防禦機動 的英文怎麼說

中文拼音 [fángdòng]
防禦機動 英文
defensive maneuver
  • : Ⅰ動詞(防鷥) provide against; defend against; guard against Ⅱ名詞1 (防守; 防禦) defence 2 (堤...
  • : machineengine
  • 防禦 : defense
  • 機動 : 1 (利用機器開動的) motor driven; motorized2 (權宜; 靈活) flexible; expedient; mobile; manoeuv...
  1. Advances in aquatic crustacean immunologic defence mechanisms and immunoprophylaxis

    水產甲殼物的免疫能及其免疫預研究進展
  2. In carefully choreographed moves, drones were used to spy on the syrian defences, fool their radars and gather the electronic intelligence needed to destroy them

    在精心編制的軍事行中,無人駕駛的飛是用於對敘利亞系統的偵察、擾亂敘利亞的雷達以及收集能摧毀他們所需的電子情報。
  3. The intelligent mine will be the most important weapon system to defend arming helicopter hedgehopping in future war. passive acoustic detection technology is the key technology. with the researching of the national defence pre - researching project which is the research of acoustics compound fuse of anti - helicopter intelligent mine, this paper presents acoustic localization algorithm and discusses the affect of wind to the localization, then a method of how to correct the affect of wind has been studied, upon this a dsp software system has been designed

    智能雷彈是超低空飛行的武裝直升的重要武器系統,而被聲探測技術是其關鍵技術,本文結合「九?五」國預研項目「反直升智能雷彈聲復合引信技術」的研究,對空間目標聲定位演算法和風對被聲定位的影響及如何對這種影響進行修正進行了深入分析,並在此基礎上設計了dsp軟體系統。
  4. The intelligent mine will be the most important weapon system to defend arming helicopter hedgehopping in future war. passive acoustic detection technology is the key technology. with the researching of the national defence pre - researching project which is the research of acoustics compound fuse of anti - helicopter intelligent mine, this paper presents two type of acoustic localization algorithm, emphasizes the discussion of algorithm and presicion of space acoustic localization with sensors at different height in detail and compares them

    智能雷彈是超低空飛行的武裝直升的重要武器系統,而被聲探測技術是其關鍵技術,本文結合「十?五」國預研項目「反直升智能雷彈聲復合引信技術」的研究,對兩種空間目標聲定位演算法進行了深入分析,重點討論了空間高低陣定位演算法,分析了定位精度。
  5. With additional capabilities in rotorcraft, electronic and defense systems, missiles, rocket engines, satellites, launch vehicles and advanced information and communication systems, the company ' s reach extends to customers in 145 countries

    加上旋翼飛、電子和系統、導彈、火箭發、衛星、運載火箭和先進信息及通訊系統等方面的研製能力,本公司的客戶已經遍及145個國家。
  6. Inverse aperture radar ( isar ) can image non - cooperative moving targets such as aircrafts, ships and celestial objects over a long distance under all weather and all day. it is of particular interest for strategic defense, anti - submarine warfare and radar astronomy

    逆合成孔徑雷達( isar )能夠對飛、艦艇、天體等非合作運目標進行全天時、全天候、遠距離成像,在戰略、反衛星、戰術武器以及雷達天文學中都有重要應用價值。
  7. For the protection of system resource, need to establish a active defence machine different from firewall and antivirus software to detection intrusion. by monitoring network or computer systematic development behavior feature intrusion detection system ( ids ) judge whether have invade take

    為保護系統資源,需要建立不同於火墻和病毒軟體的主制檢測入侵。入侵檢測系統( intrusiondetectionsystem )就是監控網路或計算系統的態行為特徵並據此判斷是否有入侵的主措施。
  8. 2 ) based on the study and analysis of many security architecture standards, the security region and the defense layer are introduced, the information category, the threatening level and the security protection level ( spl ) are put forward, the methods and requires of the security analysis are discussed in this paper. 3 ) based on the security architecture model and the security analysis, the graded requires of the security management and the security technology is presented, so the security design of the cissa and the choice of security produces can be done conveniently. 4 ) a cooperative communication platform is designed and implemented to ensure the dynamic and cooperative ability of above cissa model

    針對計算信息系統安全體系模型和實施標準的不足,本文緊密圍繞分層、分級、以及協同通信平臺等關鍵技術開展研究工作,所做的工作主要集中在: 1 )在深入研究了當前各種流行的安全體系模型基礎上,提出了用於指導計算信息系統安全體系建設的態縱深安全體系模型; 2 )在對各種安全體系標準進行研究與分析的基礎上,引入了安全域和安全護層次的概念,提出了信息類別、威脅級別和安全保障級別的定義,闡述了進行計算信息系統安全分析的方法和要求; 3 )在安全體系模型和安全分析的基礎上,提出了安全管理及安全技術的分級要求,從而便於進行計算信息系統的安全設計以及產品的選型; 4 )設計並基本實現了用於保障上述安全體系態協同能力的協同通信平臺。
  9. Unlike america, which sought to operate large uavs at long distances through hostile air space, israel ' s drones operated from its own defended territory, and real - time video was transmitted through short line - of - sight data links

    美國是想方設法地使用大型無人遠程進入敵方領空以採取軍事行,以色列卻和他們不一樣? ?以色列的無人駕駛飛從自己的區域進行軍事行,而且其實時視頻是通過短視線的數據通信進行傳輸的。
  10. This forces the defender to put a premium on mobile unit who can rush out to intercept enemy stacks before they reach the cities

    所以者必須非常重視單位? ?這些單位可以在敵人接近之前突破敵陣。
  11. The visit was conducted as part of the icao anti - sars airport evaluation project

    這次訪港活是國際民航組織評核場採取非典型肺炎措施計劃的一部份。
  12. As an important and active security mechanism, intrusion detection has reinforced the traditional system security mechanism and become the main means to detect the network attack

    入侵檢測作為一種主技術,彌補了傳統的以火墻為基礎的被的網路安全制的不足,成為當前範網路攻擊的主要手段。
  13. At the same time, it includes " mobile defence ", which is conducted when necessary to facilitate such offensive battles ; it also includes positional attack and positional defence in a supplementary role

    同時,也把為了便利於執行這種進攻戰而在某些必要時執行著的所謂「運性的」包括在內,並且也把起輔助作用的陣地攻擊和陣地包括在內。
  14. In security defense measures, the author advances a dynamic defense system, the core of which is intrusion detection system, namely the linkage with intrusion detection system, vulnerability scanners system and firewalls system

    安全護措施中提出了以入侵檢測為核心的體系,即入侵檢測系統與漏洞掃描系統和火墻系統的聯,同時,建立了日常安全維護體系和應急響應體系及風險評估制。
  15. Computer buses, pc configurations, disassembly re - assembly, printer, network, diagnosis and troubleshooting, pc repair, maintaining pcs, monitors and printer, fundamental of operating systems, installing and supporting windows 9x and windows 2000, diagnosing and troubleshooting and supporting network

    訊通信電腦結構組裝與折開電腦對電腦系統及啟的設置印表及熒幕的維修安裝電腦軟體性的維護及維修電腦的一般
  16. Among sequenced 16 positive clones randomly selected, two represent novel expression tag sequences, two are homologous to two unknown proteins in genbank ; the rest are homologous to known or putative proteins or enzymes with definite functions by searching the genbank through blast program, which are involved in various life activities of cell such as regulation of gene expression, plant secondary metabolism, signal transduction, adversity resistance, stress response and defense reaction. significant changes of quantities of these gene fragments were observed before and after ssh, which indicated they were enriched after ssh

    挑選了16個差異表達的克隆進行序列測定,經與genbank數據庫相關數據比較分析,發現有2個新的cdna片段( ets ) ,有12序列與genbank中已知蛋白或推測蛋白質( putativeprotein )序列有高低不同的同源性,它們參與基因的表達調控、植物的次生代謝、信號傳導、抗逆、應激及反應等細胞生命活過程。
  17. The intelligent mine will be the most important weapon to attack armed helicopters in the future war and passive acoustic detection is the key technology

    智能雷彈是低空飛行的武裝直升的重要武器系統,被聲探測技術是其關鍵技術。
  18. Information security defense mechanism is changed from passivity to initiative as the information times going, so honeypot technology is more and more regarded as an effective way to anti - attack

    信息時代的到來需要計算安全護由被轉為主,從而使蜜罐技術在網路對抗中日益受到重視。
  19. The design and implementation of interactive defense mechanism

    制的設計與實施
  20. The techniques need unite network security mechanism and intrusion prevention mechanism in order to insuring system usability. in this dissertation, the conceptual architecture of such a system was described, and our experience with its initial implementation was described

    其中,火墻系統與入侵檢測系統的聯是目前技術研究的熱點問題,它結合了傳統的網路安全制和入侵制,可從多方面確保系統的可用性。
分享友人