攻擊素 的英文怎麼說

中文拼音 [gōng]
攻擊素 英文
aggressins
  • : Ⅰ動詞1 (攻打) attack; assault; take the offensive 2 (指責別人的過錯; 駁斥別人的議論) accuse; ...
  • : Ⅰ形容詞1 (本色; 白色) white 2 (顏色單純) plain; simple; quiet 3 (本來的; 原有的) native Ⅱ名...
  • 攻擊 : 1 (進攻) attack; assault; launch an offensive 2 (惡意指責) attack; accuse; charge; slander; v...
  1. The information safety has the characteristics of the high weakness and danger, delitescence and abruptness, the diversity of the attack sources and the indeterminacy of the guarded object and the asymmetry of the main body of the safety, etc. the contents of information safety are extensive, involving politics, economy, culture, military, science, technology and resources ecosystem etc. the factor which threatens the information safety mainly includes the hackers, network crimes, the network viruses, and the garbage information, etc. the second part thoroughly analyzes the strategic position of the information safety in the national security

    信息安全具有高度脆弱性和風險性、潛伏性和突發性、源的多樣性和防範對象的不確定性、安全主體的不對稱性等特徵。信息安全的內容廣泛,涉及政治、經濟、文化、軍事、科技、資源生態等領域。威脅信息安全的因主要包括病毒、網路黑客、網路犯罪和垃圾信息等。
  2. Translocation from endocytic compartments to the cytosol is the essential and rate - limiting step in the intoxication process of most toxins such as ricin, diphtheria toxin, shiga toxin and pseudomonas exotoxin ( pe ). a number of these toxins are transported to trans - golgi network ( tgn ), and in many cases such transport to the tgn is required for the translocation and cytotoxicity. in deed, 5 % of the ricin endocytosed by cells has been shown to reach the tgn

    蓖麻毒進入細胞的機理不甚明了,一般認為是rtb先與細胞膜受體結合,主要經過受體介導的內吞作用進入吞噬體,然後沿著內體、高爾基體、內質網等逆向分泌途徑,有序地運輸到內質網,最後從內質網轉位進入細胞漿,在胞漿內核糖體,從而抑制蛋白質的合成,導致細胞死亡。
  3. At the begin of the dissertation, we has discussed the state of security on internet, analyzed the factors caused frangibility of internet, and intrude some means used to provide security services for internet

    本文從網路安全的現狀談起,探討了網路安全的主要威脅因和相應的手段,同時也歸納了針對這些威脅因手段而採取的提高網路安全的安全措施和技術手段。
  4. Their outside individual nucleus cell is in week blood the leucocyte interferon that small amount produces only after virus is atttacked

    他們的外周血單個核細胞在病毒后僅產生低量的白細胞干擾
  5. The research does not demonstrate that watching violent acts in films or television shows directly and immediately causes people to commit violent acts. rather, the scholarly evidence cited by mr. mcintyre either demonstrates cumulative effects of violent entertainment or establishes it as a " risk factor " that contributes to increasing a person s aggressiveness

    研究並沒有指出觀看暴力節目會直接立即導致人們的暴力行為,但是麥因泰爾所舉出的學術證明顯示,暴力節目的影響日積月累,是造成人們行為的一個危險因
  6. Demon prince qualities : orcus is immune to electricity and poison, and possesses acid and fire resistance 20 ; orcus can engage in telepathic communication with any creature within 100 feet ; orcus constantly detects good, detects magic, and sees invisibility as a 31st level sorcerer ; he possesses immunity to polymorphing, petrification, or any other attack to alter his form

    惡魔君主特性:奧庫斯免疫閃電與毒,並且擁有強酸與火焰抗性各20 ;奧庫斯能通過心靈感應與100英尺范圍內的任何生物交談,奧庫斯身上總是附加有相當於31級術士施展的偵測善良,偵測魔法以及偵測隱身術效果,他免疫變形,石化,或者任何其他能夠改變其外形的
  7. Defence against multiple attackers ( 2 attackers ) and against tanto, bokken and jo attacks. - ken suburi & jo suburi ( based on seidojuku weapon training syllabus ). - 13 - jo kata

    對多人(兩個者)及對使用短刀、刀及杖之防守技法。 -劍振及杖振(跟隨《正道塾》刀杖練習范圍) 。 -十三杖型。
  8. The study found that a substance in green tea, a major polyphenol called epigallocatechin gallate ( egcg ) has the ability to block the hiv virus from attacking the immune system

    該研究發現綠茶中主要的一種茶多酚,表沒食子兒茶沒食子酸酯( egcg ) ,能夠阻止hiv病毒免疫系統。
  9. The main task of this article contains : ( l ) compares algorithm and encryption and decryption between the widely - used public key encryption system rsa and ecc ; ( 2 ) directing against present elliptic curve attack algorithm, uses sea algorithm to perform choosing of safe elliptic curve and to achieve based on prime field elliptic curve ' s elgamal encryption and decryption and digital signature ; ( 3 ) discusses elliptic curve ' s application on smart card and proposes two identification plans based on eec

    綜上所述,本論文所作的主要工作有: ( 1 )對目前應用較廣的公鑰密碼體制rsa和ecc演算法及加解密實現進行比較。 ( 2 )針對目前已有的橢圓曲線演算法,使用sea演算法實現了安全橢圓曲線的選取,實現了基於大數域上的橢圓曲線的elgamal加解密和數字簽名。 ( 3 )討論了橢圓曲線在智能卡上的應用,並提出了兩種基於ecc的身份認證方案。
  10. Abstract : two new digital signature schemes whose security are based onboth discrete logarithms and factorization are proposed. the paper also considers some possible attacks to the schemes, shows that the two schemes are more secure than the elgamal ' s signature scheme and the rabin ' s signature scheme

    文摘:提出了兩個新的數字簽名方案,它們的安全性同時基於離散對數和因子分解兩個困難問題,並各有特點.對兩個方案的性能和可能遭受到的進行了詳細討論
  11. In conclusion, cognitional preference and the acquisition of social cognition are major factors contribution to children ' s development of aggressive behaviors

    通過這個實驗我們研究了性兒童和非性兒童的社會觀點采擇能力是否有區別,以及年齡因的影摘要4響。
  12. The elements of situation maps include the information of flight track, detection range of radar, capability of weapon attack, and quantification of being attacked etc

    態勢圖元包括飛機的軌跡信息、雷達探測范圍信息、火力范圍信息,以及受威脅程度的定量描述等。
  13. Xml has no built - in limits on names of elements, entity depths, and the like, so an attacker could provide long values for these constructs

    Xml對元名稱、實體深度和類似的東西沒有內建限制,所以者可以為這些構造體提供很長的值。
  14. Mr yusuf says there is now a “ gentleman ' s agreement ” between gaza ' s assorted armed factions to attack israel only in response to israeli actions, such as its killing of several militants in gaza this week

    福稱,目前在加沙各色武裝派別中有一個「君子協定」 ,即僅對在以色列採取行動時以色列以作回應,例如以色列本周在加沙槍殺幾名激進分子的行動。
  15. The thermovision 2000s long - wave, narrow band qwip 320 x 240 fpa delivers high thermal sensitivity in both warm and cold climates and makes the system resistant to existing laser

    Thermovision 2000採用320 x 240像長波窄波段的焦平面的探測器。在溫暖和寒冷的天氣下具有很高的熱靈敏度,確保系統能夠抵抗現有的激光性武器。
  16. The purpose of the present study was to investigate the pattern of the development of children ' s aggressive behaviors during age 4 to 5 and the family determinants. the main methods of measuring children ' s aggressive behaviors included natural observation and teacher assessment. family influences involve parent - child relationship, husband - wife relationship and emotional atmosphere, and data concerning them were collected via relevant questionnaires administered to the children ' s mother

    本研究採用縱向的發展研究設計,系統、動態的自然觀察、問卷調查等研究方法考察了兒童4 - 5歲期間性行為的發展及其相關家庭因如親子關系、夫妻關系、家庭情感氛圍等的影響作用。
  17. For the present study, complete data existed for 157 subjects. data concerning aggressive behaviors were obtained via natural observation every 6 months from age 4 to 5, 3 in all and those involving family influences were collected during the time of the first and third observation, administering questionnaires to children ' s mother. the main findings from the present study are as follows : 1

    採用時序滯差性追蹤設計,對157名4歲兒童進行了1年追蹤:運用自然觀察法每隔半年對被試進行一次觀察,並在第一、三次觀察期間對被試母親進行集中的問卷調查以獲得家庭影響因的信息;同時由教師對兒童的性進行評定。
  18. The definition and model of urgent degree are presented, and the application case is given. this model considers such factors which can influence the urgent degree as the alert times, the elapsed time and so on. in addition, the direct factors and the indirect factors are also considered

    該模型考慮了報警次數、報警已逝去時間等因對危急度的影響,以及影響危急度的直接因和與有關的間接因; 3 .危急度在統一報警格式中的應用。
  19. You see with water elemental the mage doesn ' t have to cast any non - instant spells to beat you

    正如你所見到的帶著水元的法師不需要施放任何非瞬發法術來你。
  20. It is thought that extracellular gsh protects the cells from oxidants released by inflammatory cells whilst intracellular gsh neutralizes the ros produced as a result of normal cell metabolism, as well as detoxifying xenobiotics ( 4 )

    研究者認為細胞外的谷胱甘肽可保戶細胞免受發炎細胞所釋放氧化劑的,而細胞內的谷胱甘肽可中和正常細胞代謝作用以及共棲生物解毒作用所產生的具反應性氧核
分享友人