Development in coal processing technology and its main direction in Baogang;
包钢选煤技术的发展及今后的主攻方向
In order to meet the need of qunlity education and creation education,the main directions of exam reform should include the following three aspects:first,transter closed exam to openexam;secand,transfer unified exam to differentiated exam;third transter knowledge-oriented exam to ability-oriented exam.
为适应素质教育、创新教育的需要,“两课”考试改革应选准主攻方向。
The composition, function, attacking modes and working procedure of the designed FCS for air-lunched cruise missiles are analyzed in the paper.
空射巡航导弹武器系统所涉及的关键技术很多,本文针对空中平台发射的巡航导弹的特点对火控系统总体设计进行了探讨;对空射巡航导弹火控系统的组成、功能、攻击方式、工作过程等进行了分析。
The different attacking modes and targeting methods used for various air to air, ait to ground, guided and nonguided weapon are summarized in the paper.
介绍了空空、空地、制导与非制导武器所使用的各种攻击方式及瞄准方
In this paper, the classification and their vulnerabilities of wireless sensor network routing protocol are presented, and the attack methods for several network routing protocols are analyzed, and the security strategy of network routing protocol is elaborated.
介绍了无线传感器网络路由协议分类及其脆弱性,分析了几种网络路由协议的攻击方法,阐述了网络路由协议的安全策略。
Various attack methods are fully analyzed and summarized,and some relevant remedies against part of those attacks are put forward,which are of great importance to im.
全面总结和分析了现有的各种数字水印的攻击方法,并对部分攻击方法提出了相应的解决对策,对改进和设计新型的水印算法具有重要指导作用;最后,对数字水印技术未来的研究方向作出了展望。
Three important research directions in computers cryptology are encryption, secret key security and attack method (cryptanalysis).
加密方法、密钥安全性、攻击方法(密码分析学)一直就是计算机密码学研究的三个方面,混沌作为一种新的密码编码源,正引起信息安全领域愈来愈多的关注,本文综述并分析了混沌在保密通讯研究中的这三个重要方面。
Current attacking methods to digital image watermarking and basic countermeasures;
常用数字图像水印攻击方法及基本对策
embedding techniques and attacking methods.
该文较为系统地分析了当前关于数字图像水印的常用攻击方法,讨论了数字水印技术未来可能出现的研究热点。
At first,researching the state conversion of system intrusion,analyzing some famous attacking methods,such as TCP SYN FLOODING,IP FRAGMENT OVERLAP and so on,according to defect of the existing intrusion detection technology,a new intrusion detection model is accomplished,intrusion detection technology based on characteristic information sequence parsing is proposed.
对系统入侵的状态转换进行了研究,分析了常见的黑客攻击方法,包括TCPSYNFLOODING、IP分片攻击等。
Second, absence of a main direction of attack.
二是没有主攻方向。
Dialect of the Shield to Protect
以毛翰之“矛” 攻方保之“盾”
The enemy diversion you are ignoring will be the main attack.
你所忽视的方向将是敌军的主攻方向。
Counterdrive: An attacking stroke made against an attacking stroke.
对攻:把对方攻过来的球反击回去。
Method of Detection to Worm-Attack Based on Model of Attack-Tree;
基于攻击树模型的蠕虫攻击检测方法
An Attacked-Probability-Based Approach to Ranking Attack Graph
一种基于攻击概率的攻击图分级方法
close in(on sb/sth);come nearer and attack from several directions
从四面八方逼近并攻击
The enemy strongholds fell one after another.
敌方据点相继被攻克。
in an aggressively truculent manner.
以攻击性的、凶猛的方式。
Which side is batting now?
现在是哪一方进攻?
To charge into(an opponent's line)carrying the ball.
持球强攻(入对方阵地)
Feint: A false attack designed to force an opponent into a reaction that opens the way to a genuine attack.
佯攻:引诱对方做出反应的假进攻,使对方闪出空隙,以利于真进攻。
"a military attack, such as one launched against a fortified area or place."
军事攻击,如向要塞地区或地方发动的攻击。
The Study of Evaluation Methods of AUAV s Hit Precision in Small-Sample Circumstances;
攻击型无人机小子样攻击精度评估方法研究
The Research On Automated Generation of Attack Graph Based On Attack Mode;
基于攻击模式的攻击图自动生成方法研究
Many-sided Training for the Speed of the Change of Attack and Guard and the Consciousness of Rapid Attack;
提高攻守转换意识和快攻速度的综合训练方法
Forecast Algorithm for Multi-Step Attack Based on Attack Utility
基于攻击效用的复合攻击预测方法研究
Research on Computer Network Attack Modeling Based on Attack Graph
基于攻击图的计算机网络攻击建模方法
本网站所收集内容来自网友分享仅供参考,实际请以各学校实际公布信息为主!内容侵权及错误投诉:1553292129@qq.com
CopyRight © 2020-2024 优校网[www.youxiaow.com]版权所有 All Rights Reserved. ICP备案号:浙ICP备2024058711号