核攻擊 的英文怎麼說

中文拼音 [gōng]
核攻擊 英文
nuclear attack
  • : 核構詞成分。
  • : Ⅰ動詞1 (攻打) attack; assault; take the offensive 2 (指責別人的過錯; 駁斥別人的議論) accuse; ...
  • 攻擊 : 1 (進攻) attack; assault; launch an offensive 2 (惡意指責) attack; accuse; charge; slander; v...
  1. Translocation from endocytic compartments to the cytosol is the essential and rate - limiting step in the intoxication process of most toxins such as ricin, diphtheria toxin, shiga toxin and pseudomonas exotoxin ( pe ). a number of these toxins are transported to trans - golgi network ( tgn ), and in many cases such transport to the tgn is required for the translocation and cytotoxicity. in deed, 5 % of the ricin endocytosed by cells has been shown to reach the tgn

    蓖麻毒素進入細胞的機理不甚明了,一般認為是rtb先與細胞膜受體結合,主要經過受體介導的內吞作用進入吞噬體,然後沿著內體、高爾基體、內質網等逆向分泌途徑,有序地運輸到內質網,最後從內質網轉位進入細胞漿,在胞漿內糖體,從而抑制蛋白質的合成,導致細胞死亡。
  2. Their outside individual nucleus cell is in week blood the leucocyte interferon that small amount produces only after virus is atttacked

    他們的外周血單個細胞在病毒后僅產生低量的白細胞干擾素。
  3. In the french air force, mirage 2000 fighters in operation are : mirage 2000c / b single seater and two seater for air defence ; mirage 2000n, two seater, designed for all weather nuclear penetration at low altitude and very high speed ; and mirage 2000d, which is an upgraded version of the mirage 2000n, for automated bombing using conventional and laser guided munitions ; e type for multi purpose exporting version ; r for single seat day / night eaporting version

    在法國空軍內,現役的幻影2000戰斗機為幻影2000c型單座戰斗機、 b型雙座戰斗教練機、幻影2000n雙座全天候低空高速核攻擊機以及其改進型d型常規精確制導武器機、幻影2000e多任務出口型、幻影2000r單座晝夜偵察出口型。
  4. The only maritime force in asia with submarine - launched ballistic missile ( slbm ) capability, china is configuring its naval force levels around two aircraft carrier groups, with several new inductions ranging from nuclear - powered " type 093 " attack submarines to stealth frigates

    擁有亞洲唯一具備用潛艇發射彈道導彈海上力量的中國,正設定其海軍實力要達到的水平是擁有兩個航母特混群,以及包括從動力的093型潛艇到隱身護衛艦在內的多艘新造艦艇。
  5. Intensity is the heart of iron palm and the raw energy behind its unrelenting attacks

    內力是鐵掌式及其無情的背後的元氣之心。
  6. Security, too, is a key issue for switching the traditional private nforork to vpn. security of mpls wn architectur is analyzed thorouguy in this thesis, including septheion of address space and route, hiding of the mpls core smicture, resistance of attacks, impossibi1ity of 1abe1 spoofing

    安全性是虛擬專用網能否取代傳統專用網的關鍵,本文對mplsvpn體系結構的安全性進行了深入分析,包括地址空間和路由的隔離、隱藏mpls心結構、抵抗、抵抗標記欺騙等,從而得出mplsvpn與atm framerelay具有相同安全級別的結論。
  7. But to prevent any israeli retaliation, an iranian attack would not only have to overcome israel ' s arrow air - defence missiles and destroy its airfields but also penetrate the silos of its nuclear - tipped jericho missiles

    為了防止以色列的報復,伊朗的不僅要摧毀以色列箭式防空導彈,還要能破壞他隱秘的彈發射井。
  8. The first of class, the seawolf ssn21, was ordered from the electric boat division of general dynamics, connecticut, in january 1989 and commissioned in july 1997

    「海狼」級潛艇代號為ssn21型,是美國海軍最先進的潛艇,也是二十一世紀世界上最先進的潛艇。
  9. More broadly, the free software movement saw the deal as an attack on one of its core tenets

    另外,免費軟體行動則將其視為對其心原則的
  10. U. s. navy nuclear - powered attack submarine, under heavy escort, has arrived back at its home port of guam after a fatal accident at sea

    美國舊金山號動力潛艇在發生致命事故以後,在嚴密的護航之下返回在關島的基地。
  11. A u. s. navy nuclear - powered attack submarine, under heavy escort, has arrived back at its home port of guam after a fatal accident at sea

    美國舊金山號動力潛艇在發生致命事故以後,在嚴密的護航之下返回在關島的基地。
  12. Being a widely utilized public ip platform, it is susceptible to security attacks of all nature, as outlined in the following areas : the open nature of the ip internet systems - increase of foreign attacks, for example dos / ddos attacks ; the current weakness of the existing operating system ' s internet protocol ; mainframe, and lack of an evaluation standard for back office systems, the inevitable problem of illegal internal access, the lack of guidelines for record keeping and post attack documentation processes, hi addition, still in existence, are managerial problems including the lack of securit y knowledge amongst the workforce and the inexistence of a complete set of security guidelines. to guarantee china telecom ' s 163 / 169 system ' s reliable functions, to protect the user ' s interests, at the same time, insuring quality service, it is necessary to adapt p2dr model as a solution to the current security issues. supported by the modern secure theory and made the secure implementation abundant project practices, this paper gives the general secure design for the chongqing public ip network using p2dr secure model

    中國電信建設的公眾ip網對我國internet的發展起著決定性作用,重慶電信163 / 169網際網路是國家骨幹網在本地的延伸,擁有7個心節點(採用cisco12012 、 2 * 2 . 5gdpt環) ,三十八個匯接節點,能提供寬帶,窄帶多種接入方式的公眾ip網,現擁有近20萬用戶,佔全市網際網路用戶四分之三以上,作為這樣一個擁有眾多用戶,開放的ip平臺,會受到各種各樣的安全威脅,主要表現在ip網路的開放性,來自外部的增多,如dos / ddos;所使用的操作系統運行的網路協議自身的脆弱性;主機、網路設備的配置是否缺乏評估手段;不可避免的內部非法訪問;缺乏必要的審計作為犯罪取證,出此之外,還有管理上的一些問題,如人員安全意識不強,安全制度不夠健全等多方面原因。
  13. If you are new to hacking the kernel, find lots of resources including an irc channel, a mailing list, and a wiki

    :如果您是一名內核攻擊新手,可以通過這里找到很多資源,包括irc通道郵件列表和wiki 。
  14. Thanks to the leaker of the oe code, sony has done several changes in the loadcore module ( the most important that oe / m33 patches ), and done some attacks against the oe / m33 core, such as the change of the nids that they use

    感謝oe源代碼的?漏者,新力已經在裝入系統心的模塊中做了幾處改變(這是對目前的自製系統最關鍵的部分) ,並且加入了對自製系統進行的部分,比如改變了他們所使用的調用。
  15. China ' s limited nuclear counterattack ability is entirely for deterrence against possible nuclear attacks by other countries

    中國保持有限的力量,是為了遏制他國對中國可能的核攻擊
  16. Then it explains packet validation mechanism, connection maintaince, and with taking the system platform into consideration, design and implement a improved - syncookie model. at last, we design several performance test cases. the test cases show that the high - speed filter can protect away from the syn flood attack effectively, at the same time it has been much more improved than traditional protect ways on the filtering and processing capacity

    該文首先對國內外拒絕服務威脅以及研究現狀進行分析描述;然後,從拒絕服務的方法分類、主要手段、常見的防禦及防範方法分析研究著手,提出了一種採用tcpproxy與待響應ack隊列相結合的能夠對tcp拒絕服務進行有效過濾的方法,並用這種方法在linux內中實現了一個高速過濾器,最後進行了相關的性能測試。
  17. Supporters of the star wars defence system hope that this would not only protect a nation war from ever happening

    支持建立星球大戰防禦系統的人希望這不僅能真正使一個國家免遭核攻擊,而且希望它足以成為防止戰爭的一種威懾力量。
  18. In one hour it will initiate a massive nuclear attack on its enemy

    一小時后,它就會向其敵人發動大規模核攻擊
  19. After all, the internet was a robust communications system ; it could, in theory, withstand a nuclear attack

    說到底,網際網路是一個強健的通信系統;它能,在理論上,承受一次核攻擊
  20. Supporters of the star wars defense system hope that this would not only protect a nation against an actual nuclear attack, but would be enough of a threat to keep a nuclear war from ever happening

    譯文:星球大戰防禦系統的支持者們希望它不僅能保護一個遭受核攻擊的國家,也希望它能成為使核攻擊永不發生的足夠威脅。
分享友人