集中攻擊 的英文怎麼說

中文拼音 [zhōnggōng]
集中攻擊 英文
concentration
  • : gatherassemblecollect
  • : Ⅰ動詞1 (攻打) attack; assault; take the offensive 2 (指責別人的過錯; 駁斥別人的議論) accuse; ...
  • 集中 : concentratecentralizefocusamassgroupmassingput togather
  • 攻擊 : 1 (進攻) attack; assault; launch an offensive 2 (惡意指責) attack; accuse; charge; slander; v...
  1. They proposed a heavy and concentrated amphibious assault.

    他們計劃進行一次猛烈而的兩棲
  2. Concentrate our offense on the diggers. order the apus into position

    火力巨大鉆頭下令裝甲部隊準備迎敵
  3. Years ago, dna typing achieved such wide acceptance and proven reliability that opponents now concentrate on two principal points of attack : ( 1 ) the quality and methodology of the laboratory work, including the lab ' s error rate, and ( 2 ) the statistical interpretation of data

    幾年前, dna鑒定贏得了廣泛的接受並證實了它的可靠性,現在,反對者開始於兩點進行: ( 1 )實驗室工作的質量和方法論,包括實驗室的誤差率; ( 2 )數據的統計學解釋。
  4. There are various tactics or methods for giving effect to this principle, such as dispersion and concentration of forces, diverging advance and converging attack, the offensive and the defensive, assault and containment, encirclement and outflanking, advance and retreat

    執行這個方針,有兵力的分散和、分進和合和防禦、突和鉗制、包圍和迂迴、前進和後退種種的戰術或方法。
  5. For the first minute anna pavlovna had, in spite of her social adroitness, been dismayed by pierres outbreak ; but when she saw that the vicomte was not greatly discomposed by pierres sacrilegious utterances, and had convinced herself that it was impossible to suppress them, she rallied her forces and joined the vicomte in attacking the orator

    開初,安娜帕夫洛夫娜雖有上流社會應酬的習慣,卻很害怕皮埃爾的乖戾舉動。但是一當她看到,皮埃爾雖然說出一些瀆神的壞話,子爵並沒有大動肝火,在她相信不可能遏止這些言談的時候,她就附和子爵,精力來發言人了。
  6. The waging of mobile warfare involves many problems, such as reconnaissance, judgement, decision, combat disposition, command, concealment, concentration, advance, deployment, attack, pursuit, surprise attack, positional attack, positional defence, encounter action, retreat, night fighting, special operations, evading the strong and attacking the weak, besieging the enemy in order to strike at his reinforcements, feint attack, defence against aircraft, operating amongst several enemy forces, by - passing operations, consecutive operations, operating without a rear, the need for rest and building up energy

    運動戰的實行方面,問題是很多的,例如偵察、判斷、決心、戰斗部署、指揮、蔭蔽、、開進、展開、、追、襲、陣地、陣地防禦、遭遇戰、退卻、夜戰、特種戰斗、避強打弱、圍城打援、佯、防空、處在幾個敵人之間、超越敵人作戰、連續作戰、無後方作戰、養精蓄銳之必要等等。
  7. To detect both known and unknown intrusion patterns, the system introduces a blended frame that makes use of both misuse detection approach and anomaly detection approach. the one of the highlight of the architecture is introduction of data mining technique, and the other is introduction of genetic algorithms. the ids uses data mining algorithms to abstract key features of system runtime status from security audit data, and it uses genetic algorithm to select the feature subset to reduce the amount of data that must be obtained from running processes and classified

    本文陳述了所研究系統的主要特點和技術:將智能體( agent )技術應用於入侵檢測系統,解決了傳統入侵檢測系統的式解決方案的弊病,充分利用網路資源協同完成入侵檢測任務;利用基於主機和基於網路的數據源,形成一種完整的混合型的結構,從而能收到更加全面的信息;使用了異常檢測技術和誤用檢測技術,採用一種混合型的結構,既能檢測已知的模式,又能發現新的模式。
  8. In this thesis intrusion is a conception of broad sense. it includes that crackers acquire the system control right beyond legal scope, and some behavior harmful to systems such as collection of leak information, denial of service

    本文的「入侵」 ( intrusion )是個廣義的概念,不僅包括被發起的人(如惡意的黑客)取得超出合法范圍的系統控制權,也包括收漏洞信息,造成拒絕訪問( denialofservice )等對計算機系統造成危害的行為。
  9. Awacs thunderhead concentrate on shooting down the enemy jammer aircraft. the transport can wait

    集中攻擊敵人電子干擾機。運輸就能拖延。
  10. Use your mammoth + zone troopers to shield the juggernauts and destroying tanks, while your pitbulls need to concentrate on tackling air units and infantry exclusively

    用你的猛獁區域防禦兵來掩護神像和摧毀坦克,同時你的鬥犬需要精力力量和步兵。
  11. A year after delivery, half the mothers had a condition in at least one of the three categories - mental health, substance abuse, domestic violence - and 22 percent of the children had at least one type of behavior problem such as aggression, anxiety - depression, or inattention hyperactivity

    而孩子們則有22的人至少出現了1種日常行為方面的問題,具體表現為蓄意他人焦慮沮喪以及注意力不多動癥等。
  12. An early attack would provide the air force with only a minimum opportunity for pinpoint bombing of critical transportation centers in france.

    過早的使空軍對法國重要運輸轟炸之時機太少。
  13. " your ranged critical strikes against targets affected by hunters mark increases the damage of melee and ranged attacks against that target by 1 %. lasts 10 sec. " ( up to 5 %

    火力( 5點)需要: 25點射系天賦使你對受獵人印記影響目標的遠程致命一可以增加目標所受到的近戰或遠程傷害1 % / 2 % / 3 % / 4 % / 5 % ,持續10秒。
  14. For the present study, complete data existed for 157 subjects. data concerning aggressive behaviors were obtained via natural observation every 6 months from age 4 to 5, 3 in all and those involving family influences were collected during the time of the first and third observation, administering questionnaires to children ' s mother. the main findings from the present study are as follows : 1

    採用時序滯差性追蹤設計,對157名4歲兒童進行了1年追蹤:運用自然觀察法每隔半年對被試進行一次觀察,並在第一、三次觀察期間對被試母親進行的問卷調查以獲得家庭影響因素的信息;同時由教師對兒童的性進行評定。
  15. And keeps working on braddock ' s body

    集中攻擊布洛克的身體
  16. In " the hand of god ", why doesn ' t kara thrace join the attack against the tylium - mining base

    在「上帝之手」一,卡拉?瑟瑞斯為何沒有加入對抗「 ? 」礦基地的
  17. The researchers also spliced a gene into the virus that makes it produce granulocyte - macrophage colony - stimulating factor, which induces the body ' s immune system to recognize and attack tumors infected by the virus

    研究人員還向病毒插入了一段基因使得受侵細胞分泌粒細胞落刺激因子,這促進了機體的免疫系統識別和受到病毒感染的腫瘤細胞。
  18. The concept of intersection set of " possible attacking sector " and its application in the fighter course determination for multi - target attacking are also discussed

    同時還介紹了多目標「可能扇形區」交的概念和在載機航線求解的應用等問題。
  19. In order to coordinate monitoring agents with each other in tracing the source of network attack by sharing the tracing data, a traceback method based on collaborative mechanism was proposed

    為了在分散式網路追蹤系統協調監控代理,及時共享多點採的追蹤數據合作定位網路源,提出一種基於協同機制的源追蹤方法。
  20. For the purpose to perfect the risk assessment of major hazard installation, a vulnerability assessment methodology for industrial facilities is developed on the basis of relativity between target selection of attack and certain inherence of industrial facilities ( especially the industrial facilities involve a store of chemical or energy )

    摘要為使重大危險源風險分析更加完善,從者的角度分析工業設施(主要指化學物質或能量聚的工業設施)固有特徵影響襲目標選擇的諸因素,提出易受性指標。
分享友人