说明:双击或选中下面任意单词,将显示该词的音标、读音、翻译等;选中中文或多个词,将显示翻译。
您的位置:首页 -> 词典 -> 窃听装置
1)  bugging [英][bʌg]  [美][bʌg]
窃听装置
2)  anti-eavesdrop device
反窃听装置
3)  eavesdropping [英]['i:vz,drɔpiŋ]  [美]['ivz,drɑpɪŋ]
窃听、窃取
4)  eavesdropping [英]['i:vz,drɔpiŋ]  [美]['ivz,drɑpɪŋ]
窃听
1.
Random network coding against the eavesdropping adversaries
一种防窃听的随机网络编码
2.
This paper analyses of the submarine optical fible cable signals eavesdropping technology channels,discussed the waters of China′s submarine fiber optic cable for wiretap method,the United States nuclearpowered attack submarines" Jimmy·Carter,"the eavesdropping undersea fiber optic cable capacity.
分析了对海底光缆中的光信号进行窃听的技术途径,讨论对我国海域海光缆进行窃听的方法,研究了美国核动力攻击潜艇"吉米。
5)  tapping [英][tæp]  [美][tæp]
窃听
1.
Based on optical fiber-bending radiation,four steps method for optical cable tapping,bending the optical fiber,collecting optical signals and demodulating information are proposed.
基于光纤弯曲辐射,提出了四步光缆窃听法,即"剥光缆,弯光纤,取信号,解信息"。
2.
By analyzing Four Wave Mixing (FWM) theory, we propose a new tapping and attacking method by virtue of ROADM.
在分析四波混频理论的基础上,提出了借助可重构光分插复用器、基于四波混频效应实施光信道窃听和攻击的方法;仿真了对光信道窃听的可行性,并进行了攻击试验,这种攻击可导致通信系统服务质量明显下降,甚至出现服务拒绝。
3.
In order to collect the information about the terrorism,the American government approved the" Patriot Act" and thus enlarged swiftly the power of the government for tapping and wiretap surveillance,which has been doubted by the public,but in the subsequent years,the American government still takes a series of measures to strengthen the surveillance procedure.
为了加强对恐怖主义的情报收集,美国政府通过《爱国者法》迅速扩大政府窃听及电讯监视的权力。
6)  eavesdrop [英]['i:vzdrɔp]  [美]['ivz'drɑp]
窃听
1.
The works are as follows:1、Proposed a framework for security analysis, pointed out the parameters which related to security in address codes, analysed the securiyt performance from the perspective of two common eavesdropping methods, deduced the time eavesdropper required when taped single-signals from multiple users and the ability to tap a single user and multiple users.
完成的主要工作如下:(1)介绍了OCDMA安全性能分析的模型,指出了地址码中和安全性有关的几个参数,从两种常见窃听方式的角度定量分析了安全性能,推导出了窃听者从多个用户信号中窃听到单用户信号所需的时间,以及窃听单个用户和多个用户的能力。
补充资料:封口装置——滚纹装置

封口装置——滚纹装置
 

 

 

 

 
文章编辑:moji
文章来源:

说明:补充资料仅用于学习参考,请勿用于其它任何用途。
参考词条