擬病毒 的英文怎麼說

中文拼音 [bìng]
擬病毒 英文
virusoid
  • : 動詞1. (設計; 起草) draw up; draft 2. (打算; 想要) intend; plan 3. (模仿) imitate
  • : Ⅰ名詞1 (疾病; 失去健康的狀態) illness; sickness; disease; malum; nosema; malady; morbus; vitium...
  • : Ⅰ名詞1 (對生物體有害的性質或物質; 毒物) poison; toxin 2 (毒品) drug; narcotics 3 (姓氏) a s...
  • 病毒 : [醫學] virus; inframicrobe (濾過性)
  1. However, only a few host factors with clear in vivo function have been identified. by using pcr and 5 " and 3 " race, we were able to clone a homologue ( named ttom1 ) of arabdopsis thaliania host factor gene, tom1, which supports the replication of tobacco mosaic virus

    根據從南芥中已經克隆的支持煙草花葉復制的基因tom1序列設計一對特異性引物,用rt - pcr的方法獲得番茄同源基因的部分序列,然後利用5 』 race與3 』 race方法從番茄中克隆出全長ttom1基因。
  2. Screening of mimicry peptide of japanese encephalitis virus e protein from phage 15 - mer peptide library

    從噬菌體15肽庫中篩選乙腦糖蛋白模
  3. Sabin believed that live vaccines, which can replicate somewhat but are too weak to trigger disease, best mimic the protection acquired through natural infection

    沙賓認為,活性不足以致、但仍可復制的活疫苗,最能夠模因自然感染所產生的保護作用。
  4. ( ) i1 t [ lo basi s of " that, we make systemic rosoarcl1 ( ) n l f1o s ( ) cllr i ty ilrct1 i t. cc 1. ljre, dcs i gn out the securi ty so. l ut io11 ; 1l1t ] s l. ci ) i n i, rilc t. i cc ( ) f. s1 ) t } ( t i ; l l network according to the security archi tec turc fr ; tn1e, wi1 icl1 silt i si ! y the need of confidentia1 ity, integri ty, avai 1 abi l i ty, authentj cat ion, authorization and accountable of specia1 network information system

    特別是,論文作者在網路安全系統建設的過程中,獨立承擔了中心子網防火墻、網路入侵檢測系統、防護體系的安裝及管理工作,在詳細了解了ddn鏈路加密、 pki ca體系的建設和使用原理的基礎上,參與了網路基礎設施的安裝調試以及各類服務器的配置管理,定了《計算機信息系統安全管理規定》 、 《網路ip地址規范》 ,為本單位網路安全建設規劃提出了意見和建議。
  5. The new algorithm is based on new developments in the understanding of the virology of hbv, the availability of more sensitive molecular diagnostic testing, and an examination of the advantages and disadvantages of currently approved therapies

    新演算法與數據結構根據是依據對hbv學,更精密檢驗方法,和對目前治療上出現的有利面和無利面總結上的最新了解所
  6. For example, to avoid getting into an infinite loop, and thereby hanging a system, an anti - virus system that uses an emulator ( or a sand box ) would have to determine when to terminate the analysis

    例如,為了避免進入一個無限循環從而掛起系統,一個使用模器(或沙箱)的反系統必須決定何時結束分析。
  7. Illuminated by human immune system, this paper presents a continuous learning model for intrusion defense that follows the principle of how bacterin stimulates the immune system to generate antibody. this model presents how to get the important “ bacterin ” to add to the database, which is used to do signature matching and anomaly detection, and thus protect system from unknown intrusion ( virus )

    受到疫苗和人體免疫系統工作方式的啟發,本文提出一種入侵預防系統模型,它模人體注射疫苗后免疫系統產生相應抗體抵抗抗原的機理:通過設置捕獲器捕獲最新的外部入侵並將其加入特徵庫,通過特徵匹配和異常檢測兩種方式檢測識別並將其隔離消除。
  8. Self - protocoled hepatitis detoxicative soup treating 168 cases of viral hepatitis

    肝炎解湯治療性肝炎168例
  9. The result indicated that the mimotopes could induce part crossed protection against h1n1. in conclusion, we acquired the cross - protective mimotopes of influenza virus a and explored a new way to reseach for the cross - protective epiptops

    通過以上實驗,篩選到具交叉免疫保護作用的甲型流感表位,為流感疫苗的研製提供了新的思路和有益的線索。
  10. The result indicated that we had selected the mimotopes of influenza virus a. 2

    提示陽性噬菌體遞呈膚可能為流感的模表位。
  11. The oral vaccine works because the ingestion of live virus mimics the natural process of infection, encouraging the production of antibodies in the gut

    口服疫苗能夠發揮效力是因為活在機體吞入后可模天然感染過程,同時刺激消化道產生抗體。
  12. The theory of protocol analysis is listed. by explaining the course of nimda virus evades computer and server, it shows the reason why protocol analysis can detect nimda virus. afterwards it lists the advantage that pattern match can " t have

    重點介紹了協議分析的工作原理,並以nimda為例分析了該檢測方法能夠檢測出這種攻擊的原因,並概括出其具有模式匹配無法比的優勢。
  13. Screening and identification of mimic epitopes of monoclonal antibodies against hantaan virus using phage display technique

    鑒定抗漢灘單克隆抗體的模表位
  14. By changing infection source and adjusting infecting rate and recovering rate, some good strategies of control the spreading of virus on complex network are proposed

    在中國教育網中對的傳播和控制進行了演化模,提出了在資源有限的條件下復雜網路控制傳播的有效策略。
  15. In this text the basic theories and the applied truss of the network monitor and control the system are discussed firstly, the inevitability is also analyzed about monitor and control network facing with the frequent safety threaten. then i research each safety aspect of network remote monitor and control system through academic study, engineering practice and a lot of simulation experiment. at the same time i research deeply and systemically in the popular virus problems and the dangerous hacker ' s attack

    本文討論了網路監控系統的基本理論和應用構架,分析了監控網路面臨經常的安全威脅的必然性,然後通過理論研究、工程實踐以及大量的模實驗,對網路遠程監控系統安全性問題的各個方面進行了廣泛的研究,對其中最常見的計算機問題以及最可能造成嚴重危害的黑客攻擊問題進行了深入系統的研究。
  16. And the quantity of iggl was much more than the one of igg2a in mice serum, so we deduced initially that the main type of immune reaction that the mimotopes induced was cell - mediated immune response

    而血清中針對流感的iggza含量明顯高於iggi ,初步推斷模表位引起的免疫反應是以thl引起的細胞免疫為主。
  17. This paper use ga to figure out the complicated scheduling problem ; the main research concentrates on the following several aspects : ( 1 ) by reading a great deal of documents of scheduling problem and ga, the issue that genetic algorithm being adaptive to solve scheduling problem is introduced ; ( 2 ) hybrid genetic algorithm is adopted to solve a multi - objective job scheduling problem on identical parallel machine and a multi - objective job scheduling problem on non identical parallel machine, and the feasibility and validity of the algorithm is approved by numeric experiment ; ( 3 ) based on the heuristic algorithm of maximizing customer ' s satisfaction for single machine, this issue is extended to parallel machine, and then bring forward a heuristic arithmetic and a virus infective hybrid genetic algorithm

    本文應用遺傳演算法求解復雜的生產調度問題;主要在以下幾個方面作了一些研究工作:通過大量閱讀各種生產調度和遺傳演算法的文獻,指出了遺傳演算法適合解決生產調度問題。採用混合遺傳演算法應用在求解多目標等同并行多機問題和多目標非等同并行多機問題,並通過模實驗證明演算法的可行性和有效性。在求解極大化顧客滿意數的單機問題的啟發式演算法的基礎上,將此問題擴展為多機問題,提出一種啟發式演算法和一種帶感染的混合遺傳演算法。
  18. The main works of this paper are presented as follows : ( 1 ) analyzed the research condition and the difficulty of multi - agent security research at present, and we gave the definition of security in a multi - agent system ; ( 2 ) analyzed and sampled involved immune mechanism, we constructed a immune agent and described its mental attribute by dfl ; ( 3 ) gave a communication form based on mental attribute ; ( 4 ) based on dfl, we proposed a diseriminating model among tias by taking into account the theories of dynamic immune network ; ( 5 ) based on the principle of clone selection, we gave a tia ’ s immune algorithm, and put forward single tia ’ s distinghuishing model and multi - tia ’ s distinghuishing model by taking this algorithm as foundation ; ( 6 ) the security model carried on an application in the detection of computer virus, for this purpose, we also developed a simple simulation program based on binary coding

    主要包括如下工作: ( 1 )分析了當前多agent安全的研究現狀及其面臨的困難,給出了多agent安全的需求和定義; ( 2 )分析和抽取了相關的免疫機制,構造了一種免疫agent ,並利用動態模糊邏輯對其非空心智狀態進行了描述; ( 3 )給出了agent之間基於心智屬性的通信方式; ( 4 )以動態免疫網路理論為基礎,結合動態模糊邏輯,給出了tia的狀態鑒別模型; ( 5 )給出了基於克隆選擇原理的tia免疫演算法,並在該演算法的基礎上提出了單tia非自體識別模型和多tia協商非自體識別模型; ( 6 )將該安全模式在計算機檢測中進行了應用,實現了一個簡單的基於二進制編碼的計算機檢測模系統。
  19. We use software that automatically downloads small pieces of data and performs calculations that model how drugs interact with various hiv virus mutations

    客戶端軟體將自動的下載小數據塊,並對其分子模型進行各種各樣的抗hiv變化的過程模
  20. We applied dummy special net, complex firewall and inbreak checking techniques into the network, applied inherent safety mechanism of system software, operating system, database and application software into the system, and applied norton anti - virus software into the application

    在網路層應用了虛專用網技術、復合型防火墻阻技術和入侵檢測技術;在系統層應用了基於系統軟體固有的安全機制、基於操作系統的安全機制、基於數據庫的安全機制和基於應用軟體的安全機制;在應用層採取防norton防軟體。
分享友人