空間攻擊 的英文怎麼說

中文拼音 [kōngjiāngōng]
空間攻擊 英文
space attack
  • : 空Ⅰ形容詞(不包含什麼; 裏面沒有東西或沒有內容; 不切實際的) empty; hollow; void Ⅱ名詞1 (天空) s...
  • : 間Ⅰ名詞1 (中間) between; among 2 (一定的空間或時間里) with a definite time or space 3 (一間...
  • : Ⅰ動詞1 (攻打) attack; assault; take the offensive 2 (指責別人的過錯; 駁斥別人的議論) accuse; ...
  • 空間 : space; enclosure; room; blank; interspace
  • 攻擊 : 1 (進攻) attack; assault; launch an offensive 2 (惡意指責) attack; accuse; charge; slander; v...
  1. Whenever damage is received, faceless void moves a moment back in time to try to dodge that damage. can backtrack both physical and magical attacks

    不論是受到物理或者魔法,虛假面都有一定的幾率通過將時向回移動一小段來閃避傷害。
  2. In this paper, a space model of antisubmarine homing torpedo ' s trajectory has been established based on the surface warship attacking underwater target, a formula which can be used to calculate the trajectory length of antisubmarine horning torpedo is also given

    在建立了水面艦艇發射反潛自導魚雷水下目標的彈道模型的基礎上,提出了反潛自導魚雷全彈道長度的一種計算公式。
  3. We constructed fences using 2 x 2 x 2 factorial design to examine the effect patterns of food availability, predation and interspecific competition on population dynamics and spatial behavior of reed voles, microtusfortis. we expected to test two hypothesises : ( 1 ) availability of high quality food, predation and interspecific competition have independent and addictive effects on population system dynamics for small mammalia herbivore ; ( 2 ) availabiliry of high quality food could reduce home range and aggressive behavior level between individuals of microtine, predation and interspecific competition have independent effects on spatial behavior of microtine

    以2 2 2析因實驗設計,在野外圍欄條件下,探討食物可利用性、捕食及種競爭對沼澤田鼠( microtusfortis )種群動態及行為的作用,旨在檢驗下述特定假設: ( 1 )高質量的食物可利用性、捕食及種競爭對植食性小哺乳動物種群系統動態具有獨立的和累加的效應; ( 2 )高質量的食物可利用性可降低田鼠個體行為水平,並導致其巢區減小;捕食與種競爭對田鼠的行為亦有獨立的作用。
  4. Operate guidebook : the ctrl attackstones for the big gun, the space attackstones for the nailhead hammer, the arrowhead acts, jumps up

    操作指南: ctrl為大炮為釘頭錘,箭頭行動、跳躍。
  5. The guessing attacks in the strand space model

    模型中的口令猜測
  6. Security, too, is a key issue for switching the traditional private nforork to vpn. security of mpls wn architectur is analyzed thorouguy in this thesis, including septheion of address space and route, hiding of the mpls core smicture, resistance of attacks, impossibi1ity of 1abe1 spoofing

    安全性是虛擬專用網能否取代傳統專用網的關鍵,本文對mplsvpn體系結構的安全性進行了深入分析,包括地址和路由的隔離、隱藏mpls核心結構、抵抗、抵抗標記欺騙等,從而得出mplsvpn與atm framerelay具有相同安全級別的結論。
  7. The waging of mobile warfare involves many problems, such as reconnaissance, judgement, decision, combat disposition, command, concealment, concentration, advance, deployment, attack, pursuit, surprise attack, positional attack, positional defence, encounter action, retreat, night fighting, special operations, evading the strong and attacking the weak, besieging the enemy in order to strike at his reinforcements, feint attack, defence against aircraft, operating amongst several enemy forces, by - passing operations, consecutive operations, operating without a rear, the need for rest and building up energy

    運動戰的實行方面,問題是很多的,例如偵察、判斷、決心、戰斗部署、指揮、蔭蔽、集中、開進、展開、、追、襲、陣地、陣地防禦、遭遇戰、退卻、夜戰、特種戰斗、避強打弱、圍城打援、佯、防、處在幾個敵人之、超越敵人作戰、連續作戰、無後方作戰、養精蓄銳之必要等等。
  8. One thing should be pointed out is that the correctness proof based on strand space is valid only on the attack set already known

    需要指出的是:基於strand理論的正確性證明是建立在已知集的基礎上的。
  9. Second, by computing the trajectory of the missile and the method of analyzing cep, influences that the fighter ' s height, speed, pitch angle, the deflection angle between fighter and target, and the target moving characters make on the times of fighter attack and missile launch are deeply developed. third, by relating the motion of the missile and the fighter, the influences that fighter ' s dive angle and the deflection angle between fighter and target make on the attack field of the fighter are discussed in this paper when the fighter perform vertical and horizontal attack. criterion of attack effect is proposed focusing on attack time of the fighter, trajectory of the missile and destruction probability to the target

    本文主要完成了以下幾個方面的工作:對導彈可發射區和飛機可區進行建模,通過對導彈彈道的模擬計算,並運用典型的圓概率偏差精度分析方法,詳細討論了飛機實施時,飛機的飛行高度h 、速度v 、俯仰角、與目標的偏離角_ x及目標運動特性等對飛機時機和導彈發射時機的影響;因此,將飛機和導彈結合起來,詳細研究了飛機在垂直平面和水平平面內實施時,飛機俯沖角和與目標的偏離角_ x對飛機的范圍的影響;以飛機實施的時t 、彈道特性和對目標的殺傷概率p來評判對地的效果;最後給出典型算例,通過對過程的模擬實現,對飛機飛行過載提出要求。
  10. Public - key encryption has a much larger keyspace, or range of possible values for the key, and is therefore less susceptible to exhaustive attacks that try every possible key

    公鑰加密具有更大的密鑰(或密鑰的可能值范圍) ,因此不大容易受到對每個可能密鑰都進行嘗試的窮舉
  11. Except with the advantages of long range early warning and anti - stealth, rending anti - radiation missiles useless, also for its inherent flexibility and mobility that enlarge warning region, high frequency ship - borne surface wave over - the - horizon radar ( hf sswothr ) has been widely used in military domain

    高頻地波艦載超視距雷達具有遠距離預警、反隱身、抗反輻射導彈等方面的顯著特點。而且載艦本身的靈活性、機動性又提供了更廣闊的警戒,因此它在軍事上具有廣闊的應用前景。
  12. With the development of aerospace science, especially the appearance of high speed attack weapons such as guided missile, radar is required to not only discover and track the target in further distance but also command plane and missile to head off the target

    隨著技術的發展,特別是導彈等高速進性武器的出現,要求雷達能在更遠的距離上發現和跟蹤目標,並能及時指揮和引導飛機和導彈攔目標。
  13. First of all, we bring forward the basic project of tadil, which adapts to combined operations. it is suggested to use tdma ( the abbreviation of time division multiple access ) as the working pattern and utilize the concept of mobile ad hoc network to construct the data link network. aiming at the impact of time delay on data link and the characteristic of cooperative combat under the command of director aircraft, this thesis applies a kind of kalman filtering algorithm in polar coordinates to compensate the error of time delay, and then does the transformation of target motion parameters to obtain the current information of target

    本文結合軍裝備部某「十五」預研課題,圍繞著戰術數據鏈、多機協同多目標、超機動對地這四個方面展開了一系列的研究工作:本文首先給出了適應三軍聯合作戰的戰術數據鏈系統的基本方案,建議採用時分多址的工作模式,並利用移動自組織網路的概念構建數據鏈網路,同時針對數據鏈傳輸信息的時延遲特性和指揮機指揮下的多機協同作戰特點,應用一種極坐標系下的卡爾曼濾波演算法對該傳輸延遲誤差進行補償,並在此基礎上進行目標運動參數的轉換,以獲得目標相對于某無人機的當前運動信息,且利用模擬驗證了方法的有效性。
  14. “ it ' s a shame we were unable to beat albinoleffe. unfortunately we met with a side that decided not to play, preferring instead to close down all our spaces

    「未能敗阿爾比諾勒菲非常羞恥。不幸的是我們遇到了一支不進的球隊,他們的縮手防守阻止了我們進。 」
  15. During the blitz everyone used to spend the night in underground shelters

    在閃電,每個人常常在地下防洞度過夜晚。
  16. Because of the characteristics of internet such as anonymity and publicity, e - commerce makes it possible for more and more people to be involved deeply in commercial activities in cyberspace. at the same time, it also puts forward a new security requirement : how to fight fraud and prevent exchange activities from the bargainer ' s misbehavior

    由於網際網路絡匿名性及開放性的特點,電子商務的發展一方面使得人們在更廣闊的數字內進行商務活動的同時,對信息安全提出了新的需求:如何防止來自交易實體的欺詐和
  17. Awacs oka nieba : the later you get there, the less time you ' ll have to attack the solg

    中管制機: 「你們到得越遲,solg的時就越緊張。 」
  18. Their aim was to find the most prominent chemical weapon in each plant, whether that weapon was directed against insects that might want to eat the plant, bacteria and fungi that might want to infect it, or other plants that might compete for space, water, nutrients and light

    這種「化學武器」的對象包括可能吃掉該植物的昆蟲,使其感染的細菌和真菌以及與其競爭生長、水、養料和陽光的其它植物。
  19. There were problems employing this type of system as there were big gaps between the attacking players and defensive players

    但是應用這種陣形就會出現問題,因為在線和防守線之有一條大隙。
  20. It can construct a reference path with lowest danger for the uav ( unmanned aerial vehicle ) by accounting for some aircraft performance characteristics, the mission goals, the threat information and the terrain information. this paper puts emphasis on the study of path planning algorithms and the analysis of uav missions. the main contributions are summarized as follows : ( 1 ) the threat environment, mainly as the radar threat, is studied and the detection probability of the aircraft is analyzed

    本論文主要根據無人機的作戰任務方式進行了航路規劃研究,包括航路和偵察監視任務航路,具體內容包括以下幾個方面: ( 1 )本論文分析了威脅的威脅計算問題,對飛行器探測概率進行定量化的研究,根據恆虛警處理技術對雷達探測概率計算方法進行了總結,說明了計算單部雷達探測概率問題的方法,在此基礎上對雷達網的探測概率計算進行了討論,提出了相對于距離的探測概率求解方法和思路,用於航路規劃中的威脅計算。
分享友人