採掘臺 的英文怎麼說

中文拼音 [cǎijuétái]
採掘臺 英文
stull
  • : 動詞(刨; 挖) dig
  • : 臺名詞(指臺州) short for taizhou (in zhejiang province)
  1. Aiming at the design requirements of shield tunnelling machine for simulator test rig, hydraulic systems of shield were designed and manufactured by applying electro - hydraulic proportional control technology, which included thrust hydraulic system, screw conveyor hydraulic system and cutting wheel drive hydraulic system

    摘要針對盾構進機模擬試驗的設計要求,用電液比例控制技術設計製造了盾構進機液壓系統,包括推進液壓系統,螺旋輸送機液壓系統以及刀盤驅動液壓系統。
  2. On the algorithm of market rate prediction, this article adopts the sequence prediction model based on genetic algorithm bp neural network, and receives better estimation effects, and builds the experimenting platform of data mining using the j2ee technique

    在營銷指標預測演算法上,本文用基於遺傳演算法的bp神經網路時間序列預測模型,取得了良好的預測效果,並用j2ee技術建立了數據挖實驗平
  3. Hi the environment of microsoft visual c + + 6. 0 and database management system ( dbms ) sql servert. o, the chinese version of window98 operating system, a fault diagnosis system is developed by using data mining methods, hi which visible rules are produced finally, the system is tested by experiment data of a rotaiy machinery

    在windows98開發平上,結合開發工具microsoftvisualc + + 6 . 0 , sqlserver數據庫管理系統。用面向對象的程序設計思想和模塊化程序設計方法,對基於顯式規則的幾種數據挖方法進行了軟體實現,開發了基於故障診斷的挖系統,該系統具有一定的實用價值。
  4. The thesis describes the common network attack types as well as research condition of network intruding inspection system, and analyses the basic theory of network data packets transfer on account of protocol tcp / ip, and finally discusses network safe system framework on account of p2drr, which takes linux operating system as the development platform, has c as the development tool, uses libpcap as a tool to capture network data packets, and decode according to various protocols, along with the preprocess function on account of such inspection as i / o port scanning, and analyses the misuse inspecting technology deeply on account of key word mode matching, and studies theory abnormal inspecting system on account of data mining. the inspecting and output function of the whole system is designed as mold in plug - mechanism, so as to transplant and extend the system

    論文介紹了網路常見的攻擊模式及網路入侵檢測系統的研究現狀,分析了基於tcp ip協議的網路數據包傳輸的基本原理,討論了基於p2drr模型的網路安全系統架構,本系統以linux操作系統為開發平用c作為開發工具,利用1ibpcap庫為工具捕獲網路數據包,並根據不同協議實現報文的解碼,實現了基於埠掃描等檢測的預處理功能,對基於關鍵字模式匹配的誤用檢測技術作了深入地分析,並對基於數據挖的異常檢測系統進行了探討,整個系統的檢測與輸出功能均以插件機制設計成模塊,以便系統的移植和擴展。
分享友人