ABA和SA主要参与调控基础防御的核心基因和滞后特异性防御基因。
ABA and sa regulate core genes of basal resistance and lagging specific resistance genes.
如果正在攻击你的怪的武器技能比你的基础防御技能高15点以上,那么将有一定几率发生碾压。
When the attacking mob has more than 15 points of weapon skill above the player's current base defense there is a chance of being struck by a crushing blow.
综合表达特性检测结果,推测棉花对黄萎病的抗性存在两个防御时期,瞬时基础防御和滞后特异性防御。
Combined the result of the expression, we predict that there are two stages of the resistance of cotton to Verticillium wilt: transient basal resistance and lagging specific resistance.
空中拳击手是完美的装甲部队随从,并且经常在指挥官还没能建造更重型的对空炮时充当临时的基础防御部队。
The sky boxer is an excellent companion to mobile armor and is often used as a temporary base defense when a commander has not been able to build the heavier flak cannon.
产业和竞争对手以事实,过去和现在的数据作为基础分析得出了好的应对措施和防御性假设方案。
Base each of these models on facts, past and present performance data, industry and competitor analyses and a series of well-thought-out, defendable assumptions.
应在公司用于检测漏洞和保护s OA基础结构的业务策略中包含用于目标和攻击者之间的多个SOA的深度防御模型。
A defense in depth model with multiple SOAs between the target and the adversary should be part of a company's business strategy for detecting vulnerability and protecting SOA infrastructure.
随后,他把精力投入到基础设施和防御工事的建造上。
He then invested in infrastructure and built massive fortifications.
此深度防御模型使用以下示例作为技术基础
This defense-in-depth model begins with technologies as the foundation using the following examples
尽管技术让攻击变得更具破坏性,让防御变得更为复杂,但安全的基础仍像以往一样重要。
Although technology has made the attack more disruptive and more sophisticated, the security base is still as important as ever.
通过对智慧城市架构的全面把握,建立基础设施层、运营管理层、解决方案层全面的数据防御体系。
Through a comprehensive grasp of the wisdom of the city architecture, the establishment of the infrastructure layer, operations management, solution layer comprehensive data defense system.
基于MIX匿名系统模型,提出一种改进的统计命中集攻击算法,并在该算法的基础上给出基于填充包的防御策略。
This paper proposes an improved Statistical Hitting Set attack (SHS-attack) based on MIX anonymity technique and a defence strategy based on dummy packets to counter against this attack.
你学习在防御中生活,保护自己免受伤害,并重获所失去的,在重获的基础上于是你的提升得以实现。
One learns to live in the defensive, protecting oneself from harm, retrieving what has been lost on a recurring basis so that one's ascent does not fail to come forth.
就植物对病原的防御反应,植物-病原互作模式和植物抗病性的遗传基础进行了概述。
Plant defense responses against pathogens, plant-pathogen interaction model and genetic basis of plant disease resistance were summarized.
以排队论为基础,建立了同类防空武器多层防御的射击效能的计算模型。
The shooting effectiveness model of multiplayer defense of the same type air-defense weapons is established based on queue theory.
在近年来气候变暖的基础上,分析探讨霜冻的气候变化特征,对提高当地霜冻灾害的预测和防御能力有着十分重要的意义。
On the basis of global warming, it was significance to predict and prevent local frost through analyzing the characteristics of frost climatic variation.
以排队论为基础,建立了不同类型防空武器多层防御的射击效能的计算模型。
The shooting effectiveness model of multiplayer defense of the different air-defense weapons, based on queue theory, is established.
在危险性评价的基础之上,建立灾害预测预报和监测系统,进而应逐步建立和完善城市地质灾害防御系统。
Based on the risk assessment, we should set up hazard forecasting and monitoring system and set up and perfected the geologic hazard preventing system.
远程对空观察是水面舰艇编队对空防御的前提,是编队完成作战任务的基础,在编队防御作战中起着非常重要的作用。
Long-distance air observation is the premise of warship formation's aerial defense, and it is the base for warship formation to accomplish campaign assignment.
我推测基础命中率是基于等级差异和技能差异(武器技能对目标的防御技能)。
I presume that your base chance to hit something is based on level difference and skill difference (weapon skill versus target defense skill).
以排队论为基础,建立了不同类型防空武器多层防御射击效能的计算模型。
The shooting effectiveness model of multilayer defense system formed by different type of air-defense weapons is established based on queue theory.
在此基础上结合神经网络理论,建立了基于免疫和神经网络综合评判的智能评判网络防御效果仿真模型,根据该模型可以对网元的网络防御效果进行定性化计算研究。
The simulation model of network defense effect evaluated by intelligence, which is comprehensive evaluated by combining the theories of immunity and neural networks, is modeled based on the tactic.
在此基础上,我们再补充“日志”功能和“ARP主动防御”功能,ARP攻击也可以被完美的解决。
On this foundation, we are again compensatory "log" function and "ARP active defence" function, ARP attack is OK also by perfect settlement.
文章在分析ARP协议工作原理、安全缺陷、攻击原理和攻击方式的基础上,详细论述了基于ARP协议攻击的防御方法。
This paper gives a general analysis of the working principle of the ARP, the security vulnerabilities of the ARP, the way of the attack and the protecting method.
其次,对系统所处于的防御体系结构进行合理的设计,这部分是建立检测系统的基础。
The next in order, proceed the reasonable design to the system a defense for being placed in system construction.
并在电子政务安全防御体系层次的基础上提出电子政务网络安全的基本解决方案。
Based on security defence framework of E-government, it puts forward basic solution of the problem.
在总结现有安全机制的基础上,提出了一种具有攻击防御、攻击探测和攻击反应能力的移动自组网络安全架构。
Then a secure architecture was given, which includes secure wireless ad hoc routing, secure packet for-warding and secure data link layer.
本文论述了陕西的崩塌灾害,并根据陕西的地质地貌特征和地质灾害防御实践,对区内的崩塌进行了分类,在此基础上分析总结了陕西崩塌灾害的时空分布特征。
Based on geological features and disaster mitigation practice of Shaanxi, this paper expounded its collapse hazards and types and analyzed its distribution features of time and space.
本文论述了陕西的崩塌灾害,并根据陕西的地质地貌特征和地质灾害防御实践,对区内的崩塌进行了分类,在此基础上分析总结了陕西崩塌灾害的时空分布特征。
Based on geological features and disaster mitigation practice of Shaanxi, this paper expounded its collapse hazards and types and analyzed its distribution features of time and space.
应用推荐