防禦機動 的英文怎麼說
中文拼音 [fángyùjīdòng]
防禦機動
英文
defensive maneuver-
Advances in aquatic crustacean immunologic defence mechanisms and immunoprophylaxis
水產甲殼動物的免疫防禦機能及其免疫預防研究進展In carefully choreographed moves, drones were used to spy on the syrian defences, fool their radars and gather the electronic intelligence needed to destroy them
在精心編制的軍事行動中,無人駕駛的飛機是用於對敘利亞防禦系統的偵察、擾亂敘利亞的雷達以及收集能摧毀他們所需的電子情報。The intelligent mine will be the most important weapon system to defend arming helicopter hedgehopping in future war. passive acoustic detection technology is the key technology. with the researching of the national defence pre - researching project which is the research of acoustics compound fuse of anti - helicopter intelligent mine, this paper presents acoustic localization algorithm and discusses the affect of wind to the localization, then a method of how to correct the affect of wind has been studied, upon this a dsp software system has been designed
智能雷彈是防禦超低空飛行的武裝直升機的重要武器系統,而被動聲探測技術是其關鍵技術,本文結合「九?五」國防預研項目「反直升機智能雷彈聲復合引信技術」的研究,對空間目標聲定位演算法和風對被動聲定位的影響及如何對這種影響進行修正進行了深入分析,並在此基礎上設計了dsp軟體系統。The intelligent mine will be the most important weapon system to defend arming helicopter hedgehopping in future war. passive acoustic detection technology is the key technology. with the researching of the national defence pre - researching project which is the research of acoustics compound fuse of anti - helicopter intelligent mine, this paper presents two type of acoustic localization algorithm, emphasizes the discussion of algorithm and presicion of space acoustic localization with sensors at different height in detail and compares them
智能雷彈是防禦超低空飛行的武裝直升機的重要武器系統,而被動聲探測技術是其關鍵技術,本文結合「十?五」國防預研項目「反直升機智能雷彈聲復合引信技術」的研究,對兩種空間目標聲定位演算法進行了深入分析,重點討論了空間高低陣定位演算法,分析了定位精度。With additional capabilities in rotorcraft, electronic and defense systems, missiles, rocket engines, satellites, launch vehicles and advanced information and communication systems, the company ' s reach extends to customers in 145 countries
加上旋翼飛機、電子和防禦系統、導彈、火箭發動機、衛星、運載火箭和先進信息及通訊系統等方面的研製能力,本公司的客戶已經遍及145個國家。Inverse aperture radar ( isar ) can image non - cooperative moving targets such as aircrafts, ships and celestial objects over a long distance under all weather and all day. it is of particular interest for strategic defense, anti - submarine warfare and radar astronomy
逆合成孔徑雷達( isar )能夠對飛機、艦艇、天體等非合作運動目標進行全天時、全天候、遠距離成像,在戰略防禦、反衛星、戰術武器以及雷達天文學中都有重要應用價值。For the protection of system resource, need to establish a active defence machine different from firewall and antivirus software to detection intrusion. by monitoring network or computer systematic development behavior feature intrusion detection system ( ids ) judge whether have invade take
為保護系統資源,需要建立不同於防火墻和防病毒軟體的主動防禦機制檢測入侵。入侵檢測系統( intrusiondetectionsystem )就是監控網路或計算機系統的動態行為特徵並據此判斷是否有入侵的主動防禦措施。2 ) based on the study and analysis of many security architecture standards, the security region and the defense layer are introduced, the information category, the threatening level and the security protection level ( spl ) are put forward, the methods and requires of the security analysis are discussed in this paper. 3 ) based on the security architecture model and the security analysis, the graded requires of the security management and the security technology is presented, so the security design of the cissa and the choice of security produces can be done conveniently. 4 ) a cooperative communication platform is designed and implemented to ensure the dynamic and cooperative ability of above cissa model
針對計算機信息系統安全體系模型和實施標準的不足,本文緊密圍繞分層、分級、動態防禦以及協同通信平臺等關鍵技術開展研究工作,所做的工作主要集中在: 1 )在深入研究了當前各種流行的安全體系模型基礎上,提出了用於指導計算機信息系統安全體系建設的動態縱深防禦安全體系模型; 2 )在對各種安全體系標準進行研究與分析的基礎上,引入了安全域和安全防護層次的概念,提出了信息類別、威脅級別和安全保障級別的定義,闡述了進行計算機信息系統安全分析的方法和要求; 3 )在安全體系模型和安全分析的基礎上,提出了安全管理及安全技術的分級要求,從而便於進行計算機信息系統的安全設計以及產品的選型; 4 )設計並基本實現了用於保障上述安全體系動態協同能力的協同通信平臺。Unlike america, which sought to operate large uavs at long distances through hostile air space, israel ' s drones operated from its own defended territory, and real - time video was transmitted through short line - of - sight data links
美國是想方設法地使用大型無人機遠程進入敵方領空以採取軍事行動,以色列卻和他們不一樣? ?以色列的無人駕駛飛機從自己的防禦區域進行軍事行動,而且其實時視頻是通過短視線的數據通信進行傳輸的。This forces the defender to put a premium on mobile unit who can rush out to intercept enemy stacks before they reach the cities
所以防禦者必須非常重視機動單位? ?這些單位可以在敵人接近之前突破敵陣。The visit was conducted as part of the icao anti - sars airport evaluation project
這次訪港活動是國際民航組織評核機場採取防禦非典型肺炎措施計劃的一部份。As an important and active security mechanism, intrusion detection has reinforced the traditional system security mechanism and become the main means to detect the network attack
入侵檢測作為一種主動防禦技術,彌補了傳統的以防火墻為基礎的被動的網路安全機制的不足,成為當前防範網路攻擊的主要手段。At the same time, it includes " mobile defence ", which is conducted when necessary to facilitate such offensive battles ; it also includes positional attack and positional defence in a supplementary role
同時,也把為了便利於執行這種進攻戰而在某些必要時機執行著的所謂「運動性的防禦」包括在內,並且也把起輔助作用的陣地攻擊和陣地防禦包括在內。In security defense measures, the author advances a dynamic defense system, the core of which is intrusion detection system, namely the linkage with intrusion detection system, vulnerability scanners system and firewalls system
安全防護措施中提出了以入侵檢測為核心的動態防禦體系,即入侵檢測系統與漏洞掃描系統和防火墻系統的聯動,同時,建立了日常安全維護體系和應急響應體系及風險評估機制。Computer buses, pc configurations, disassembly re - assembly, printer, network, diagnosis and troubleshooting, pc repair, maintaining pcs, monitors and printer, fundamental of operating systems, installing and supporting windows 9x and windows 2000, diagnosing and troubleshooting and supporting network
訊通信電腦結構組裝與折開電腦對電腦系統及啟動的設置印表機及熒幕的維修安裝電腦軟體防禦性的維護及維修電腦的一般Among sequenced 16 positive clones randomly selected, two represent novel expression tag sequences, two are homologous to two unknown proteins in genbank ; the rest are homologous to known or putative proteins or enzymes with definite functions by searching the genbank through blast program, which are involved in various life activities of cell such as regulation of gene expression, plant secondary metabolism, signal transduction, adversity resistance, stress response and defense reaction. significant changes of quantities of these gene fragments were observed before and after ssh, which indicated they were enriched after ssh
隨機挑選了16個差異表達的克隆進行序列測定,經與genbank數據庫相關數據比較分析,發現有2個新的cdna片段( ets ) ,有12序列與genbank中已知蛋白或推測蛋白質( putativeprotein )序列有高低不同的同源性,它們參與基因的表達調控、植物的次生代謝、信號傳導、抗逆、應激及防禦反應等細胞生命活動過程。The intelligent mine will be the most important weapon to attack armed helicopters in the future war and passive acoustic detection is the key technology
智能雷彈是防禦低空飛行的武裝直升機的重要武器系統,被動聲探測技術是其關鍵技術。Information security defense mechanism is changed from passivity to initiative as the information times going, so honeypot technology is more and more regarded as an effective way to anti - attack
信息時代的到來需要計算機安全防護由被動防禦轉為主動防禦,從而使蜜罐技術在網路對抗中日益受到重視。The design and implementation of interactive defense mechanism
聯動防禦機制的設計與實施The techniques need unite network security mechanism and intrusion prevention mechanism in order to insuring system usability. in this dissertation, the conceptual architecture of such a system was described, and our experience with its initial implementation was described
其中,防火墻系統與入侵檢測系統的聯動是目前動態防禦技術研究的熱點問題,它結合了傳統的網路安全機制和入侵防禦機制,可從多方面確保系統的可用性。分享友人