攻擊指數 的英文怎麼說

中文拼音 [gōngzhǐshǔ]
攻擊指數 英文
total average
  • : Ⅰ動詞1 (攻打) attack; assault; take the offensive 2 (指責別人的過錯; 駁斥別人的議論) accuse; ...
  • : 指構詞成分。
  • : 數副詞(屢次) frequently; repeatedly
  • 攻擊 : 1 (進攻) attack; assault; launch an offensive 2 (惡意指責) attack; accuse; charge; slander; v...
  • 指數 : 1. [經] (比數) index number; index 2. [數學] exponent
  1. Hatemongers have taken to cable tv in a big way, attacking such minority groups as blacks, jews, hispanics, asians and gays in 24 of the nation ' s 100 largest markets, the anti - defamation league charged yesterday

    反詆毀同盟昨日控說,從事散播仇恨的人開始喜歡大規模使用有線電視,在全國100個最大的市場中的24個,族裔如黑人、猶太人、西班牙裔、亞裔,以及同性戀者。
  2. So security and safeguarding of information on computer networks has become one of the most import problems, because of the diversity of network ' s connection, the asymmetry of terminal ' s distribution, the interconnection of computer and the attack of hacker, cracker and vicious software. it is more important for military ' s automation commanding network and banks whose network communicates sensitive data. thus we should apply sufficient safeguarding to these networks, otherwise the computer network will be useless, even jeopard the national security

    但由於計算機網路具有連接形式多樣性、終端分佈不均勻性和網路的開放性、互連性等特徵,致使網路易受黑客、駭客、惡意軟體和其它不軌的,所以網上信息的安全和保密是一個至關重要的問題。對于軍用的自動化揮網路和銀行等傳輸敏感據的計算機網路系統而言,其網上信息的安全和保密尤為重要。因此,上述的網路必須有足夠強的安全措施,否則該網路將是個無用、甚至會危及國家安全的網路。
  3. The government accused the tigers of using the truce only to arm and recruit, and to carry out attacks against government forces and civilians, rather than to seek a peaceful solution to the conflict between the sinhalese majority and the tamil minority over political autonomy

    政府責猛虎組織僅僅只是利用停火來徵兵和補充裝備,政府軍和平民,而不是尋求和平的方法來解決人口佔多的僧加羅族和少民族泰米爾族之間的沖突,這個沖突的起因是泰米爾族希望能在政治上自治。
  4. So it can be one method to track the transaction. ( 2 ) uses combinatorial theory and constructs nonlinear dbbd ( differential balanced block design ) code as fingerprint for digital media ( image, video, etc )

    利用組合設計理論中的均衡關聯區組設計,構造出非線性均衡關聯區組設計碼作為字媒體(圖像、視頻等)紋碼字,該碼字具有抵禦串謀的特性。
  5. First of all, we bring forward the basic project of tadil, which adapts to combined operations. it is suggested to use tdma ( the abbreviation of time division multiple access ) as the working pattern and utilize the concept of mobile ad hoc network to construct the data link network. aiming at the impact of time delay on data link and the characteristic of cooperative combat under the command of director aircraft, this thesis applies a kind of kalman filtering algorithm in polar coordinates to compensate the error of time delay, and then does the transformation of target motion parameters to obtain the current information of target

    本文結合空軍裝備部某「十五」預研課題,圍繞著戰術據鏈、多機協同多目標、超機動、空對地這四個方面展開了一系列的研究工作:本文首先給出了適應三軍聯合作戰的戰術據鏈系統的基本方案,建議採用時分多址的工作模式,並利用移動自組織網路的概念構建據鏈網路,同時針對據鏈傳輸信息的時間延遲特性和揮機揮下的多機協同作戰特點,應用一種極坐標系下的卡爾曼濾波演算法對該傳輸延遲誤差進行補償,並在此基礎上進行目標運動參的轉換,以獲得目標相對于某無人機的當前運動信息,且利用模擬驗證了方法的有效性。
  6. After target is detected the on - board avionics suite in combination with the automatic control system of the helicopter solve the task of bringing the helicopter to the designated point and automatic firing of the weapons selected by the pilot

    當捕獲目標后,機上的自動控制系統與電子系統將解算任務據,引導直升機飛向敵潛艇水域,並在飛行員令準許下自動發射武器進行
  7. Fourthly, we discuss and simulate the transformation method of relative parameters of ground target based on data link. and then we analyze decision algorithm of air - to - ground attack. especially, we educe three dimensional terminal guidance law of air - to - ground missile in the disturbance of wind, and give the simulation result

    本文也研究了空對地的若干技術,包括對獲得據鏈揮下地面目標相對于某機當前時刻相關參的方法進行了闡述及模擬,並在此基礎上討論了單機對地面多個目標的決策演算法,同時提出了一種風干擾下空地導彈的三維末制導導引律,且利用字模擬進行了驗證,並出研究空地導彈導引律時考慮風影響的必要性。
  8. Overall, boys engaged in more aggressive behaviors than girls, but girls engaged in significantly more indirect aggression than boys

    這一時期兒童的性行為多向同性同伴,多能夠自行終止。 ( 2 )總體而言,男孩的性水平高於女孩。
  9. It means that for attackers there exists a way of constructing network datagrams that contain wrong data

    的是者有辦法構造包含錯誤據的網路據報。
  10. Throwing a few miles per hour above his norm, lidle said he threw his splitters more aggressively and pitched with a lot more confidence, allowing him to throw strikes earlier in the count

    當他球速比平常快上幾英哩時,萊多說他的叉球更具有性,而且投起來更有信心,使得他在球上能夠取得領先
  11. Now provides security protection for vulnerable pointer parameters

    現在可對容易受到針參提供安全保護。現在,
  12. One of the most significant aspects is that the combination of strict type checks, array bounds checking, and automatic garbage collection thoroughly blocks the most destructive forms of server code vulnerabilities : buffer overruns, double - release errors, and rogue pointers

    最顯著的方面之一是嚴格的類型檢查、組邊界檢查和自動垃圾收集的組合徹底防止了最具破壞性形式的服務器代碼:緩沖區溢出、重復釋放的錯誤和游離的針。
  13. 18 iwata t, kurosawa k. on the pseudorandomness of the aes finalists - rc6 and serpent. in fast software encryption - fse 2000, lncs 1978, springer - verlag, new york, usa, april 2000, pp. 231 - 243. 19 iwata t, yoshino t, yuasa t, kurosawa k. round security and super - pseudorandomness of misty type structure

    本文首先證明了5輪camellia型結構對適應性是偽隨機的然後證明了8輪camellia型結構對適應性是超偽隨機的最後討論了如何構造更有效的camellia型方案,出如果每一輪僅用一個隨機函,則無論輪如何增長,也不能使camellia型方案是偽隨機的並給出了一個如何用8個隨機函構造偽隨機camellia型方案的方法。
  14. Montgomery multiplication algorithm is optimized for large - bit modular multiplication and vlsi implementation. it is combined with the r - l right to left binary method to achieve speed improvement. special efforts are focused on the problems with long - bit modular arithmetic

    介紹了採用蒙哥馬利模乘法演算法和的從右到左的二進制方法,並根據大整模乘法運算和vlsi實現的要求進行改進的rsa處理器,在提供高速rsa處理能力的同時,可抵抗某些定時分析和功耗分析
  15. Firstly, a study of target sorting in air combat of single aircraft against multiple targets is presented using the fuzzy optimization method. according to given velocities, distance, relative angle, the target capability and the relative energy index between the target and the attack, the factors are changed into threaten index, which is between the attack and the target, using the mathematic optimum method

    應用模糊多目標決策基本理論與方法,在單機多目標機過程中,根據與排序有關的載機與目標機相對速度、能量、距離等因素,用模糊優屬度演算法把它們換算成目標機對載機的威脅,然後確定載機對目標機的先後次序。
  16. In this dissertation, first, the basic conceptions of ew, radar ew and combat effectiveness are made clear about internal characteristics, consist and tasks. then, the evaluation factors architecture of radar ew system combat effectiveness is set up, which is the base of quantificational evaluation. second, mathematics modeling of radar ew reconnaissance, radar jamming and anti radiation attack are constructed

    本論文的研究首先從電子戰、雷達對抗、武器裝備作戰效能的基本概念出發,理清其內涵、特點、組成、任務,從而建立以能力為主線的雷達對抗系統作戰效能評估標體系,為定量評估系統作戰效能奠定基礎;然後分雷達偵察、雷達干擾、反輻射分別對雷達對抗系統武器裝備的電子偵察能力、電子干擾能力、電子進能力進行學建模,進而建立系統綜合對抗能力學模型,為系統模擬建立設計基礎。
  17. The research works of this article mainly include several aspects as follows : 1. wavelet analysis theories is researched, which include the first and the second generations of wavelet transformation, the basic concept, principle and algorithm, especially the multi - resolution of wavelet and the lifting scheme theory of the second - generation wavelet. the research contents about digital watermark are introduced systematically, and the general principle and universal model are summarized and the primary applied prospect is also pointed out

    本文的研究工作主要包括以下幾個方面: 1 .研究了小波分析理論,包括第一代和第二代小波變換的基本概念,原理,演算法,特別是小波的多分辨分析和第二代小波的提升框架理論;系統地介紹了字水印研究內容,總結了它的一般原理及通用模型,並出了其主要應用前景,分析了字水印的各種典型演算法、以及主要的方式。
  18. The key of multiple attribute decision making is to confirm attribute weights, a model of an optimal combination weights way is to solving the problem of multi - targets attacking decision, which is contained in many kinds of determining weights methods

    多屬性決策問題的關鍵是確定各屬性權重,綜合各種賦權法的特點,採用離差平方和的最優賦權方法求解多目標的綜合優勢
  19. But the indices, although they have their attractions, are already under attack from traditionalists

    盡管也自有其吸引力,但是它已經受到傳統主義者的
  20. Aiming at the scheduling of multi targets attacking in beyond visual range air combat, on the base of multiple attribute decision making, a synthetically dominant index method is proposed to sorting of multi - targets attack

    摘要針對未來超視距空戰條件下的多目標排序問題,以多屬性決策理論為基礎,提出了一種多目標排序的綜合優勢模型。
分享友人