首先攻擊 的英文怎麼說

中文拼音 [shǒuxiāngōng]
首先攻擊 英文
cast the first stone
  • : Ⅰ名詞1 (頭) head 2 (首領) leader; head; chief 3 (表示方位) aspect 4 (姓氏) a surname Ⅱ動...
  • : 名詞1 (時間或次序在前的) earlier; before; first; in advance 2 (祖先; 上代) elder generation; ...
  • : Ⅰ動詞1 (攻打) attack; assault; take the offensive 2 (指責別人的過錯; 駁斥別人的議論) accuse; ...
  • 首先 : first
  • 攻擊 : 1 (進攻) attack; assault; launch an offensive 2 (惡意指責) attack; accuse; charge; slander; v...
  1. However, the defense system can be weakened if the attackers manage to seize the other baronies first

    然而,如果了其他的男爵領地,那麼防禦系統就可能會弱化。
  2. Ln the end, we discuss the distributed ids and divide it inio two categories. ln chapter 3, the concept of attack trees is introduced first

    第三章介紹多層次入侵檢測,然後引入樹來表示多層次入侵,並提出了一個基於樹的說明語言。
  3. First of all, we bring forward the basic project of tadil, which adapts to combined operations. it is suggested to use tdma ( the abbreviation of time division multiple access ) as the working pattern and utilize the concept of mobile ad hoc network to construct the data link network. aiming at the impact of time delay on data link and the characteristic of cooperative combat under the command of director aircraft, this thesis applies a kind of kalman filtering algorithm in polar coordinates to compensate the error of time delay, and then does the transformation of target motion parameters to obtain the current information of target

    本文結合空軍裝備部某「十五」預研課題,圍繞著戰術數據鏈、多機協同多目標、超機動、空對地這四個方面展開了一系列的研究工作:本文給出了適應三軍聯合作戰的戰術數據鏈系統的基本方案,建議採用時分多址的工作模式,並利用移動自組織網路的概念構建數據鏈網路,同時針對數據鏈傳輸信息的時間延遲特性和指揮機指揮下的多機協同作戰特點,應用一種極坐標系下的卡爾曼濾波演算法對該傳輸延遲誤差進行補償,並在此基礎上進行目標運動參數的轉換,以獲得目標相對于某無人機的當前運動信息,且利用模擬驗證了方法的有效性。
  4. First off, versus the infantry you can attack with, let ' s say predator tanks and counter his infantry by putting anti - infantry towers near the building that you ' ve captured that provides you with ground control

    ,對抗步兵,我們假設你用捕食者坦克,那麼可以在剛占領的建築所提供的地面控制區域內造一些反步兵槍塔來對抗步兵。
  5. In our laboratory, a unique mutation detection system using a shuttle vector plasmid has been established to demonstrate that a low concentration of mnng ( 0. 2 m ) can induce nontargeted mutation in mammalian cells : the mammalian cells were exposed to 0. 2m mnng for 2. 5h, then a shuttle plasmid pz189 carrying supf trna gene was transfected into cells after 24h culture. we found a 5 - fold higher mutation frequency of the plasmid replicated in pretreated cells than the spontaneous mutation frequency of the plasmid replicated in control cells. this kind of mutation did not occur immediately after mnng exposure

    我們實驗室曾用一特殊的突變檢測系統,直接證明dna損傷劑可在哺乳動物細胞誘發非定標性突變:用低濃度( 0 . 2 m )的短壽烷化劑mnng (半壽期為1 . 1hr )處理細胞2 . 5h后,繼續培養24h ,將重組有用作突變檢測的靶基因supftrna基因的穿梭質粒pz189轉入細胞復制,發現在未受致癌物直接的穿梭質粒中有較自發突變率高5倍以上的靶基因突變。
  6. This thesis starts with the party press which started in the late 18th century, characterized by press conflicts among different partisan newspapers. though the press conflicts in this period possessed no distinguishing characteristics of the press criticism of the modern sense, it can be defined as press criticism - the original form of the press criticism

    本文分析美國政黨報刊論戰年代的媒介批評,指出政黨報刊之間的論戰? ?報刊筆戰、謾罵、持械決斗? ?盡管不是現代意義上的媒介批評,但也屬媒介批評范疇,是原始方式的媒介批評。
  7. Then it explains packet validation mechanism, connection maintaince, and with taking the system platform into consideration, design and implement a improved - syncookie model. at last, we design several performance test cases. the test cases show that the high - speed filter can protect away from the syn flood attack effectively, at the same time it has been much more improved than traditional protect ways on the filtering and processing capacity

    該文對國內外拒絕服務威脅以及研究現狀進行分析描述;然後,從拒絕服務的方法分類、主要手段、常見的防禦及防範方法分析研究著手,提出了一種採用tcpproxy與待響應ack隊列相結合的能夠對tcp拒絕服務進行有效過濾的方法,並用這種方法在linux內核中實現了一個高速過濾器,最後進行了相關的性能測試。
  8. It summarize the algorithm model and attack means of the watermark and generalized the existing picture watermark algorithm

    本文對水印技術進行了概括性介紹,總結了水印演算法模型和手段,概括了現有的圖像水印演算法。
  9. Before attacking your opponent, be sure to assess his base, and target key buildings first

    在你對手前,確保已經進入了他的基地,並且瞄準關鍵建築。
  10. The first thing to do on defense therefore is for the woman to get away from the smash ( and the man will likely smash at her because she is so close to the net ) by quickly taking a position cross - court from the shuttle about three feet behind the short service line and half - way between the center line and the inside side line

    對于女選手來說,要做的事情就是遠離這樣的殺球(由於女選手的站位靠近網前所以更容易被男選手) ,快速的斜線後退大概距離發球線三英尺,站在中線和發球線的中間。
  11. Then according to system simulation technology, the overall air - to - ground attack simulation plan is made with the thought of models and layers. after that, the mathematical models of main parts in the simulation are made such as aircraft body, propulsive system, flight control system, fire control system, bomb and air - to - ground missile. on the basis of these mathematical models, using the object - oriented design methodology, a set of air - to - ground attack real - time visual simulation software is developed. this software can be used to aid aircraft design, research of air - to - ground attack tactics and flight training

    本文介紹了現代戰爭中空對地的技術裝備及其特點,計算機模擬技術的發展以及面向對象的軟體設計思想;而後使用系統模擬技術,依據分層、模塊化設計思想,制定了空對地模擬系統總體設計方案;之後根據目前技術狀況,建立了戰斗機機體、推進系統、飛控系統、火控系統、航空炸彈、空地導彈等子系統數學模型;在此基礎上,利用面向對象的軟體設計思想,在基於pc的平臺上開發了一套對地視景模擬軟體,實現了戰斗機對地實時視景模擬。
  12. The article first analyses the major vulnerabilities of sip : plain text transmission of sip messages and the lack of effective mechanisms for identification, then do research on the security threats caused by the vulnerabilities of sip, including registration hijacking, impersonating a server, tampering with message bodies, tearing down sessions and denial of service. after setting up a sip communication platform in the laboratory environment, the article confirms the existence of security risks by using simulation attacking experiments

    本文分析sip協議主要的脆弱性: sip消息明文傳送和缺乏有力的身份鑒定機制,以及由於這些脆弱性而引發的包括注冊劫持、服務器偽裝、消息篡改、拆卸會話和拒絕服務等的安全威脅,並通過在實驗室環境下搭建的sip通信平臺,進行模擬實驗來證實問題的存在性。
  13. Revolves the argument which this book causes first is in the subject, according to the jake london ' s original intention, he writes one of this subordinate objectives attacks the individualism, but the majority critics all think him really for the individualism defense, but quite many readers are ascends the martin iraq treats as " individual struggle " the model accept

    圍繞這部書引起的爭論是在主題上,按照傑克?倫敦的本意,他寫這部屬的宗旨之一乃是個人主義,但大多數評論家都認為他實在為個人主義辯護,而相當多的讀者是把馬丁?伊登當作「個人奮斗」的典型來接受的。
  14. In this paper, we firstly describe the recent research progress and the theory basis of quantum cryptography, then introduce quantum key distribution ( qkd ) and eavesdropping attacks on the qkd

    本文描述了量子密碼學的最近研究進展及其理論基礎,接著介紹了量子密鑰分配以及在它之上的竊聽
  15. Let me first explode the myth about divers being at exceptional risk of shark attack

    我要推翻關于潛水者遭受鯊魚風險異常高的荒謬說法。
  16. In this paper, the mechanism, methods of and countermeasures to denial of services attacks are discussed. after that, several packet marking schemes for traceback are reviewed and some improvements to the basic packet marking scheme are given, which reduce the workload and false positive rate in the attack tree reconstruction. knowing that in existing packet marking schemes, router marks packets with fixed probability, which results in that many packets are required in path reconstruction and that attacker could encumber path reconstruction via spoofed marking information

    在本文中,我們研究了拒絕服務機制、方法及其對策,並對以包標記的方式追蹤拒絕服務的來源的各種方法進行了深入的研究,分析了它們各自的優缺點,並對基本包標記方案作了改進,使得其路徑重構時的運算量和重構的誤報率在原有基礎上大為降低,達到或超過了其他一些方案的水平。
  17. Based on analyzing the mechanism of direction finding triangulation location and location accuracy for two - ship passive locating, the acquisition probability model of anti ship missile terminal guidance radar is presented for two - ship passive locating : and the effects of the key factors to the probability are analyzed, and then the primary factors are pointed not by analyzing the results in different conditions

    摘要簡要介紹了無源定位技術,然後著重分析了雙艦無源測向交叉定位以及其誤差產生的機理,在此基礎上,給出了雙艦無源定位情況下實施超視距時,反艦導彈末制導雷達開機時刻對目標的捕捉概率模型,並通過模擬分析雙艦距離。
  18. In regard to the bluetooth combiner, we study the probability distributions between its output and input sequences, with which we analyze its correlation immunity, introduce two representative attack methods and give a whole evaluation on the security of bluetooth combiner

    對藍牙組合生成器,考察了其輸入輸出序列的基本性質,在此基礎上,研究了它的相關免疫性,介紹了目前有代表性的兩種演算法,並對藍牙組合生成器的安全性做了總體評價。
  19. Hong kong - which, like new york, is one of the world s great trading and financial centers - is especially vulnerable to the consequences of al - qaeda s attacks, even if they occur many thousands of miles away

    香港與紐約雖有千里之遙,但大家都是世界的貿易及金融中心。阿蓋達組織的,對大家影響甚大。紐約與香港,何其相似:,兩地商人,均吸引世界各地的資金。
  20. First, the attacker needs to make sure that the fake packets will actually be routed to the target

    者需要確保假的信息包確實被路由到目標機器。
分享友人