擬病毒 的英文怎麼說
中文拼音 [nǐbìngdú]
擬病毒
英文
virusoid-
However, only a few host factors with clear in vivo function have been identified. by using pcr and 5 " and 3 " race, we were able to clone a homologue ( named ttom1 ) of arabdopsis thaliania host factor gene, tom1, which supports the replication of tobacco mosaic virus
根據從擬南芥中已經克隆的支持煙草花葉病毒復制的基因tom1序列設計一對特異性引物,用rt - pcr的方法獲得番茄同源基因的部分序列,然後利用5 』 race與3 』 race方法從番茄中克隆出全長ttom1基因。Screening of mimicry peptide of japanese encephalitis virus e protein from phage 15 - mer peptide library
從噬菌體15肽庫中篩選乙腦病毒糖蛋白模擬肽Sabin believed that live vaccines, which can replicate somewhat but are too weak to trigger disease, best mimic the protection acquired through natural infection
沙賓認為,活性不足以致病、但仍可復制的活病毒疫苗,最能夠模擬因自然感染所產生的保護作用。( ) i1 t [ lo basi s of " that, we make systemic rosoarcl1 ( ) n l f1o s ( ) cllr i ty ilrct1 i t. cc 1. ljre, dcs i gn out the securi ty so. l ut io11 ; 1l1t ] s l. ci ) i n i, rilc t. i cc ( ) f. s1 ) t } ( t i ; l l network according to the security archi tec turc fr ; tn1e, wi1 icl1 silt i si ! y the need of confidentia1 ity, integri ty, avai 1 abi l i ty, authentj cat ion, authorization and accountable of specia1 network information system
特別是,論文作者在網路安全系統建設的過程中,獨立承擔了中心子網防火墻、網路入侵檢測系統、病毒防護體系的安裝及管理工作,在詳細了解了ddn鏈路加密、 pki ca體系的建設和使用原理的基礎上,參與了網路基礎設施的安裝調試以及各類服務器的配置管理,擬定了《計算機信息系統安全管理規定》 、 《網路ip地址規范》 ,為本單位網路安全建設規劃提出了意見和建議。The new algorithm is based on new developments in the understanding of the virology of hbv, the availability of more sensitive molecular diagnostic testing, and an examination of the advantages and disadvantages of currently approved therapies
新演算法與數據結構根據是依據對hbv病毒在病毒學,更精密檢驗方法,和對目前治療上出現的有利面和無利面總結上的最新了解所擬定For example, to avoid getting into an infinite loop, and thereby hanging a system, an anti - virus system that uses an emulator ( or a sand box ) would have to determine when to terminate the analysis
例如,為了避免進入一個無限循環從而掛起系統,一個使用模擬器(或沙箱)的反病毒系統必須決定何時結束分析。Illuminated by human immune system, this paper presents a continuous learning model for intrusion defense that follows the principle of how bacterin stimulates the immune system to generate antibody. this model presents how to get the important “ bacterin ” to add to the database, which is used to do signature matching and anomaly detection, and thus protect system from unknown intrusion ( virus )
受到疫苗和人體免疫系統工作方式的啟發,本文提出一種入侵預防系統模型,它模擬人體注射疫苗后免疫系統產生相應抗體抵抗抗原的機理:通過設置捕獲器捕獲最新的外部入侵病毒並將其加入病毒特徵庫,通過特徵匹配和異常檢測兩種方式檢測識別病毒並將其隔離消除。Self - protocoled hepatitis detoxicative soup treating 168 cases of viral hepatitis
自擬肝炎解毒湯治療病毒性肝炎168例The result indicated that the mimotopes could induce part crossed protection against h1n1. in conclusion, we acquired the cross - protective mimotopes of influenza virus a and explored a new way to reseach for the cross - protective epiptops
通過以上實驗,篩選到具交叉免疫保護作用的甲型流感病毒模擬表位,為流感疫苗的研製提供了新的思路和有益的線索。The result indicated that we had selected the mimotopes of influenza virus a. 2
提示陽性噬菌體遞呈膚可能為流感病毒的模擬表位。The oral vaccine works because the ingestion of live virus mimics the natural process of infection, encouraging the production of antibodies in the gut
口服疫苗能夠發揮效力是因為活病毒在機體吞入后可模擬天然感染過程,同時刺激消化道產生抗體。The theory of protocol analysis is listed. by explaining the course of nimda virus evades computer and server, it shows the reason why protocol analysis can detect nimda virus. afterwards it lists the advantage that pattern match can " t have
重點介紹了協議分析的工作原理,並以nimda病毒為例分析了該檢測方法能夠檢測出這種攻擊的原因,並概括出其具有模式匹配無法比擬的優勢。Screening and identification of mimic epitopes of monoclonal antibodies against hantaan virus using phage display technique
鑒定抗漢灘病毒單克隆抗體的模擬表位By changing infection source and adjusting infecting rate and recovering rate, some good strategies of control the spreading of virus on complex network are proposed
在中國教育網中對病毒的傳播和控制進行了演化模擬,提出了在資源有限的條件下復雜網路控制病毒傳播的有效策略。In this text the basic theories and the applied truss of the network monitor and control the system are discussed firstly, the inevitability is also analyzed about monitor and control network facing with the frequent safety threaten. then i research each safety aspect of network remote monitor and control system through academic study, engineering practice and a lot of simulation experiment. at the same time i research deeply and systemically in the popular virus problems and the dangerous hacker ' s attack
本文討論了網路監控系統的基本理論和應用構架,分析了監控網路面臨經常的安全威脅的必然性,然後通過理論研究、工程實踐以及大量的模擬實驗,對網路遠程監控系統安全性問題的各個方面進行了廣泛的研究,對其中最常見的計算機病毒問題以及最可能造成嚴重危害的黑客攻擊問題進行了深入系統的研究。And the quantity of iggl was much more than the one of igg2a in mice serum, so we deduced initially that the main type of immune reaction that the mimotopes induced was cell - mediated immune response
而血清中針對流感病毒的iggza含量明顯高於iggi ,初步推斷模擬表位引起的免疫反應是以thl引起的細胞免疫為主。This paper use ga to figure out the complicated scheduling problem ; the main research concentrates on the following several aspects : ( 1 ) by reading a great deal of documents of scheduling problem and ga, the issue that genetic algorithm being adaptive to solve scheduling problem is introduced ; ( 2 ) hybrid genetic algorithm is adopted to solve a multi - objective job scheduling problem on identical parallel machine and a multi - objective job scheduling problem on non identical parallel machine, and the feasibility and validity of the algorithm is approved by numeric experiment ; ( 3 ) based on the heuristic algorithm of maximizing customer ' s satisfaction for single machine, this issue is extended to parallel machine, and then bring forward a heuristic arithmetic and a virus infective hybrid genetic algorithm
本文應用遺傳演算法求解復雜的生產調度問題;主要在以下幾個方面作了一些研究工作:通過大量閱讀各種生產調度和遺傳演算法的文獻,指出了遺傳演算法適合解決生產調度問題。採用混合遺傳演算法應用在求解多目標等同并行多機問題和多目標非等同并行多機問題,並通過模擬實驗證明演算法的可行性和有效性。在求解極大化顧客滿意數的單機問題的啟發式演算法的基礎上,將此問題擴展為多機問題,提出一種啟發式演算法和一種帶病毒感染的混合遺傳演算法。The main works of this paper are presented as follows : ( 1 ) analyzed the research condition and the difficulty of multi - agent security research at present, and we gave the definition of security in a multi - agent system ; ( 2 ) analyzed and sampled involved immune mechanism, we constructed a immune agent and described its mental attribute by dfl ; ( 3 ) gave a communication form based on mental attribute ; ( 4 ) based on dfl, we proposed a diseriminating model among tias by taking into account the theories of dynamic immune network ; ( 5 ) based on the principle of clone selection, we gave a tia ’ s immune algorithm, and put forward single tia ’ s distinghuishing model and multi - tia ’ s distinghuishing model by taking this algorithm as foundation ; ( 6 ) the security model carried on an application in the detection of computer virus, for this purpose, we also developed a simple simulation program based on binary coding
主要包括如下工作: ( 1 )分析了當前多agent安全的研究現狀及其面臨的困難,給出了多agent安全的需求和定義; ( 2 )分析和抽取了相關的免疫機制,構造了一種免疫agent ,並利用動態模糊邏輯對其非空心智狀態進行了描述; ( 3 )給出了agent之間基於心智屬性的通信方式; ( 4 )以動態免疫網路理論為基礎,結合動態模糊邏輯,給出了tia的狀態鑒別模型; ( 5 )給出了基於克隆選擇原理的tia免疫演算法,並在該演算法的基礎上提出了單tia非自體識別模型和多tia協商非自體識別模型; ( 6 )將該安全模式在計算機病毒檢測中進行了應用,實現了一個簡單的基於二進制編碼的計算機病毒檢測模擬系統。We use software that automatically downloads small pieces of data and performs calculations that model how drugs interact with various hiv virus mutations
客戶端軟體將自動的下載小數據塊,並對其分子模型進行各種各樣的抗hiv病毒變化的過程模擬。We applied dummy special net, complex firewall and inbreak checking techniques into the network, applied inherent safety mechanism of system software, operating system, database and application software into the system, and applied norton anti - virus software into the application
在網路層應用了虛擬專用網技術、復合型防火墻阻技術和入侵檢測技術;在系統層應用了基於系統軟體固有的安全機制、基於操作系統的安全機制、基於數據庫的安全機制和基於應用軟體的安全機制;在應用層採取防norton防病毒軟體。分享友人