期刊文献+
共找到4篇文章
< 1 >
每页显示 20 50 100
浅谈足球守门员出击技术的运用 被引量:1
1
作者 赛丽麦.塞尔山巴依 《当代体育科技》 2016年第11期145-146,共2页
该文采用文献资料法、问卷调查法、数理统计法对守门员出击技术进行分析,得出结论。出击是守门员能力的重要内容之一,并且能够较好地反映守门员控制罚球区的防守能力。守门员要扩大防守范围,减轻防守压力,必须具备善于出击的能力。守门... 该文采用文献资料法、问卷调查法、数理统计法对守门员出击技术进行分析,得出结论。出击是守门员能力的重要内容之一,并且能够较好地反映守门员控制罚球区的防守能力。守门员要扩大防守范围,减轻防守压力,必须具备善于出击的能力。守门员在门前采取攻击性的出击,大范围封锁和控制罚球区的地面和空间,是稳固球门,瓦解对方进攻的有力武器,让守门员在罚球区域内化被动为主动。本文对守门员出击的重要性,时机和应该注意的事项进行了初步的探讨。 展开更多
关键词 足球 守门员 出击技术 技术分析
下载PDF
2002世界杯足球决赛中国队守门员位置防守技术运用分析 被引量:3
2
作者 张强 张力 +1 位作者 董向荣 张立平 《四川体育科学》 2003年第4期43-45,共3页
主要运用观察和统计归纳的方法,对中国队参加第17届世界杯足球赛决赛阶段比赛的守门员位置防守技术运用情况进行分析。结果表明,判断选位与反应能力的不足,导致中国队守门员防射门技术运用失误增多,防守的成功率降低;比赛中中国队守门... 主要运用观察和统计归纳的方法,对中国队参加第17届世界杯足球赛决赛阶段比赛的守门员位置防守技术运用情况进行分析。结果表明,判断选位与反应能力的不足,导致中国队守门员防射门技术运用失误增多,防守的成功率降低;比赛中中国队守门员把握出击的能力低,出击欠灵巧机变,强对抗条件下难以有效发挥位置防守优势。守门员技术稳定是心理稳定的体现,训练实践中既要加强守门员意识引导,更要加强守门员意志的培养,努力改变比赛中守门员技术不过硬的现状。 展开更多
关键词 2002年 世界杯 足球 决赛 中国队 守门员 防守技术 出击技术
下载PDF
A Practical Online Approach to Protecting Kernel Heap Buffers in Kernel Modules
3
作者 Donghai Tian Xiaoqi Jia +2 位作者 Junhua Chen Changzhen Hu Jingfeng Xue 《China Communications》 SCIE CSCD 2016年第11期143-152,共10页
Heap overflow attack is one of the major memory corruption attacks that have become prevalent for decades. To defeat this attack,many protection methods are proposed in recent years. However,most of these existing met... Heap overflow attack is one of the major memory corruption attacks that have become prevalent for decades. To defeat this attack,many protection methods are proposed in recent years. However,most of these existing methods focus on user-level heap overflow detection. Only a few methods are proposed for kernel heap protection. Moreover,all these kernel protection methods need modifying the existing OS kernel so that they may not be adopted in practice. To address this problem,we propose a lightweight virtualization-based solution that can protect the kernel heap buffers allocated for the target kernel modules. The key idea of our approach is to combine the static binary analysis and virtualization technology to trap a memory allocation operation of the target kernel module,and then add one secure canary word to the end of the allocated buffer. After that,a monitor process is launched to check the integrity of the canaries. The evaluations show that our system can detect kernel heap overflow attacks effectively with minimal performance cost. 展开更多
关键词 kernel heap overflow virtualization technology kernel module
全文增补中
Injection and Extraction Techniques in Circular Accelerators
4
作者 唐靖宇 《Chinese Physics C》 SCIE CAS CSCD 北大核心 2008年第z1期256-258,共3页
Injection and extraction are usually the key systems in circular accelerators.They play important roles in transferring the beam from one stage acceleration to the other or to experimental stations.It is also in the i... Injection and extraction are usually the key systems in circular accelerators.They play important roles in transferring the beam from one stage acceleration to the other or to experimental stations.It is also in the injection and extraction regions where beam losses happen mostly.Due to the tight space and to reduce the perturbation to the circulating orbit,the devices are usually designed to meet special requirements such as compactness,small stray field,fast rise time or fall time,etc.Usual injection and extraction devices include septum magnets,kicker magnets, electrostatic deflectors,slow bump magnets and strippers.In spite of different accelerators and specification for the injection and extraction devices,many techniques are shared in the design and manufacturing.This paper gives a general review on the techniques employed in the major circular accelerators in China. 展开更多
关键词 injection extraction technique SEPTUM kicker slow bump electrostatic deflector STRIPPER
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部