攻擊率 的英文怎麼說

中文拼音 [gōng]
攻擊率 英文
total average
  • : Ⅰ動詞1 (攻打) attack; assault; take the offensive 2 (指責別人的過錯; 駁斥別人的議論) accuse; ...
  • : 率名詞(比值) rate; ratio; proportion
  • 攻擊 : 1 (進攻) attack; assault; launch an offensive 2 (惡意指責) attack; accuse; charge; slander; v...
  1. Yherefore, many researchers have shown great concern with the development of vaccines to against schistosomiasis. at early stage, the research of vaccines of schitosomiasis was centered on dead vaccine and athenuated cercaria of schistosomes while molecular vaccine and athenuated cercaria of schistosomes while molecular vaccine is currently the focus of research with anti - infection protective immunity as its main concern. guan xiaohong and zhao weixian ( 1986 ) certified that the allergen of egg granulonma of schistosoma japonicum might firstly come from gut associated antigen ( gaa ) of schistosomula and adult worm and that daa had cross reaction with soluble egg antigen ( sea ) and membrane associated antigen ( maa ) ; and the gaa of schistosoma japonicum might play a sensitizing role in egg granuloma formation

    Np30主動免疫c57bl 6對尾蚴感染產生42 . 05的保護力,肝組織減卵為66 . 63 ; balb c和昆明種小鼠的保護分別為39 . 53和50 . 46 ;免疫山羊可誘導42 . 78的減蟲,肝組織減卵為35 . 83 ,糞減卵為25 ,並可明顯抑制肝臟蟲卵肉芽腫的大小,肉芽腫數量明顯減少,纖維化減輕,體重明顯增加,因此np30是南京醫科大學博士學位論文很有希望的抗日本血吸蟲病疫苗侯選分子。
  2. Years ago, dna typing achieved such wide acceptance and proven reliability that opponents now concentrate on two principal points of attack : ( 1 ) the quality and methodology of the laboratory work, including the lab ' s error rate, and ( 2 ) the statistical interpretation of data

    幾年前, dna鑒定贏得了廣泛的接受並證實了它的可靠性,現在,反對者開始集中於兩點進行: ( 1 )實驗室工作的質量和方法論,包括實驗室的誤差; ( 2 )數據的統計學解釋。
  3. Whenever damage is received, faceless void moves a moment back in time to try to dodge that damage. can backtrack both physical and magical attacks

    不論是受到物理或者魔法,虛空假面都有一定的幾通過將時間向回移動一小段來閃避傷害。
  4. Using a humvee filled with pathfinders to kill a large group of infantry is an appropriate time to use the attack - move command, but otherwise it only decreases your efficiency greatly

    用一架裝滿游騎兵的悍馬車去殺死一大群士兵時,使用移動命令是恰當的時機,然而把它用在其他方面,只會大大降低你的效
  5. Mrs. thatcher joined in eloquent attacks on the inefficiency of nationalized industries.

    撒切爾夫人對國有化工業的效低劣也作了有力的
  6. Whenever the phantom lancer attacks he will randomly create a duplicate of himself. limit of 8 images

    幻影長矛手在中有一定幾製造一個幻象。幻象的力為本體的25 % ,受到300 %的傷害,持續15秒。
  7. Gives the phantom lancer an edge in combat by allowing him to evade attacks and increasing juxtapose ' s image generation. additionally, it enables his images to generate their own images

    讓幻影長矛手能以一定的幾閃避,提升在中製造幻象的幾。同時,幻象本身也能以一定的幾製造幻象。
  8. Then, the paper present a protocol misusage ids in application layer based on markov chain, and obtain the following results after test : the system can have good effection on detecting the probe packet, dos attack and novelty attack. the system can overcome part of disadvantages in traditional intrusion detection system, and adapt requirements with different network. the experiment shows that the system can improve the detection accuracy rate, reduce the false negatives probability

    通過對檢測系統的測試分析,系統對掃描探測報文、 dos報文和新的報文等有較好的檢測。基於馬爾可夫鏈建立的網路異常檢測系統可以克服傳統入侵檢測系統的部分缺陷,能夠適應不同網路環境的要求,同時也有效提高了系統的檢測能力和檢測效,降低了誤報
  9. A practical efficient one - time password authentication protocol is presented which based on the symmetric algorithm, which conquers common challenge - response protocol weakness and can achieve mutual authentication and avoid replay attack and personating attack

    該方案克服了通常的質詢響應認證方案的弱點,可以用在網路環境下,實現通信雙方的相互認證,防止重放和冒充,實現簡單,執行效高。
  10. Resemble with the digital watermark methods of the other media such as still image and video, digital audio watermark must account for some problems which consist of perceptual transparency, data bit rate, robustness, security and real - time etc. the robustness of watermark is vital to the practical application, which requires the watermark providing with significant data since it suffered from some intended attacks or unintended revisal

    與靜態圖像、視頻等數字水印方法類似,音頻水印的研究主要須解決感知透明性、數據嵌入、魯棒性、安全性以及實時性等問題。水印演算法的魯棒性對于實際應用來說是至關重要的,它要求數字水印在遭受有意的或無意的修改後,仍能提供有意義的數據,這一性能對版權保護的應用顯得尤為突出。
  11. Makes the chance of an opponent riposting an offhand attack 20 % lower per rank

    每一階可以降低對手反副手武器20 % 。要求:等級66 。
  12. The termless security of quantum cryptographic key protocol is based on the quantum non - clone principle and heisenberg uncertainty principle. whilst, these two characteristics mentioned above contributes greatly to solve the problems of low transmitting rate, complicated operation and forge - identity assault in the bb84 protocol

    量子密鑰協議的無條件安全性能主要建立在量子不可克隆定理和heisenberg的測不準原理兩大理論基礎上的,但也正是由於量子的這兩種特性導致在bb84協議中存在了傳輸效低下、操作復雜、假冒身份等方面的問題。
  13. The strategy is a direct attack on atkins : americans who follow the atkins diet increase their risk of health problems that include cardiovascular disease, high cholesterol, kidney damage and some cancers, the wheat foods council says

    這些食品公司的策略就是直接阿特金斯的理論。食品聯盟宣稱:阿特金斯的追隨者們患心血管疾病高膽固醇腎壞死及一些癌癥的幾比常人要高。
  14. Your opponent ' s fear of you mounts as does the debilitation caused by it. incoming critical + 7 %, all resistances reduced and incoming spiritual damage + 5 %

    恐懼面容2級?你的目標開始感到衰弱,提高對他們的會心一7 % ,各種抗性下降,並且精神+ 5 % 。
  15. In the years following operation desert storm, u. s. military strategists debated the best way to destroy such “ hardened ” and deeply buried targets, knowing full well that attacks on subterranean bunkers or weapons stockpiles would face uncertain chances of success

    沙漠風暴作戰后這幾年,美軍戰略專家爭論著哪種方法最適合用來破壞這種強硬又深埋地下的目標,因為他們很清楚,地下掩體或武器庫的成功機無法掌握。
  16. Second, by computing the trajectory of the missile and the method of analyzing cep, influences that the fighter ' s height, speed, pitch angle, the deflection angle between fighter and target, and the target moving characters make on the times of fighter attack and missile launch are deeply developed. third, by relating the motion of the missile and the fighter, the influences that fighter ' s dive angle and the deflection angle between fighter and target make on the attack field of the fighter are discussed in this paper when the fighter perform vertical and horizontal attack. criterion of attack effect is proposed focusing on attack time of the fighter, trajectory of the missile and destruction probability to the target

    本文主要完成了以下幾個方面的工作:對導彈可發射區和飛機可區進行建模,通過對導彈彈道的模擬計算,並運用典型的圓概偏差精度分析方法,詳細討論了飛機實施時,飛機的飛行高度h 、速度v 、俯仰角、與目標的偏離角_ x及目標運動特性等對飛機時機和導彈發射時機的影響;因此,將飛機和導彈結合起來,詳細研究了飛機在垂直平面和水平平面內實施時,飛機俯沖角和與目標的偏離角_ x對飛機的范圍的影響;以飛機實施的時間t 、彈道特性和對目標的殺傷概p來評判對地的效果;最後給出典型算例,通過對空地過程的模擬實現,對飛機飛行過載提出要求。
  17. And its main guns, while among the most powerful in the game, have a slow firing rate that may not be ideal against smaller ships - - other ships would be more cost - effective

    它的主炮,是游戲中最強大的武器之一,開火速非常慢,用它小船不是個好主意其他的船會更劃算。
  18. Under assumptions of kea3, a decision diffie - hellman and a variant of target collision resistance tcrv, the new scheme is proved secure against indistinguishable adaptive chosen ciphertext attack ind - cca2

    Rd提出的elgamal deg方案具有相同的效和帶寬,而deg方案在2004年亞密會上證明為選擇密文ind - cca1安全,而新的體制則是ind - cca2安全的。
  19. Their size parameters, the largest probability of a successful impersonation attack and the largest probability of a successful substitution attack are computed ; chapter three use sympletic geometry to construct authentication codes with arbitration, some parameters and the largest probability of successful attack are also computed ; chapter four is about lattices generated by transitive sets of subalgebras under finite chevalley groups

    並計算了相關參數及成功偽造和成功替換的最大概;第三章在辛幾何的基礎上構造了具有仲裁的認證碼,亦計算了相關參數及各種成功的最大概;第四章討論了有限域上chevalley群作用下的子代數軌道生成的格。
  20. Weakening strike > > > with each successful attack, the attacked enemys attack and defense properties are reduced by 2 units ( cannot get below zero )

    具有該技能的兵種的每次都會使目標的攻擊率和防禦下降2點(該效果累計,所以目標的最低能降到0 ) 。
分享友人