排序方式: 共有196条查询结果,搜索用时 265 毫秒
101.
102.
结合量子计算算子提出一种基于极化单光子的量子秘密共享协议.该方案可以将全部量子态用于密钥共享,借助量子置换算子和量子纠缠特性证明了方案能够有效抵抗中间人攻击,利用辅助量子态进行监视,方案能够以高概率检测特洛伊木马攻击.通过对置换算子进行高维推广,证明了方案推广到(n,n)的可行性和实用性. 相似文献
103.
104.
105.
Erik J Dahl 《战略研究杂志》2013,36(1):31-55
Many scholars and analysts have studied intelligence failure and surprise and developed theories to explain disasters such as the attack on Pearl Harbor. Others, especially since the 9/11 attacks, have examined the rising threat of terrorism and see it as posing a particularly difficult challenge for the intelligence community. But little work has been done to integrate the earlier literature on intelligence failure with the newer threat of terrorist attack. This article attempts such an integration, by examining the bombing of the US Marine Barracks in Beirut in 1983; it concludes that most studies of the Beirut bombing are mistaken in their assessment of the role played by intelligence in that disaster, and suggests that our understanding of intelligence failure against surprise attacks needs to be revised in the age of terrorism. 相似文献
106.
107.
108.
109.
110.
便携式反坦克导弹在通过击顶方式打击目标时,要同时满足落角和精度的要求,以达到对目标的毁伤效能。首先推导带落角约束的最优比例导引律;然后设计携式反坦克导弹击顶弹道方案,导弹先出筒无控,以指数规律完成爬升,采用定攻角进行滑翔飞行,弹道末端运用推导的导引律来满足对落点和落角的约束。仿真结果表明,当反坦克导弹攻击不同距离的目标时,该弹道方案具有较强的有效性。 相似文献