说明:双击或选中下面任意单词,将显示该词的音标、读音、翻译等;选中中文或多个词,将显示翻译。
您的位置:首页 -> 词典 -> 前方攻击
1)  nose attack
前方攻击
2)  predecessor attack
前驱攻击
1.
Study of predecessor attack in rerouting anonymous communication system;
重路由匿名通信系统中前驱攻击模型研究
2.
The results show that the G-Hordes can resist the predecessor attack effectively,moreover it is safer than the Hordes and Mix cascade on the whole.
分析表明,G-Hordes不仅能够有效抵抗前驱攻击,而且在整体上比Hordes和MixCascade更安全。
3)  pre-image attack
前像攻击
4)  attacking mode
攻击方式
1.
The composition, function, attacking modes and working procedure of the designed FCS for air-lunched cruise missiles are analyzed in the paper.
 空射巡航导弹武器系统所涉及的关键技术很多,本文针对空中平台发射的巡航导弹的特点对火控系统总体设计进行了探讨;对空射巡航导弹火控系统的组成、功能、攻击方式、工作过程等进行了分析。
2.
The different attacking modes and targeting methods used for various air to air, ait to ground, guided and nonguided weapon are summarized in the paper.
介绍了空空、空地、制导与非制导武器所使用的各种攻击方式及瞄准方
5)  attack method
攻击方法
1.
In this paper, the classification and their vulnerabilities of wireless sensor network routing protocol are presented, and the attack methods for several network routing protocols are analyzed, and the security strategy of network routing protocol is elaborated.
介绍了无线传感器网络路由协议分类及其脆弱性,分析了几种网络路由协议的攻击方法,阐述了网络路由协议的安全策略。
2.
Various attack methods are fully analyzed and summarized,and some relevant remedies against part of those attacks are put forward,which are of great importance to im.
全面总结和分析了现有的各种数字水印的攻击方法,并对部分攻击方法提出了相应的解决对策,对改进和设计新型的水印算法具有重要指导作用;最后,对数字水印技术未来的研究方向作出了展望。
3.
Three important research directions in computers cryptology are encryption, secret key security and attack method (cryptanalysis).
加密方法、密钥安全性、攻击方法(密码分析学)一直就是计算机密码学研究的三个方面,混沌作为一种新的密码编码源,正引起信息安全领域愈来愈多的关注,本文综述并分析了混沌在保密通讯研究中的这三个重要方面。
6)  attacking methods
攻击方法
1.
Current attacking methods to digital image watermarking and basic countermeasures;
常用数字图像水印攻击方法及基本对策
2.
embedding techniques and attacking methods.
该文较为系统地分析了当前关于数字图像水印的常用攻击方法,讨论了数字水印技术未来可能出现的研究热点。
3.
At first,researching the state conversion of system intrusion,analyzing some famous attacking methods,such as TCP SYN FLOODING,IP FRAGMENT OVERLAP and so on,according to defect of the existing intrusion detection technology,a new intrusion detection model is accomplished,intrusion detection technology based on characteristic information sequence parsing is proposed.
对系统入侵的状态转换进行了研究,分析了常见的黑客攻击方法,包括TCPSYNFLOODING、IP分片攻击等。
补充资料:带血管蒂的旋前方肌骨瓣移位术


带血管蒂的旋前方肌骨瓣移位术
vaso-pedical pronator quadratus bone flap transfer

由于旋前方肌接受桡、尺骨间掌侧动脉等多根血管供血,这些血管间构成血管网,相互交通,故可利用此特点切取带血管蒂的旋前方肌及尺骨或桡骨附着处的骨膜、骨组织,逆行或顺行植入舟骨、月骨和桡、尺骨的骨坏死、骨缺损和骨不连接之部位,以治疗舟、月骨骨坏死,桡、尺骨折,骨不连接等疾病有较好效果。而旋前方肌的功能可为旋前圆肌所替代,不影响供区的功能。
说明:补充资料仅用于学习参考,请勿用于其它任何用途。
参考词条