攻击点

ɡōnɡ jī diǎn
  • attack point
攻击点攻击点
  1. 计算机仿真结果表明,在末端成像制导阶段,当斜视角达到以上时,改进的FS算法也能达到较好的成像效果,为完成攻击点的选择,提高角跟踪精度创造了条件。

    Simulation result shows that in terminal control and guidance phase , the image from modified frequency scaling algorithm is good when the squint angle is up to 75 degree , which creates the conditions for choosing attack point and improving angle tracking precision .

  2. Trian的主要攻击点是,百事每年在管理上花费11亿美元。

    Trian 's main beef is that Pepsi spends $ 1.1 billion a year on management .

  3. GWT提供了高层次的混淆,从而可以将这个问题降低到一定程度,但是仍然存在次要攻击点:GWT客户机及其服务之间的HTTP通信量。

    GWT provides a high level of obfuscation that mitigates the problem to a degree , but a secondary point of attack remains : any HTTP traffic that travels between your GWT client and its services .

  4. MD530MG主要用于攻击点目标和反坦克。

    MG would mainly be used to destroy the point target and tanks .

  5. 空间拦截的目标攻击点制导规律研究

    Aim Point Guidance Law Design in Space Interception

  6. 好的我觉得我们可以就在这攻击点什么

    Okay , l 'm feeling like we ought to attack something in here .

  7. 成像制导系统目标攻击点的选择

    Aimpoint selection on image guidance system

  8. 对我,她的攻击点几乎每每是在我的单身情况上面。

    With me , her point of attack was almost always aimed at my solo status .

  9. 她酗酒曾是我们的攻击点,但自从她加入了嗜酒者互诫协会…

    Her drinking was supposed to be our silver bullet , but since she joined AA ...

  10. “我们今年将增加很多攻击点,这样,大家就都有机会发挥了!”

    " We 've got plenty of attacking options this year and it keeps all the players on their toes . "

  11. 对于同一个《新青年》,办刊人的出发点,反对方的攻击点,与局外人的观察点既不尽一致;

    Though addressing the same New Youth magazine , what the editors aimed to do , what opponents attacked and what outsiders observed were not all the same .

  12. 进攻盯人时组织后卫注意力选择以观察主要攻击点为主,适当的选择其他同伴或者自己有好的机会进攻。

    Offensive guard man-to-man attentional selection to observe the main point of attack , the appropriate selection of the other partner or have a good chance to attack .

  13. 该方法利用动态污点分析技术跟踪程序对不可信数据的处理,通过监视程序中可疑的错误点来追踪输入网络报文中潜在的攻击点,并以此作为模糊测试用例生成的启发式信息。

    DTA is used to trace how the program processes untrustworthy data , and then mine the potential attacking points in the test cases by monitoring potential error points in the program .

  14. 我们考虑中的一个野蛮防御的改动是将其改为在一定时间内吸收X点伤害,而不是现在的降低下次近战攻击X点。

    For Savage Defense the change we 're thinking about would probably be instead of reducing the next physical attack for X damage , it would instead absorb X damage for some duration .

  15. 目的探讨MAGE-1基因编码的肿瘤相关抗原作为肝细胞性肝癌(HCC)主动免疫治疗攻击靶点的可能性。

    Objective To explore the possibility of tumor associated antigen encoded by MAGE-1gene used as a tarest for immunotherapy in HCC patients .

  16. MAGE3mRNA在NSCLC中呈高比例表达,提示该基因编码的肿瘤抗原可以作为对NSCLC患者进行免疫治疗的攻击靶点。

    This study suggests that MAGE-3 mRNA is expressed in a high percentage in NSCLC specimens , and its encoding tumor antigen may be the target for immunotherapy for NSCLC patients .

  17. 利用目标高度估计确定目标攻击要害点是精确制导武器信息处理中的一个重要内容。

    Target height estimation is a key for precision guidance weapons to decide the point of a target to be attacked .

  18. 排球强攻击球点的空间位置与有效过网区间的多变量研究

    A Variable Study on the Relationship between the Spiking point in Space and the Effective Zone over the Net of Volleyball

  19. 同时,青蒿素针对肿瘤细胞的攻击靶点及杀伤机理尚未明确,也阻碍了青蒿素在临床肿瘤治疗中的应用。

    Additionally , due to the molecular target and the lethal mechanism of artemisinin acting on tumor cells being unclear , the application of artemisinin in the clinic tumor therapy has been largely delayed .

  20. 计算分析ARM分辨角、攻击角和点源间距对诱偏效果的影响。

    The influence of resolution angle , attack angle and the radiation sources distance on cajolery effect is calculated and analyzed .

  21. 对中间产物的分析表明,.OH自由基的攻击DBP的点位可能有两个,脂肪链和DBP结构中的的芳香环。

    It was shown from the analysis results of intermediate product that there might be two attacking positions to DBP by hydroxyl radical , which were aliphatic chain and aromatic nucleus in DBP structure .

  22. Nerubian护腿:永久性的为裤子附加Nerubian护加效果,增加攻击强度60点,致命等级15点。

    Nerubian Leg Armor-Permanently attach nerubian armor onto pants to increase attack power by60 and critical strike rating by15 .

  23. 虚弱诅咒现在降低攻击强度272点。

    Curse of Weakness now lowers attack power by 272 .

  24. 魔爪术:你的徒手攻击造成+1点额外伤害。

    Talons . Your unarmed attacks deal + 1 damage .

  25. 增加猫、熊、巨熊形态下的攻击强度420点。

    420 attack power in cat , bear , and Dire Bear forms only .

  26. 会话安全是一个老生常谈的话题了,会话作为一个常见的攻击目标一点也不稀奇。

    Session security is a sophisticated topic , and it 's no surprise that sessions are a frequent target of attack .

  27. 为了让应用能避免此类攻击或模糊点,应用的设计者或开发者们应该在待签名的应用数据中加入目标接收方的身份。

    In order to protect applications from this kind of attack or ambiguity , application designers or developers should add the identity of the intended recipient to application data to be signed .

  28. 由于人们网络安全意识的淡薄,以及网络犯罪的智能化的提高,用户桌面已成为网络安全的瓶颈,成为防范各种网络攻击的薄弱点,网络的整体安全性得不到保证。

    Because of shortage of precaution sense and enhanced intelligent of network crime , user desktop has already be a bottleneck of network security , weakness point of guarding against network attack , and then the entire network security is not protected .

  29. 在检测方面,按一定数量的数据包中新出现的源IP地址的比例值构造序列,采用序列变化点的检测方法检测到攻击发生的时间点。

    In detection , it uses sequence change-point detection method to detect the attacking point by finding the shift of a sequence composed of the ratio of diagrams with new source IP address to a certain number of diagrams .

  30. 水面舰艇对抗鱼雷攻击时决策基准点的选取方法

    The Selection Method of Decision-making Datum Mark During Anti-torpedo Time