蠕蟲樣的 的英文怎麼說

中文拼音 [chóngyàngde]
蠕蟲樣的 英文
helminthoid
  • : 動詞(蠕動) wriggle; squirm
  • : 名詞1. (蟲子) insect; worm 2. (姓氏) a surname
  • : Ⅰ名詞1. (形狀) appearance; shape 2. (樣品) sample; model; pattern Ⅱ量詞(表示事物的種類) kind; type
  • : 4次方是 The fourth power of 2 is direction
  • 蠕蟲 : worm; helminth蠕蟲感染 invermination; 蠕蟲學 helminthology; scolecology; 蠕蟲藥 wormer
  1. It can be found in the cell walls of fungi and the exoskeletons of shellfish, plankton and insects, along with insect egg cases and the powerful grinders and rigid walls in the pharynx of worms

    見于真菌細胞壁和甲殼類動物、浮游生物和昆外骨架,多見于昆卵鞘和咽部硬管壁和強有力研磨器官。
  2. The appendix is a worm - like tube between two and four inches long protruding from the start of the large intestine

    闌尾是一突出於大腸起始端, 2 - 4英寸長蠕蟲樣的管狀器官。
  3. If the new worm spreads as quickly as last week ' s code red outbreak, hundreds of thousands of web sites could be left open to computer hackers

    如果這種新病毒傳播速度像「紅色代碼」一快,成千上萬網站將在「黑客」攻擊下失去全部防禦力。
  4. These are the same people who mindlessly click executable e - mail attachments, causing worms and viruses to spread unchecked

    是這些人無意地點擊可執行電子郵件附件,造成和病毒不受抑制傳播。
  5. It is advised to use a win98 winme pc or a patched pc to download the patch software and transfer it via floppy diskette or cd - r to the infected system. this is safer

    最好在一部不受影響系統(視窗98 、視窗me )或已修補好系統下載清除程式,再經軟碟及光碟抄錄到受感染電腦上,這較為安全。
  6. In this paper, by studying the feature of the netflow data and the mib status of the network equipments, at the same time, in terms of analyzing the characteristics of network attack, worm spread, virus infection and network misuse behaviors, our work is based on the facts that most of the anomaly traffic in campus network has influences of the netflow data and network equipment status. an approach is present to assess the threats of the traffic in terms of five factors : the traffic bytes distribution, flow number distribution, packets number distribution, equipment cpu utilization and the memory utilization. the weight of each factor is computed and determined by fuzzy relation matrix 。 an prototype system is designed to test the method and the results are analyzed to evaluate the availability of our method

    本文研究了netflow流數據特徵和網路設備運行狀態數據,分析了校園網網路異常攻擊、病毒和網路濫用行為特點,基於大多數網路流異常必然反映在網路網路流量數據特徵變化以及網路設備運行狀態改變這一個事實,提出了一套基於網路流量和網路設備運行狀態異常威脅評估方法,確定了5種威脅評估因素:網路流帶寬分佈、網路流數量分佈、網路流包數量分佈、網路設備cpu利用率、網路設備內存利用率,並採用模糊關系矩陣方法計算和分配這5種評估因素在評估函數中權重。
  7. Locksley used this mouse model to show that the same immune process that occurs in response to a worm bite in the intestines also takes place following exposure to an allergen in the lungs

    洛克斯利運用該小鼠模型表現出在腸道內咬后反應中發生同免疫過程,在隨后肺中接觸該變應原也發生相同情況。
  8. Preious studies hae shown that a reduction in insulin - like signaling in the neurons extends the lifespan in the worm, caenorhabditis elegans, and the fruit fly, drosophila melanogaster

    之前已經有研究證實,減少神經元中胰島素信號可以延長、新桿狀線、果蠅及黑腹果蠅壽命。
分享友人