防禦需要 的英文怎麼說

中文拼音 [fángyāo]
防禦需要 英文
defense needs
  • : Ⅰ動詞(防鷥) provide against; defend against; guard against Ⅱ名詞1 (防守; 防禦) defence 2 (堤...
  • : Ⅰ動詞(需要) need; want; require Ⅱ名詞1. (需用的東西) necessaries; needs 2. (姓氏) a surname
  • : 要動詞1. (求) demand; ask2. (強迫; 威脅) force; coerceⅡ名詞(姓氏) a surname
  • 防禦 : defense
  • 需要 : 1. (應該有或必須有) need; want; require; demand; do with 2. (對事物的慾望或要求) needs
  1. For the protection of system resource, need to establish a active defence machine different from firewall and antivirus software to detection intrusion. by monitoring network or computer systematic development behavior feature intrusion detection system ( ids ) judge whether have invade take

    為保護系統資源,建立不同於火墻和病毒軟體的主動機制檢測入侵。入侵檢測系統( intrusiondetectionsystem )就是監控網路或計算機系統的動態行為特徵並據此判斷是否有入侵的主動措施。
  2. While the leather armor leaves your footmen with more defense skill, the actual tradeoff is that footmen in leather have an overland movement of 2 instead of 1 and cost 11 resources instead of 20

    皮甲使你的步兵擁有較高的技巧,作為交換,皮甲的步兵的地圖移動力為2而不是1 ,11單位的資源而不是20 。
  3. Article 24 the local people ' s governments at or above the county level in the key areas under surveillance for and protection against earthquakes shall, in the light of actual need and possibility, allocate an appropriate amount of funds and materials for earthquake relief from their financial budgets and materials reserve

    第二十四條地震重點監視區的縣級以上地方人民政府應當根據實際與可能,在本級財政預算和物資儲備中安排適當的抗震救災資金和物資。
  4. Use your mammoth + zone troopers to shield the juggernauts and destroying tanks, while your pitbulls need to concentrate on tackling air units and infantry exclusively

    用你的猛獁區域兵來掩護神像和摧毀坦克,同時你的鬥犬集中精力攻擊空中力量和步兵。
  5. In accordance with the requirements of national defense in the new situation, china persists in unified leadership over national defense activities, pursues the principle of independence and self - defense by the whole people, implements the military strategy of active defense, strengthens the building of its armed forces and that of its frontier defense, sea defense and air defense, takes effective defensive and administrative measures to defend national security and safeguard its maritime rights and interests

    中國根據新形勢下國家衛的,堅持對國活動的統一領導,堅持獨立自主和全民自衛原則,實行積極軍事戰略,加強武裝力量建設和邊、海、空建設,採取有效的衛和管理措施,保衛國家安全,維護海洋權益。
  6. One of the importants missions of surface ship is defending oneself against torpedo

    魚雷是水面艦艇的重作戰任務之一,僅靠艦載聲納難以滿足對魚雷預警的
  7. In order to protect network system proactively, how to make the network security defense system dynamic and change the measure actively but not passively are the task of network security research

    如何使網路安全的體系由靜態轉為動態,措施從被動轉變為主動,改變傳統總是處于被動挨打的處境。積極有效地保護網路系統的安全是研究的新課題。
  8. Intrusion detection, an important supplement to the firewall, should combine with the firewall to build a better security system

    因而火墻與入侵檢測技術相結合,來構造一個比較完善的系統。
  9. Speaking theoretically and in terms of china ' s needs, in order to achieve the strategic objective of greatly depleting the enemy ' s forces, china in her defensive stage should not only exploit the function of annihilation, which is fulfilled primarily by mobile warfare and partially by guerrilla warfare, but also exploit the function of attrition, which is fulfilled primarily by positional warfare ( which itself is supplementary ) and partially by guerrilla warfare

    (一)從理論上和上說來,中國在階段中,應該利用運動戰之主的殲滅性,游擊戰之部分的殲滅性,加上輔助性質的陣地戰之主的消耗性和游擊戰之部分的消耗性,用以達到大量消耗敵人的戰略目的。
  10. Abstract : based on the characteristic and tactical applications o f modern air strike weapons and according to the air - defense demand of naval ba se and coastal area, this paper analyzes the necessity and significance of devel oping air - defense missile patrol boat. the property and tactial applications of air - defense missile patrol boat are discribed too

    文摘:從現代空襲兵器的性能和戰術運用特點出發,根據海軍基地及沿海地區對空求,分析了發展空導彈巡邏艇的必性和重性,並簡分析說明了空導彈巡邏艇的性能和戰術運用。
  11. If you attack with a charged superweapon, then your opponent ' s army will be easily wiped out when he tries to defend against you, since you can just use the superweapon on his army

    如果你用充能好的超武配合攻擊的話,當敵人試圖你的攻擊時,他們的部隊會被你輕而易舉的消滅,你只在他們的軍隊上使用超武就可以了。
  12. By combining spreading models, population data extracted from real internet worm epidemics, and measured models of internet topology, we have shown that any reactive worm defense will require extremely widespread deployment and very short reaction times ( a few minutes or less )

    通過結合傳播模式、數量等從實際的網際網路蠕蟲的傳播得來的數據,以及對網際網路拓撲結構的測量,發現任何反應式的蠕蟲防禦需要廣泛的部署和非常短的反應時間(即分鐘或更少) 。
  13. Professor sung said studies had shown that patients passed through a viral replicative phase, when the sars virus multiplied rapidly in the body, an immune hyperactive phase, when the body s defences attacked the virus, and a pulmonary - destructive phase, when the lungs were severely damaged and patients needed extra help

    沈祖堯教授指研究顯示,患者會首先經過病毒繁殖期,即在這段時期嚴重急性呼吸系統綜合癥病毒在體內大量繁殖;繼而進入免疫系統異常活躍期,即身體的系統攻擊病毒;及后為肺部破壞期,此時患者肺部遭受嚴重損傷及額外支援。
  14. The notion of metabolism was well understood : like people, plants take in nutrients ( sun, water and air ) and then metabolize, or transform, those nutrients into lots of other things ( metabolites ), from vitamins to defense toxins

    現在大家對于植物的代謝已經有清楚的概念:就像人類一樣,植物也吸收營養(陽光、空氣、水) ,然後把營養代謝(或轉化)成許多種代謝產物,從維生素到性毒素,應有盡有。
  15. " yeah. . yeah, now umbridge has left, obviously we need a new defense against the dark arts teacher, don ' t we ? so, er, what ' s he like ?

    「是啊… …是啊,現在烏姆里奇走了,我們的黑魔法術顯然一位新老師,對不對?那麼,嗯,他長得什麼樣兒? 」
  16. Information security defense mechanism is changed from passivity to initiative as the information times going, so honeypot technology is more and more regarded as an effective way to anti - attack

    信息時代的到來計算機安全護由被動轉為主動,從而使蜜罐技術在網路對抗中日益受到重視。
  17. To develop a missile defense system with washington, japan would have to export components to the united states

    而在於華盛頓合作發展的導彈計劃中,日本可能出口武器組件到美國。
  18. As far as defense is concerned, we need to buy more sophisticated weapons

    的觀點來說,我們購買更多精密的武器。
  19. Our research project is basic condition platform construction project of the national science and technology of the ministry of science and technology. this paper researches the security audit techniques which watch and track actions in network information systems, and develops audit tool software. on the base of technology research, we will constitute technology standards that have own intelligence property, so that we could enhance network recovery capability to protect important computer information systems

    本文課題是科技部國家科技基礎條件平臺建設項目,研究對網路信息系統進行全面監視和對網上行為進行跟蹤的安全審計技術,開發符合信息安全管理的審計工具軟體,為構建網路安全信息系統提供技術支持,並在技術研究的基礎上研究制定具有自主知識產權且能與國際接軌的技術標準,以提高國內信息網路能力,保護國家關鍵基礎設施,維護國家事務、經濟建設、國建設、尖端科學技術等重領域的計算機信息系統的安全。
  20. Four critical minerals - copper, zinc, selenium and manganese are antioxidant co - factors required to activate your body ' s internal antioxidant system

    四種重的礦物質銅、鋅、硒以及鎂是抗氧化劑的輔助因子,人體他們來活化體內抗氧化系統。
分享友人