隱性抗體 的英文怎麼說

中文拼音 [yǐnxìngkàng]
隱性抗體 英文
inapparent antibody
  • : Ⅰ動詞(隱瞞; 隱藏) hide; conceal Ⅱ形容詞1 (隱藏不露) hidden from view; concealed 2 (潛伏的; ...
  • : Ⅰ名詞1 (性格) nature; character; disposition 2 (性能; 性質) property; quality 3 (性別) sex ...
  • : Ⅰ動詞1 (抵抗; 抵擋) resist; combat; fight 2 (拒絕; 抗拒) refuse; defy 3 (對等) contend with...
  • : 體構詞成分。
  • 隱性 : 1 [語言學] covert gender2 [遺傳學] recessivity; recessiveness隱性詞 opaque word; 隱性基因 recessi...
  1. The article points out the importance and necessity of the information - security from its actuality in our country. the resources in the information system, for instance, hardware, software, data, document, operator, meterial and so on, are evaluated and gived safety grade firstly. and then, it analyses the menace including the nonauthorized access, the information leak, the refused sevice, the internal objection which the system will take. the following are the corresponding control police : confirm the users " rights and duties, including the mode of using account, the limit of accessing resource, the application of password, the building of backup ; confirm the administrators " right and duties, including physical safety, system configuration, account configuration and usufruct, password management, audit and control, backup and individual intimity ; run - of - mill measure of security defence, including access control, symbol and identification, integrality control, password technique, firewall system, audit and resumption, safety of operating system, safety of database system, defence of computers " virus and resisting - deny protocol. in the end, the article offers the strategies of disposing the safety - accident and analyse after ithow. to report it, how to solve it in phase, and how to avoid it happening again. in a word, the article presents a holistic resolvent about keeping away the information system ' s security, and supplies a essential frame for its configuration, management and application

    然後,對系統可能受到的威脅,包括非授權訪問、信息泄漏、拒絕服務和內部缺陷等進行分析,並提出了相應的控制策略:確定用戶的權力和責任,包括帳戶使用方式、資源訪問權限、口令應用以及建立備份等;確定系統管理員的權力和責任,包括物理安全、系統配置、帳戶設置及使用權限、口令管理、審計和監控、備份以及個人私等方面;一般的安全防護措施:存取控制、標識和認證、完整控制、密碼技術、防火墻系統、審計和恢復、操作系統安全、數據庫系統安全、計算機病毒防護和抵賴協議等。最後,對事故處理和事後分析提供策略,如何報告安全事故,如何協調解決安全事故,如何避免安全事故再次發生。總之,本文對信息系統安全防範工作給出一個整的解決方案,為其在配置、管理和應用方面提供了基本的框架。
  2. All f1 seedlings showed wild - type salt - sensibility, and two of four mutants were detected that the proportion of the salt - tolerance seedlings to salt - sensibility seedlings was 1 : 3 in f2 progenys. the results of genetic analysis suggested that this mutants have a monogenic recessive mutation in a nuclear gene

    F _ 1代白花授粉所得的f _ 2代中,兩個株系鹽植株與不鹽植株的比例為1 : 3 ,表明該突變單基因突變
  3. We obtain two recessive monogenic salt - tolerance mutants from co60 - - mutagenized arabidopsis thaliana m2 populations. the effect of nacl on the structure of vegetative organa in arabidopsis thaliana was further studied and through a rapd analysis on salt - tolerance mutants of arabidopsis thaliana, a 1200bp dna fragment probably related to the salt - tolerance gene was get

    本實驗以模式植物擬南芥( arabidopsisthaliana )為材料獲得了單基因鹽突變,並研究了不同濃度的nacl脅迫對擬南芥營養器官結構的影響,進而通過對突變的rapd分析,獲得了一個與植物有關的1200bp大小的基因片段。
  4. Security, too, is a key issue for switching the traditional private nforork to vpn. security of mpls wn architectur is analyzed thorouguy in this thesis, including septheion of address space and route, hiding of the mpls core smicture, resistance of attacks, impossibi1ity of 1abe1 spoofing

    安全是虛擬專用網能否取代傳統專用網的關鍵,本文對mplsvpn系結構的安全進行了深入分析,包括地址空間和路由的隔離、藏mpls核心結構、抵攻擊、抵標記欺騙等,從而得出mplsvpn與atm framerelay具有相同安全級別的結論。
  5. The results from sds - page presented that there were three female specific protein subunits with molecular weights of 123 kd, 120 kd and 91 kd, respectively. we can conclude the higher molecular compose of two subunits ; the results from two dimension electrophoresis showed the isoelectric points of two female - specific spots with molecular weight of about 120kd were 5. 5 and 5. 7. immunodiffusion reactions demonstrated that vg existed both in female fat body and hemolymph, which as vn was deposited in the ovary, while not in the male

    Page電泳結果表明:麗蠅蛹集金小蜂明顯存在2條雌特異帶-卵黃蛋白,分子量分別為181kd和136kd ; sds - page電泳分析:存在3條雌特異帶,其分子量為123kd 、 120kd和91kd ,由此,可推定卵黃原蛋白( vitellogenin , vg )和卵黃磷蛋白( vitellin , vn )由2個蛋白組成,其中分子量較大的蛋白由2個亞基組成;雙向電泳結果顯示,在120kd附近有兩個特異點,其等電點為5 . 5和5 . 7 ;雙擴散表明,麗蠅蛹集金小蜂卵黃磷蛋白的血清與雌成蟲蟲、脂肪、血淋巴和卵巢勻漿液均有免疫沉澱反應,而與雄蜂血淋巴無免疫反應,說明了vg與vn具有免疫同源,是雌特異蛋白,且由脂肪合成。
  6. Being lack of systematic research on legislation of public opinion supervision in the law field, this paper, relatively thoroughly expounds the legal warranty and realistic basis of the law of public opinion supervision by applying means of the basic theories of marxism. after having surveyed systematically on the relevant historical and current situation and experience of public opinion supervision legislation at home and abroad, the writer also puts forward his own viewpoints related to several theoretical problems such as the legal status of public opinion supervision law which connects tightly with our state ' s public opinion supervision legislation, the defecnce rights of the media and the secret interview of the media

    鑒於法學界對輿論監督立法的系統研究成果不多,筆者運用馬克思主義法學的基本觀點和基本方法,比較全面地闡述了我國《輿論監督法》的法理依據和現實基礎,並且在系統考察中西有關輿論監督立法的歷史現狀及其經驗與問題的基礎上,對與我國輿論監督立法密切相關的輿論監督法的法律地位、新聞媒辯權以及新聞媒采訪等幾個重要理論問題提出了自己的看法。
  7. Civil air defense alarm system was a system to dispense antiaircraft alarm sig - nal, hand hostile air attack informational communication to urbanite at wartime. it is a particular informational communication system of the civil air defense depart - ment, and can not be taken place. at the development trend of digitaliza - tion, unitization, integration of civil air defense communication, the civil air defense alarm system is developing too, for adaptation to the require of both future war and peaceful dual, and enhancing civil air defense communication system ' s directing automation. in recent years, development of different kinds of communication technology infuses new clearly energy into communication, especially spread spectrum communication, because of its strongly interference - free feature, invisibility best, realizable code division multiple access and antimultipath wane and so on merit, gets extensive use at wireless region ; the corresponding spread spectrum chips emerge as the times and get boom, which provides advantag e to realization of the circuit of spread spectrum communication. at the same time, in company with the advance of electronics level, the single chip microcomputer has a great development, world renowned chip manufacturer pushout respective products one after another, the kinds of which are too many to statiste

    在人防通信的數字化、一化、綜合化必然的發展趨勢下,人防警報系統也不斷發展,以適應未來戰爭和和平時期的雙重需要,提高人防通信系統指揮自動化。近年來,各種通信技術的發展給通信注入了活力,擴頻通信更因其干擾能力強、好、可實現碼分多址和多徑衰落等優點在無線領域得到了廣泛應用;其相應擴頻處理晶元應運而生並得到迅速發展,這為擴頻通信的電路實現提供便利。同時隨著微電子工藝水平的提高,單片微型計算機有了飛躍發展,世界上著名的集成電路晶元製造商紛紛推出各自的產品,單片機型號之多,已達到難以統計的地步。
  8. Fifty - three subjects had a positive test on initial elisa screening ; seven of them were confirmed as true positives. among these seven positive cases, only one had asymptomatic infection

    在五十三個初步測試呈陽反應的樣本當中;七個樣本最終確定有sars冠狀病毒存在,其中只有一個樣本是來自形病人。
  9. Territory - wide sars seroprevalence study suggests hong kong is not a human reservoir for sars coronavirus a territory - wide study by the centre for emerging infectious diseases ( ceid ) of the faculty of medicine, the chinese university of hong kong suggests that extremely few hong kong residents have asymptomatic sars infection

    香港中文大學醫學院防疫研究中心一項全港嚴重急呼吸系統綜合癥( sars )冠狀病毒研究顯示:只有極少數的香港市民是sars形病人,即曾受病毒感染,但沒有出現病徵。
  10. Because of the special nature of banking card transaction, the specific rights of the consumers are different from the average consumers, including the right to privacy, the right to information, consumer credit rights, the right to equal access to credit, the right to revoke contracts as well as the rights to defence in addition to the general rights

    由於銀行卡交易的特殊,其消費者的具權利較一般消費者也有所不同,除了一般的權利之外,還包括私權、知情權、消費信用權、平等獲得信貸權、合同撤銷權以及辯權等。
  11. The newcastle university researchers demonstrate in the first paper the procedure of coating the surface of a protein, such as an antibody, with an organic oil which is photocleavable, a process called “ cloaking ”

    紐卡斯爾大學的研究人員在第一篇論文中描述了包被蛋白程序的過程,如,用一種具有光裂的有機油包裹,這個過程叫做「匿」 。
分享友人