日誌分類 的英文怎麼說

中文拼音 [zhìfēnlèi]
日誌分類 英文
categories
  • : Ⅰ名詞1 (太陽) sun 2 (白天) daytime; day 3 (一晝夜; 天) day 4 (泛指某一段時間) time 5 (日...
  • : 分Ⅰ名詞1. (成分) component 2. (職責和權利的限度) what is within one's duty or rights Ⅱ同 「份」Ⅲ動詞[書面語] (料想) judge
  • : Ⅰ名1 (許多相似或相同的事物的綜合; 種類) class; category; kind; type 2 (姓氏) a surname Ⅱ動詞...
  • 日誌 : daily record; journal
  1. Another highlight of the architecture is introduction of data mining technique. ids makes use of data mining algorithms to abstract key features of system runtime status from security audit data such as system log and network data stream, and then constructs classify engine of audit data

    本文提出的體系結構中還引入了數據挖掘思想,利用數據挖掘技術中的關聯析、等演算法從系統、系統調用序列、網路流等海量的安全審計數據中提取關鍵的系統特徵屬性,根據這些屬性生成安全審計數據的模型用於入侵檢測。
  2. Race cop will be responsible for distributing the team pack including the log book, fish id chart, water proof log sheets and a clip board to the race team on the event day

    賽事指導員負責于向比賽隊伍派比賽用品包括觀魚圖表防水紙與墊板。隊伍只須將觀魚交予裁判,其餘物資則交還給賽事指導員
  3. The study limitations point to a need for revising measures of social desirability, refining analytical models of overestimates, conducting more research on time diary reliability and validity, making comparative analyses of multiple methods for time data collection, and replicating past studies using a representative national sample and longitudinal design

    對未來研究的建議包括更改社會贊許性的測量方法,重建對高估時間的模式析,更多時問的信度與效度的研究,多元方法綜合運用於時間測量方法的比較析,鼓勵對其他自營職業婦女與其他學科領域從事似的時間運用研究,以及從事具代表性樣本與追蹤樣本的反覆檢驗。
  4. Sparks of this paper are as follows : 1 ) a much improved security audit log is presented, which supports log file in main systems and ensures orginal log files before system intruding happens are protected from being tampered or deleted so that they can be saved completely to be used as investigation clues and evidence souces of great importance ; 2 ) a log file base including different kinds of log files is established to support log file collecting and analyzing ; 3 ) correlation analysis is applied to effectively identify latent clues

    本文的創新點在於: 1 )提出了一種較為完善的支持計算機取證的安全審計方法,它可以支持目前常見系統的文件,確保系統被入侵攻擊前的文件記錄不被篡改、刪除,使得入侵者在入侵攻擊系統前留下的「痕跡」能被完整的記錄下來,作為取證人員重要的調查線索和證據來源; 2 )對各系統不同文件組成文件庫,為獲取和文件的記錄提供支持; 3 )對各文件的記錄採用關聯析,更有效的提取潛在的計算機犯罪線索。
  5. In the paper, we apply the approach of data mining to log analysis system of ids, and especially solve the problem of intrusion model ' s drawing and classifier ' s constructing in the system, which also does solve the automatic process of log analyses

    將數據挖掘的方法應用於ids析系統,並構造出了入侵模式提取與檢測器建立的處理流程,從而解決了析自動化的問題。
  6. Partition contains a lot of state information specific to debian in addition to its regular contents like logfiles. the

    割區里裝有許多debian的特定狀態資料和檔案這樣普通內容。
  7. Partition contains a lot of state information specific to debian in addition to its regular contents, like logfiles. the

    區里裝有許多debian的特定狀態信息和文件這樣的常規內容。
  8. Hence, even if the servlet is serving multiple clients simultaneously, the logs initiated by the same code that is, belonging to the same category can still be distinguished because each client request will have a different ndc stack

    因此,即使servlet同步處理多個客戶機,仍可以區由同一個代碼(即屬于同一個別)啟動的,因為每個客戶機請求有不同的ndc堆棧。
  9. Through the study we find : the processive learning assessment is especially useful in leading and facilitating students to grasp learning method ; it is reliable to use rubric, which should be design according to specific learning content, to carry through the processive learning assessment on the whole ; the processive learning assessment including the assessing content such as knowledge and skill, process and method, sensibility, attitude and view of value, adapts to use self - assessment relatively ; in order to assure the reliability of assessing each other, we should keep the learning teams consistent with the assessing teams ; teachers are not proper to assess their students " sensibility, attitude and view of value which is internal ; research on the design of learning journal should be reinforced, and we should decide whether to adopt it according to the degree of mature of the students and the characteristic of assessing content ; it is capable for teachers to make qualitative assessment on student ' s learning process ; parents assessment does n ' t adapt to use qualitative method completely ; the improper work - dividing of assessors and the occasion of assessment will influence the operation of assessment ; when deciding to explain and utilize the assessing result, we should differentiate two kinds of the processive learning assessment strictly

    研究發現:過程性學習評價對于導向與促進學生掌握學習方法特別有用;使用評價量表進行過程性學習評價基本可靠,其設計要以每個具體的學習內容為依據;包括知識技能、過程方法、情感態度價值觀等評價內容的過程性學習評價比較適合採取自評;為了保證互評的可靠性,要保持學習小組與評價小組的一致;教師不適宜評價學生的情感態度價值觀這一內在的內容;學習的研究設計有待加強,並且要根據學生的成熟程度和評價內容的特點決定是否採用;教師對學生的學習過程給予質性評語基本可行;家長評價不適宜採取完全質性的評語方式;評價主體的工以及評價的時機都會對評價的可操作性產生影響;在決定評價結果的解釋與利用時要嚴格區兩種型的過程性學習評價。
  10. This thesis introduces the background about this system and solving path at first ; then emphasises to describe ideas and implementation of clustering - algorithm ; furthermore expands on the characteristics and flows of each module ; analyses how to establish security policies ; finally summary full text, and suggest further works, otherwise, it also make point of personalizing hyperlinks and personalizing search - engines based on web data mining, making personalizing application more integrate

    本文首先介紹了論文所提問題的背景和解決途徑;然後說明了本系統的概念定義和目標;重點介紹了系統中聚演算法的思想和實現;進而詳細闡述了系統各個功能模塊的特徵和流程;析了如何通過服務器建立安全策略;最後進行了總結,並提出了下一步的工作。此外,論文提出了個性化引擎、個性化鏈接與web數據挖掘的結合,使個性化應用更加全面。
  11. Collaborative filtering recommendation system based on web log and commodities classification

    和商品的協同過濾推薦系統
  12. Aspect to association rules mining, constructing two mining modes : static mining and dynamic mining ; implementing two level mining : single - level mining and domain - level mining. about classification engineering, the mainstream classification techniques were compared through thoroughly experiments, and some improvement was made to decision tree toward the concrete problem, which make naids detect some new type attacks and this kind of capability embodies the advantage of anomaly detection over misuse detection ; incremental mining approach was put forward which detect one window data amount, instead of batch of tcp / ip record, which was very suitable to on - line mining and make naids be high real - time performance

    在關聯規則挖掘上,建立了兩種挖掘模式:靜態挖掘模式、動態挖掘模式;實施兩個層面上的挖掘:單層面挖掘、領域層面挖掘;在引擎的構建上,通過實驗綜合比較了主流技術,並針對具體問題對決策樹方法進行了應用上的改進,從而使得naids系統具備一定的檢測新型攻擊的能力,而這個特性正是異常檢測的優勢所在;所提出的增量式挖掘方法由於每次只監測一個窗口的數據量,而不是批量處理網路,所以非常適合在線挖掘,從而使得naids在實時性上有較好的性能表現。
  13. Based on web log of hannan univercity, this paper focused on the following aspects : 1 ) aanalyze and reserch technology of web log mining ; 2 ) bring forward a multi - path partitioning cluster method, which partions and clusteres according to user access path to improve effiency ; 3 ) bring forward a hierarchy search and iterative method to find frequent set

    本文結合海南大學web服務器,主要研究了以下內容: 1 ) web服務器挖掘技術進行了系統的析和研究。 2 )提出了多路徑割聚方法。這種方法根據用戶的訪問路徑進行割聚,有效地提高了聚演算法的效率。
  14. Write clause are minimally logged. for more information, see " updating large value data types " that follows

    Write子句對較大值數據型的部更新進行最小記錄。
  15. The tables are divided into log - output classes, log - listener classes, and log - filtering classes

    這些表輸出偵聽器篩選。若要進入
  16. Based on the kernel interface and the essential application method of the enterprise level event logging system, this paper analysis related knowledgeof data mining method, proposes the connection method and the classified method which are used for to analyze fault data

    同時結合eventlogging企業級系統的內核空間介面和基本使用方法,研究了數據析的相關知識,提出析設備失效數據的關聯方法和方法。
  17. The system capture the network packet with the help of winpcap, then analysis the packet, mainly analysis ip, tcp, udp and icmp protocol, and then display the data and store the data into the logs that may be analysed anon. and i design a intrusion detection language, and realize a intrusion detection database. after the network packet was captured, it match the packet

    其主要流程是數據包捕獲模塊運用winpcap抓取網路數據包,然後對數據包進行協議析,主要析了ip , tcp , udp , icmp協議,並且按照數據包的協議型顯示數據,並把數據記錄在文件中供以後析使用,同時設計了一個簡單的入侵描述語言,根據該語言的規則建立了一個入侵特徵數據庫,讓已抓獲的數據包與入侵特徵數據庫中的規則進行匹配,如果匹配成功,則說明有異常行為發生,否則,則說明行為正常。
  18. Li this part, the thesis first profiles semantic features of each document by employing chinese information processing technology in order to change documents into the form which can be operated with the help of mathematical methods. second, the thesis profiles each user ' s information needs by three ways : 1 ) accepting the information provided by the user himself ; 2 ) watching the user ' s retrieval action ; and 3 ) analyzing web server log. in this module, users are also classified into different categories according to their information needs

    在用戶建模中,系統從三方面獲取用戶信息需求特徵,第一,用戶主動地向系統提供需求信息;第二,系統檢測用戶檢索行為,從用戶檢索詞析其需求;第三,系統通過析web訪問,得到用戶的興趣所在及興趣的變化狀況,並進一步利用對用戶訪問文檔內容的析來追蹤其興趣變化,將用戶興趣同樣表示為興趣特徵向量,聚相似用戶。
分享友人