防禦地域 的英文怎麼說

中文拼音 [fángde]
防禦地域 英文
defended area
  • : Ⅰ動詞(防鷥) provide against; defend against; guard against Ⅱ名詞1 (防守; 防禦) defence 2 (堤...
  • : 名詞(在一定疆界內的地方; 疆域) land within certain boundaries; territory; region
  • 防禦 : defense
  1. Sieges that aimed at isolating and reducing fortified places became the dominant instrument for prosecuting the war and protective fortifications were vital, for both the besieged as well as the besieger

    對于攻城戰的雙方來講,以孤立並消耗築壘為目的的攻城戰成為戰爭的決定性手段、同時保護築壘工事也生死攸關。
  2. Unlike america, which sought to operate large uavs at long distances through hostile air space, israel ' s drones operated from its own defended territory, and real - time video was transmitted through short line - of - sight data links

    美國是想方設法使用大型無人機遠程進入敵方領空以採取軍事行動,以色列卻和他們不一樣? ?以色列的無人駕駛飛機從自己的進行軍事行動,而且其實時視頻是通過短視線的數據通信進行傳輸的。
  3. In large - scale security system, subdomain segmentation can effectively improve the granularities of control and observation. by setting border protection in each subdomain, special custom protection is achieved. subdomain auto - isolation, global policy management, subdomain cooperation protection, can make the defense system more controllable, self - adaptive

    通過子邊界保護以解決子網安全需求不同,以及內部保護的針對性問題;利用子網隔離、全局策略、子協作等方式有效解決不同控制之間的協作問題,為大規模網路系統提供靈活的反擊機制。
  4. The original list was dominated by ex - soviet satellites ( rows over polish meat exports, lithuanian oil imports, the siting of an estonian war memorial, and czech and polish plans to host an american anti - missile defence system )

    最初的爭議領都是由前蘇聯附庸國掌控的,比如說,波蘭的肉食品出口、立陶宛的原油進口、愛沙尼亞戰爭紀念館建築定位和捷克與波蘭主辦美國反導彈系統的計劃) 。
  5. Article 40 local people ' s governments at or above the county level responsible for flood control and flood fighting shall, in accordance with the comprehensive plans for river basins, in the light of the actual conditions of flood control works and based on the flood control standards set by the state, formulate the flood prevention schemes ( including the measures for dealing with catastrophic floods )

    第四十條有汛抗洪任務的縣級以上方人民政府根據流綜合規劃、洪工程實際狀況和國家規定的洪標準,制定洪水方案(包括對特大洪水的處置措施) 。
  6. Firstly, the thesis analyzes the goal of computer network security and the security threat of network faced, and then introduces several traditional security techniques such as data encryption techniques and firework techniques. it analyzes the problems of these traditional security techniques and brings forward combine intrusion detection system ( ids ) and the traditional network security techniques to create multi - layers recovery system. it indicates the status in security domain and its significance of ids

    本論文在分析了計算機網路安全的目標以及網路所面臨的安全威脅基礎上,討論了幾種傳統的計算機網路安全技術,如數據加密技術、火墻技術等,並分析了傳統網路安全技術存在的不足,在此基礎上提出了以入侵檢測技術與傳統的計算機網路安全技術相結合的多層次體系,指出了入侵檢測系統在整個安全領中的位以及研究ids的重要意義。
  7. In accordance with the study of the theory of the large area air defense, the position and function of the terminal defense in the system of the large area air defense in the future air defense were analyzed

    摘要結合大區空作戰的理論研究,分析未來空中末端在大區空體系中的位和作用。
分享友人