英语人>网络例句>攻击的 相关的搜索结果
网络例句

攻击的

与 攻击的 相关的网络例句 [注:此内容来源于网络,仅供参考]

The experimental results show that the fault detection circuitry can effectively detect the error condition while errors are introduced.

这些的设计经验将有助於我们,针对未来的AES密码器的防止错误攻击的设计有所帮助。

But in political onrush, the mainstream is manacled ideologically fall with dominant," of these " love novel also fail to escape by the destiny of critically attack, lots and lots of outstanding and crackajack fictionist people suffer persecute, even some gives young life for it.

但在政治洪流,主流意识形态的束缚和主导下,这些"爱情小说"也未能逃出被批判攻击的命运,许许多多优秀杰出的创作家们惨遭迫害,甚至有的为之付出年轻的生命。

It is of theoretical significance and practical value to improve the dynamic size scalability of cluster, decrease the difficulty in developing distributed parallel application software, and enhance system security capability aimed at protecting the system from malicious fraudulence and attack.

提高机群的动态规模可扩展性、降低分布并行应用软件的开发难度,以及增强系统抗欺骗与攻击的安全能力都是有理论意义和应用价值的课题。

In the research of secure communication, the thesis analyzes some shortcomings of Diffie - Hellman"s crypt key exchanging protocol, presenting a new exchanging method based on the "station to station protocol and cookie mechanism, realizing the software of crypt key exchanging and secure communication of IP datagram on router.

在对安全通信的研究中,本文分析了Diffie-Hellman密钥交换协议中易受攻击的地方,提出了基于端对端协议及cookie机制的密钥交换新方法,并在路由器上实现了密钥交换和IP报文的安全通信。

The results showed that the algorithm realizes the watermark's imbedding and extracting; it also is robust. The digital watermarking technology can be used to protect the security of digital images and the copyright.

结果证明该算法能够实现数字水印的提取和检测,并具有较强抵抗常见攻击的能力,鲁棒性较好,能够实现初步的数字图像的防伪和版权保护。

The results showed that the algorithm realizes the wa'termark's imbedding and ex-tracting; it also is robust. The digital watermarking technology can be used to protect the security of digital im-ages and the copyright.

结果证明该算法能够实现数字水印的提取和检测,并具有较强抵抗常见攻击的能力,鲁棒性较好,能够实现初步的数字图像的防伪和版权保护。

The key of digital watermark to copyright protection is the imperceptibility and robustness for embedded information.

用于版权保护的数字水印设计的关键是水印信息嵌入的隐蔽性和抵抗攻击的鲁棒性。

To evaluate the defense effectiveness of a radar site with decoys against the attack of ARM, a calculation method based on the transfer probability matrix of the Markov link is given.

为了评定一个布置有诱饵的雷达阵地抗反辐射导弹攻击的防御效能,提出了采用马尔可夫链的转移概率矩阵进行计算的方法。

First, it allows the attacking player to occupy the base, transferring 30% of the base's credit income to the occupier.

第一,发动攻击的玩家将占领目标基地,并获得相当于30%目标基地经济的信用点,这表示被占领的星球向征服者提供的贡物。

Aimed pointedly at the most intimate aspects of a person, especially in a critical or hostile manner

人身攻击的:尖刻地对准人的最隐密部分的,特别是以一种批判和敌意的态度

第59/100页 首页 < ... 55 56 57 58 59 60 61 62 63 ... > 尾页
推荐网络例句

However, as the name(read-only memory)implies, CD disks cannot be written onorchanged in any way.

然而,正如其名字所指出的那样,CD盘不能写,也不能用任何方式改变其内容。

Galvanizes steel pallet is mainly export which suits standard packing of European Union, the North America. galvanizes steel pallet is suitable to heavy rack. Pallet surface can design plate type, corrugated and the gap form, satisfies the different requirements.

镀锌钢托盘多用于出口,替代木托盘,免薰蒸,符合欧盟、北美各国对出口货物包装材料的法令要求;喷涂钢托盘适用于重载上货架之用,托盘表面根据需要制作成平板状、波纹状及间隔形式,满足不同的使用要求。

A single payment file can be uploaded from an ERP system to effect all pan-China RMB payments and overseas payments in all currencies.

付款指令文件可从您的 ERP 系统上传到我们的电子银行系统来只是国内及对海外各种币种付款。