按序檢測 的英文怎麼說

中文拼音 [ànjiǎn]
按序檢測 英文
sequential testing
  • : Ⅰ動詞1 (用手或手指壓) press; push down 2 (壓住; 擱下) leave aside; shelve 3 (抑制) restrain...
  • : Ⅰ動詞1 (查) check up; inspect; examine 2 (約束; 檢點) restrain oneself; be careful in one s c...
  • : 動詞1. (測量) survey; fathom; measure 2. (測度; 推測) conjecture; infer
  • 檢測 : check; detection; test; gauging; detecting; sensing; [工業] checkout; measuring
  1. The essence of edid is to set up a normal behavior fuzzy sub collection a on the basis of watching the normal system transfer of the privilege process, and set up a fuzzy sub collection b with real time transfer array, then detect with the principle of minimum distance in fuzzy discern method the innovation point of this paper is : put forward the method of edid, can not only reduce efficiently false positive rate and false negative rate, also make real time intrusion detection to become possibility ; have independent and complete character database, according to the classification of monitoring program, design normal behavior and anomaly behavior etc., have raised the strongness of ids ; use tree type structure to preservation the character database, have saved greatly stock space ; in detection invade, carry out frequency prior principle, prior analysis and handling the behavior feature of high frequency in information table, have raised efficiency and the speed of detection, make real time intrusion detection to become possibility ; have at the same time realized anomaly intrusion detection and misuse intrusion detection, have remedied deficiency of unitary detection method

    這種方法的實質是在監控特權進程的正常系統調用基礎上建立正常行為模糊子集a ,用到的實時調用列建立模糊子集b ,然後用模糊識別方法中的最小距離原則進行。本文的創新點是:通過對特權進程的系統調用及參數列的研究,提出了基於euclidean距離的入侵方法edid ,不僅能有效降低漏報率和誤報率,而且使實時入侵成為可能;設計有獨立而完整的特徵數據庫,根據被監控程的類別,分別設計正常行為、異常行為等,提高了系統的強健性和可伸縮性;特徵數據庫樹型結構存儲,大大節省了存儲空間;在入侵時,實行頻度優先原則,優先分析和處理信息表中的高頻度行為特徵,提高的速度和效率,使實時入侵成為可能;同時實現了異常入侵和誤用入侵,彌補了單一方法的不足。
  2. All inspection equipment is identified and calibrated. all inspections are conducted with calibrated equipments. all non destructive tests are conducted in accordance with written procedures

    所有的設備都經過嚴格鑒定和校準。用校準過的設備進行驗操作。所有非破壞性試均照書面程進行。
  3. Gamma knife lack of physiological experiment used in operations or electric stimulation check. so before curing it should be strictly examined by order of procedure as medical history collection, resonance scanning of magnetism, image video synchronization monitor electroencephalogram and ect comprehensive check to cautiously confirm the epilepsy and choose the right target

    伽瑪刀缺乏術中電生理驗證或電刺激查,因此,治療前更應嚴格進行診斷查,如病史採集,磁共振掃描視頻同步監腦電圖及ect等綜合查,謹慎地確定致癇灶和選擇合適的治療靶點。
  4. The paper accounts the importance and the necessity of the forecasting research to the stock return volatility of our country, and the use in practice of the forecasting about the stock return volatility, firstly, stock market of our country is divided into large scale stock 、 middle scale stock and small scale stock on the basis of stock size. secondly, according to the basic method of the mathematical statistics , the behavior of the return volatility about single stock is described by using the model of the rolling variance estimates 。 through the relation of daily returns volatility and weekly returns volatility and the forecasting accuracy of the volatility forecasting model to various stock scale , we do practical analysis with the forecasting research to return volatility of single stock market

    在個股收益波動性的可預性研究方面,首先市值規模大小將我國股票分為大盤股、中盤股和小盤股,然後利用數理統計的基本方法,用滾動樣本方差估計模型描述個股市場收益波動性的行為,並對三種股票日收益率列及周收益率列波動之間的關系以及波動預模型對各種股盤的預準確性進行了實證分析和結果驗。
  5. The protector makes the over - current value, zero - phase - sequence component, negative - phase - sequence and so on as protection criterions, in protection theory ; it makes atmel 8 - bit microprocessor at89c55wd as the core, with which the lattice lcd is linked, in hardware

    該保護裝置在保護理論上,以過電流幅值、零電流為判據;在硬體實現上,以atmel單片機at89c55為核心,外接圖形點陣式液晶顯示器、觸摸式鍵等外設。
  6. The main results in this paper as follows : first, a prototype of a shape - based image database retrieval system is completed, it can receive the query mode both by giving an example image and by sketching the desired object on the screen, second, five shape - based image retrieval methods are realized ; third, an algorithm based on triangulation for shape - based image retrieval is brought forward. in this algorithm, firstly, the edge of the original image is followed and the candidate corners in the original image are detected. then the counterpoints of the candidate corners in the result of edge follow are found, and the boundary corners whose counterpoints have been found are queued in the order of their counterpoints in edge follow

    同時本文中主要完成了以下三方面的工作:完成了一個基於形狀特徵的圖象索的原型系統,可實現例子圖象或徒手繪草圖兩種查詢方式;實現了五種利用形狀特徵進行圖象索的具體方法,並對其進行了分析比較;並且在繼承將三角剖分引入形狀索的思想基礎上提出了利用三角剖分進行形狀索的一種新演算法:先對原圖象進行邊界跟蹤和角點;然後尋找初始角點在邊界跟蹤中的對應點,並對找到對應點的角點其對應點在邊界跟蹤中的順進行排;再對排后的角點進行德洛內三角剖分,得到能表示目標真實形狀的三角形列;最後計算三角形列的角度直方圖作為形狀特徵,並進行相似性匹配。
  7. Research about the deadlock detection method experienced a long time. ac - cording to the resource requirement types of the processes, the distributed computa - tion models can be divided into single resource model, and model, or model and and - or model. generalization of these models is stronger gradually and the dead - lock topologies of these models are single cycle, cycle and knot respectively

    對分散式死鎖演算法的研究由來已久,根據進程對資源的需求條件不同,分散式計算可以被分為單資源模型、 and模型、 or模型以及and - or模型,這些模型的通用性逐漸增強,它們在系統等待圖中所產生的死鎖拓撲結構相應地表示單環、多環和結(后兩種模型都為結) ,學者們對各種演算法的研究過程也是著這個拓撲結構的順展開的。
  8. Gene chips is high density probe array which is composed of nucleic acid or nucleic acid band arranged on the solid support media according to the definite order. it can detect unknown molecule by nucleic acid hybridize principle

    基因晶元是將核酸或核酸片段照一定的順排列在固相支持物上構成高密度探針陣列,利用核酸雜交原理未知分子。
  9. The most common place for a bug to occur in a test on a gui program is in the last step : checking that the state of the program was modified as intended

    試gui程的過程中,錯誤最常發生的地方是在最後一步:查狀態是否已經意願被修改。
  10. Methods : the quality inspection and analysis of hands of doctors and nurses, air environment in central blood hank of zhoushan city were carried out

    方法:嚴格照衛生部頒發的《消毒技術規范》操作程采血人員的手和空氣的衛生學質量,並統計相關數據。
  11. The detection methods, load procedure and selecting the sample of material, etc. all be done by the request of the " test on the building structure " strictly

    本試驗的方法、加載程以及試件材料的取樣等工作都嚴格照《建築結構試驗》 2的要求進行。
  12. Generally speaking, we may do it according to such a procedure as first detection of the electric circuit connection quality, next detection of the sensor and the actuator, and final detection of the electrically controlled unit

    一般來說,我們都可以照首先電路連接質量,其次傳感器、執行器,最後電控單元這樣的程來操作。但是,由於汽車故障具有突發性、綜合性、差異性等特點。
  13. If the ability to " brain scan " individuals expands from the million or so currently under scrutiny to include all inhabitants of the planet ( as per the echelon surveillance system which already monitors all private / commercial telecommunications ) then no - one will ever be able to even think about expressing an opinion contrary to those forced on us by the new world order

    如果「腦掃描」個人的能力擴張到數兆或如此多現在正被詳細查的,包括所有的地球上的居民(照梯形監系統,它已經監所有私人商業電信) ,接著沒有一個將永遠能永久的思考關于壓榨一個意見相反的到那些通過新世界的秩強加於我們。
  14. We rank stocks and make portfolios according to various kinds of risk factors from 1997 to 2002, and test in method of cross - sectional regression. we find that # and stock and portfolio returns lack significant relation, on the contrary, two easily measured variable, market equity and book - to - market equity, combine to capture the cross - sectional variation in stock returns. this conclusion proves that the size effect and value effect exist in shanghai stock market during the research period of this thesis

    通過將1997年到2002年股票收益率數據各種風險因素進行排、分組的討論,以及橫截面回歸的驗,本文發現與股票組合收益之間缺乏顯著的相關性,相反流通市值和賬面市值比這兩個易於度的變量一起捕捉了股票收益橫截面的變化,這一結論說明上海股市在本文的研究期間內存在規模效應和價值效應。
  15. Profile guided optimization from the shortcut menu, and then click run instrumented application

    在快捷菜單中單擊「配置優化」 ,然後單擊「運行應用程」 。
  16. Click profile guided optimization from the shortcut menu, and then click run instrumented application

    在快捷菜單中單擊「配置優化」 ,然後單擊「運行應用程」 。
  17. Note that you can also launch the instrumented application using the start or start without debugging from the debug menu as normal

    請注意,也可以正常方式,使用「調試」菜單中的「開始」或「開始執行(不調試) 」啟動應用程
  18. Upon completion of the inspection / maintenance, reassemble the bonnet and control group to the body in the reverse order to that shown above

    在完成、維護以後,照上述相反的順將閥帽和控制組件重新裝配到閥體上。
  19. The conventional single user detector matches the spread - spectrum codes for each user completely according to the classic theory of directe - sequences spread - spectrum ( ds - ss ) theory, so its ability to resist mai is poor

    傳統的單用戶技術完全照經典直接列擴頻理論對每個用戶的信號分別進行擴頻碼匹配處理,因而抗mai能力較差。
  20. It is important in theory and applications to study the detection and segmentation of object identifying character image in video sequence, which is used in content segmentation of image sequence, high efficient representation, transportation, storage and interactive control, image content searching, recognition and tracking, security barrier of communication network and information etc. in this thesis, is studied the segmentation and recognition of mobile identifying character image in video sequence

    列圖像標識文本的與分割技術的研究具有重要的理論和實際意義。比如,在圖像列的內容分割、高效表徵方面;圖像信號的高效傳輸、存儲與內容的互動式控制;特定內容的搜索、識別與跟蹤、以及信息內容建立對信息和通信網路的安全屏障等。這里著重研究車流視頻圖像標識文本的分割與識別技術。
分享友人