正常網路 的英文怎麼說

中文拼音 [zhēngchángwǎng]
正常網路 英文
proper network
  • : 正名詞(正月) the first month of the lunar year; the first moon
  • : Ⅰ名詞1 (捕魚捉鳥的器具) net 2 (像網的東西) thing which looks like a net 3 (像網一樣的組織或...
  • : 1 (道路) road; way; path 2 (路程) journey; distance 3 (途徑; 門路) way; means 4 (條理) se...
  • 正常 : normal; regular; average
  • 網路 : 1. [電學] network; electric network2. (網) meshwork; system; graph (指一維復形); mesh
  1. With the progress of technology and developing of internet economy in the world, the broadband network becomes another hotspot in internet field when the foam of. com comes to almost nil. with the beginning of new thousand year, hot waves of the broad band surge throughout the country, sorts of investors come and make huge expenses in a constinuous stream to make a majority of marketing lot and lead up the position of broad band market. however, when the net circuity, which is based on huge numbers of cash, is facing the consumers, market really does not redound upon the investors inexpection

    隨著技術的進步和經濟在全球范圍內的高速發展,寬帶是繼? com "泡沫"破滅后產業的又一熱點。新千年開始,全國各地各類投資商紛紛拆巨資"跑馬圈地" ,以期在市場份額上搶占寬帶市場領先地位,但是當這些"巨額現金'堆成'的面向用戶時,市場並沒有給投資商們預期的回報,寬帶運營商不僅投資回收遙遙無期,還要繼續燒掉大量的現金去維持運行,大批中小型寬帶運營商苦苦支撐,有的甚至瀕臨破產。
  2. If given some access rights, wherever the users are, legal users can access or control the remote industrial workstation so as to do something like remote scheduling, remote diagnosing, remote maintenance, etc. this is one way to break the communication gap between management network and control network

    進行適當配置后,授權用戶就可以在任一internet終端實現對監控主機的訪問和控制,以進行調度優化,遠程診斷與維護。目前,這套工業遠程信息監控系統已在省計算機重點實驗室進行了運行測試,系統工作,達到了預期要求。
  3. The ids of the paper is network - based anomaly detection system. with the help of data mining technology, we bring forward a measure to describe the normal state of the network traffic and user behavior and extracting the useful rule from large network data. so we can establish the knowledge warehouse which describe the normal state of the network traffic and user behavior. the knowledge warehouse can be the standard in order to judge the normal state. we can find the dubitable connections according to account the state and anomly instances of connections

    論文在描述應用和用戶行為時採用數據挖掘技術從海量的數據中提取有用的規則,構建了一個描述狀態下的應用和用戶行為的規則集,這個規則集是用來判斷應用和用戶行為是否的標準,論文根據這個標準分析當前連接的異情況,將可疑的連接找出來。
  4. Along with the extensive use of power cable lines in power distribution system, the probability of fundamental frequency resonance has greatly increased

    隨著配電中電纜線的大量使用,出現基波電流諧振的可能性大大增加,威脅系統的運行。
  5. Using mri, her team detected a network of abnormal memory traces in the brains of people with this condition

    藉助磁共振技術,她在患有這個癥狀的病人腦中發現一個不的記憶痕跡的
  6. You should first verify that the new one boots and all hardware needed for the upgrade works e. g. network adaptors. make your system bootable

    您應該先行確認新的kernel能夠開機,且所有在升級過程中必須用到的硬體比如說,裝置能夠作業。
  7. Once the pressure of the main network returns to normal, the valve flap of drainage outlet closes under pressure, first, second level check valves open, the main network return to supply water to branch pipeline

    一旦主管壓力恢復,排污口閥瓣受壓關閉,一二級止回閥打開,主管恢復向支管供水。
  8. With the rapid development of railway construction in china, the network size has been continuously expanded, the net framework strengthened and the network structure optimized. at the same time, the task of railway transportation has been more and more onerous, then the railways are constructed in different ages, complex geological conditions and effected by their designs and constructions as well, in addition, the railways are making advances to speed - up and load - over now, so many railway roadbed have the existence of all kinds of diseases in different degree. these diseases effect badly the normal railway operation, even they may bring about catastrophic accidents

    隨著我國鐵建設的飛速發展,規模不斷得到擴大,骨架不斷得到加強,結構不斷得到優化,但與此同時,鐵部門運輸任務日趨繁重,加之我國鐵修建年代不同、地質條件復雜及受當時設計施工等因素的影響,且目前我國鐵朝著高速重載方向發展,許多線基存在著不同程度的病害隱患,嚴重影響列車的運營,甚至造成災害性的事故。
  9. Two nonlinear simulation methods are designed by curve fitting method and anfis which seem simply and right in the simulation experiment. based on the model different control strategies also were realized in detail such as chopped current control ( ccc ), angular position control ( apc ), amplitude - change ccc and pi control. a simple torque sharing function ( tsf ) method and a tsf controller were designed which decreases torque ripple effectively

    文章中還建立一種基於模糊神經的非線性模型,並對比分析了三種方法,模擬中確定了電機的最優開通關斷角,在此基礎上實現了電流斬波控制、角度位置控制、變幅值電流斬波控制以及分段雙閉環pi控制,模擬結果表明,它實現了電機的運行,很好的抑止了電機轉矩脈動,同時有效地降低了噪聲。
  10. Third is to be released via mercury / island on april 29th 2008. the band will appear on the main stage at coachella on saturday april 26, 2008

    按照一般來說,提前幾個星期出現在上也是現象。官方時間也就2008年四月28 - 29號的樣子吧。
  11. Apple has no plans to declare a dividend or buy back stock, the chief executive, steve jobs, told the annual meeting of shareholders, adding that iphone sales were on track

    蘋果電腦沒有宣布一個被除數或者買回存貨的計畫,執行長,史帝夫賈伯斯,在股東的年會告訴,增加那一個電話售賣回歸
  12. Avoiding the difficulties of detecting the difficult parameters in furnace control and of building up the models, integrated with fuzzy control and conventional pid control, abb ’ s control it system is used to predict the bloom surface and center temperature directly based on the temperature of furnace wall easily to be detected so that the temperature settings in various furnace sections can be self - corrected, the furnace temperature of each section self - adjusted and on - line parameters of combustion control self - optimized. in addition, the heating parameters and the operating status of the field plant can be monitored with alarm

    採用abb公司的controlit控制系統,避開爐子控制中遇到的困難參數檢測及建模困難等因素,直接根據容易檢測的爐壁溫度來推知鋼坯表面溫度及鋼坯中心溫度,將模糊控制技術與規pid控制相結合,實現各段溫爐設定值自修、各段爐溫自協調、各參數在線自整定的自尋優最佳燃燒控制;對熱工參數、現場設備的運行情況進行監視、報警,實現爐膛壓力、管道壓力、換熱器的保護控制,並將重要參數送往廠級mis
  13. The content of this paper is arranged as foll owing : chapter 1 introduces the concept of credit, credit risk and credit assessment, as well as the history and development of credit assessment ; chapter 2 introduces the history of ai technology, and the background of expert system and neural network. characters and disadvantages of expert system and neural network are presented respectively and the necessity of combining expert system and neural network is lightened ; chapter 3 shows the process of dealing with sample data, including the treatment of exceptional data and factor analysis, and puts forward the concrete framework of the mixed - expert credit assessment system ; chapter 4 introduces concept of object - oriented technology, and constructs object model and functional model after analyzing the whole system. it also illustrates the implementation of concrete classes by an example of rule class and the inference algorithm in the form of pseudocode ; chapter 5 introduces the structure of the whole system, the major functional models and their interfaces, and the characteristic of the system is also generalized ; chapter 6 summarizes the whole work, and points out the remaining deficiencies as well as the prospective of this method

    本文具體內容安排如下:第一章介紹了信用、信用風險、信用評價的概念,回顧了信用評價的歷史、發展和現狀,並綜合各種信用評價模型,指出這些模型各自的優缺點:第二章簡單描述了人工智慧技術,著重介紹有關專家系統與神經的基礎知識,通過總結它們的優缺點,指出結合專家系統與神經構造混合型專家系統的必要性;本章還介紹了神經子模塊的概念,提出了混合型專家系統的一般框架與設計步驟:第三章對樣本數據進行處理,包括異數據的剔除、因子分析等,提出了信用評價混合型專家系統的具體框架結構,介紹了系統知識庫的主要部分、基於優先級的向推理機制的流程、以及基於事實的自動解釋機制的具體實現方法;第四章介紹了面向對象技術,進而採用面向對象對信用評價系統進行分析,建立了對象模型和功能模型,並在此基礎上,採用c + +語言以規則類為例說明系統中具體類的實現,用偽代碼的形式描述了推理的演算法;第五章描述了整個系統的結構,對系統主要功能模塊和界面進行了介紹,並總結系統的特點;第六章總結了全文,指出本文所構造系統存在的不足以及對將來的展望。
  14. Meanwhile, on the basis of the network topology this paper detailedly states the formation of funneling effect and origin of funneling noise, and also demonstrates its huge damage to network

    漏斗噪聲的根源就在於的樹狀拓撲結構,並指明了漏斗噪聲可以對造成巨大的危害,嚴重的時候使得無法運行。
  15. First, realized a wegener - willie distribute based network traffic anomaly detection algorithm. we make use of wegener - willie distribute to analyze the inherent time - frequency distribution characteristics of the traffic flow signal. then according to the experience of analysis on historical flow, we construct a normal flow training sample aggregation and a abnormal flow training sample aggregation

    通過魏格納-威利分佈分析流量信號在時頻分佈上所反映出的內在特點,根據歷史流量的經驗構造流量和異流量兩個訓練樣本空間,通過k最近鄰分類演算法將帶檢測流量信號的時頻分佈與訓練樣本進行比較,完成對檢測樣本的自動分類識別。
  16. The results of trial indicate classification models constructed by this set of features can find an obvious threshold to distinguish between a normal network activity and an abnormal one. so the anomaly classification model offered in this thesis has better performance of detection

    通過大量的實驗,表明應用我們所提出的基於連接記錄異檢測分類模型的構建方法,能夠以較為明顯的閾值把正常網路活動與異活動區分開,因此,本文提出的異檢測分類模型具有較好的檢測性能。
  17. It can show significant difference between normal flows and attack flows in the correlation, which offers a new method to analyze the correlation in anomaly detection. the second analysis method is multi - similarity analysis of network charact - eristics

    通過主成分宏觀分析和微觀分析,該方法很好地分析了流量內部微觀的行為和關系,很好地區分了正常網路流和異流在相關性上的不同,為異發現提供了新的思
  18. But the potential for such citizen science is expanding rapidly because of moore ' s law ? the doubling of processor power every 18 months or so ? and a similarly speedy growth of the bandwidth available to ordinary internet users

    但是,這種公民科學(或稱大眾科學)發展迅猛的潛在因素是因為摩爾法則(大約每18個月處理器的能力就會加倍)與正常網路用戶所能使用的帶寬出現了同樣的快速提高。
  19. We do researches on constructing normal model of network traffic, analysizing self - similarity of network traffics - hurst parameter, and its time variable function h ( t ). experimental analysis confirmed the validity of the novel mechanism, limiting the extent of network traffic in time and detecting the ddos attack through measuring the change of h parameter brought by the attacks. moreover we use database to refine the ddos attack

    主要成果為: ( 1 )對流量的自相似性? hurst參數、 hurst參數的時變函數h ( t )進行分析,建立正常網路流量模型,比傳統的特徵匹配更準確描述了流量的特性; ( 2 )通過實驗驗證了,基於正常網路流量模型,對流量進行實時限幅,由自相似性的變化來預測ddos攻擊方法的確性; ( 3 )對于不同的攻擊方式,我們使用不同的方法進行檢測,並用數據庫對流經的包頭信息進行統計分析,來對攻擊定位。
  20. By adopting the real - time rescaled range ( rrs ) algorithm developed from the rs method, we do the simulation work using fractional gaussian noise ( fgn ) and real network traffic data collected from lan and wan. it shows the method we bring up can differentiate normal network traffic and ddos attack traffic effectively and precisely in most situation, and has provided a new way to detect and prevent ddos attack duly and precisely

    通過基於rs演算法改進的實時hurst系數估計演算法rrs ,採用分形高斯噪聲和局域、廣域真實業務數據進行了模擬實驗,結果表明本文所提出的方法可以在絕大多數情況下準確高效地區分正常網路業務和包含了ddos攻擊的數據業務,從而為及時、準確地判斷和制止大規模ddos攻擊的發生提供了新的手段。
分享友人