根据心理动力学理论,预防有害攻击的最好方法可能是鼓励危害较小的攻击行为。
According to psychodynamic theory, the best ways to prevent harmful aggression may be to encourage less harmful aggression.
社会生物学是生物学方法的一个分支;据社会生物学理论表明,攻击性是与生俱来的,甚至是人类所希望得到的。
An offshoot of the biological approach called sociobiology suggests that aggression is natural and even desirable for people.
第二种理论——很可能是一个荒诞的都市说法——几个州担忧的父母提议禁止使用金属午餐盒,声称孩子们会把它们当作“武器“来互相攻击。
The second theory—possibly an urban myth—is that concerned parents in several states proposed bans on metal lunch boxes, claiming kids were using them as "weapons" to hit one another.
虽然支持这种理论的证据最近受到攻击,但这种说法或许能解释为什么许多自闭症患者不说谎,而且也不能理解别人说的谎话。
This account would explain why many autistic people do not tell lies and cannot comprehend those told by others, although the supporting evidence behind this theory has come under fire lately.
如今,精神分析理论存在很多争议,有很多著名的针对弗洛伊德的批判和攻击。
Freudian theory is now, at this point of time, extremely controversial and there is a lot of well-known criticisms and attacks on Freud.
然而,最近这种有效市场理论遭到了行为模型学说攻击。该学说成功的用极具说服力的理由击中对方软肋。
Lately, however, the efficient market hypothesis has been attacked, successfully, by the behavioral model, which has pointed sharp arguments at its flanks.
但是,装死能帮一个人从鲨鱼的攻击中“虎口逃生”的理论被证明是事实。
However the theory that playing dead will help a person survive a shark attack was confirmed as fact.
发起此类攻击并不简单,但在理论上却是可行的。
Such an attack is not a trivial task, but it is theoretically possible.
巴基斯坦的将军们称他们新的战术武器可以应对印度于2004年开始实施的“冷启动”作战理论带来的威胁,该理论倡导针对巴基斯坦发动的虽然传统但迅速猛烈的攻击。
Pakistan's generals say their new tactical weapons will meet a threat from India's Cold Start doctrine, adopted in 2004, that calls for rapid, punitive, though conventional thrusts against Pakistan.
从理论上来说(因为我自己没做过),您可以通过比较作为HTTP请求的一部分发送的 HTTP头信息来防止遭到黑客攻击。
Theoretically (since I've not done this myself), you could guard against hackers by comparing HTTP header information that is sent as part of the HTTP request.
岗恩认为这些发现与有人称之为“植物可见性理论”(plantapparency theory)的解释相一致。这一理论认为最容易被看到的植物最有可能受到捕食者的攻击。
Gahn says these findingsare consistent with something called the “plant apparency theory, ”which states that the most readily seen plants are those that are mostlikely to be attacked by predators.
本文运用飞行力学原理和现代控制理论,对攻击地面固定目标的飞行器的再入机动制导方法进行了研究。
In this paper, the method of reentry maneuver guidance applying to attack the ground fixed target is described by using flight dynamics principle and modern control theory.
脉冲多普勒雷达是先进战斗机上广泛采用的火控攻击雷达,对这种雷达,有些理论问题仍需进一步研究。
The pulsed Doppler radar is widely adopted in modern advanced fighting aircrafts as the fire controlling radar, of which some theoretical problems are still waiting for further researching.
针对无线传感器网络自身特殊性和路由协议面临的攻击类型,提出了一个基于灰理论的分布联合的攻击检测模型(GADM)。
To the specific features of wireless sensor network and attack models met with routing protocols, this paper presents an attack detection model of combined distribution based on grey theory (GADM).
它常常包括在著名的组成问题的证据,确定攻击的企图孤立地的(即,不支持长文件由先前公布的理论)。
It often consists of determined attacks on famous questions, consisting of proof-attempts made in an isolated way (that is, long papers not supported by previously published theory).
理论上,具有武僧等级的眼魔法师可以用奥法之手进行徒手攻击。
Theoretically, a beholder mage with monk levels could use its arcane hand for its unarmed attacks.
在研究模糊数学理论的基础上,设计了一个基于模糊数学的攻击危害度评判模型。
After researching theory of fuzzy math, this paper also designs an evaluation model of attack severity based on fuzzy math.
文章介绍了对现有信息隐藏系统模型的攻击形式,指出加入认证理论的必要性。
This paper introduces the attack form to IH system model, points out the necessary of adding authentication theory.
定义了图中邻接点的攻击代价,并采用多属性效用理论计算其效用值。
The attack cost of adjacent nodes is defined, and the multi-attribute utility theory is adopted to quantify its value.
最后给出了对该类方案的已知明文的同态攻击方法,弥补了该类方案理论分析上的不足。
Homeostasis attack of this kind of scheme is also proposed with known plaintext, all of these could make up the shortcoming of theory analysis.
理论计算证明了量子密钥分配协议在这种攻击策略下仍具有足够的安全性。
It is shown that there is still an asymptotic perfect security of quantum key distribution under this attack strategy.
扩展的诚实理想分析模型不仅继承了原理论的有关性质,而且适应猜测攻击的分析。
The extended honest ideal model not only inherits its original characters, but also is adaptive for the analysis of guessing attack.
这个信仰的理论是,“早攻击,并要用大量的药”,药物可以把HIV排出体外。
The belief was that by "hitting it early and hard, " treatments could push HIV all the way out of the body.
针对导弹武器体系攻击多目标时的武器配置问题,利用模糊多目标决策理论研究了多种配置方案的优选,提出了一种新的基于效能的导弹武器配置优化算法。
Aiming at the problem of collocating missile weapon system to attack multi-objective, a new collocating method based on fuzzy multi-objective decision making theory is studied.
这样的冲动很难抵制,因为要理论、攻击对方的冲动在你感觉受到批评时是很强烈,但这并没有帮助,也肯定是没有效果的。
This urge is very difficult to resist, because the impulse to justify and attack is strong when you feel criticized, but it just isn't helpful, and it certainly isn't effective.
详细地阐述了对通用密码系统实施简易功耗分析攻击(SPA)的理论基础和对DES算法攻击的特定理论,并提出了对SPA的改进算法。
In some detail, the paper expounds the principle about simple power analysis (SPA) attacks against the general cryptography and a particular theory against data encryption standard (DES) algorithm.
通过对这些概念从理论角度的研究和分析,可以给协议攻击与对策的研究作一些新的指导。
The research and analysis of these concepts in theoretic angle may give rise to some new instructions for the research of attacks and countermeasures.
理论分析和仿真实验表明,该算法具有较高的安全保密性能和抗攻击性能。
Theoretical analysis and simulation experiment show that, the algorithm guarantees the security of the encryption effectively and excellent performance against attack.
理论分析和仿真实验表明,该算法具有较高的安全保密性能和抗攻击性能。
Theoretical analysis and simulation experiment show that, the algorithm guarantees the security of the encryption effectively and excellent performance against attack.
应用推荐