水平攻擊 的英文怎麼說

中文拼音 [shuǐpínggōng]
水平攻擊 英文
attack fron horizion level
  • : 名詞1 (由兩個氫原子和一個氧原子結合而成的液體) water 2 (河流) river 3 (指江、河、湖、海、洋...
  • : Ⅰ形容詞1 (沒有高低凹凸 不頃斜) flat; level; even; smooth 2 (高度相同; 不相上下) on the same l...
  • : Ⅰ動詞1 (攻打) attack; assault; take the offensive 2 (指責別人的過錯; 駁斥別人的議論) accuse; ...
  • 水平 : 1. (跟水面平行的) horizontal;level2. (達到的高度) standard; level
  • 攻擊 : 1 (進攻) attack; assault; launch an offensive 2 (惡意指責) attack; accuse; charge; slander; v...
  1. The country should rely on a high level of armaments to deter or repel attacks on her from the world outside.

    該國應依賴高的軍備以防止或退外來世界對她的進
  2. This unit can make two secondary gunnery attacks against separate targets during your surface attack step

    輪時這個單位可以對敵方在不同區域的單位進行兩次副炮
  3. We constructed fences using 2 x 2 x 2 factorial design to examine the effect patterns of food availability, predation and interspecific competition on population dynamics and spatial behavior of reed voles, microtusfortis. we expected to test two hypothesises : ( 1 ) availability of high quality food, predation and interspecific competition have independent and addictive effects on population system dynamics for small mammalia herbivore ; ( 2 ) availabiliry of high quality food could reduce home range and aggressive behavior level between individuals of microtine, predation and interspecific competition have independent effects on spatial behavior of microtine

    以2 2 2析因實驗設計,在野外圍欄條件下,探討食物可利用性、捕食及種間競爭對沼澤田鼠( microtusfortis )種群動態及空間行為的作用,旨在檢驗下述特定假設: ( 1 )高質量的食物可利用性、捕食及種間競爭對植食性小哺乳動物種群系統動態具有獨立的和累加的效應; ( 2 )高質量的食物可利用性可降低田鼠個體間的行為,並導致其巢區減小;捕食與種間競爭對田鼠的空間行為亦有獨立的作用。
  4. The only maritime force in asia with submarine - launched ballistic missile ( slbm ) capability, china is configuring its naval force levels around two aircraft carrier groups, with several new inductions ranging from nuclear - powered " type 093 " attack submarines to stealth frigates

    擁有亞洲唯一具備用潛艇發射彈道導彈海上力量的中國,正設定其海軍實力要達到的是擁有兩個航母特混群,以及包括從核動力的093型潛艇到隱身護衛艦在內的多艘新造艦艇。
  5. Second, by computing the trajectory of the missile and the method of analyzing cep, influences that the fighter ' s height, speed, pitch angle, the deflection angle between fighter and target, and the target moving characters make on the times of fighter attack and missile launch are deeply developed. third, by relating the motion of the missile and the fighter, the influences that fighter ' s dive angle and the deflection angle between fighter and target make on the attack field of the fighter are discussed in this paper when the fighter perform vertical and horizontal attack. criterion of attack effect is proposed focusing on attack time of the fighter, trajectory of the missile and destruction probability to the target

    本文主要完成了以下幾個方面的工作:對導彈可發射區和飛機可區進行建模,通過對導彈彈道的模擬計算,並運用典型的圓概率偏差精度分析方法,詳細討論了飛機實施時,飛機的飛行高度h 、速度v 、俯仰角、與目標的偏離角_ x及目標運動特性等對飛機時機和導彈發射時機的影響;因此,將飛機和導彈結合起來,詳細研究了飛機在垂直面和面內實施時,飛機俯沖角和與目標的偏離角_ x對飛機的范圍的影響;以飛機實施的時間t 、彈道特性和對目標的殺傷概率p來評判對地的效果;最後給出典型算例,通過對空地過程的模擬實現,對飛機飛行過載提出要求。
  6. Civilian ships will have an average to high maneuverability, average offense / defense, an average amount of cargo space and average maintenance / crew

    民船會有介於中高的可操作性,一般的力/一般的防禦力,一般容量的貨艙、一般的維護費用以及一般數量的乘員。
  7. The sub - munitions - warfare is a kind of exactitude armament. taking full advantage of mature technology and pre - research work, the investigation and application of sub - munitions - warfare is possible at the present and suitable to our country ’ s missile in current use

    某型號子母戰斗部以成熟的導彈武器型號為臺,充分利用預研關成果和成熟技術,是一個預研周期較短、符合我國現有常規導彈武器研究的精確打武器。
  8. The air bombardment of german fortifications was crucial, even if not as effective as hoped, and the naval attack on german defenses was essential, even if it did not silence most of the german guns, but at h - hour when the landing craft lowered their ramps the success or failure of the greatest amphibious attack in the history of warfare, the event upon which the success of the allied effort in world war ii depended, all came down to the bedford boys and thousands of men like them scrambling in chest high water, weighed down with equipment and ammunition, and the water they splashed into was crimson with their blood and that of their buddies

    德國防禦工事的炮火是殘酷無情的,即使它沒有達到預期的效果;對德國防禦的海上是至關重要的,即使它並不能息德國人多數的炮火;但是,當開始時刻,登陸艇漸漸放下它們的滑梯的時候,戰爭史上最偉大的兩棲作戰? ?一場決定二戰的聯盟力量的勝利的戰爭? ?的勝敗就掌握在了貝德福德的男孩們以及數以千計的像他們一樣在齊胸的裡前行的戰士們手裡,他們背負著沉重的裝備和武器,跳進他們和他們兄弟的鮮血染紅的海裡。
  9. Past research on preschool and primary children indicated that many rejected children in social interaction showed high level aggressive behavior, while social withdrawn children were characteristic of extremely low self - evidence and poor social interaction

    以往關于學前和小學兒童的研究表明,許多在社交中被拒絕的兒童展示了相當高行為,同時社會退縮兒童具有極端不自信和較差的社會交往特徵。
  10. Overall, boys engaged in more aggressive behaviors than girls, but girls engaged in significantly more indirect aggression than boys

    這一時期兒童的性行為多指向同性同伴,多數能夠自行終止。 ( 2 )總體而言,男孩的高於女孩。
  11. In this paper, the mechanism, methods of and countermeasures to denial of services attacks are discussed. after that, several packet marking schemes for traceback are reviewed and some improvements to the basic packet marking scheme are given, which reduce the workload and false positive rate in the attack tree reconstruction. knowing that in existing packet marking schemes, router marks packets with fixed probability, which results in that many packets are required in path reconstruction and that attacker could encumber path reconstruction via spoofed marking information

    在本文中,我們首先研究了拒絕服務機制、方法及其對策,並對以包標記的方式追蹤拒絕服務的來源的各種方法進行了深入的研究,分析了它們各自的優缺點,並對基本包標記方案作了改進,使得其路徑重構時的運算量和重構的誤報率在原有基礎上大為降低,達到或超過了其他一些方案的
  12. Boys exhaled more proactive aggressive behaviors, however, most aggressive events were instrumental whether boys or girls are concerned. 3. no significant changes were found in the overall level of children ' s aggression during age 4 to 5 and children of this age showed stable individual differences in aggression

    但就不同方式的而言,男孩的身體及言語多於女孩,女孩的間接多於男孩,男孩主動發起的4 5歲兒奮性行為發展及其與家庭因素關系的追蹤研究自)兒童的在45歲之間總體上保持穩定,性的個別差異也表現出顯著的穩定性。
  13. Make sure you at least match the power level with your shields and beams or you may be under powered when under attack and will not be able to use your full beam strength or maintain shields under attack

    請確保你的光束(武器)和防禦性裝置至少與功率相匹配,否則,在受到時,你的船隻可能會動力不足,無法使用完全的光束力量或無法維持防禦。
  14. In this paper, we design a watermark algorithm to resist geometric attacks, which used lpt ' s characters to resist the scale, translation attack and used the exhaustive search method to oppose rotation attack

    本文利用數極坐標變換的性質,消除移和縮放對印的威脅,用搜索的方法來應對旋轉,設計並實現了一種新的抗幾何印演算法。
  15. The developerworks columns by gary and john have been updated and expanded in the book building secure software, which also includes plenty of new material

    ,在那裡, gary和john描述了高的緩沖區溢出,並討論了緩沖區溢出是軟體安全最大威脅的原因
  16. Circular symmetric spread spectrum digital image watermarking using chaotic sequences as the watermark takes advantage of the discrete fourier transform properties and spread - spectrum communication techniques to embed a circular symmetric watermark in the frequency domain. the watermark can be detected without the presence of the original image even when the watermarked image suffers geometrical attacks such as translation, rotation and scaling. experimental results show that the proposed scheme has good transparency and highly good robustness to geometric transformations

    基於混沌序列的圓對稱擴頻印方案是以實值混沌序列作為印,根據離散傅立葉變換的特性並結合通信上的擴頻技術,將一圓對稱印嵌入到了圖像的頻域中,且即使圖像遭受了移、旋轉、縮放等幾何檢測印也不需要原圖像。
  17. Industrial ships will have a low to average maneuverability, small offense, average defense, a high amount of cargo space and low maintenance / crew

    工業船會有低於一般的可操作性,較底的力,一般的防禦力,一個極高容量的貨艙以及廉價的維護費用和較少的乘員數量。
  18. Utilizing the characteristics of the human visual system, we embed a digital signal into the average value of the four adjacent wavelet coefficients since the average value has better stability than single wavelet coefficient. this method need n ' t original image when the watermark is extracting. experiment results show the effectiveness of this method which is robust to common image process and fragile to malicious attack, i. e. this method can detect the tampered portions

    因此,本文利用小波系數均值來嵌入印,提出了一種基於小波域的圖像完整性驗證的半脆弱印演算法,在魯棒性和脆弱性方面達到了很好的衡,對非惡意有很強的魯棒性,而對于惡意的篡改操作有很強的識別和定位能力。
分享友人