檢出系統 的英文怎麼說

中文拼音 [jiǎnchūtǒng]
檢出系統 英文
check out system
  • : Ⅰ動詞1 (查) check up; inspect; examine 2 (約束; 檢點) restrain oneself; be careful in one s c...
  • : 系動詞(打結; 扣) tie; fasten; do up; button up
  • : Ⅰ名詞1 (事物間連續的關系) interconnected system 2 (衣服等的筒狀部分) any tube shaped part of ...
  • 檢出 : checkout
  • 系統 : 1. (按一定關系組成的同類事物) system 2. (有條理的;有系統的) systematic
  1. In this paper, we introduce the intrusion detection system in the following aspects such as intrusion detection model, detection theory based on which we provide an intrusion detection system based on mobile agent

    本文通過對現有的入侵的模型、測原理進行分析研究,提了一個基於aglet移動代理平臺的入侵
  2. We use artificial immune principles to design a novel antibody network which based on the immune algorithm and neural network, and use these as in - depth research of the application of our achievement to engineering. in this paper, we built the novel antibody network which based on the two intelligence algorithms and reach the application of its use in the intrusion detection system. furthermore we create an ideal antitype system from it

    本課題以人工免疫和神經網路為研究對象,並依託四川省科技廳基礎項目「智能入侵的關鍵技術研究」 (項目編號: 04jy029 - 017 - 1 ) ,將人工免疫原理和神經網路技術相結合,提了應用於入侵的新型抗體網路,為該項目在工程領域中的進一步研究、應用提供理論依據
  3. It increases the detectable rate of antigen and sensitivity by applying biotin - avidin system to p24 antigen detection system

    將生物素-親和素應用到p24抗原,提高了抗原率和假陽性。
  4. In the system, the collimation semiconductor laser - scanned beam scanning two perpendiculars direct of one plane of the measured workpiece at the same time is made. the beams with the dimension information of two perpendiculars direct are processed by the scanning receive system, the high - speed photoelectric transition and electronic data process. two measured results of the diametric directs and ellipse tolerance, etc, parameter, of the turning workpiece on the same plane are obtained by non - contact automatic measurement

    在單向激光掃描測技術的基礎之上,提了一種雙向激光掃描,其採用激光掃描測技術與特殊光學相結合,用準直半導體激光掃描光束對被測工件徑向某一截面的兩個相互垂直方向同時掃描,經掃描接收光學、高速光電變換、電子學和微機數據處理,對將攜帶有垂直方向被測量信息的光束進行處理,實現了回轉體工件同一截面兩個垂直方向的徑向尺寸和橢圓度等參數的非接觸自動測量,解決了同時非接觸測量回轉體零件同一截面兩個徑向尺寸的難題,它具有高速,高精度和非接觸自動測量等特點。
  5. And the interfaces have analog input, analog output and digital input / output. we have used differently cards, such as pc - 6330d a / d card, pcl - 728 d / a card based isa bus, ipc - 5375 i / o card and so on. in addition, we select micro - stir switches and pressure sensors as sensor elements to inspect the system and choose relays and induction valves to control the bicycle pump and the motor

    總線採用isa內部總線;介面主要有模擬量輸入介面、模擬量輸介面、開關量輸入輸介面等,課題分別選用pc - 6330d型a d板卡、基於isa總線的型號為pcl - 728的d a板卡、型號為ipc - 5375的i o板卡;另外,課題選用了微動式行程開關、壓力變送器作為傳感元件,選用繼電器、電磁控制換向閥實現對氣缸、電機的控制;採用vc + + 6 . 0編制控制軟體,實現了纖維鋪放技術的計算機控制。
  6. At recent decade, accompany with surface mount technology printed - circuit board to produce fly of automation degree to soon develop, as to it ' s correspond of mass defect the inspection also put forward higher request, from in brief shoot to be like system to complicated " 3 - d " x optics to examine system, the automatic optical inspection is in great quantities adopt by the each production factory house

    摘要在最近十年,伴隨著表面貼裝印刷電路板生產自動化程度的飛速發展,對其相應的質量缺陷查也提了更高的要求,從簡單的攝像到復雜的" 3 - d " x光,自動光學大量被各生產廠家採用。
  7. We do research on the transitions between states of network protocol, the protocol misusage detection model based on markov chain, the framework of the ids technology and protocol anormity after we discuss the current technology. the main research contents of this paper include : research on transitions between states of network protocol and session process, protocol misuage and the anomaly detection model based on markov chain, the research of intrusion detection framework, more accurately model based on the characteristic of the network traffic and so on

    在分析了現有入侵的基礎上,本文圍繞典型網路協議狀態轉換、基於馬爾可夫鏈的測模型、入侵測技術框架、以及協議異常等幾個方面展開深入研究,主要工作內容包括:典型網路協議轉換狀態的分析和會話過程的研究;基於馬爾可夫鏈的網路異常測模型;分散式的測架構;針對網路流量特徵而提了精確的測模型等。
  8. In this study, a precise and quick method using a biosensor device will be presented to detect the blood phenylalanine concentration in order to help control the disease

    本課題提了一種準確、快速驗苯丙酮尿癥的新方法,即利用生物傳感器組建苯丙酮尿癥
  9. With a brief introduction to the structure, function, operation principle and property of a contactless ticket system manufactured by shanghai huaming electronics company, the author holds that this system shall be expected to bring about considerable economic and social benefits in its presumable application in railway traffic

    摘要詳細介紹了上海華明電子公司研製的非接觸式自動售的功能、結構、工作原理及性能,並簡要分析了該的經濟效益和社會效益情況,同時指的應用前景十分廣闊。
  10. After getting online results, combustion expert controller gained relevant ratiocinate output results by integrating technical parameters of online inspected system, combustion computed results and diagnostic and manipulated countermeasure of knowledge base, then which could propose operator for choosing a suitable control method using concentrated corresponding rules

    在得到在線計算結果以後,燃燒專家控制器綜合在線提供的工藝參數,以及燃燒計算的結果,使用存放在知識庫中的診斷和操作對策,得到相應的推理輸結果;利用規則集的相應規則,提示操作工選用合適的控制方法。
  11. According to all discussed above, adopted typical mobile agent system ibm aglets to design a framework of mobile agent based intrusion detection system and various functional mobile agents, analyzed data collection, detection and tracing of intruding attacks of the concurrent multiple mobile agents. those mobile agents trace and watch the network equipments and hosts in real time, study net flow and status of the hosts, analyze and audit the outcome data, then give real time alarms for the aggressive activities

    在此基礎上,採用典型移動代理ibmaglets設計了一種基於移動代理的入侵框架,並設計了不同功能的移動代理,分析多個移動代理協作進行數據採集與跟蹤測入侵攻擊的過程,這些移動代理實時跟蹤監視網路設備和主機,了解網路上的流量和主機的狀態,並對結果數據進行分析審計,做一定的響應。
  12. Very large data bases vldb 05, trondheim, norway, 2005, pp. 505 - 516. 8 agrawal s et al. dbxplorer : a system for keyword search over relational databases

    因此,我們提一個分類學習和選擇候選網路的方法clascn classification , learning and selection of candidate network來提高基於模式圖的在線數據庫關鍵詞的查詢效率。
  13. Instruction detection technology is core in instruction detection system, it include abnormity instruction and abused instruction detection, on the basis of traditional network security model, ppdr model, instruction detection principle and instruction technology analysis, the author has brought forward instruction detection method based genetic neural networks, adopted genetic algometry and bp neural networks union method, and applied in instruction detection system, solve traditional bp algometry lie in absence about constringency rate slowly and immersion minim value

    入侵測分析技術是入侵的核心,主要分為異常入侵測和誤用入侵測。作者在對傳網路安全模型、 ppdr模型、入侵測原理以及常用入侵測技術進行比較分析的基礎上,提了一個基於遺傳神經網路的入侵測方法,採用遺傳演算法和bp神經網路相結合的方法?遺傳神經網路應用於入侵中,解決了傳的bp演算法的收斂速度慢、易陷入局部最小點的問題。
  14. Secondly, the core conception of cognitive towards information science is " human as essence ", and bring forward that the information system is one that can boost up and magnify the existence value, ability and specialty of " human ", and provide users a system which is active and unforced, rather than force users to arduously adapt system. thirdly, from the visual angle of cognitive, information - seeking or information - using is a kind of cognitive behavior in essence. fourthly, cognitive style is the development trend of future information retrieve system, it can reveal the thinking - process of users during retrieving on - line, in order to help users to develop their knowledge configuration

    首先,認知觀可集成情報科學的相關領域,從而為形成一、有效的情報科學提供體結構;第二,情報學認知觀把「以人為本」作為它的核心觀念,提情報設計的任務是要設計增強和放大「人」的存在價值、能力和特長的,使提供給用戶的情報是一種積極自然,而不是要求他們花力氣去適應的;第三,從認知角度來看,情報查尋和利用從根本上說是一項認知行為;第四,認知風格將是未來情報的發展趨勢,這樣可以揭示聯機索過程中的用戶思維過程,以便有助於用戶知識的發展;第五,知識的進化與認知活動有密切關,人的知識結構對外來信息的吸附、同化、選擇、建構和實現社會化的過程,其實就是知識的進化;第六, 「知識結構」將成為情報學認知觀研究的重點。
  15. ( ) i1 t [ lo basi s of " that, we make systemic rosoarcl1 ( ) n l f1o s ( ) cllr i ty ilrct1 i t. cc 1. ljre, dcs i gn out the securi ty so. l ut io11 ; 1l1t ] s l. ci ) i n i, rilc t. i cc ( ) f. s1 ) t } ( t i ; l l network according to the security archi tec turc fr ; tn1e, wi1 icl1 silt i si ! y the need of confidentia1 ity, integri ty, avai 1 abi l i ty, authentj cat ion, authorization and accountable of specia1 network information system

    特別是,論文作者在網路安全建設的過程中,獨立承擔了中心子網防火墻、網路入侵、病毒防護體的安裝及管理工作,在詳細了解了ddn鏈路加密、 pki ca體的建設和使用原理的基礎上,參與了網路基礎設施的安裝調試以及各類服務器的配置管理,擬定了《計算機信息安全管理規定》 、 《網路ip地址規范》 ,為本單位網路安全建設規劃提了意見和建議。
  16. The base principles of the network intrusion detection system and some kinds of typical intrusion detection system are briefly described. then, a new network intrusion detection system based on data mining is given

    簡要地介紹網路入侵的基本原理模型和幾種典型的入侵,給了一種基於數據挖掘的網路入侵測引擎的設計模型。
  17. A nondestructive system for monitoring broken wires in production line was designed, which based on the magnetic character of locked coil wire rope

    根據密封鋼絲繩的結構特點,採用漏磁測技術,研製了一套斷絲在線無損,能對密封鋼絲繩生產過程中現的斷絲現象進行有效監測。
  18. Ad620 - based cardiotach measurement system ( corresponding to the scheme mentioned above ) achieves good experimental results and is of the advantages of low cost and high performance

    其次,根據該方案設計的心跳速率獲得了良好的實驗結果,表現低成本、高性能的特性。
  19. This paper is mainly focus on the chinese keyword spotting for real - time application and achieving the keyword spotting system that has the good capability and can satisfy the real - time requirement. first, this paper generally introduces the framework and theory of keyword spotting

    本文的主要研究內容是面向實時應用的漢語關鍵詞技術,要求實現的漢語關鍵詞檢出系統,不僅具有良好的識別性能,而且能夠滿足實時性要求,可以應用於實時環境。
  20. It detects systematic errors and is violated when two consecutive iqc values exceed the mean on the same side of the mean by 2sd

    示意檢出系統誤差、判為失控,即:有2個連續的iqc值(點)已經超過均值線同一側的均值2sd外側。
分享友人