攻擊高度 的英文怎麼說

中文拼音 [gōnggāo]
攻擊高度 英文
attack altitude
  • : Ⅰ動詞1 (攻打) attack; assault; take the offensive 2 (指責別人的過錯; 駁斥別人的議論) accuse; ...
  • : Ⅰ形容詞1 (從下向上距離大; 離地面遠) tall; high 2 (在一般標準或平均程度之上; 等級在上的) above...
  • : 度動詞[書面語] (推測; 估計) surmise; estimate
  • 攻擊 : 1 (進攻) attack; assault; launch an offensive 2 (惡意指責) attack; accuse; charge; slander; v...
  • 高度 : altitudeheightelevation
  1. A dominance hierarchy exists in all multi - male groups. dominance in a group usually depends on body size, strength and aggressiveness of an adult male. the alpha male ( group leader ) together with the high ranking males, protect the whole group especially the infants

    在多雄性的獼猴族群內,存在著明顯的階級制,要成為族群內出眾的階級雄猴,必須擁有龐大及強壯的體形,並具強勁能力。
  2. Also, the highly controversial aum shinrikyo sect in japan ( which attacked the tokyo subway with sarin gas ) was trying to build a community of scientists after the model of the foundation and used this book as its inspiration

    在日本受到爭議的真理教(在東京的地下鐵使用沙林毒氣)以基地為模型,並且用這本書當作他們的教示,正試著建立一個由科學家組成的團體。
  3. Bolero is a joint project, aimed at the use of e - b / l

    目前國際黑客對各國計算機系統中敏感保密信息的和竊取正在日益上升。
  4. The information safety has the characteristics of the high weakness and danger, delitescence and abruptness, the diversity of the attack sources and the indeterminacy of the guarded object and the asymmetry of the main body of the safety, etc. the contents of information safety are extensive, involving politics, economy, culture, military, science, technology and resources ecosystem etc. the factor which threatens the information safety mainly includes the hackers, network crimes, the network viruses, and the garbage information, etc. the second part thoroughly analyzes the strategic position of the information safety in the national security

    信息安全具有脆弱性和風險性、潛伏性和突發性、源的多樣性和防範對象的不確定性、安全主體的不對稱性等特徵。信息安全的內容廣泛,涉及政治、經濟、文化、軍事、科技、資源生態等領域。威脅信息安全的因素主要包括病毒、網路黑客、網路犯罪和垃圾信息等。
  5. Use : increases attack power by 60 for 60 min. battle elixir

    使用:60點,持續1小時。戰斗藥劑。
  6. Why is internet so frangible ? after analyzing many events of network attacks and invalid intrusions, we found that the frangibility of internet is due to lack of the firewall to protect the network security

    造成internet網路不安全局面的原因很多,網路和非法入侵的手段也很多,但是究其根本原因,是缺乏一個能保證網路安全的防火墻。
  7. The jdam ( joint direct attack munition ) is a low - cost and high accuracy guidable bomb, owning to the laser guidable bomb have found many of disadvantages in the war. it is very important realistic and martial signification that we must develop the homing gliding missile though we are lacking in support from the finance

    Jdam (聯合制導炸彈)是美軍針對第三代激光制導炸彈在戰爭中所暴露出來的各種缺點而研製的一種低成本、的第四代制導炸彈,大力發展國產同類制導滑翔彈有重大的現實意義和軍事意義。
  8. For twenty - five days, working sundays and holidays, he toiled on " the shame of the sun, " a long essay of some thirty thousand words. it was a deliberate attack on the mysticism of the maeterlinck school - an attack from the citadel of positive science upon the wonder - dreamers, but an attack nevertheless that retained much of beauty and wonder of the sort compatible with ascertained fact

    他辛辛苦苦寫了二十五天,完成了一篇專門梅特林克的神秘主義學派的論文:太陽的恥辱,大約有三萬字,假日和星期日也沒有休息,從實證科學的了奇跡夢想者,但並未波及與確切的科學事實並不矛盾的許多美感經驗與奇跡。
  9. The new software named " d - gun " for ddos is carried out, which completed in windows 2000 and rethat linux. three characteristics of d - gun are lied out. first, it can complete all steps of attack automatically ; secondly, it support a lot of method of ddos, especially support echo attack method and pulsant attack method

    本課題開發完成了一個獨立的分散式拒絕服務軟體,開發平臺是windows2000和redhatlinux ,其特色是跨平臺自動傳播,自動實現ddos的全步驟;支持多種模型,特別是構造了反射拒絕服務和脈動模型,且難追溯;有一定繞過防火墻的能力。
  10. As smart bombs rained down with pinpoint precision on iraqi command centers, weapons storage depots and other facilities, it became clear that fixed military assets on the surface were extremely vulnerable to american aerial assault

    當精靈炸彈以極的精準如下雨般落在伊拉克指揮中心、武器儲藏庫和其他基地上時,固定的地面軍事設施顯然已經完全無法逃過美軍的空中
  11. Second, by computing the trajectory of the missile and the method of analyzing cep, influences that the fighter ' s height, speed, pitch angle, the deflection angle between fighter and target, and the target moving characters make on the times of fighter attack and missile launch are deeply developed. third, by relating the motion of the missile and the fighter, the influences that fighter ' s dive angle and the deflection angle between fighter and target make on the attack field of the fighter are discussed in this paper when the fighter perform vertical and horizontal attack. criterion of attack effect is proposed focusing on attack time of the fighter, trajectory of the missile and destruction probability to the target

    本文主要完成了以下幾個方面的工作:對導彈可發射區和飛機可區進行建模,通過對導彈彈道的模擬計算,並運用典型的圓概率偏差精分析方法,詳細討論了飛機實施時,飛機的飛行h 、速v 、俯仰角、與目標的偏離角_ x及目標運動特性等對飛機時機和導彈發射時機的影響;因此,將飛機和導彈結合起來,詳細研究了飛機在垂直平面和水平平面內實施時,飛機俯沖角和與目標的偏離角_ x對飛機的范圍的影響;以飛機實施的時間t 、彈道特性和對目標的殺傷概率p來評判對地的效果;最後給出典型算例,通過對空地過程的模擬實現,對飛機飛行過載提出要求。
  12. 8 ) the system files of fsca are encrypted with high strength algorithm, which breaks through the bound of foreign export

    8 ) ca自身數據被加密。突破了國外對中國加密產品的出口限制,不怕內部,不怕惡意下載。
  13. Monster to bring it to eliminate all gogogo operations guide : keyboard control, key control direction, x jump, z shooting to defeat the enemy is still available with special weapons ; late enemy attack will be very strong, high difficulty

    來把怪物全部都消滅吧gogogo操作指南:鍵盤控制,方向鍵控制方向, x跳躍, z射,打倒敵人後還有特殊武器可拿後期敵人的會很猛烈,難
  14. Introduction : your task, it is necessary to control witnessing the experts from the various buildings to the foreign devils hand to get inside look at the entire document - you pull the operation guide : keyboard control around key mobile, for the jump, the space bar of the attack, but attention to the spaces in the attack speed is very slow oh, attention to the early volume

    略:你的任務,就要控制武林手來從重重包圍的洋鬼子手裡面拿到文件全看你的拉操作指南:鍵盤控制,左右鍵移動,上為跳,空格鍵為,不過注意空格的很慢的哦,注意提前量。
  15. Your task, it is necessary to control witnessing the experts from the various buildings to the foreign devils hand to get inside look at the entire document - you pull the operation guide : keyboard control around key mobile, for the jump, the space bar of the attack, but attention to the spaces in the attack speed is very slow oh, attention to the early volume

    你的任務,就要控制武林手來從重重包圍的洋鬼子手裡面拿到文件全看你的拉操作指南:鍵盤控制,左右鍵移動,上為跳,空格鍵為,不過注意空格的很慢的哦,注意提前量。
  16. Shaman - lesser healing wave has a 10 % chance to grant 100 mana, lightning bolt has a 15 % chance to grant up to 100 mana, and stormstrike has a 50 % chance to grant up to 250 attack power for 10 seconds

    薩滿祭司-次級治療波有10 %的幾率為你回復100點法力值;閃電箭有15 %幾率為你回復100點法力值;風暴打有50 %幾率使你的250點,持續10秒。
  17. Level 3 - calls upon the aid of a greater hawk ( invisibility ) and a quilbeast ( has 20 % speed reduction poison attack ). 80 second duration

    三級-召喚一隻等貓頭鷹哨兵和一隻豪豬。等貓頭鷹哨兵具有永久隱身能力,豪豬的毒性降低20 %的和移動速
  18. Level 4 - calls upon the aid of a greater hawk ( invisibility ) and a greater quilbeast ( has 35 % speed reduction poison attack ). 90 second duration

    四級-召喚一隻等貓頭鷹哨兵和一隻等豪豬。等貓頭鷹哨兵具有永久隱身能力,等豪豬的毒性降低35 %的和移動速
  19. Buffs that add directly to pet attack power, such as blessing of might, scroll of strength, and trueshot aura have a much more powerful effect on growl

    一些直接提寵物的增益魔法,比如力量祝福,力量卷軸,還有強光環將會對低吼有很大的影響(就是提) 。
  20. Disadvantages : slower attack speed, can attract agro ( since doing high damage )

    缺點:較慢,會吸引仇恨(因為造成的傷害) 。
分享友人