用於進攻的 的英文怎麼說

中文拼音 [yòngjìngōngde]
用於進攻的 英文
used for or connected with attack aggressive
  • : Ⅰ動詞1 (使用) use; employ; apply 2 (多用於否定: 需要) need 3 (敬辭: 吃; 喝) eat; drink Ⅱ名...
  • : 於名詞(姓氏) a surname
  • : 進構詞成分。
  • : Ⅰ動詞1 (攻打) attack; assault; take the offensive 2 (指責別人的過錯; 駁斥別人的議論) accuse; ...
  • : 4次方是 The fourth power of 2 is direction
  • 用於 : be applied to
  • 進攻 : attack; assault; offensive
  1. The constant search for a more effective infantry weapon led in the 1990s to the concept of small - calibre high - explosive fragmentation grenade shells designed to burst over the heads of their targets, thereby permitting the attack of troops in defilade, ie hiding behind cover

    上世紀八十年代對更加有效步兵武器不斷研究得出了小口徑高爆破片手榴彈外殼設計殺傷目標頭部概念,從而形成了對隱藏工事及掩體部隊手段。
  2. Cbr is used to obtain the domain knowledge and experience embedded in campaign plans by memorizing the existing cases, which is similar with the operating procedure mainly relied on the planning of aoc. moreover, cbr eases the bottleneck of the formalization of domain theory and experience of aoc through memorization. therefore, it is pretty rational and worthwhile for this thesis to introduce cbr and take it as the planning technology of aoc

    案例推理是通過回憶已有案例來獲得蘊涵在作戰計劃中知識和經驗,但是對空中作戰知識和經驗行規范化表示很困難, cbr則通過回憶避開了知識規則表示瓶頸,因此,本文將cbr技術引入空中作戰計劃生成中,具有相當可行性和重要價值。
  3. This platform system can not only detect and attack in the case of actual combat, but also be used for training the administrator with actual combat experience

    該訓練平臺不僅可以行在線實戰時檢測和擊,同時也可培養有實戰經驗網路安全管理員。
  4. Wwii combatives lays primary importance on simple, straight forward, effective and practical skills with an offensive aggressive attitude of attack and more attack

    二戰格鬥術最重要之處在,簡單、直接、有效、實技術,加上以一種侵略性姿態。
  5. At the same time, it includes " mobile defence ", which is conducted when necessary to facilitate such offensive battles ; it also includes positional attack and positional defence in a supplementary role

    同時,也把為了便利執行這種戰而在某些必要時機執行著所謂「運動性防禦」包括在內,並且也把起輔助作陣地擊和陣地防禦包括在內。
  6. 003601211 ) and hebei province ' s tackling key problem plan " the study of agv accurate navigation used in material automation transportation " ( no. 00547001d - 18 ). this thesis mainly focuses on the stereo vision technique used for the mobile robot, the main work includes : 1

    在天津市自然科學基金「面向復雜任務移動機器人系統技術研究」 (項目編號: 003601211 )和河北省關計劃「物料自動傳輸自主車精確導航研究」 (項目編號: 00547001d - 18 )支持下,本文對移動機器人立體視覺技術行了較為系統深入研究,本文主要工作包括: 1
  7. An investigation of the rijndael algorithm which is the advanced encryption standard of usa is taken in this thesis. we have focused on developing the cryptographic properties of the rijndael sbox from the viewpoint of boolean function, walsh spectrum and algebraic structures, on the attacks against the reduced variants of rijndael, and on the optimized implementations of rijndael. the key contributions follow below

    本文對美國高級加密標準rijndael演算法行了比較深入研究,內容包括:從布爾函數、 walsh譜和代數結構角度對其s盒密碼性質研究,簡化演算法擊方法以及演算法優化實現問題,主要成果有: 1 、提出求解布爾函數表達式兩種新方法,具有簡潔、易編程實現、準確而快速特點,應des演算法獲得與公開文獻相符結果,應rijndael演算法首次求出其s盒布爾函數表達式。
  8. In some projects charged by our lab such as national 863 project - " crop planting management components based on weather analyse ", anhui provincial 95 key project - " agricultural meteorology disaster evaluation system base on gis in anhui province " and the project " small coal mine security management and decision system based on gis in anhui province ", this paper combines the theory and arithmetic of rough set with gis and data mining in idss, investiges the application of rough set theory to precision analysis of attribute data and logical operation in gis, analyzes the logical operation based on rough set ( logical union, logical intersection, logical complement, mixed logical operation etc. ), so that it can give a method y to research the gis attribute data and the uncertainty of attribute data after superposition operator, so as to express the roughness and illegibility of attribute data more accurately

    在完成試驗室所承擔國家863項目「基氣象分析農作物種植管理軟構件」 、省95關項目「基gis安徽省重大農業氣象災害測評系統」和「基gis安徽省小煤礦安全管理決策系統」等項目中,將粗糙集理論和演算法與gis 、智能決策系統中知識發現等相結合,對粗糙集理論在gis屬性數據和邏輯運算精度分析中情況行了研究,分析了基粗集gis邏輯運算(邏輯並、邏輯交、邏輯補、混合邏輯等) ,從而為研究gis屬性數據及其疊加運算后屬性數據不確定性提供了一種方法,能比較準確地表達屬性數據模糊性和粗糙性。
  9. Then it discusses the cbr employed in aoc planning and contours the planning model of military campaign. meanwhile, it raises a synthesized pattern comprising two planning techniques in view of cbr and rbr respectively and designs carefully the representation, the retrieval and the revision of the planning case of aoc under the guidance of cbr

    接著論述了cbr在空中作戰計劃生成中,給出了作戰計劃生成過程模型,並提出了基cbr和rbr相結合計劃生成方法,詳細設計了基cbr空中作戰計劃案例表示、檢索和調整。
  10. And staggering and gasping, the old man fell into that state of fury in which he would sometimes roll on the ground in frenzy, and flew at eichen, shaking his fists, and shouting abuse in the language of the gutter

    是,老人氣得渾身發抖,喘息著,已經處在瘋狂狀態,在他氣得在地上打滾時候,總是這種樣子,他向艾興了,揮舞著雙手威嚇他,喊叫著,最粗鄙話罵他。
  11. The quantity of credit cards issued by chinese commercial banks is so small, and, at the same time, the bank of china is lack of management experience of the credit card customer. while foreign banks have issued credit cards over 100 years and acquired plenty of management experience, there is no doubt that the competition will be very serious for chinese commercial banks

    卡由有豐厚利潤,不依存銀行營業網點和分支機構經營而成為2005年後外資銀行首先金融業務,而我國商業銀行信發行量少,缺乏對信卡客戶管理經驗,面對著經營信卡已經100多年,擁有豐富管理經驗外資銀行來說,競爭激烈是不言而喻
  12. The focke-wulf and other bombers employed against our shipping must be attacked in the air and in their nests.

    應該對擊我船舶「福克烏爾夫」式及其它轟炸機行空中襲擊,或在飛機場將它們擊毀。
  13. It should detect categories of obstacle. in this paper, recognizing obstacle based on multisensor fusion technology is given. in the support of tianjin ' s natural science foundation " the study of mobile robot system technology faced to complicated task " ( no. 003601211 ) and hebei province ' s tackling key problem plan " the study of agv accurate navigation used in material automation transportation " ( no. 00547001d - 18 ), this thesis developed application study of information fusion based of multisensor in mobile robot ' s navigate autonomously. in this thesis, the main work and innovation include : the structure of hebut - 1 mobile robot is designed. furthermore, the driving system ' s characteristics and the kinematics features of the mobile robot are analyzed

    在天津市自然科學基金「面向復雜任務移動機器人系統技術研究」 (課題編號: 003601211 )和河北省關計劃「物料自動傳輸自主車精確導航研究」 (課題編號: 00547001d - 18 )兩項基金支持下,開展了基多傳感器信息融合技術在移動機器人自主導航中研究,本論文主要研究內容如下:介紹了由本研究室自行研製hebut -型移動機器人車體結構並對驅動系統和運動學特性行了分析。
  14. It can construct a reference path with lowest danger for the uav ( unmanned aerial vehicle ) by accounting for some aircraft performance characteristics, the mission goals, the threat information and the terrain information. this paper puts emphasis on the study of path planning algorithms and the analysis of uav missions. the main contributions are summarized as follows : ( 1 ) the threat environment, mainly as the radar threat, is studied and the detection probability of the aircraft is analyzed

    本論文主要根據無人機作戰任務方式行了航路規劃研究,包括擊航路和偵察監視任務航路,具體內容包括以下幾個方面: ( 1 )本論文分析了威脅空間威脅計算問題,對飛行器探測概率行定量化研究,根據恆虛警處理技術對雷達探測概率計算方法行了總結,說明了計算單部雷達探測概率問題方法,在此基礎上對雷達網探測概率計算行了討論,提出了相對于距離探測概率求解方法和思路,擊航路規劃中威脅計算。
  15. Sponsored by china national 863 / cims project " event - based integrated quality system modeling and prototype technology research " ( no. 863 - 511 - 9844 - 012 ) , heilongjiang province cad application project " furniture series of products computer aided design " and project " the network - based product design center of furniture manufacturing industry " ( no. 2001ba201a0605 ) , which is a subproject of the tenth - five national key project " network - based manufacturing platform " ( no. 2001ba201a06 ) , this thesis made a systemic research on some key technologies of ncd , such as the network model , the collaborative design - supporting product data management and the evaluation of collaborative design quality and so on. with the furniture industry as the object of application , this thesis applied the research achievements to furniture enterprises , established the platform of the ncd in furniture manufacturing industry and settled the base of network - based design for furniture enterprises. this research has important theoretical significance and practical value

    本文結合所承擔國家863 / cims項目「基『事件』集成質量系統建模及原型技術研究」 (編號: 863 - 511 - 9844 - 012 ) 、黑龍江省重點cad應工程項目「傢具系列產品計算機輔助設計」和國家十五科技關項目「網路化製造平臺」 (項目編號: 2001ba201a06 )子項目「傢具製造業產品網路化設計中心」 (子項目編號: 2001ba201a0605 ) ,對網路化協同設計網路模型、支持協同設計產品數據管理和協同設計質量評價等關鍵技術行了深入系統研究,並以傢具企業為主要應對象,將研究成果應傢具企業中,建立了傢具製造業產品網路化協同設計平臺,為傢具企業實施網路化協同設計奠定了基礎,其研究成果具有重要理論意義和實價值。
  16. Obviously rc6 is not square - like cipher. square attack can only attack few rounds of rc6, because the data - rotations of rc6 affact the rules of propagation for active and passive words, which makes square attack ineffective. we analyse the square attack against serpent which is bit - oriented cipher, and the result shows that square attack on serpent is weak, because the bit - oriented linear operations interrupt the rules of propagation for active and passive multiset

    我們將square擊應rc6密碼,發現square擊只能擊少數幾輪rc6 ,這主要是因為rc6數據依賴循環運算打亂了活動位元組和固定位元組傳播路徑,使得擊無法行。我們分析了對serpent密碼square擊, serpent密碼按比特線性混合運算打亂了所構造multiset傳播路徑,使得擊只能行到3輪serpent密碼。
  17. While, some algorithms of machine learning are introduced to get the intelligence of the individual of hfutagent which makes individual skills in the robocup. finally, we realize the multi - agent cooperation mechanism using the knoledge of soccer experts. in our system, a typical cooperation method in robocup called sbsp is used, and we explains how to use reinforcement learning method to reach the goal of local cooperation, and the offense and defense strategy system is build by decision - theoretic

    在本文中,首先介紹了典型agent結構和mas模型和模擬機器人足球一些主要模型:設計了一個分層agent結構? hfutagent ,通過機器學習演算法實現了agent個體智能;最後結合足球領域專家知識實現了agent間協作,其中使了robocup中一個典型協作方法- sbsp ,設計了一個通過強化學習方法來達到agent之間局部協作,把基對策論方法引入了hfutteam體系和防守體系中。
  18. Finally, we proposed a novel improved self - adaptive algorithms and testified its combining encryption effect with its position and energy information. in part two of this thesis, we analyze the dynamic states of an image caused by image iteration, as a result we point out that the holographicity exists with chaotic characters simultaneously during image scrambling

    隨后,我們分析純位置移動演算法弱點並作了改,給出了一種新自適應圖像置亂加密演算法,經過本演算法加密圖像可以有效地防止已知明文擊,並具有很好完整性保護功能,亦可圖像驗證。
  19. Wallace never has been an offensive - minded player. his impact has always come on the defensive end, where he is annually among the league leaders in rebounds and blocks

    本- -華萊士在心裏可能就沒怎麼想要,他來自防守端,幾乎每年,他都是聯盟數一數二籃板和蓋帽高手。
  20. For example, in the simplest case, network sniffing is used to obtain passwords, and those passwords are then used to mount an application - level attack

    例如,在最簡單情況中,網路嗅探能夠獲取密碼,然後這些密碼可以行應擊。
分享友人