進攻權 的英文怎麼說

中文拼音 [jìngōngquán]
進攻權 英文
try for point after touch down
  • : 進構詞成分。
  • : Ⅰ動詞1 (攻打) attack; assault; take the offensive 2 (指責別人的過錯; 駁斥別人的議論) accuse; ...
  • : Ⅰ名詞1 [書面語] (秤錘) counterpoise; weight (of a steelyard)2 (權力) power; authority 3 (...
  • 進攻 : attack; assault; offensive
  1. Radical iraq, he thought, would be used as a battering ram against all moderate pro-western regimes in the area.

    他認為奉行激方針的伊拉克將被人利用成為擊該地區一切持溫和方針的親西方政的急先鋒。
  2. On september 30th a delegation secretly presented the french with a fabricated casus belli : israel would invade egypt and race to the canal

    9月30日,一個授的代表給法國提供了一個製造出來的開戰事件:以色列埃及,並且將到運河。
  3. Politicians need a stronger peer - review system that goes beyond the churlish opprobrium of the campaign trail, and i would love to see a political debate in which the candidates were required to make the opposite case

    而政治人物除了選戰里的惡毒訐外,同樣需要極具威的同儕檢視系統,我會很樂于見到候選人必須在政治辯論會以相反立場行答辯。
  4. Using fumy cipher, transmission data are kept secret that can prevent others from reading or writing data without permit. it can ensure data security

    為了確保數據傳輸的安全性,運用流密碼對數據行加密傳輸,防止外來者的擊,未經授行非法數據讀寫操作。
  5. In view of present scattered and incompact research of the field in mainland, while systemic and meticulous research is also necessary for the development of legislation and economy demands, during the course of property legislation and asset securitization, i choose the issue of the accessory character and independent character of mortgage as the subject of my thesis

    選擇抵押的附隨性和獨立性問題作為畢業論文研究的方向,主要是看到目前國內對這個問題的研究處於一種不系統、不細致的狀況,而我國的物立法和資產證券化正處于堅階段,立法和經濟生活要求對這一問題行系統、細致的研究。
  6. Liverpool ' s first all - out attack put arsenal on the defensive and they never regained the initiative throughout the rest of the game

    利物浦隊的首次全線使阿聖納爾隊處于防禦地位,而在整個比賽餘下的時間里他們再也沒有得到主動
  7. Fairbairn and sykes return to england and shock the powers that be because they advocate violent offensive attack

    當年費爾班和塞克斯返回英國,正是因為他們極力提倡猛烈的主動,因而震動了掌者。
  8. Golz makes the attack but he has not the power to cancel it.

    戈爾茲部署了這次,但他無撤消。
  9. Palestinian authorities president mahmoud a as denounced the offe ive

    巴勒斯坦力機構主席阿巴斯對以色列的行了譴責。
  10. In chapter 2, a general digital watermarking frame is presented, including the generation, embedding and detection of watermark. in chapter 3, the concept of watermarking channel is presented, the modes of watermarking channel and image dct coefficients is proposed, the capacity of watermarking channel is evaluated by embedding watermarks to selected still image dct coefficients in direct spread spectrum. in chapter 4, a watermarking algorithms based wavelet multi - resolution is presented, by conjunction with human visual model, it keeps invisibility of watermark in host image and need not original image during detection

    數字水印是一種新的數字媒體保護技術,它是將特定的信息(如版信息、秘密消息等)嵌入到圖象、語音、視頻等各種數字媒體中,以達到版保護等目的,同時,這種信息對宿主媒體的影響不足以引起人們的注意且有特定的恢復方法,此信息對非法接收者應該是不可見的,本文主要對數字水印的一般框架,靜止圖象dct系數的理論容量,圖象水印的嵌入和檢測,數字媒體防篡改以及數字水印的擊等問題行了研究,提出了兩個新的水印算演算法。
  11. From that time up to the end of the campaign, all kutuzovs activity was limited to trying by the exercise of authority, by guile and by entreaties, to hold his army back from useless attacks, manuvres, and skirmishes with the perishing enemy

    自從獲悉法國人撤出莫斯科直至戰役結束,庫圖佐夫的全部活動是:用力計謀勸告來阻止軍隊打無益的運動戰與行將滅亡的敵人沖突。
  12. It may be said that the quick - decision offensive warfare on exterior lines which we advocate and the flexibility and planning necessary for its execution are designed to gain the initiative and thus force the enemy into a passive position and achieve the object of preserving ourselves and destroying the enemy

    我們提出的外線的速決的戰,以及為了實現這種戰的靈活性、計劃性,可以說都是為了爭取主動,以便逼敵處于被動地位,達到保存自己消滅敵人之目的。
  13. To explore and make clear the background factor of the behaviors, the dynamic relationship and cause - effect relationship between organizational politics perceptions and consequential behaviors. this paper, based on the five theories related to power at different levels, personal perspective, strategy contingency theory, social exchange theory and structural theory. there appear several problems in the development of key disciplines and processes of crossing and assimilating of subjects, including system tie, the character of scientists, the problem of administers, which influence the development and construction of subject, through abstracting, summarizing and based on “ swot ” analytical model from the theory strategic competition by michael baud, we divide organizational politics behaviors in the organizational development of college subjects and crossing and assimilating of subjects into several sorts : including ( 1 ) offensive model ( 2 ) defensive model ( 3 ) strengthening model ( 4 ) shrinking model

    為探索和理清重點學科組織政治行為的背景因素,組織政治知覺與后續產生的組織政治行為的動態關聯性與因果關系,本研究以五種不同層次與力相關的理論,即個人特質理論觀點( personalperspective ) ;策略變理論觀點( strategycontingencytheory ) ;沖突理論觀點( conflicttheory ) ;社會交換理論觀點( socialexchangytheory ) ;結構化理論觀點( structurationtheory )為基本理論依據,將重點學科學科發展以及學科交叉與融合過程中出現的諸如體制束縛、科學家自身素質、管理層問題等影響學科建設與發展的共性現象行提煉、總結,並依據「邁克爾?波特」的戰略競爭理論學說中的「 swot 」分析模型,將大學學科組織發展及學科交叉與融合中存在的組織政治行為行提練歸類,分為( 1 )型; ( 2 )防守型; ( 3 )增強型; ( 4 )退縮型四類政治行為。
  14. The author of this essay believes that only if a terrorist attack constitutes armed attack, the victim state has the right to do so. the victim state should strictly observe all the four requirements mentioned above. the targets should be limited to the terrorist group which carried out the terrorist attack and the state ( states ) which goaded, directed, controlled or tolerated the terrorist attack

    此外,本文認為受害國有在恐怖主義行動構成武力擊的情況下對其行使自衛,但是受害國應向國際社會提供確鑿的相關證據並應嚴格遵守必要性和相稱性原則,並且對恐怖主義行自衛的對象應限於實施了構成武力擊的恐怖主義行動的恐怖主義組織以及指導、控制、唆使或縱容該恐怖主義行動的國家。
  15. When the watermarking bit is destroyed, which position can be judged exactly, and then block checkout and hamming checkout are used to recover it. meanwhile, watermarking can be extracted without the original document and original watermarking information, which is significative copyright information, so it is a public watermarking technology

    擊時,能準確判斷水印比特位受破壞的具體位置,並能通過塊校驗和海明校驗將破壞的水印比特位行適當恢復;同時,提取水印時既不需要原始文本,也不需要原始水印,且提取的水印信息是有意義的版信息,是一種公開水印。
  16. Structural realism has given some broad predictions state behavior ; theories of hegemonic stability and hegemonic maintenance set up the linkages between institution - all / power position and the national interests of hegemonic states ; offensive realism conceptualizes the relationship of power position and national interests of great powers ; and both defensive realism and neoclassical realism try to enhance the explanatory power of realism which focusing on different aspects

    結構現實主義提出了一系列非常寬泛的預測;霸穩定理論、霸護持理論闡述了制度地位、實力地位與霸國國家利益的關系;性現實主義則概念化了實力地位和大國國家利益的關系;雖然關注的重點所有不同,防禦性現實主義和新古典現實主義都試圖結合國內因素以增強現實主義的解釋力。
  17. An attack resulting in an unauthorized state change, such as the manipulation of files, or the adding of unauthorized files

    引起非授狀態發生變化的一種,例如文件的操縱,或未授文件的增加。
  18. Would you rather have the ball down one, or be up one on d

    你是願意落後一分但擁有球呢,還是領先一分但沒有球(對方持球,己方防守) ?
  19. In so far as the law applicable to the trust requires or provides, such recognition shall imply, in particular - a that the personal creditors of the trustee shall have no recourse against the trust assets ; b that the trust assets shall not form part of the trustees estate upon his insolvency or bankruptcy

    第11條規定承認信託的效力時,對第2條作了補充,說信託的財產免受受託人本人的債人的請求,信託財產不屬于受託人的遺產或夫妻財產。
  20. Answering every question lopez posed with an exclamation point, roger took control of the third set and the match, coming back to win 3 - 6, 6 - 4, 6 - 1, 6 - 4 in the fourth round at flushing meadows

    面對洛佩斯的強烈,費德勒在第三盤取得控制,最終以3 - 6 , 6 - 4 , 6 - 1 , 6 - 4成功逆轉,拿下在法拉盛公園行的第四輪比賽。
分享友人