英语人>网络例句>威胁 相关的搜索结果
网络例句

威胁

与 威胁 相关的网络例句 [注:此内容来源于网络,仅供参考]

This dissertation has conducted some information superiority oriented research focusing on some key technologies such as information acquiring, object recognition, situation assessment, threat assessment, target assignment, effectiveness evaluation of C~4ISR system, effectiveness evaluation of NCW in cognitive domain and so on. The main research and devotement of this dissertation are listed as follows: 1. Based on the analysis of physical meaning and campaign course of Lanchester linear law, we proposed a model reflecting the impact of surveillance and reconnaissance on force attrition. The model also discussed the effect of asymmetry information on the outcome of the battle, and conquered the disadvantage of Lanchester equation in modeling C~4ISR system.

本文面向信息优势对C~4ISR系统的信息获取、目标识别、态势评估、威胁估计、武器分配、效能评价以及网络中心战等关键技术进行深入研究,取得了一些创新性成果:(1)通过对Lanchester线性率中各参数物理意义及作战过程的分析,建立了反映侦察和监视效果的兵力消耗过程模型,并引入博弈论分析了战场上信息的不对称对交战结果的影响,克服了描述C~4ISR系统的Lanchester方程没有考虑作战单元、对手和环境间的动态交互以及数学结构简单的缺点。

An overly stark dichotomization here would point to those in the US who see China as a threat......

最佳答案:这里一种过分明显的两分化政策将会指向美国那些把中国视为威胁的人。

And their most important achievement, in Mr Dickey's estimation, is to have turned New York's multicultural diversity to their advantage, building up a team of more than 600 linguists fluent in some 50 languages and dialects. In 2007 NYPD analysts published a 90-page booklet,"Radicalization in the West", seeking to pass on what they had learnt about the home-grown threat in Europe and America.

Dickey认为,他们最大的成就,就是将纽约的多元化特性成功融入到他们的队伍中,建立了一支由600多名精通50多种语言和方言的专家所组成的队伍。2007年纽约警署出版了一本名为"西方世界的激进化"的90页的小册子,来揭示他们所了解到的日益增加的欧美本土威胁

Multitarget differential game and bargaining differential game are proposed for the first time, which extend the classical differential game to develop a new method for the solution of combat tactics.

提出了以效能为目标,以战术机动为主要内容的研究思路,具体研究了空战中威胁判断、角色确定和多机空战战术求解等内容。

In this paper, the concept of network security and security structures of OSI and Internet is introduced, and various threats confronting the computer network are also discussed. Several kinds of network information security technologies, including firewall technology, virtual private network, intrusion detection system, data encryption technology, identity authentication and security protocol etc. are also examined. The security of internal network is the biggest problem in the construction of each network. The solution to this problem lies in setting up a firewall. The theory of a firewall and the approach to its actualization is studied. Intrusion detection system, an important part of the computer network security system, has gained extensive attention. IDS monitors the computer and network traffic for intrusion and suspicious activities. It not only detects the intrusion from the extranet hacker, but also the intranet users. The emergence of virtual private network paves the way for realizing secure connection of LAN quickly and at a relatively low cost. The concept, function, key techniques, including the tunnel technology, and the ways to realize VPN are expounded in this paper. Also introduced is the data encrypt network technology, which is called the soul of computer network security, such as digital digest, digital signature, digital certificate, digital encrypt arithmetic and so on. At the same time, the principle and the process of implementing network security by digital certificate and digital signature, the basic principle and characters of security protocols, and finally, three of the security protocols, concerning the security problems in network, IPsec, SLL and SET are analyzed in detail Computer network system should be a system of dynamic defence, both dynamic and static, passive as well as active, and even offensive, combined with management and technology.

本文系统地介绍了网络安全的概念、OSI及Internet的安全体系结构,并讨论了计算机网络面临的各种安全威胁;内部网络的安全问题是每个建网单位面临的最大问题,可以认为防火墙技术是解决网络安全的一个主要手段,本文研究了防火墙的原理及其实现手段;作为一种主动的防御措施,入侵检测系统作为网络系统安全的重要组成部分,得到了广泛的重视,TDS对计算机和网络资源上的恶意使用行为进行识别和响应,不仅检测来自外部的入侵行为,也监督内部用户的未授权活动;虚拟专用网技术的出现,为实现网络间的连接提供了快速安全但又相对便宜的手段,本文较深入的探讨了实现VPN的隧道技术,并对VPN的概念、功能、实现途径、基本构成、关键技术及发展前景等问题进行了全面论述;数据加密技术是网络安全核心技术之一,本文从数据加密算法、数字摘要、数字签名及数字证书等几方面简要介绍了数据加密技术,并分析用数字证书和数字签名实现网络安全的原理和过程;对安全协议的基本原理、主要特点进行了较为深入的研究,并就网络的安全性问题剖析了三种安全协议:IPsec协议、SLL协议和SET协议。

Russia denounces America's "diktat and imperialism", talks of a new arms race, threatens oil and gas supplies to neighbours regarded as unfriendly, and says it wants to overturn the Western-inspired economic order.

俄罗斯指责美国的"专制主义和帝国主义",谈论有关新的军备竞赛,威胁其视为不友好的邻居的石油天然气供应,还有表示它想推翻西方主导的经济秩序。

There is no reason to assume that a rising China poses a threat to the United States, or that China's emergence represents a diminution of American leadership.

没有理由认为中国的崛起会对美国构成威胁,也没有必要假设中国的兴起意味着美国的主导地位下降。

The Kuwaiti interior ministry threatened a 100 dinar ($356) fine or one month imprisonment for anyone caught eating in public or encouraging others to do so before dusk.

科威特内政大臣威胁对那些被抓住在公共场合进食或鼓励别人如此做的,要罚款100第纳尔(合356美元)或者一个月监禁。

Of course diphtheria still presents a threat and will probably always do so.

当然,白喉仍然并且可能长期是一种威胁

Diptera is a fly Tephritidae, is an important fruit and vegetable pests are known to the world more than 4000 kinds of fruit flies, known in China about 400 kinds of fruit flies, the danger of fruit and vegetable crops or pose a potential threat to an important type of account More than 50 countries provided for in quarantine fly nearly 20 categories.

实蝇属双翅目实蝇科,是重要的果蔬害虫,全世界已知实蝇4000多种,我国已知实蝇约 400种,危险性或对果蔬作物构成潜在威胁的重要种类计50余种,各国规定的检疫实蝇类近20种。

第83/100页 首页 < ... 79 80 81 82 83 84 85 86 87 ... > 尾页
推荐网络例句

It was Napoleon, the immense somnambulist of this dream which had crumbled, essaying once more to advance.

那人便是拿破仑,梦游中的巨人,他还想往前走,去追寻那崩塌了的幻境。

This method alleviates the highly dependent on domain knowledge experts. The quality and efficiency of the KBS were improved.

使用这种设计方法减小了对领域知识专家的严重依赖,提高了知识系统开发的质量和效率。

Imperialism doesn't exist any more, and now there are only capitalism and socialism in the world.

帝国主义已经不存在了,现在世界上只有资本主义和社会主义。