用弓形虫速殖子腹腔攻击感染小鼠,观察小鼠的生存时间。
All mice were challenged with highly virulent tachyzoites to observe the survival time.
目的:探讨紫外线减毒血吸虫尾蚴免疫宿主的皮肤组织在抗攻击感染中的作用。
AIM: to explore the role of the skin tissue from the host immunized with UV-attenuated schistosome cercariae against the challenge infection.
目的研究旋毛虫在小鼠的先天性传播并观察母鼠抗旋毛虫抗体对攻击感染的保护作用。
Objective to study congenital transmission of Trichinella spiralis in mice and observe the protection of anti-Trichinella antibodies from the infected DAMS to challenge infection.
结论:提示皮肤组织的细胞免疫反应在血吸虫减毒尾蚴免疫的宿主抗攻击感染保护性免疫中起重要作用。
CONCLUSION: Cellular immune response in the skin of the mice immunized with UV-attenuated cercariae might play an important role in the protective immunity against challenge infection.
研究人员的研究集中在检测主要组织相容性复合物(MHC)上,它能结合特定的抗原决定簇并且它是触发免疫系统攻击感染细胞的钥匙。
The researchers focused their testing on the Major Histocompatibility Complex (MHC), which binds to certain epitopes and is key to triggering the immune system to attack a virus-infected cell.
若以两种抗原加福氏佐剂分别免疫小鼠,以日本血吸虫大陆株尾蚴攻击感染,减虫率相似(26~32%),表明两种抗原存在一定程度的交叉免疫保护性。
The worm reduction rate after challenging with mainland strain cercariae in mice immunized with rSj26 was 26~32%, similar to that in mice immunized with 24-26 kDa antigen.
一旦它找到正确的密码,它感染的下一台电脑即加入到攻击的行列中。
Once it finds the right password, it infects the next computer, which joins the attacking ranks.
自体免疫疾病是因身体(免疫系统)对抗感染时转而攻击身体的某一部分而产生的。
An autoimmune disease results when the body's system for fighting infection (the immune system) turns against a part of the body.
他们的打算是通过训练病人免疫系统来识别活跃的巨细胞病毒感染的特征来达到促使免疫系统攻击肿瘤的目的。
Their intention was to encourage those patient's immune systems to attack the tumours by training them to recognise the signs of active cytomegalovirus infection.
僵尸网络通常由恶意软件感染的数千个僵尸机器组成,这些机器被主机远程控制并执行一系列表面上看无迹可循的攻击。
Botnets generally comprise thousands of malware-infected zombie computers that are controlled remotely by a host to carry out a wide array of seemingly untraceable attacks.
该攻击和大多数基于web的攻击类似,均为哄骗不知情的用户访问受感染的恶意网站或被非法操纵的合法网站。
The attack begins like most Web-based infections: an unsuspecting user visits an infected Website — either a malicious or rigged legitimate one.
查明这些袭击的罪犯,几乎是不可能的,因为网络攻击通常会通过多层被感染的计算机进入,以掩盖其发起源头。
Identifying the culprits in such attacks can be next to impossible, because computer attacks are typically routed through multiple layers of infected computers to disguise the source.
病毒会攻击某种能帮助我们抵御感染的血液白细胞,从而导致免疫缺失。
The virus causes an immune deficiency by attacking a type of white blood cell that helps to fight infections.
我们大多数人在冬天会花费很少的时间晒太阳,这方法能使我们摆脱维生素d缺乏症,使我们易受一些感染的攻击。
Most of us spend less time in the sun during the winter, and that means we can end up vitamin d-deficient, leaving us vulnerable to any number of infections.
某人接种了疫苗或受到病毒感染后,其免疫系统就会产生抗体,主要攻击病毒表面被称为红血球凝聚素的蛋白质。
When someone is vaccinated or infected, the immune system makes antibodies that mostly attack a protein on the surface of the virus called hemagglutinin.
克拉克和他的同事正在研究云服务是如何用于构建僵尸网络的。僵尸网络是由网络攻击者控制的受感染计算机网络。
Now Clark and colleagues have investigated how the cloud could be used to build a botnet, a network of infected computers under an attacker's control.
因此,攻击活动源于美国的重要原因是许多美国人的电脑感染了恶意病毒,并因此成为了僵尸网络的一部分。
The important thing about the attacks coming from the U.S. is that a lot of American's computers are infected with malware, thus part of some botnet.
用户不需要去点击或下载任何东西,单单浏览受感染的网站就可以受到攻击。
Users do not have to click or download anything to become infected, merely visiting an infected website is sufficient.
其序列单位可被感染细胞的蛋白质翻译结构迅速读取。所有的鼻病毒在此区域都有相同的序列也可以被同一种药攻击。
All strains of rhinovirus have much the same sequence of units at this region and all could be vulnerable to the same drug.
安全专家还发现攻击者已经诱骗了大约90,000个潜在用户登录他们的网站,并成功感染了6,400个用户。
Finjan found the attackers had lured about 90,000 potential victims to their sites, and successfully infected about 6,400 of them.
此类型攻击中使用的系统可能以多种方式被破坏并受到蠕虫或病毒感染。
Systems used in this type of attack can be compromised in any number of ways and infected with a worm or virus.
接下来,感染病毒的电脑被连起来形成“僵尸网络”,并被外部控制。“僵尸网络”能被用来发送垃圾邮件或者发动能使网站瘫痪的洪水攻击。
Compromised machines can then be linked up to form "botnets" under external control, which are used to send spam e-mails or disable websites with a flood of bogus requests.
据三菱重工证实,此次网络攻击事件,共导致其45台服务器和38台电脑被至少八个电脑病毒感染。
MHI confirmed that 45 of its servers and 38 computers were infected by at least eight viruses.
网站上的受感染PD F文件和Flash影片进而能够攻击受害者的电脑。
Infected PDF documents and Flash films on the site attack the victim's PC.
以网站以及社会网络为基础的攻击将会增多,引起更多的感染。
As well as the social network site-based attacks will increase, causing more infections.
以网站以及社会网络为基础的攻击将会增多,引起更多的感染。
As well as the social network site-based attacks will increase, causing more infections.
应用推荐