毒性攻擊 的英文怎麼說

中文拼音 [xìnggōng]
毒性攻擊 英文
poisonous attack
  • : Ⅰ名詞1 (對生物體有害的性質或物質; 毒物) poison; toxin 2 (毒品) drug; narcotics 3 (姓氏) a s...
  • : Ⅰ名詞1 (性格) nature; character; disposition 2 (性能; 性質) property; quality 3 (性別) sex ...
  • : Ⅰ動詞1 (攻打) attack; assault; take the offensive 2 (指責別人的過錯; 駁斥別人的議論) accuse; ...
  • 毒性 : [藥理學] toxicity; virulence; poisonousness毒性測定 toxicity test
  • 攻擊 : 1 (進攻) attack; assault; launch an offensive 2 (惡意指責) attack; accuse; charge; slander; v...
  1. The information safety has the characteristics of the high weakness and danger, delitescence and abruptness, the diversity of the attack sources and the indeterminacy of the guarded object and the asymmetry of the main body of the safety, etc. the contents of information safety are extensive, involving politics, economy, culture, military, science, technology and resources ecosystem etc. the factor which threatens the information safety mainly includes the hackers, network crimes, the network viruses, and the garbage information, etc. the second part thoroughly analyzes the strategic position of the information safety in the national security

    信息安全具有高度脆弱和風險、潛伏和突發源的多樣和防範對象的不確定、安全主體的不對稱等特徵。信息安全的內容廣泛,涉及政治、經濟、文化、軍事、科技、資源生態等領域。威脅信息安全的因素主要包括病、網路黑客、網路犯罪和垃圾信息等。
  2. The king cobra is highly venomous, but it seldom attacks unless it is molested or is defending its nest

    過山烏的劇烈,除非受到傷害或許要保護巢穴,否則甚少主動敵人。
  3. Demon prince qualities : orcus is immune to electricity and poison, and possesses acid and fire resistance 20 ; orcus can engage in telepathic communication with any creature within 100 feet ; orcus constantly detects good, detects magic, and sees invisibility as a 31st level sorcerer ; he possesses immunity to polymorphing, petrification, or any other attack to alter his form

    惡魔君主特:奧庫斯免疫閃電與素,並且擁有強酸與火焰抗各20 ;奧庫斯能通過心靈感應與100英尺范圍內的任何生物交談,奧庫斯身上總是附加有相當於31級術士施展的偵測善良,偵測魔法以及偵測隱身術效果,他免疫變形,石化,或者任何其他能夠改變其外形的
  4. The network is liable to be attacked by the hacker and virus because of the fluidness of information, the distribution of resource, the opening of connection and diversity of connection forms. so the security problem is become more and more serious

    由於計算機網路具有信息的流動,資源的分佈,連接的開放和連接形式的多樣等特徵,致使網路易受到黑客和病,因此計算機網路的安全問題變得越來越突出。
  5. The basic mechanism of viral attack is that the viruses replicate themself using the host ' s ( in this case is " our " ) dna genetic replication system

    濾過人體的基本機制是病能夠通過使用病人身體中的dna基因復制系統來復制自己。
  6. It did not cause any death or side effects on chickens orally dosed at or below 108 cfu. at week 2 after the 2nd immunization, no s. typhimurium cells were recovered from the spleen and liver. zj111 / pcdna3 - f showed high stability in vitro and in vivo even in the absence of ampicillin as determined by enzymatic digestion and pcr

    上為了進一步探討利用減鼠傷寒沙門氏菌為載體傳遞ndvdna疫苗的免疫原,將zjlll pcdna3f菌株分別給3日齡非免疫雞以10 、 fu 、 10 、 fu和10 、 fu的劑量進行首兔, 2周后h免, h免后4周株f 。
  7. Some of the most damaging computer security attacks, including the code red virus, have resulted from a failure to properly parse input

    一些最有破壞的計算機安全(包括「紅色代碼( code red ) 」病)都是因未能正確解析輸入而引起的。
  8. The serious issue of computer software security will be explored in this programme. the programme goes on to discuss three forms of software attacks the virus, the trojan horse and the worm and demonstrates how the use of a firewall installed into a computer network can provide a good measure of protection

    電腦網路究竟有多安全?本節目會探討電腦軟體安全的嚴重,以及電腦病木馬程式和蠕蟲軟體的方式。另外,亦會介紹如何利用防火墻保護電腦網路。
  9. Level 3 - calls upon the aid of a greater hawk ( invisibility ) and a quilbeast ( has 20 % speed reduction poison attack ). 80 second duration

    三級-召喚一隻高等貓頭鷹哨兵和一隻豪豬。高等貓頭鷹哨兵具有永久隱身能力,豪豬的毒性攻擊降低20 %的速度和移動速度。
  10. Level 4 - calls upon the aid of a greater hawk ( invisibility ) and a greater quilbeast ( has 35 % speed reduction poison attack ). 90 second duration

    四級-召喚一隻高等貓頭鷹哨兵和一隻高等豪豬。高等貓頭鷹哨兵具有永久隱身能力,高等豪豬的毒性攻擊降低35 %的速度和移動速度。
  11. The specific nature of the security hole, such as whether it makes the vulnerable to outsiders or allows virus - like code to enter the operating system, was not made clear

    上述安全漏洞的質,諸如其是否會導致計算機易受外部,或是使得諸如蠕蟲病的代碼進入操作系統,現在還不得而知。
  12. It is thought that extracellular gsh protects the cells from oxidants released by inflammatory cells whilst intracellular gsh neutralizes the ros produced as a result of normal cell metabolism, as well as detoxifying xenobiotics ( 4 )

    研究者認為細胞外的谷胱甘肽可保戶細胞免受發炎細胞所釋放氧化劑的,而細胞內的谷胱甘肽可中和正常細胞代謝作用以及共棲生物解作用所產生的具反應氧核素。
  13. Professor sung said studies had shown that patients passed through a viral replicative phase, when the sars virus multiplied rapidly in the body, an immune hyperactive phase, when the body s defences attacked the virus, and a pulmonary - destructive phase, when the lungs were severely damaged and patients needed extra help

    沈祖堯教授指研究顯示,患者會首先經過病繁殖期,即在這段時期嚴重急呼吸系統綜合癥病在體內大量繁殖;繼而進入免疫系統異常活躍期,即身體的防禦系統;及后為肺部破壞期,此時患者肺部遭受嚴重損傷及需要額外支援。
  14. Study on rat small airway epithelium injury induced by lipopolysac charide and its pathogenesis

    對增敏小鼠內素致死的保護作用及其對炎癥因子產生的調節
  15. As the growth of the internet popularize intensity, network traffic anomalies, which are caused by network attacks, worm virus, malicious download, equipment failure, etc, increasingly impact the network performance, some unusual offensive flow disrupts the normal operation of the network order, poses a serious threat to network security. in such situations, how to detect the network traffic anomalies accurately and in time, ensure the normal operation of the network, provide users with a good network environment, become a topic of concern

    但是隨著網路的普及程度越來越高,由網路、蠕蟲病、惡意下載、設備異常等因素導致的網路流量異常對網路能的影響越來越大,某些帶有的異常流量干擾了正常的網路運行秩序,對網路安全造成了嚴重威脅。在這種情況下,如何及時而準確的檢測出網路流量異常,保證網路的正常運行,為用戶提供一個良好的網路環境成為一個備受關注的研究課題。
  16. 1 this website shall be entirely free from liabilities or responsibilities for any loss resulting from the force majeure such as y2k problems, online attacks, virus infection, and or government regulations

    年問題黑客計算機病侵入或發作因政府管制而造成的暫時關閉等不可抗力而造成的任何損失,本網站免責。
  17. From these results we can conclude that host cellular protein cd55, cd59 are incorporated into eev and hiv out membrane and mediated virus resisitance to complement attack. at the same time, the results suggest that virus incorporated cd55 and cd59 can be used as the target in the strategy aimed at target blocking rca on virions and enhancing the anti virus effects of complement. 2

    Cd55 、 cd59的中和抗體能夠發揮消除病的補體逃避機制,恢復病對補體的敏感的實驗結果提示,這兩種補體調節蛋白可以作為以消除病逃避補體的機制、恢復病對補體的敏感,提高補體抗病效率為目標的抗病策略的靶點。
  18. To answer this question, a bispecific, trifunctional antibody constructs which can not only target block virus incorporated rca, but also can induce complement activation by it ' s fc fragment were designed and constructed and iv the role of this kind of bispecific antibody in virus neutralization was studied. 1. to test our idea, human immunodeficient virus ( hiv ) and enveloped extracellular virus ( eev ) of vaccinia virus ( vv ) were selected in our study because of their complex immune evasion stratiges, their threaten to humans, and because both these two kinds of virus can escape complement attack by incorporating host rca into their envelope

    以嚴重危害人類健康,且具有復雜免疫逃避機制的有包膜的hiv病及痘苗病的eev病為研究對象,首先對它們逃避補體的現象進行了驗證,探討了宿主膜補體調節蛋白cd55 、 cd59與hiv病及eev病免疫逃避的關系,評價了病結合的這兩種補體調節蛋白作為本研究提出的,通過消除病逃避補體的機制來恢復病對補體的敏感,提高補體抗病效率這一抗病策略的靶點的可能
  19. These neutralizing antibodies ( would immunize the body against hi oer a person ' s lifetime

    這些抑制的抗體將終生保護機體免受艾滋病
  20. Level 2 - calls upon the aid of a scout hawk and a quilbeast ( has 20 % speed reduction poison attack ). 70 second duration

    二級-召喚一隻貓頭鷹哨兵和一隻豪豬。豪豬的毒性攻擊降低20 %的速度和移動速度。
分享友人