• 根据心理动力学理论预防有害攻击最好方法可能鼓励危害较小攻击行为。

    According to psychodynamic theory, the best ways to prevent harmful aggression may be to encourage less harmful aggression.

    youdao

  • 社会生物学生物学方法一个分支;据社会生物学理论表明攻击与生俱来的,甚至是人类希望得到的。

    An offshoot of the biological approach called sociobiology suggests that aggression is natural and even desirable for people.

    youdao

  • 第二理论——很可能是一个荒诞都市说法——几个担忧父母提议禁止使用金属午餐声称孩子们会它们当作武器互相攻击

    The second theorypossibly an urban myth—is that concerned parents in several states proposed bans on metal lunch boxes, claiming kids were using them as "weapons" to hit one another.

    youdao

  • 虽然支持这种理论证据最近受到攻击,但这种说法或许能解释为什么许多自闭症患者说谎而且也不能理解别人的谎话。

    This account would explain why many autistic people do not tell lies and cannot comprehend those told by others, although the supporting evidence behind this theory has come under fire lately.

    youdao

  • 如今精神分析理论存在很多争议,有很多著名针对弗洛伊德批判攻击

    Freudian theory is now, at this point of time, extremely controversial and there is a lot of well-known criticisms and attacks on Freud.

    youdao

  • 然而最近这种有效市场理论遭到行为模型学说攻击学说成功极具说服力的理由击中对方软

    Lately, however, the efficient market hypothesis has been attacked, successfully, by the behavioral model, which has pointed sharp arguments at its flanks.

    youdao

  • 但是一个鲨鱼攻击“虎口逃生”理论证明事实

    However the theory that playing dead will help a person survive a shark attack was confirmed as fact.

    youdao

  • 发起此类攻击并不简单理论却是可行的。

    Such an attack is not a trivial task, but it is theoretically possible.

    youdao

  • 巴基斯坦将军们他们新的战术武器可以应对印度于2004年开始实施的“冷启动”作战理论带来的威胁,理论倡导针对巴基斯坦发动的虽然传统迅速猛烈的攻击

    Pakistan's generals say their new tactical weapons will meet a threat from India's Cold Start doctrine, adopted in 2004, that calls for rapid, punitive, though conventional thrusts against Pakistan.

    youdao

  • 理论上来说因为自己过),可以通过比较作为HTTP请求一部分发送的 HTTP信息防止遭到黑客攻击

    Theoretically (since I've not done this myself), you could guard against hackers by comparing HTTP header information that is sent as part of the HTTP request.

    youdao

  • 认为这些发现有人称之为植物可见性理论”(plantapparency theory)解释相一致理论认为容易被看到植物最有可能受到捕食者攻击

    Gahn says these findingsare consistent with something called theplant apparency theory, ”which states that the most readily seen plants are those that are mostlikely to be attacked by predators.

    youdao

  • 本文运用飞行力学原理现代控制理论攻击地面固定目标飞行器再入机动制导方法进行了研究。

    In this paper, the method of reentry maneuver guidance applying to attack the ground fixed target is described by using flight dynamics principle and modern control theory.

    youdao

  • 脉冲多普勒雷达先进战斗机广泛采用火控攻击雷达,对这种雷达,有些理论问题进一步研究

    The pulsed Doppler radar is widely adopted in modern advanced fighting aircrafts as the fire controlling radar, of which some theoretical problems are still waiting for further researching.

    youdao

  • 针对无线传感器网络自身特殊性路由协议面临的攻击类型,提出一个基于理论分布联合攻击检测模型(GADM)。

    To the specific features of wireless sensor network and attack models met with routing protocols, this paper presents an attack detection model of combined distribution based on grey theory (GADM).

    youdao

  • 常常包括著名的组成问题证据,确定攻击企图孤立地的(支持文件先前公布理论)。

    It often consists of determined attacks on famous questions, consisting of proof-attempts made in an isolated way (that is, long papers not supported by previously published theory).

    youdao

  • 理论具有武僧等级眼魔法师可以法之进行徒手攻击

    Theoretically, a beholder mage with monk levels could use its arcane hand for its unarmed attacks.

    youdao

  • 研究模糊数学理论基础上,设计了一个基于模糊数学的攻击危害度评判模型

    After researching theory of fuzzy math, this paper also designs an evaluation model of attack severity based on fuzzy math.

    youdao

  • 文章介绍现有信息隐藏系统模型攻击形式指出加入认证理论必要性

    This paper introduces the attack form to IH system model, points out the necessary of adding authentication theory.

    youdao

  • 定义了图中邻接攻击代价采用属性效用理论计算效用

    The attack cost of adjacent nodes is defined, and the multi-attribute utility theory is adopted to quantify its value.

    youdao

  • 最后给出了对该类方案已知明文的同态攻击方法,弥补了该类方案理论分析上的不足

    Homeostasis attack of this kind of scheme is also proposed with known plaintext, all of these could make up the shortcoming of theory analysis.

    youdao

  • 理论计算证明了量子密钥分配协议这种攻击策略具有足够安全性

    It is shown that there is still an asymptotic perfect security of quantum key distribution under this attack strategy.

    youdao

  • 扩展诚实理想分析模型不仅继承了理论有关性质而且适应猜测攻击分析

    The extended honest ideal model not only inherits its original characters, but also is adaptive for the analysis of guessing attack.

    youdao

  • 这个信仰理论,“攻击大量的药”,药物可以HIV排出体外

    The belief was that by "hitting it early and hard, " treatments could push HIV all the way out of the body.

    youdao

  • 针对导弹武器体系攻击目标武器配置问题利用模糊多目标决策理论研究了多种配置方案的优选,提出了一种新的基于效能的导弹武器配置优化算法

    Aiming at the problem of collocating missile weapon system to attack multi-objective, a new collocating method based on fuzzy multi-objective decision making theory is studied.

    youdao

  • 这样冲动很难抵制因为理论攻击对方冲动感觉受到批评强烈没有帮助,也肯定是没有效果的。

    This urge is very difficult to resist, because the impulse to justify and attack is strong when you feel criticized, but it just isn't helpful, and it certainly isn't effective.

    youdao

  • 详细阐述通用密码系统实施简易功耗分析攻击(SPA)的理论基础DES算法攻击特定理论,并提出了对SPA的改进算法。

    In some detail, the paper expounds the principle about simple power analysis (SPA) attacks against the general cryptography and a particular theory against data encryption standard (DES) algorithm.

    youdao

  • 通过这些概念理论角度研究分析可以协议攻击对策的研究作一些新的指导

    The research and analysis of these concepts in theoretic angle may give rise to some new instructions for the research of attacks and countermeasures.

    youdao

  • 理论分析仿真实验表明算法具有较高安全保密性能攻击性能。

    Theoretical analysis and simulation experiment show that, the algorithm guarantees the security of the encryption effectively and excellent performance against attack.

    youdao

  • 理论分析仿真实验表明算法具有较高安全保密性能攻击性能。

    Theoretical analysis and simulation experiment show that, the algorithm guarantees the security of the encryption effectively and excellent performance against attack.

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定