數據收集常式 的英文怎麼說

中文拼音 [shǔshōuchángshì]
數據收集常式 英文
dcr data collection routine
  • : 數副詞(屢次) frequently; repeatedly
  • : 據Ⅰ動詞1 (占據) occupy; seize 2 (憑借; 依靠) rely on; depend on Ⅱ介詞(按照; 依據) according...
  • : Ⅰ動詞1 (把攤開的或分散的事物聚集、合攏) put away; take in 2 (收取) collect 3 (收割) harvest...
  • : gatherassemblecollect
  • : 名詞1 (樣式) type; style 2 (格式) pattern; form 3 (儀式; 典禮) ceremony; ritual 4 (自然科...
  • 數據 : data; record; information
  • 收集 : collect; gather
  1. To do the investigating and studying work about the achievements of tackling key problem of the quondam exploration of front - zone of mountain, to analyze and study the applicability about the gathering technology used in the seismic exploration of the complicated construction belt of front - zone of mountainous ; 2. combining the quondam achievements, researching the design method of observation system objective of the complicated construction belt based on seismic - geology model, firstly, building the surface level and deep layer seismic - geology model of complicated construction belt and analyzing the forward model, secondly, designing the observation system aiming at the overthrust nappe structure in section and in area ; 3. aiming at the complicated earth ' s surface condition of front - zone of mountain, how to select the exciting method and the parameter, how to optimize the environment of exciting method and reception, how to pledge the normal combination of the datum of different exciting method ; 4

    山前帶的地震地質條件特點,本文主要研究了以下幾個方面的內容: 1 、對以往山前帶地震攻關成果開展調研工作,分析研究在山地山前復雜構造帶所採用的地震勘探採技術的適用性; 2 、研究基於地震地質模型的復雜構造帶觀測系統目標設計方法:如何建立復雜構造帶的表層、深層地震地質模型,利用正演分析目標區的觀測系統;針對逆掩推覆體構造,如何分區分段有針對性設計觀測系統等; 3 、針對復雜地表條件的山地山前帶,如何選擇激發方、參,如何優選激發、接環境,如何保證不同激發方的資料能正拼接; 4 、山前帶巨厚礫石區的表層結構調查技術及靜校正方法研究。
  2. To detect both known and unknown intrusion patterns, the system introduces a blended frame that makes use of both misuse detection approach and anomaly detection approach. the one of the highlight of the architecture is introduction of data mining technique, and the other is introduction of genetic algorithms. the ids uses data mining algorithms to abstract key features of system runtime status from security audit data, and it uses genetic algorithm to select the feature subset to reduce the amount of data that must be obtained from running processes and classified

    本文陳述了所研究系統的主要特點和技術:將智能體( agent )技術應用於入侵檢測系統,解決了傳統入侵檢測系統的解決方案的弊病,充分利用網路資源協同完成入侵檢測任務;利用基於主機和基於網路的源,形成一種完整的混合型的結構,從而能到更加全面的信息;使用了異檢測技術和誤用檢測技術,採用一種混合型的結構,既能檢測已知的攻擊模,又能發現新的攻擊模
  3. On the other hand, by the statistical analysis of historical flow data, the system can model the network traffic flows, and forecast short - term network flows. after that the system can analyse the network traffic abnormity. by use of the netwok management system and network security facility, we can setup a security infrastructure to monitor flows in real time, predicts the future flows, alarm some abnormal flows, respond to the abnormity automatically and immediately

    論文通過定期採網路關鍵設備,包括匯聚層和核心交換層的流量情況,處理后以結構化、層次型的方保存起來,一方面提供了圖形化的用戶介面,將的各種歷史和實時在其中以圖形的方直觀地顯示出來,另一方面通過對歷史流量的統計分析,從而對網路流量進行建模,短時間預測網路流量情況,實現對網路流量異情況的觀察分析,利用有充分響應能力的網路管理系統和網路安全設備,構成響應和預警的綜合安全系統。
  4. Through processing data, the equipment status of the remote working site has been controlled. if some problems have happened, the supervision system will give an alarm and confirm the trouble equipment and inform the relevent people to deal with them with short message or dialing number

    現代遠程監控系統將現場採通過網路傳送給監控中心計算機,計算機自動對進行分析處理,對設備運行狀況進行評估,當有設備工作異時,自動產生告警,並對故障設備進行定位,可以通過簡訊或者撥號呼叫方通知維護人員進行維修。
  5. Before the connectting between moden and other equipments, it works at the cammand mode, the cammand that is send to moden is used to set or manipulate the mode, after the connectting between moden and other equipments, it works at connectting mode, at that time, the cammand send from the computer is send to another computer which will pass the moden and telephone line. the moden control cammand is called " at " cammand, all the control manipulation is realized by sending the ascii character to moden, after the moden received the " at " cammand, it firstly judges the cammand, secondly, it analyses and executes the cammand, finnally, it executes a response by sending back a ascii character, during the deseign of below - computer, we introduce in detail the deseign of system hardware and system software, below - computer system hardware and system software, below - computer is made up of microchip collecting and controlling system, which finish the strobe and water level data collection, display and disposal, deal with the communication with the above - computer, the microchip is the centre of data dealing with, the peripheral equipments are made up of data collecttion module, control cammand input module, display module, execute output module, and long - distance communication module

    在moden控制軟體的設計中,詳細敘述了moden正工作時的幾個重要函:初始化函、撥號處理函、應答處理函、掛機處理函,設計並調試了四個函的通信程序,機工作時存在兩種模,命令模與連線模,命令模是針對功能設置的模,連線模傳輸的模。當機未與其他設備連接時,其處于命令模,這時候下達給機的指令是作為機本身設置或操作用的;當機已經與其他設備連接時,其處于連線模,所有在此時由計算機送至機的信息都將經由電話線傳送到另一部計算機上。專門使用於控制機的指令被稱為「 at指令」 ,對moden的所有操作(如撥號、應答、掛機等)都可以通過給moden發送ascii字元串來實現, moden在到at命令后,先對命令進行判斷,接著分析和執行命令緩沖區中的命令,最後以自身的ascii字元對命令作出響應。
  6. This thesis describes in detail the whole process of sensors detect anomaly events in networks, collect audit data, report to superior analyzer, execute response instruction ; and the process of analyzers mine audit data, synthesize information from sensors, cooperate with other analyzers, and make distributed response to attacks

    本文詳細說明了感應器檢測網路異安全審計,並向所屬的分析器匯報,以及執行響應指令的過程;說明了分析器對安全審計進行分析挖掘,對感應器上報的信息進行聚合分析,多個分析器進行協作檢查異事件,對入侵行為進行分散響應的過程。
  7. Moreover, this new architecture enable ids to enhance detection capability and adaptability to intricate network environment through self - study and evolution. to achieve better accuracy, the architecture adopts security audit data gathered from both host and network. to enable ids to detect both known and unknown intrusion model, the architecture adopts a blend frame that makes use of both misuse detection approach and anomaly detection approach

    該體系結構是一種混合形結構:一方面,該結構同時利用基於主機和基於網路的源,使得ids能到更加全面的信息;另一方面,該結構同時使用了異檢測技術和誤用檢測技術,既能檢測已知的攻擊模,又能發現新的攻擊模
  8. Usually most practical intrusion detection systems ( idss ) in existence only compare the audit data with the attack pattern database, and find the actions in collision with security strategy

    現有的大多實用入侵檢測系統通只是將到的審計與已有的攻擊模庫進行簡單的比較,從而發現違背安全策略的行為。
  9. The data collected are routinely evaluated in order to identify sources of infection, to determine methods of spread, and to make recommendations regarding prevention and control

    評估以確定感染來源,決定傳播方,和推薦預防和控制措施
分享友人