• 弓形虫速殖子腹腔攻击感染小鼠观察小鼠的生存时间

    All mice were challenged with highly virulent tachyzoites to observe the survival time.

    youdao

  • 目的探讨紫外线减毒血吸虫尾蚴免疫宿主皮肤组织在抗攻击感染中的作用

    AIM: to explore the role of the skin tissue from the host immunized with UV-attenuated schistosome cercariae against the challenge infection.

    youdao

  • 目的研究毛虫小鼠先天性传播观察母鼠抗旋毛虫抗体攻击感染保护作用

    Objective to study congenital transmission of Trichinella spiralis in mice and observe the protection of anti-Trichinella antibodies from the infected DAMS to challenge infection.

    youdao

  • 结论:提示皮肤组织细胞免疫反应血吸虫减毒尾蚴免疫的宿主抗攻击感染保护性免疫重要作用

    CONCLUSION: Cellular immune response in the skin of the mice immunized with UV-attenuated cercariae might play an important role in the protective immunity against challenge infection.

    youdao

  • 研究人员研究集中检测主要组织相容性复合物(MHC)上,结合特定抗原决定簇并且它触发免疫系统攻击感染细胞钥匙

    The researchers focused their testing on the Major Histocompatibility Complex (MHC), which binds to certain epitopes and is key to triggering the immune system to attack a virus-infected cell.

    youdao

  • 抗原加福氏佐剂分别免疫小鼠,以日本血吸虫大陆尾蚴攻击感染相似26~32%),表明两种抗原存在一定程度的交叉免疫保护性。

    The worm reduction rate after challenging with mainland strain cercariae in mice immunized with rSj26 was 26~32%, similar to that in mice immunized with 24-26 kDa antigen.

    youdao

  • 一旦找到正确密码,它感染下一台电脑加入攻击行列中

    Once it finds the right password, it infects the next computer, which joins the attacking ranks.

    youdao

  • 自体免疫疾病身体(免疫系统)对抗感染转而攻击身体一部分而产生的。

    An autoimmune disease results when the body's system for fighting infection (the immune system) turns against a part of the body.

    youdao

  • 他们的打算通过训练病人免疫系统识别活跃巨细胞病毒感染特征来达到促使免疫系统攻击肿瘤的目的。

    Their intention was to encourage those patient's immune systems to attack the tumours by training them to recognise the signs of active cytomegalovirus infection.

    youdao

  • 僵尸网络通常恶意软件感染数千个僵尸机器组成,这些机器被主机远程控制执行一系列表面上看无迹可循攻击

    Botnets generally comprise thousands of malware-infected zombie computers that are controlled remotely by a host to carry out a wide array of seemingly untraceable attacks.

    youdao

  • 攻击大多数基于web攻击类似,均为哄骗不知情用户访问感染的恶意网站被非法操纵合法网站。

    The attack begins like most Web-based infections: an unsuspecting user visits an infected Website — either a malicious or rigged legitimate one.

    youdao

  • 查明这些袭击罪犯几乎是不可能的,因为网络攻击通常通过多层感染计算机进入掩盖其发起源头

    Identifying the culprits in such attacks can be next to impossible, because computer attacks are typically routed through multiple layers of infected computers to disguise the source.

    youdao

  • 病毒攻击某种帮助我们抵御感染血液白细胞,从而导致免疫缺失

    The virus causes an immune deficiency by attacking a type of white blood cell that helps to fight infections.

    youdao

  • 我们大多数在冬天会花费很少时间晒太阳方法使我们摆脱维生素d缺乏症,使我们一些感染攻击

    Most of us spend less time in the sun during the winter, and that means we can end up vitamin d-deficient, leaving us vulnerable to any number of infections.

    youdao

  • 某人接种了疫苗受到病毒感染免疫系统就会产生抗体主要攻击病毒表面被称为红血球凝聚素蛋白质

    When someone is vaccinated or infected, the immune system makes antibodies that mostly attack a protein on the surface of the virus called hemagglutinin.

    youdao

  • 克拉克他的同事正在研究云服务如何用于构建僵尸网络的。僵尸网络是由网络攻击控制感染计算机网络。

    Now Clark and colleagues have investigated how the cloud could be used to build a botnet, a network of infected computers under an attacker's control.

    youdao

  • 因此攻击活动源于美国重要原因许多美国电脑感染恶意病毒,并因此成为了僵尸网络一部分

    The important thing about the attacks coming from the U.S. is that a lot of American's computers are infected with malware, thus part of some botnet.

    youdao

  • 用户需要点击下载任何东西单单浏览感染网站就可以受到攻击

    Users do not have to click or download anything to become infected, merely visiting an infected website is sufficient.

    youdao

  • 序列单位可被感染细胞蛋白质翻译结构迅速读取。所有病毒区域都有相同的序列也可以同一种药攻击

    All strains of rhinovirus have much the same sequence of units at this region and all could be vulnerable to the same drug.

    youdao

  • 安全专家还发现攻击已经诱骗了大约90,000个潜在用户登录他们网站成功感染6,400个用户。

    Finjan found the attackers had lured about 90,000 potential victims to their sites, and successfully infected about 6,400 of them.

    youdao

  • 类型攻击使用系统可能多种方式破坏受到蠕虫病毒感染

    Systems used in this type of attack can be compromised in any number of ways and infected with a worm or virus.

    youdao

  • 接下来,感染病毒电脑起来形成僵尸网络”,外部控制。“僵尸网络”用来发送垃圾邮件或者发动能使网站瘫痪的洪水攻击

    Compromised machines can then be linked up to form "botnets" under external control, which are used to send spam e-mails or disable websites with a flood of bogus requests.

    youdao

  • 三菱重工证实,此次网络攻击事件,共导致45服务器38电脑至少八个电脑病毒感染

    MHI confirmed that 45 of its servers and 38 computers were infected by at least eight viruses.

    youdao

  • 网站感染PD F文件Flash影片进而能够攻击受害者电脑

    Infected PDF documents and Flash films on the site attack the victim's PC.

    youdao

  • 以网站以及社会网络为基础攻击将会增多引起更多感染

    As well as the social network site-based attacks will increase, causing more infections.

    youdao

  • 以网站以及社会网络为基础攻击将会增多引起更多感染

    As well as the social network site-based attacks will increase, causing more infections.

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定