second attack 中文意思是什麼

second attack 解釋
兩次球
  • second : adj 1 第二的;第二次的;二等(的)。2 次等的;較差的;劣於…的 (to)。3 〈美國〉較年輕的。4 另一...
  • attack : vt 1 攻擊 (opp defend)。2 非難,抨擊。3 著手,動手,投入。4 (疾病)侵襲。5 【化學】腐蝕。n 1 ...
  1. Interference with direct investment to improve the balance of payments is clearly a second-best policy. the best attack is through macroeconomic tools.

    干預直接投資以求改善收支平衡顯然是一種次佳政策,最佳之著乃是運用宏觀經濟工具。
  2. The information safety has the characteristics of the high weakness and danger, delitescence and abruptness, the diversity of the attack sources and the indeterminacy of the guarded object and the asymmetry of the main body of the safety, etc. the contents of information safety are extensive, involving politics, economy, culture, military, science, technology and resources ecosystem etc. the factor which threatens the information safety mainly includes the hackers, network crimes, the network viruses, and the garbage information, etc. the second part thoroughly analyzes the strategic position of the information safety in the national security

    信息安全具有高度脆弱性和風險性、潛伏性和突發性、攻擊源的多樣性和防範對象的不確定性、安全主體的不對稱性等特徵。信息安全的內容廣泛,涉及政治、經濟、文化、軍事、科技、資源生態等領域。威脅信息安全的因素主要包括病毒、網路黑客、網路犯罪和垃圾信息等。
  3. Demon ' s lightning attack has about a 4 second casting time, and can be stopped with scatter shot

    怪物的閃電攻擊有4秒的釋放時間,而且可以被驅散射擊打斷。
  4. On august 13, 1937, the japanese initiated the first major battles of the second world war with an all - out attack on shanghai, china ' s great seaport city

    1937年8月13日,日軍發動了第一次主要的「二戰」的戰斗? ?襲擊中國重要的港口城市上海。
  5. The manifester does now have an off - hand weapon in the form of a second claw ( or a claw attack in addition to a held weapon or even a bite, if manifesting another power ) and can use the standard rules for making off - hand attacks described in the player ' s handbook, treating all claw and bite attacks as light weapons

    顯能者現在擁有了副爪形態的副手武器(或者除了所持武器甚至嚙咬? ?如果展現另一道異能? ?以外的一次爪抓攻擊)並且可以使用《玩家手冊》中描述的進行副手攻擊的標準規則,此時將所有的爪抓和嚙咬攻擊視為輕武器。
  6. Second, by computing the trajectory of the missile and the method of analyzing cep, influences that the fighter ' s height, speed, pitch angle, the deflection angle between fighter and target, and the target moving characters make on the times of fighter attack and missile launch are deeply developed. third, by relating the motion of the missile and the fighter, the influences that fighter ' s dive angle and the deflection angle between fighter and target make on the attack field of the fighter are discussed in this paper when the fighter perform vertical and horizontal attack. criterion of attack effect is proposed focusing on attack time of the fighter, trajectory of the missile and destruction probability to the target

    本文主要完成了以下幾個方面的工作:對導彈可發射區和飛機可攻擊區進行建模,通過對導彈彈道的模擬計算,並運用典型的圓概率偏差精度分析方法,詳細討論了飛機實施攻擊時,飛機的飛行高度h 、速度v 、俯仰角、與目標的偏離角_ x及目標運動特性等對飛機攻擊時機和導彈發射時機的影響;因此,將飛機和導彈結合起來,詳細研究了飛機在垂直平面和水平平面內實施攻擊時,飛機俯沖角和與目標的偏離角_ x對飛機的攻擊范圍的影響;以飛機實施攻擊的時間t 、彈道特性和對目標的殺傷概率p來評判對地攻擊的效果;最後給出典型算例,通過對空地攻擊過程的模擬實現,對飛機飛行過載提出要求。
  7. On the basis of these results, the relations of total - pressure recovery coefficient or flow coefficient and flight mach number, angle of attack and the second movable wedge angle of the inlet have been founded by hypersurface fitting, then the mathematical model of the inlet is established

    根據流場計算結果並利用超曲面擬合方法建立了進氣道總壓恢復系數、流量系數與飛行馬赫數、進氣道攻角及二級可調斜板角度之間的關系,由此得到了二元混壓式超聲速進氣道數學模型。
  8. As seen above, the design angle of attack for the second segment is 10 deg

    如上所述,設計攻角的第二部分是10甘醇
  9. Under current international law, the victim state should meet four requirements in exercising the right of self - defense. first, there should be actual armed attack ; second, the action of self - defense should be necessary and proportionate ; third, the un security council has not taken necessary action to maintain international peace and security, and ; forth, the victim state should report to the security council immediately about the action it has taken to defend itself

    行使自衛權必須滿足四項要求:一是遭受實際發生的武力攻擊並且該武力攻擊針對的是受害國的領土或該國的海陸空部隊;二是符合必要性和相稱性原則;三是聯合國安理會尚未採取必要措施以維持世界和平與安全;四是受害國必須立即就其採取的自衛行動向安理會報告。
  10. This is the second time the mosque has been hit and there are fears this attack could prompt large sectarian violence

    因為這是清真寺第二次遭到襲擊,有人擔心會挑起大規模宗派暴亂。
  11. Shares hae lost 10 per cent of their alue since a study in the new england journal of medicine in may linked the drug, the firm ' s second best seller, to an increased risk of heart attack

    自5月份《新英格蘭醫學雜志》發表該藥物(該公司第二大暢銷藥)與增加心臟病發作風險有關的文章以來,該公司股票已經下跌10 % 。
  12. Shares have lost 10 per cent of their value since a study in the new england journal of medicine in may linked the drug, the firm ' s second best seller, to an increased risk of heart attack

    自5月份《新英格蘭醫學雜志》發表該藥物(該公司第二大暢銷藥)與增加心臟病發作風險有關的文章以來,該公司股票已經下跌10 % 。
  13. Waiting until the last second and trying to call in a strike on a moving enemy will be far less effective than planning ahead and anticipating their movements and attack routes

    直到最後一刻才試圖呼叫炮擊敵方移動目標,其效果要遠遠小於提前計劃並預算目標的移動位置再行攻擊。
  14. The first key technique : using plain - text cipher and md5 message - digest algorithm to ensure stb and dhcp server ' s certificate and secure the stb and server ' s communications - the second key technique : using hmac algorithm to realize the safe functions - the third key technique : using ipsec to realize safe functions o those three methods " complexity increases in turn and the degree of the security increases as well which depend on the frame of the methods and the complexity of the algorithm. all theose three methods use the unique serial - number or a special slip - window to defend replay attack

    主要採用三種安全方案實現:第一種:利用約定的明文密碼驗證機頂盒與dhcp服務器的合法身份, md5驗證信息合法性:第二種:利用hmac演算法驗證機頂盒與服務器身份,信息合法性;第三種:利用ipsec驗證機頂盒與dhcp服務器身份與信息合法性。每一種方案中皆採用包序號唯一法或者滑動窗口法保證重放攻擊。此三種方案復雜度依次增加,安全度依次升高,主要取決于演算法的復雜度與架構的搭建。
  15. He was a plain rough man ; and he made no scruple to speak his doubts of her surviving this second attack ; unless she were more submissive to his directions than she had shown herself before

    他是一個坦率質樸的人。他毫不遲疑地說出他懷疑她是否能安然度過這第二次的打擊,除非她對他的指示比以前更聽從些。
  16. However, he can ' t even lift his feet after tying bricks on them. therefore, his second attack fails before it starts

    但是腳上綁了磚塊以後,他的腳根本就抬不起來,因此他的第二次進攻還沒出發就失敗了。
  17. A man peeked out from a slight opening in the door way to his apartment and rattled off an account of the killer ' s second attack

    那個從他的公寓門里窺視到凶手的人很快供述了兇犯第二次攻擊的情形
  18. A second attack may occur, but usually not for 6 months to 2 years, but it could be 20 years, or neer

    痛風可能再次發作,但通常發生在首次發病後半年至兩年內,也有可能是在首次發病二十年後,或者永不復發。
  19. An australian surfer fought off a shark with his hands on sunday, the second attack in australian waters in two days

    一位澳大利亞沖浪愛好者9月25日僅憑自己的雙手便趕走了向其發動襲擊的一條鯊魚,這是最近兩天內在該國發生的第2起同類事件。
  20. This second attack was much more violent than the first, and he had slipped from the couch to the ground, where he was writhing in agony. the doctor left him in this paroxysm, knowing that he could do nothing to alleviate it, and, going up to noirtier, said abruptly, " how do you find yourself ? - well ?

    這次發作比第一次更猛烈,他從睡榻上滾到地上,痛苦地在地上扭來扭去,醫生知道已是毫無辦法,就只管他痙攣,他走到諾瓦蒂埃面前,低聲地說, 「您自己覺得怎麼樣?
分享友人