數據流異常 的英文怎麼說

中文拼音 [shǔliúcháng]
數據流異常 英文
data-flow anomaly
  • : 數副詞(屢次) frequently; repeatedly
  • : 據Ⅰ動詞1 (占據) occupy; seize 2 (憑借; 依靠) rely on; depend on Ⅱ介詞(按照; 依據) according...
  • : Ⅰ動1 (液體移動; 流動) flow 2 (移動不定) drift; move; wander 3 (流傳; 傳播) spread 4 (向壞...
  • : 形容詞1 (有分別; 不相同) different 2 (奇異; 特別) strange; unusual; extraordinary 3 (另外的;...
  • 數據 : data; record; information
  1. A method for data flow anomaly detection in oo programs

    一種檢查面向對象程序中數據流異常的方法
  2. The content of this paper is arranged as foll owing : chapter 1 introduces the concept of credit, credit risk and credit assessment, as well as the history and development of credit assessment ; chapter 2 introduces the history of ai technology, and the background of expert system and neural network. characters and disadvantages of expert system and neural network are presented respectively and the necessity of combining expert system and neural network is lightened ; chapter 3 shows the process of dealing with sample data, including the treatment of exceptional data and factor analysis, and puts forward the concrete framework of the mixed - expert credit assessment system ; chapter 4 introduces concept of object - oriented technology, and constructs object model and functional model after analyzing the whole system. it also illustrates the implementation of concrete classes by an example of rule class and the inference algorithm in the form of pseudocode ; chapter 5 introduces the structure of the whole system, the major functional models and their interfaces, and the characteristic of the system is also generalized ; chapter 6 summarizes the whole work, and points out the remaining deficiencies as well as the prospective of this method

    本文具體內容安排如下:第一章介紹了信用、信用風險、信用評價的概念,回顧了信用評價的歷史、發展和現狀,並綜合各種信用評價模型,指出這些模型各自的優缺點:第二章簡單描述了人工智慧技術,著重介紹有關專家系統與神經網路的基礎知識,通過總結它們的優缺點,指出結合專家系統與神經網路構造混合型專家系統的必要性;本章還介紹了神經網路子模塊的概念,提出了混合型專家系統的一般框架與設計步驟:第三章對樣本進行處理,包括的剔除、因子分析等,提出了信用評價混合型專家系統的具體框架結構,介紹了系統知識庫的主要部分、基於優先級的正向推理機制的程、以及基於事實的自動解釋機制的具體實現方法;第四章介紹了面向對象技術,進而採用面向對象對信用評價系統進行分析,建立了對象模型和功能模型,並在此基礎上,採用c + +語言以規則類為例說明系統中具體類的實現,用偽代碼的形式描述了推理的演算法;第五章描述了整個系統的結構,對系統主要功能模塊和界面進行了介紹,並總結系統的特點;第六章總結了全文,指出本文所構造系統存在的不足以及對將來的展望。
  3. It is designed for embedded applications with the following features : separate instruction and data caches ( harvard architecture ), 5 - stage pipeline, hardware multiplier and divider, interrupt controller, 16 - bit i / o port and a flexible memory controller. new modules can easily be added using the on - chip amba ahb / apb buses. it has flexible peripheral interfaces, so can be used as an independent processor in the board - level application or as a core in the asic design

    它遵照ieee - 1745 ( sparcv8 )的結構,針對嵌入式應用具有以下特點:採用分離的指令和cache (哈佛結構) ,五級水,硬體乘法器和除法器,中斷控制器, 16位的i / o埠和靈活的內存控制器,具有較強的處理功能,新模塊可以輕松的通過片上的ambaahb / apb總線添加。
  4. On the other hand, by the statistical analysis of historical flow data, the system can model the network traffic flows, and forecast short - term network flows. after that the system can analyse the network traffic abnormity. by use of the netwok management system and network security facility, we can setup a security infrastructure to monitor flows in real time, predicts the future flows, alarm some abnormal flows, respond to the abnormity automatically and immediately

    論文通過定期採集網路關鍵設備,包括匯聚層和核心交換層的量情況,處理后以結構化、層次型的方式保存起來,一方面提供了圖形化的用戶介面,將收集的各種歷史和實時在其中以圖形的方式直觀地顯示出來,另一方面通過對歷史的統計分析,從而對網路量進行建模,短時間預測網路量情況,實現對網路情況的觀察分析,利用有充分響應能力的網路管理系統和網路安全設備,構成響應和預警的綜合安全系統。
  5. Based on sand - storm ' s occurrence times data in ningxia, arctic sea - ice area index data, height and wind fields data of ncar / ncar reanalysis, the basic variable rules and anomalous air circulation background fields of spring sand - storm ' s occurrence times in ningxia are systematically analyzed. more attention was paid on studying the tele - connections between arctic sea - ice areas and spring sand - storm ' s occurrence times in ningxia, and impossible affecting process of greenland sea - ice areas " anomalies on sand - storm ' s occurrence times. the results are as follows : 1

    本文根寧夏沙塵暴發生次資料、北極海冰密集度資料和ncar / ncep再分析資料,較系統地分析了寧夏春季沙塵暴發生次的基本變化規律及其的大氣環背景場,重點研究了北極海冰與寧夏春季沙塵暴發生次之間的遙相關關系以及格陵蘭海冰變化對沙塵暴的可能影響途徑,結果表明: 1 、夏春季沙塵暴發生次在1960 - 2000年有明顯的年代際和年際變化特點,總體呈減少趨勢,且在1984年發生了明顯的突變,有10年和7年左右的周期。
  6. The approaches establish a relationship between monthly precipitation abnormality and monthly circulation, soil moisture and temperature on the shallow and deep layers. the relationship is the precipitation diagnostic equation and its coefficients and dimensions are determined by using the observed data of huai river basin. then we select the main soil moisture and temperature attributing factors by the dimensional analysis to establish a forecasting equation of summer precipitation over huai river basin with the statistic approach

    通過將大氣中的熱量、水汽收支方程與一個簡化的兩層土壤溫度、濕度方程相結合,並依月尺度大氣環的演變特徵,推導出月降水距平與500hp月平均高度距平場、土壤深淺兩層溫、濕度的關系;利用臺站觀測資料,使用統計反演方法確定方程中各項的系和量級,從而找出影響降水的主要土壤溫、濕因子;利用統計方法建立這些因子與淮河域夏季降水之間的簡單線性預報方程,並對1992 - 2000年淮河域夏季降水趨勢進行回報。
  7. Pickup cameras take in the video and get the data and translate to the computer. computer operates the avi video stream manipulation and the image processing

    攝像頭拍攝被檢驗的儀表獲得視頻,計算機通過對avi文件視頻的實時操作,對儀表進行實時的自動監控,實現監測儀表指針運動的功能。
  8. When the data of logistics in current process are used for input of simulating logistics in future 100 % continuous casting process, supply of hot metal from iron - making process may not satisfy the needs of 100 % continuous casting on raw materials. because planning scheme in continuous casting process depends greatly on smelting scheme in convertor vessel, it is important for operator to balance raw materials supply, smelting and casting in order to realize the scheme of 100 % continuous casting. when some equipment are work abnormally, mixer of hot metal and lf furnace can be used for logistics buffer

    用攀鋼煉鋼生產對模擬軟體系統進行的測試和模擬研究結果表明:模擬系統的隨機發生演算法可以實現對作業時間的依分佈隨機抽取;在相似的輸入條件下,模擬結果與實際生產物的時間分佈規律基本吻合,達到了模擬軟體設計的預期目標;若以攀鋼提釩煉鋼廠現工藝的鐵水輸入作為全連鑄后的輸入條件,則現工藝的物料供應能力可能難以滿足全連鑄生產的要求;連鑄機的連澆計劃對轉爐爐次計劃的編制有很高的要求,合理安排來料、煉鋼與澆鑄三者間的物平衡關系將是保證全連鑄作業的重要條件;當出現設備情況時,可以利用混鐵爐與lf爐站前等待作為物緩沖池,通過延長系統的平均物時間來緩解因設備檢修和故障等擾動所造成的影響,確保生產的順利進行。
  9. Based the basic principle of the accumulation of induced electric charges across the resistivity discontinuities and the induction current channeling inside the conductive bodies inspirited by the mt field, we set up the relation between the measured field on the earth surface and the distribution of the induced source underground by means of the defining the electric charge occurrence probability function and the electric dipole occurrence probability function and the spacial distributing of the " correlation probability ". the " image " of the field sources underground, or the distributing graphy of the induced electric charges and the induced current in the mesuring area can be drawed, from which we can get the outline of the geological anomaly on the meaning of the probability

    大地電磁場概率成像方法是一種新的地球物理成像反演方法,它是根在大電磁波場的激勵下,地下介質電阻率間斷處產生感應電荷積累和導體內部產生感應電,從而產生感應電磁場的原理,相應地定義了感應電荷發生概率函和感應電偶極子發生概率函,通過「相關概率」發生的大小的空間分佈,建立了地表觀測場與地下場源空間分佈的內在聯系。地下場源分佈概率的「像」 ,即測區的感應電荷和感應電的概率的分布圖像,就是測區內地質體在概率意義下地質體的分佈輪廓。
  10. ( 3 ) we can detection the azimuth of crack growth by abnormal amplitude or the discrepancy of wave - speed. ( 4 ) we can guess whether crack contains fluids by the change of p - wave speed. second, using pore model, under press and temperature, we have studied the influences of pore density on the characteristic parameters of seismic wave

    第一、利用人工裂縫模型,研究了裂縫密度、方位和張開度的變化對地震波屬性參的影響,根實驗結果,總結出:可利用橫波分裂的不同程度來檢測裂縫密度的高低;可利用縱橫波的振幅、主頻、衰減(或品質因子q )和主振幅的變化來檢測裂縫張開度的變化;可利用速度的差和振幅來檢測裂縫發育的方向;可利用縱波速度的變化來推測裂縫中是否含體。
  11. The transition from negative to positive of the spherical function coefficient a20 reflects it impersonally and quantificationally. with ncep / ncar day - to - day height field analysis data, the coefficient of spherical function a02 is calculated. the transition dates of circulation type in middle stratosphere are determinated based on the dates that a02 have transited from negative to positive steadily

    本文用ncep ncar北半球1958 1997年中平層五層( 10 、 20 、 30 、 50和70hpa )逐日高度場再分析資料,計算出其球函a _ 2 ~ 0 ,並a _ 2 ~ 0穩定地由負轉正的日期確定了逐年中平層各層環轉型的日期,在此基礎上著重分析了春季中平層環轉型日期的氣候及規律及它們與平層環及與對層環的關系。
  12. Abstract : data flow anomalies ( dfa ) are those anomalies related to the accessing and updating of data items in a program. the conventional dfa detection techniques alone can not be used to identify the data flow anomalies associated with the instance variables defined in a class. in this paper, a method for identifying the data flow anomalies present across the methods of a class is proposed. the method sequence specification ( mtss ) is used in conjunction with the conventional dfa detection techniques to identify the data flow anomalies in classes. this technique can ensure that there are no data flow anomalies present across methods in a class if the methods are invoked in such a way that they are compliant with the method sequence specification

    文摘:數據流異常是指程序中與變量使用有關的不合規的「可疑」情況.僅靠傳統的數據流異常檢查技術不能發現面向對象程序中與實例變量有關的數據流異常,將方法序列規范與傳統的檢查技術結合起來,提出了一種能檢查對象的實例變量的數據流異常的方法.當類中方法的調用順序符合該類的方法序列規范時,應用提出的方法能保證發現所有的介於不同方法之間的數據流異常
  13. In some modern applications, such as process control, network management, office control, etc, which often need the dbms has the functions of watch and warn, can deal with exceptional situations, select correct measures to intervene, and has the capibility to resume actively

    在一些現代應用中,如各種過程式控制制,網路管理,辦公工作控制等,經要求庫系統具有某種監視和報警功能,能夠主動處理情況,選擇適當的干預措施,具有自動恢復能力。
  14. In a local area network ( lan, the ability of a medium access unit to interrupt automatically transmission in order to inhibit an abnormally long output data stream

    在局域網( lan )中,一種對傳輸媒體訪問時間的控制能力,為了防止長時間的輸出,必要時需自動中斷這種傳輸。
  15. This research established an estimating model of pinus massoniana stand volume with the elements as variates directly obtained from rs and the conditions of stand that were extracted from 130 samples of pinus massoniana stand from the fifth forest resource continuous investigation data in min - jiang watershed and flitered by the thrice standard deviation method and liner regression method and the correlation coefficient is 0. 735 the suitability and precision of the model were tested and regression analysised with data that were extracted from another 30 samples

    摘要從福建省第5次森林資源一類調查落在閩江域的樣地中抽取馬尾松林樣地130個,以rs可提取因子及樣地林分立地條件因子為可選變量,利用3倍標準差法進行的篩選,對林分立地條件定性因子進行量化處理,通過逐步回歸構建閩江域馬尾松林分蓄積量估測模型,研究結果所構建的蓄積量估測模型的相關系為0 . 735 。
  16. In this paper, by studying the feature of the netflow data and the mib status of the network equipments, at the same time, in terms of analyzing the characteristics of network attack, worm spread, virus infection and network misuse behaviors, our work is based on the facts that most of the anomaly traffic in campus network has influences of the netflow data and network equipment status. an approach is present to assess the threats of the traffic in terms of five factors : the traffic bytes distribution, flow number distribution, packets number distribution, equipment cpu utilization and the memory utilization. the weight of each factor is computed and determined by fuzzy relation matrix 。 an prototype system is designed to test the method and the results are analyzed to evaluate the availability of our method

    本文研究了netflow的特徵和網路設備運行狀態,分析了校園網網路攻擊、蠕蟲病毒和網路濫用行為的特點,基於大多的網路必然反映在網路網路特徵的變化以及網路設備運行狀態的改變這樣一個事實,提出了一套基於網路量和網路設備運行狀態的威脅評估方法,確定了5種威脅評估因素:網路帶寬分佈、網路量分佈、網路量分佈、網路設備cpu利用率、網路設備內存利用率,並採用模糊關系矩陣方法計算和分配這5種評估因素在評估函中的權重。
  17. If you must capture this information, use the error outputs of data flow components to capture error - causing rows in an exception file

    如果必須捕獲此信息,請使用組件的錯誤輸出來將引發錯誤的行捕獲到一個錯誤文件中。
  18. This separation can be performed effectively by both marginal distribution and residuals analysis of parameters for anomalous component. experimental result shows the method can deal with non - stationary traffic data, so anomaly detection of real network traffic is implemented

    實驗結果表明,由於不必將整個時間序列進行分片和單獨擬合,演算法可以直接處理非平穩,實現了真正意義上的網路檢測功能。
  19. From abnormal network flow view, first, we can define some statistical variables and use those variables to make a model, timely get data from network. then anids make full use of data in information lib to detect current network flow whether anomaly or not

    若發現當前,則進行報警。在網路量檢測方面,首先確立測度集和建立模型,從網路中實時捕獲樣本值。其次,根信息庫中保存的信息,對當前量進行檢測。
  20. Due to the intrinsic property of no status bar of browser, b / s structure ' s network exam system leads to the great flow of the data, delays the control instruction of service port as well as appears exception of the function and data

    結構的網路考試系統由於瀏覽器無狀態的固有屬性,導致了考生考試期間量大,從而可能造成服務端控制指令的延遲,導致功能和
分享友人