the Pine Bush area - over a 10 year period.

许多人们在Catskills中看见不明飞行物和报告不同的飞碟接触案例。1991的《无声的入侵》-亚伦克里斯托尔的一本书–在Pine Bush区域持续10年时间100以上的不明飞行物目击接触案例和相会中讨论。

They came to the Caucasus after being driven out of their homeland in the Mongol invasions of the 13th century.

他们来到高加索地区后,被赶出自己的家园,在蒙古人入侵的13世纪。

Distributed Intrusion Detection System is one of the important devi ces for information security.

分布式入侵检测系统是重要的信息安全措施,如何提高检测率是目前该领域的研究热点。

According to a document obtained by the Wall Street Journal, Mr Chávez's interior minister, Ramón Rodríguez Chacín, asked the FARC to train Venezuelan soldiers in guerrilla tactics for use if the United States were to invade.

根据《华尔街日报》获得的一份文件,查韦斯先生的内政部长,Ramón Rodríguez Chacín,要求FARC以游击战术训练委内瑞拉士兵,以备将来美国入侵时所用。

To match the rules dynamically, this paper also put forward a new structure of IDS rule, a option index chain, that is adding "index" for each rule options in the rule resolution function, connecting with each other rule header.

为了能够动态地对规则进行匹配调整,对无线局域网入侵检测规则的结构进行了改进,在规则解析函数中为每一个规则选项增加一个"索引"(一个指向该选项结点的指针),与规则头相连接,形成"选项索引链表"。

You can add filtering in your mail chain, mainly in order to detect spam and viruses.

鉴于垃圾邮件的猖狂,您可以在您的邮件服务器上面安装并设置邮件过滤系统并以此来防止垃圾邮件和病毒的入侵

Based on the traditional theory of IDS,the system entropy is studied,which come from statistics model,combining the worm behaviors characteristic the exponent entropy conception is put forward,a new inhibiting method is proposed from the anomaly detection point of view.

在传统的入侵检测理论的基础上,研究了统计学概念模型系统熵,并结合蠕虫病毒的行为特征提出了指数熵概念,从异常检测的角度对蠕虫病毒采取了一种新型扼制方法。

In 1789 Napoleon's invasion of Egypt, in the year July 21 in the Pyramid in Egypt and Turkey and the armed forces in a battle, after the war he observed the Cheops pyramid.

1789年拿破仑入侵埃及时,于当年7月21日在金字塔地区与土耳其和埃及军队发生了一次激战,战后他观察了胡夫金字塔。

Formal education helps to preserve the choiceness of culture, which grew up by the mores

随着经济全球化,外国文化入侵导致的文化多样性,这时候就有

第32/100页 首页 < ... 28 29 30 31 32 33 34 35 36 ... > 尾页
推荐网络例句

The concept of equivalent rotationally rigidity is offered and the formula of rotationally rigidity is obtained.

主要做了如下几个方面的工作:对伸臂位于顶部的单层框架—筒体模型进行分析,提出了等效转动约束的概念和转动约束刚度的表达式。

Male cats normally do not need aftercare with the exception of the night after the anesthetic.

男猫通常不需要善后除了晚上的麻醉。

Its advantage is that it can be used in smaller units.

其优点在于可以在较小的单位中应用。