模式匹配系統 的英文怎麼說

中文拼音 [shìpèitǒng]
模式匹配系統 英文
pattern matching system
  • : 模名詞1. (模子) mould; pattern; matrix 2. (姓氏) a surname
  • : 名詞1 (樣式) type; style 2 (格式) pattern; form 3 (儀式; 典禮) ceremony; ritual 4 (自然科...
  • : Ⅰ動詞(比得上; 相當; 相配) be equal to; be a match for Ⅱ形容詞(單獨) lone Ⅲ量詞1. (用於馬、騾等) 2. (用於整卷的綢或布)
  • : Ⅰ動詞1 (兩性結合) join in marriage 2 (使動物交配) mate (animals) 3 (按適當的標準或比例加以...
  • : 系動詞(打結; 扣) tie; fasten; do up; button up
  • : Ⅰ名詞1 (事物間連續的關系) interconnected system 2 (衣服等的筒狀部分) any tube shaped part of ...
  • 模式 : model; mode; pattern; type; schema
  • 匹配 : 1. [書面語] (婚姻配合) mate; marry 2. [電學] matching
  • 系統 : 1. (按一定關系組成的同類事物) system 2. (有條理的;有系統的) systematic
  1. The system primarily uses the protocol analysis technology and mode matching arithmetic in realizing network engine. through the combination of the above two, it effectively monishes the target matching scope and improves the detecting speed

    在實現網路引擎時,主要使用了協議分析技術和演算法,通過兩者的結合,有效地減小目標的范圍,提高了檢測速度。
  2. In this paper, we study focus on building intrusion detection model based the technique of data mining ( dm ). firstly, the paper designed a scheme to modeling intrusion detection based dm and bright forward the idea of descriptive model and classified model to intrusion detection. secondly, we designed and implemented a net data collection system with high performance and a scheme to pretreat net data. thirdly, after studying the algorithms to mine association rule and sequence rule in net data, we extended and improved the algorithms according to the characteristic of net data and the field knowledge of intrusion detection

    首先設計了基於數據挖掘技術的入侵檢測建方案,提出使用該技術建立入侵檢測描述性型和分類型的思想,並用分類判決樹建立了入侵檢測分類型;其次,設計和實現了一個高性能的網路數據採集和網路數據預處理的方案;然後,在對關聯規則挖掘和序列規則挖掘演算法進行研究的基礎上,結合網路數據的特性和入侵檢測領域的知識對演算法進行了擴展和改進,挖掘出了網路數據的關聯和序列;最後,研究了描述性的應用,並設計出基於的入侵檢測引擎,該引擎具有誤用檢測和異常檢測功能。
  3. Next, introduct the technology of the protocol analysis. it means when examin the data packet, wo can use the protocol analysis technology to distinguish the protocol type of the data, then use the corresponding data analysis procedure to examin the data packet. so the examination efficiency can improved. finally, the k - r algorithm used for system data analysis module is parallelized design. and through the comparision the original algorithm and parallel algorithm, we can find that under the

    即在對截獲的數據包進行檢測時,先使用協議分析的技術辨別數據包的協議類型,再使用相應的數據分析程序來檢測數據包,從而提高了的檢測效率; 5 )對數據分析塊中使用的k - r演算法進行了并行化設計,並比較了原演算法和并行演算法的時間復雜度和執行代價。
  4. By the theoretical analysis and experimental test, the image processing procedure of the system has been designed. firstly, the system needs carry out pre - process : the median filtering and average filtering of acquired image, next carrying out the threshold of filtered image, then performing morphology, such as open, close and so on. next, the boundary of binary image is extracted

    通過理論分析與實驗驗證,得到了本圖像處理過程:首先對採集的圖像進行預處理,包括均值中值濾波,通過閾值分割進行二值化,然後對二值圖像進行開啟、閉合以及進行邊界提取操作來獲得清晰的圖像邊緣,最後通過邊緣檢測和擬合測量得到沖擊試樣各尺寸值,圖像坐標變換和可以完成檢測區域定位。
  5. The relationship between machine description and code generation, and the technique of mapping rtl into object code by tree pattern matching are described in detail

    重點研究了機器描述與代碼生成之間的關、如何選用合適的中間表示進行目標機器指令的描述、樹的目標代碼生成技術等。
  6. The performance efficiency of a network intrusion detection system ( nids ) is dominated by pattern matching algorithm

    摘要網路入侵檢測的效率取決于演算法選擇。
  7. Then, the thesis presents a schema based two - level associated model, which dramatically reduces the number of the candidate subscriptions. in addition, an incremental subscription matching algorithm is proposed to efficiently matching events for millions subscriptions. furthermore, since indexing is very important to the system, the indexing scheme for xml data is defined based on the containment relationship, which can be more efficient to deal with relative paths than previous methods

    另外,由於在意向過程中涉及大量索引問題,為此針對先前研究在處理基於相對路徑的意向表示上存在的問題,本文提出了一種基於相容關的索引,利用抽象數據拓撲結構進行相對路徑到絕對路徑的轉換,通過基於相容關的數字方編碼,能夠快速確定對應結點的依賴關,同時提出了新的路徑轉換演算法,將時間復雜度由過去的平方時間變為線性。
  8. At the realization of the system, we analyze the integral structure and working principle of our system at first. then, we show the relationship among tables in core database. lastly, we study automatic document categorization algorithm and propose algorithm descriptions and experiment results of chinese language segmentation, schema matching of paper titles and clustering

    實現部分分析了的整體結構和工作原理,介紹了核心數據庫中各表的聯,最後重點研究了文檔自動分類演算法,給出了漢語分詞演算法、論文標題演算法、聚類演算法的演算法描述及實驗結果。
  9. The main research content of the article is involved as follows : ( 1 ) the research and discussion of the quantitative metallographic analysis methods and the measuring methods of micro hardness. ( 2 ) the application of digital image technique in metallographic image preprocess such as gray level transformation, dichotomy, noise eliminating, dilation and erosion, image enhancement, boundary detection, etc. the application of the wavelet and multi - resolution analysis in metallographic image procession to improve the measuring accuracy and efficiency. the application of the region growth and mathematical morphology in analyzing image parameters to improve the flexibility and exaction

    本文的主要研究內容: ( 1 )定量金相分析和顯微硬度測量的方法研究; ( 2 )利用數字圖像處理技術,實現金相圖像的灰度轉換、二值化、噪音消除、膨脹收縮、圖像增強、邊緣提取等預處理;引入小波理論、基於數學形態學的區域生長法對采樣圖像進行分析,實現了對採集圖像邊緣的有效提取,從而提高了測量精度; ( 3 )開發了金相圖像分析的主體結構(硬體結構和軟體結構) ; ( 4 )採用windows開發平臺的面向對象程序設計語言microsoftvisualc + +進行塊化設計; ( 5 )提出了採用多的知識表示方法建立知識庫,應用正反推理、糊數學型、基於規則的型建立金相分析專家
  10. In the end, it is storged in the database in a normative form. the form is used easily to consequence. by this way, the system realizes the text knowledge ’ s auto - search and auto - storage in the structure of the multimedia knowledge database in the cbt courseware development platform

    以電子文本形的自然語言為輸入,經過,抽取出事先規定的用戶感興趣的知識類型的知識,把它組織化、結構化,以一種易於推理和使用的形存儲在數據庫中,完成了cbt課件開發平臺中的多媒體知識庫的構建當中的文本知識的自動查找和存儲。
  11. After comparing several pattern matching algorithms, we put forward a kind of improved pattern matching algorithm called bmhsy, then basing on some research on network intrusion system and host intrusion system, we give a hybrid intrusion detection system, which combines the advantage of bm, bmh and bmhs, at last present performance analysis in actual environment. the main work of this paper is as follows. ( 1 ) by comparing bm, bmh and bmhs pattern matching algorithm, we give a improved pattern matching algorithm which used of the thought of bm algorithm, and combined the advantage of bmh and bmhs

    本論文通過比較入侵檢測中常用的幾種演算法,提出了一種bmhsy演算法,它綜合bmh和bmhs的特點,並針對其效率問題進行了改進;在研究基於主機的入侵檢測技術和基於網路的入侵檢測技術的基礎上,結合兩種技術特點,採用分散混合型體結構,研製了一個混合入侵檢測,對其實際運行結果和性能進行了分析。
  12. It uses pattern matching method and runs under network environment

    在實現上,該採用了基於網路的方法。
  13. The wireless sensor networks ( wsns ) are the hotspot research of current sensor technology. much attention are focused in this paper on the design of the hardware architecture for wireless sensor network node, the development of the sensor node ‘ s hardware and software and its structural health monitoring application system. a structural health monitoring system based on the developed node, named as cute1, was built by the pattern matching method

    無線傳感網路是當前國內外傳感器技術領域的熱點研究課題,本文著重研究了針對無線傳感網路節點的軟硬體設計,成功實現了智能無線傳感網路節點「 cute1 」的設計,並運用該無線傳感節點建立了針對結構健康監測的應用,利用的方法實現了基於無線傳感網路的結構緊固件失效的實時監測。
  14. The study is on the basis of chinese partition technology and pattern matching theory. it devised gateway site standardization rule and best long matching arithmetic, which well applies to the system testing

    論文以中文分詞技術和理論為基礎,仿設計出門址標準化方法以及最長地址數據優先法則,在的測試中得到很好的應用。
  15. The thesis content came from vata ltd. request, which is a vehicle classification system based on inductive loop detectors, made up with data collection sample wave character extracting and automobile type pattern matching. this paper introduces principle of data collection and hardware frame, and examples some common automobile type of data ware at the same time

    本文根據優創集團泛安科技開發(石家莊)有限公司關于保定至天津高速公路機電設備更新項目的要求,設計了一種基於感應線圈的車型識別,該主要由數據采樣、采樣波形特徵提取及車型三大部分組成。
  16. First, model, constitutes, category, trend and problem of ids is presented, and then pattern match which is applied widely is introduced from the aspect of theory and technology. principle and performance data of three pattern match algorithms such as bm, bmh and ac _ bm are discussed in detail. previous two algorithms are realized by programming

    本文首先介紹了入侵檢測型、組成、分類、發展趨勢以及面臨的眾多問題,然後從原理上、技術上介紹了目前使用最廣泛的檢測方法,以常用的網路入侵檢測snort為例,詳細討論了bm 、 bmh和ac bm三種演算法的基本思想以及性能參數,並且編程實現了前兩種演算法。
  17. The thesis describes the common network attack types as well as research condition of network intruding inspection system, and analyses the basic theory of network data packets transfer on account of protocol tcp / ip, and finally discusses network safe system framework on account of p2drr, which takes linux operating system as the development platform, has c as the development tool, uses libpcap as a tool to capture network data packets, and decode according to various protocols, along with the preprocess function on account of such inspection as i / o port scanning, and analyses the misuse inspecting technology deeply on account of key word mode matching, and studies theory abnormal inspecting system on account of data mining. the inspecting and output function of the whole system is designed as mold in plug - mechanism, so as to transplant and extend the system

    論文介紹了網路常見的攻擊及網路入侵檢測的研究現狀,分析了基於tcp ip協議的網路數據包傳輸的基本原理,討論了基於p2drr型的網路安全架構,本以linux操作為開發平臺,採用c作為開發工具,利用1ibpcap庫為工具捕獲網路數據包,並根據不同協議實現報文的解碼,實現了基於埠掃描等檢測的預處理功能,對基於關鍵字的誤用檢測技術作了深入地分析,並對基於數據挖掘的異常檢測進行了探討,整個的檢測與輸出功能均以插件機制設計成塊,以便的移植和擴展。
  18. Airborne digital map is the crucial part of terrain contour matching system. the characteristics of digital map are investigated. at last a map selection algorithm is introduced, and the simulation results demonstrates this algorithm work well

    數字地圖的存儲格、制備噪聲、精度和解析度等對地形的工作性能有很大的影響,本文在分析有關數字地圖技術的基礎上,給出了一種較為實用的地形區域的選擇演算法,並對其進行了擬驗證。
  19. The original knowledge which is described in natural language in electronic text is disposed by filtrating, semantic block segmenting, word segmenting, syntax and semantic analyzing, pattern matching. in the end it is expressed in the semantic network and storaged in the multimedia knowledge database

    在本中,原始的以電子文本形存在的自然語言描述的知識經過過濾,切分語義塊,分詞及語法、語義分析,,以語義網路的形存入多媒體數據庫。
  20. The system based on iris recognition is made up of several parts : iris - capturing device, iris preprocessing, iris feature extracting and coding, iris code matching

    基於虹膜的識別由虹膜獲取、虹膜圖像預處理、虹膜圖像特徵提取、與識別等幾部分組成。
分享友人