The effectiveness of this strategy was demonstrated most spectacularly in the February 2006 attack on an iron-ore mine in Bacheli, 10 km from Gumiyapal.
2006年2月份的巴切里铁矿袭击充分展示了这种策略的有效性。铁矿距离古米亚·帕尔村10公里外。
The strategy was two-fold. First, out-muscle United. Then, channel the attack through Peter Crouch, the tall target man.
战术就两点。第一,身体流生吃曼联。其次,进攻中以高中锋皮特·克劳奇为支撑点发动攻势。
We found that for every viral strategy of attack, the bacteria would adapt to defend itself, which triggered an endless cycle of co-evolutionary change.
我们发现细菌能对病毒每一种进攻策略产生适应机制以保护自己,而这又触发了病毒下一次的进化,形成无止境的循环。
As of today, both will be severely undermined by the Berlin attack — with no alternative at hand, either in terms of a viable candidate or in terms of strategy.
今天,这条口号和基民盟都将因此次的柏林袭击遭受重创,而基民盟手中没有备用选择——无论是有胜选实力的备用候选人,还是备用策略。
Your opponent will probably get wise to your strategy and start trying to attack the Corruptors.
您得对手也许会明白您得战略而开始试图攻击腐蚀者。
A nonlinear guidance law and control strategy is proposed for aircraft applying to attack the ground fixed targets.
对于攻击地面固定目标的飞行器,提出一种非线性制导律和控制方法。
While recognizing early heart-attack warning signs is important, the best strategy for most young women is preventing heart disease.
虽然辨识出早期心脏病发作的警告信号很重要,但是对多数年轻女性最佳的策略是预防心脏病。
It is shown that there is still an asymptotic perfect security of quantum key distribution under this attack strategy.
理论计算证明了量子密钥分配协议在这种攻击策略下仍具有足够的安全性。
To have the initiative in future weapon of information, will study the wooden horse network attack technology to have the important military strategy significance.
为了在未来的信息战中掌握主动权,研究木马型网络攻击技术具有重要的军事战略意义。
When the Death Star arrived in the Yavin system, Dodonna formulated the Rebels' crucial attack run strategy of the Battle of Yavin, and briefed the Rebel pilots as to its logistics.
死星进入雅文星系时,多登纳谋划了义军在雅文战役中至关重要的攻击疾飞策略,并就其后勤保障向义军飞行员做了简短报告。
The new strategy involves implanting into the gums antibiotics or other germ killers so that they can attack bacteria in the pockets where they fester.
新的方式是在牙龈内植入抗菌素或其他能杀死细菌的药物,这些药物可以在产生溃烂的地方杀死细菌。
We outline a distributed strategy to tackle the history-revision attack threat in a simple and elegant way.
我们采取了一种分散的策略,利用一个简单而合理的方式来处理历史攻击的威胁。
The big assault on DIE HARD ATTACK is just glorious, and suggests that this is probably going to be another wonky classic of real-time strategy.
舍命攻击的大型突袭太宏伟了。这预示着本作可能会成为实时策略又一经典。
You may divide cyber retailers into three subsets and attack each with a different strategy.
您可以将网上零售商分成三个子类,用不同的战略对付他们。
In regard to the marketing strategy, Dongguan City XINYUJIANBANG Media Co., Ltd enters into network video market as a challenger. We mainly take flanking attack and indirect attack strategy.
在营销策略的制定方面,东莞市心域建帮传媒传媒责任有限公司作为市场挑战者的角色进入网络视频市场,我们主要采取侧翼进攻和迂回进攻的策略。
The paper introduces the strategy about computing trust value, maintaining the record of history remember, preventing sybil attack and slandering and cooperative cheat.
对于模型中的信任度求解、节点成员表的历史记录维护、冒名、诋毁及协同作弊等关键问题给出了解决策略。
Expert system, protection system and detection system respectively confirms security level and strategy in alternation, and detects new attack event.
专家系统、防御系统和检测系统交互分别确定安全级别和安全策略,并检测新的攻击。
The traditional all round attack strategy is based on the off boresight technology, which cannot attack rear targets.
这种全向攻击是指本机可以攻击从各个方向接近本机的目标。
Intrusion detection technology is a kind of dynamic strategy, which Can real-timely monitor the network and dynamically protect the network when suffering from attack.
入侵检测技术就是这样一种动态策略,它通过对网络系统实时监控,来达到动态保护的目的。
This paper proposes an improved Statistical Hitting Set attack (SHS-attack) based on MIX anonymity technique and a defence strategy based on dummy packets to counter against this attack.
基于MIX匿名系统模型,提出一种改进的统计命中集攻击算法,并在该算法的基础上给出基于填充包的防御策略。
This model protects the active network node from the attack of vicious capsule with authentication, authorization and active capability loads strategy dynamically.
该模型采用认证、授权、主动权能动态加载策略等安全措施保护主动节点资源免受恶意信包的攻击。
China implements a military strategy of active defense. Strategically, China pursues a principle featuring defensive operations, self-defense and attack only after being attacked.
中国实行积极防御军事战略,在战略上坚持防御、自卫和后发制人的原则。
China implements a military strategy of active defense. Strategically, China pursues a principle featuring defense operations, self-defense and attack only after being attacked.
中国实行积极防御军事战略,在战略上坚持防御、自卫和后发制人的原则。
Control strategy involved in this paper, which can make motor stably running at low speed in starting process can decrease initiative time and initiative attack.
提出了无级自动变速器汽车起步控制策略,使汽车在起步过程中,实现了发动机在低速下稳定运行,缩短了起步时间,减少了起步的冲击。
The basic security strategy for any automation system is to manage user and network access to the system to protect the controller from attack.
用于任意自动化系统的这项基本安全策略用于管理用户和网络进入系统以保护控制器收到攻击。
In this paper, a routing strategy that can adapt to the extension of network is proposed to attack the problem of blind routing in P2P search.
针对现有P 2 P检索的路由盲目性问题,论文给出了能够适应网络可扩展性的路由查询机制。
In this paper, a routing strategy that can adapt to the extension of network is proposed to attack the problem of blind routing in P2P search.
针对现有P 2 P检索的路由盲目性问题,论文给出了能够适应网络可扩展性的路由查询机制。
应用推荐