攻擊任務 的英文怎麼說

中文拼音 [gōngrèn]
攻擊任務 英文
strike mission
  • : Ⅰ動詞1 (攻打) attack; assault; take the offensive 2 (指責別人的過錯; 駁斥別人的議論) accuse; ...
  • : 任名詞(姓氏) a surname
  • : Ⅰ名詞1 (事情) affair; business 2 (姓氏) a surname Ⅱ動詞1 (從事; 致力) be engaged in; devote...
  • 攻擊 : 1 (進攻) attack; assault; launch an offensive 2 (惡意指責) attack; accuse; charge; slander; v...
  1. Ariborne anti - submarine warefare ( asw ) is a major mode of operations. it consists of the stage of searching for submarine and that of attacking the submarine

    因而,在對海作戰中,搜索、敵軍的潛艇力量是一項重要的戰略
  2. In an asw mission a platform is tasked to classify, localize, and potentially attack a suspected threat detected by ownship ' s sensors or by sources external to ownship

    在一個asw里一個平臺的是分類、定位和潛伏地一個自己船隻的傳感器探測到的或者是外部來源探測到的可疑威脅。
  3. For flexibility of command the important task is to make changes such as from the offensive to the defensive or from the defensive to the offensive, from advance to retreat or from retreat to advance, from containment to assault or from assault to containment, from encirclement to outflanking or from outflanking to encirclement, and to make such changes properly and in good time according to the circumstances of the troops and terrain on both sides

    變為防禦,防禦變為,前進變為後退,後退變為前進,鉗制隊變為突隊,突隊變為鉗制隊,以及包圍迂迴等等之互相變換,依據敵我部隊、敵我地形的情況,及時地恰當地給以變換,是靈活性的指揮之重要
  4. 2 ) a new one time password authentication scheme. the original password authentication is vulnerable to guess attack and server personating attack. to overcome the vulnerability of this scheme, this paper designs a simple and efficient password authentication schema. the enhanced schema can improve the system ' s ability to defend all kinds of the attacks without using any cryptosystems

    2 )新的一次性口令認證機制。針對postgresql原有認證機制具有易遭受口令猜測和服器端假冒的缺陷,本文設計了一種簡單而有效的口令認證機制。該認證機制不需要使用何加密系統,就能有效加強對各種手段的防範能力。
  5. In the french air force, mirage 2000 fighters in operation are : mirage 2000c / b single seater and two seater for air defence ; mirage 2000n, two seater, designed for all weather nuclear penetration at low altitude and very high speed ; and mirage 2000d, which is an upgraded version of the mirage 2000n, for automated bombing using conventional and laser guided munitions ; e type for multi purpose exporting version ; r for single seat day / night eaporting version

    在法國空軍內,現役的幻影2000戰斗機為幻影2000c型單座戰斗機、 b型雙座戰斗教練機、幻影2000n雙座全天候低空高速核機以及其改進型d型常規精確制導武器機、幻影2000e多出口型、幻影2000r單座晝夜偵察出口型。
  6. Reserve group : composed by one rifle company, one engineers platoon and one tank platoon located west of sapadni with two tasks, one to reinforced and exploit the attack in the rostov direction and another, to protect the artillery positions against attacks from the north and the west

    預備群:由一個步兵連,一個工兵排和一個位於薩帕德尼西面的坦克排組成,它有兩個,加強和擴大在羅斯托夫方向上的進,其次,保護炮兵陣地,抵禦來自北面和西面的可能
  7. Quote : - reserve group : composed by one rifle company , one engineers platoon and one tank platoon located west of sapadni with two tasks , one to reinforced and exploit the attack in the rostov direction and another , to protect the artillery positions against attacks from the north and the west

    預備群:由一個步兵連,一個工兵排和一個位於薩帕德尼西面的坦克排組成,它有兩個,加強和擴大在羅斯托夫方向上的進,其次,保護炮兵陣地,抵禦來自北面和西面的可能
  8. The mission assignment between the multi - uav. to the multi - uav system, the main problem is the cooperative of multi - uav. this includes the coordination of the arrival time, the attacking direction and the tasks assignment

    對多無人機系統來說,最主要的問題是各無人機之間的「協調」問題,即多架無人機的航路(包括時間和方向等的限制)和的協調。
  9. To detect both known and unknown intrusion patterns, the system introduces a blended frame that makes use of both misuse detection approach and anomaly detection approach. the one of the highlight of the architecture is introduction of data mining technique, and the other is introduction of genetic algorithms. the ids uses data mining algorithms to abstract key features of system runtime status from security audit data, and it uses genetic algorithm to select the feature subset to reduce the amount of data that must be obtained from running processes and classified

    本文陳述了所研究系統的主要特點和技術:將智能體( agent )技術應用於入侵檢測系統,解決了傳統入侵檢測系統的集中式解決方案的弊病,充分利用網路資源協同完成入侵檢測;利用基於主機和基於網路的數據源,形成一種完整的混合型的結構,從而能收集到更加全面的信息;使用了異常檢測技術和誤用檢測技術,採用一種混合型的結構,既能檢測已知的模式,又能發現新的模式。
  10. Type : fourth - generation single - engine, single - seater multirole fighter capable for interception, air superiority, and ground attack missions

    類型:第四代單引擎,單座,擔當攔截、空優和對地的多戰斗機。
  11. Because a stationary enemy has innumerable opportunities to ambush whatever moves into the kill zone, urban assault is probably the deadliest task to undertake

    因為一個堅守的敵人擁有無數的機會伏何進入獵殺區的目標,進行城市進或許是最為危險的
  12. Moreover, ten additional divisions, some of them french, were scheduled to join in the attack from the mediterranean sector.

    再者,更有十個師,其中數個師為法軍,他們已派定參加地中海區的攻擊任務
  13. When you send a fleet to an attack you have now the option to invite other ppl to attack with you in a group

    當你讓艦隊發起一次攻擊任務時,你可以邀請其他人和你組成聯合
  14. The cooperative air combat mission was dissolved according to the combat phase and combat mission type based on the features of air combat

    摘要根據空戰作戰的特點,對協同攻擊任務進行階段分解和類型分解。
  15. If you don ' t qualify in the relevant training schools, you can ' t participate in the subsequent battles ? you need your airborne wings to play online in the terrific night - time parachute attack mission, for example

    舉個例子:如果你不符合學校訓練的有關要求,你不能參加接下來的戰爭你需要得到你的飛行章后才能在線玩令人恐怖的夜晚跳傘攻擊任務
  16. Then the detection probability of a distributed parallel detection system that consist of multiple distributed detectors is given. ( 2 ) the path planning is studied according to the attacking and the reconnaissance / surveillance mission task requirements

    ( 2 )本論文對無人機的攻擊任務,特別是偵察監視進行了分析和研究,根據作戰效能評定原則提出了合理的航路評價指標,簡便易行,適于實際計算。
  17. The paper mainly does research on simulation of the air - to - surface ( as ) attack mission. on the basis of that, as attack representative maneuver chains are designed. and, corporation between uninhabited combat air vehicle ( ucav ) and as missile is discussed in the process

    本文主要針對無人機對地攻擊任務特點,開展模擬模型研究,並以此為基礎設計出無人機防區外的典型動作鏈,對過程中無人機與空地導彈的配合問題進行了初步的研究。
  18. To improve the efficiency of the uav ' s mission, the highly effective path the uav will fly during the execution of the mission should be planned before the mission carrying out, which give a promise for the uav to arrive at the target with a higher survivalbility and an acceptable path length

    摘要為了提高無人機( uav )作戰的成功率,在敵方防禦區域內執行攻擊任務前必須規劃設計出高效的無人機飛行航路,保證無人機能夠以最小的被發現概率及可接受的航程到達目標點。
  19. To increase the campaign effectiveness of uav, this thesis discusses the path planning of uav and solve the path planning in two conditions : the attacking mission and the reconnaissance / surveillance mission. some works have done to deal with the problems of mission planning, which considering the problems of dynamic environment and the multi - uav mission

    為了提高無人機的作戰效能,本文根據無人機的方式討論了無人機的航路規劃問題,分別對無人機攻擊任務和偵察搜索的航路進行了研究,並進一步對無人機的規劃問題進行了一些研究,涉及到了多機和動態問題。
  20. Conversely, critics contend that the doctrine and the fledgling offensive counterspace mission represent the intellectual underpinning of a major shift in us thinking that, whether intentionally or not, could lead to the global community crossing the threshold of combat in space

    反過來說,評論家趨向于認為該條令及其催生的進性太空反代表了美國思想領域理性思維的一個主要轉變,無論是否故意這樣,它都會導致國際社會越過太空戰的雷池。
分享友人