用網捕獲的 的英文怎麼說

中文拼音 [yòngwǎnghuòde]
用網捕獲的 英文
netted
  • : Ⅰ動詞1 (使用) use; employ; apply 2 (多用於否定: 需要) need 3 (敬辭: 吃; 喝) eat; drink Ⅱ名...
  • : Ⅰ名詞1 (捕魚捉鳥的器具) net 2 (像網的東西) thing which looks like a net 3 (像網一樣的組織或...
  • : 捕名詞(姓氏) a surname
  • : Ⅰ動詞1. (捉住; 擒住) capture; catch 2. (得到;取得) obtain; win; reap 3. (收割) reap; harvest Ⅱ名詞(姓氏) a surname
  • : 4次方是 The fourth power of 2 is direction
  • 捕獲 : 1. (捉到; 逮住) catch; capture; succeed in catching; acquire; arrest; seize 2. (俘獲) trapping
  1. The intrusion detection system chooses the misuse detection technology. the main content of the paper is divided into four sections : section 1 mainly explores the windows network architectonics, analyzed the program of ndis, and introduced the main network data capture schema of lower layer ; then introduced the mechanism of packet capture and filter, and analyzed the framework of winpcap in capture and filter packet on the bases of former work

    本論文主要包括四個方面:第一部分主要分析了windows路體系結構,剖析了路驅動介面規范( ndis )編程,介紹了低層路數據主要方案:然後介紹了包和過濾機制;最後在前兩者基礎上,分析了本系統開發工具winpcap數據包和過濾結構。
  2. During the procedure of system design and implementation, the author has made some innovative efforts such as : ( d establishing the user interest orientated model, the model receiving user interests continuously and conjecturing user interests by interaction with the user, accumulating user preferences in information demand, thereby achieving self - adaptive retrieval, ? roviding a feedback method which is based on the human - machine interaction, summarizing the user operations on the interface of result presentation, and designing an algorithm for capturing user operation behaviors, by which the changes in user interests and preferences can be learned potentially, ? ffering a method for user interest mining which can extract subjects of information confirmed by user, thereby conjecturing or predicting different kinds of expressions of the same interest or extracting the new interests or unexpressed interests, ? roposing a solution of personalized internet information retrieval based on the user interests in accordance with the above - mentioned work, the solution having very strong feasibility and practicality with taking user interest model as center, employing machine learning ( active learning and passive learning ) and data mining as tools, and being assisted with network robot,

    Piirs系統分析與設計過程中所做創新性嘗試主要有以下幾個方面:實現了基於戶興趣戶模型,該模型通過與交互(主動交互和被動交互) ,不斷地接收興趣和推測興趣,積累戶信息需求偏好,實現自適應檢索;提供了一種基於人機交互反饋方法,對戶在結果呈現界面上操作進行了歸納總結,設計了戶操作演算法, 「隱性地」學習戶興趣和偏好變化;提供了一種戶需求挖掘方法,對戶已確定信息做進一步主題挖掘,由此推測或預測戶同一興趣不同表述方式或者挖掘出戶新或未表達出來興趣;在上述工作基礎上提出了一套完整基於戶興趣個性化路信息檢索解決方案,該方案以戶興趣模型為中心,以機器學習(主動學習和被動學習)和數據挖掘為手段,輔以路機器人,具有很強可行性和實性。
  3. There are two series interface installed on the os in advance, the one is called bsd socket designed by berkeley software, with the working mode of blocking synchronization, nonblocking asynchronization and polling, the other is named winsock designed by microsoft, worked via the way of windows message driven. as the foundation of process socket seizing technologies under microsoft windows, api ( application program interface ) hook technology is the core to achieve

    Windows進程套接字數據劫持技術基礎部分, windows應程序介面api掛接技術,該技術是實現操作系統不支持特殊功能程序核心,有相當難度,與傳統基於路設備介面規范( ndis )包過濾技術相比,該技術不同之處在於它可以在應層上對任意進程路輸入和輸出數據進行
  4. According the cidf pattern, the system was divided into five fundamental modules : packet capture, network sniffer, rules disposal, data analyze and system reaction. each module mapp ed to different applications and the system function was introduced in brief

    根據cidf入侵檢測模型,將系統分為五個基本模塊:數據路監聽、規則處理、數據分析和系統響應模塊,分別對應于不同功能;並對目前開發系統功能做了簡單介紹。
  5. The predominant fishing method is trawling, which accounted for 86 per cent of the catch, or 145 660 tonnes

    他們主要利魚,占漁86 % ,重量達145660公噸。
  6. Functionality that microsoft describes or markets as being part of a microsoft middleware product such as a service pack, upgrade, or bug fix for internet explorer, or that is a version of a microsoft middleware product such as internet explorer 5. 5, shall be considered to be part of that microsoft middleware product

    1989年美國在這一法案修正中又增加了推動其他國家使既能夠提升海蝦量,又能使誤入海得以逃生逃生率97海排離器ted條款609條款。
  7. Re can be further broken down into the activities of fact - finding ( identification of sources of requirements or stake - holders as we will call them in rest of this document ), information gathering ( getting the “ wish - list ” from all the relevant parties ) and integration ( documenting & refining the “ wish - list ” through repeated analysis until it is self - consistent )

    需求可進一步分為查找需求源(識別需求提出人或則稱之為風險承擔者,即產品涉及其利益人,在該文檔其餘部分將繼續使風險承擔者這個詞) ,羅信息(收集各方面人員對產品要求,得到「期望列表」 )和整和(反復分析「期望列表」直到前後一致,得到文檔化,提煉后「期望列表」 )等活動。
  8. Secondly, to achieve the independent regulation of active and reactive power output from the generator side which is designed for the purpose of tracing the maximum wind - energy capturing. the paper has analyzed the mathematic model of the ac excited doubly - fed machine and the stator field orientation control strategy of the motor as vscf wind power generator. thirdly, it has put forward and designed the dual pwm converter with the capacity of energy flowing bidirectional aimed at the demand of rotor energy bidirectional flow. the author constructed reliable and integrated experimental system and did a series of experimental study including no - load, cutting - in network and power generation at, below and above the synchronous speed

    論文首先分析了風機運行特性及其最佳風能利原理,通過模擬及實驗驗證了採直流電機輸出特性模擬風力機最大輸出功率曲線可行性,並給出了模擬系統硬體結構;然後為了實現交流勵磁發電機有功、無功功率獨立調節機理,分析了交流勵磁雙饋發電機數學模型和在追蹤最大風能變速恆頻風力發電時必需定子磁鏈定向矢量控制策略;針對雙饋發電機轉子能量雙向流動要求,提出並設計了具有能量雙向流動能力雙pwm交流勵磁變頻器;最後為實現從理論到實踐全面研究,研製出了一套小功率完整雙pwm變頻器交流勵磁雙饋風力發電機實驗系統,進行了空載、並、同步速及上、下發電運行等一系列運行實驗;所完成模擬和實驗研究均驗證了理論、模型和控制策略正確性、可行性。
  9. " non - microsoft middleware " means a non - microsoft software product running on a windows operating system product that exposes a range of functionality to isvs through published apis, and that could, if ported to or made interoperable with, a non - microsoft operating system, thereby make it easier for applications that rely in whole or in part on the functionality supplied by that software product to be ported to or run on that non - microsoft operating system

    該條款含義是,推動其他國家使ted提高海保護程度。在一定海域內,如果某國上沒有使海排離器,或沒有達到美國保護海標準,美國將禁止從該國進口野生蝦及蝦類製品。
  10. Firstly, the paper, combining the characteristic of synchronous pulse bursts and inhibition with the modified pcnn model, presents a way of finding the foveation points in the images adaptively and effectively, and simulates the human vision system. secondly, pcnn is extended to pcnns, based on the properties of information couple and transmission, an algorithm that is used to fuse images of the same target got by several sensors to an image is presented to simulate the human vision system. thirdly, combining the properties of synchronous pulse bursts, capture, and transmission and competition of waves, the paper presents two ways of classification, one is an algorithm based on the properties of neuron to capture and inhibit to classify the data taking on any complex unlinear distribution robustly, the other is based on the restricted distance and modified of the former to remove the influence of inferior samples in classification ; fin ally, based on the accumulative difference pictures, and the forming and transmission of pcnn wave, selecting and controlling the direction of autowave by connecting the neighbouring neurons selectively, the paper presents a way to simulate the tracks of moving object and detect the moving direction

    首先結合pcnn同步脈沖發放和側抑制特性,提出了基於改進型pcnn圖像凹點檢測演算法,該演算法是一種自適應而有效圖像凹點檢測方法,並且較好地模擬了人類視覺系統;然後,結合信息傳遞和信息耦合特性,將pcnn擴展成pcnns ( pcnn路群) ,提出了一種基於pcnns圖像融合演算法,能夠將多個傳感器同一目標圖像信息融合到一幅圖像中,有效模擬了人類視覺系統;另外,結合pcnn同步脈沖發放特性、特性和波傳播競爭特性,開拓地將pcnn於模式分類中,提出了基於耦合神經元點火抑制特性分類方法和改進約束距離下pcnn分類方法,前者可實現對樣本空間中任意復雜分佈訓練樣本穩健非線性分類,而後者能夠消除訓練樣本中刺點對分類影響;最後,結合累積差分圖像思想、 pcnn波形成與傳播特性,通過各神經元之間連接取向來選擇與控制自動波流向,將pcnn於運動視覺分析中運動軌跡模擬及運動方向檢測。
  11. We use the tms320dm642 as the core of the whole hardware system, configure abundant function module for system adopting modularization design idea, including emif bus configuration module, audio module, video capture module, video display module and network module

    整個硬體系統以tms320dm642為核心,採模塊化設計思想,為系統配置了豐富功能模塊: emif總線配置模塊、音頻模塊、視頻模塊、視頻顯示模塊以及路模塊。
  12. According to the similarity between path selection in p2p system and internet route action, every peer is seen as a router and builds its own route table ; 2. to find special peers and store their information in default column of the route table ; 3. to use methods ( integration route table, or hop route table ) to initiatively get the network changes and store those in the route table ; the thesis compares the integration route table method and the hop route table method, then it compares the route table method and directed breadth first search method based on experiments, and draws conclusions

    根據路具有動態變化特性,兩種動態路由方法:集成路由表法和跳數路由表法,主動路中發生變化,並把系統中發生變化進行更新,存儲到路由表中,為進行動態路由提供信息;本文先對集成路由表和跳數路由表方法進行了實驗比較,然後將路由表查找方法與定向廣度優先搜索方法進行了實驗比較,並得出結論:對比開銷和查找性能提高,可以看出路由表查找方法是一個比較好查找方法。
  13. Efm use ordinary ethernet frame to transport oam information but special destination address and type code field, considering epon protocols were standarded last year, most of the network device may not recognize the oam frame above data link layer, so we use linux access link layer method to construct / capture oam frame at l2

    Ieee802 . 3ah協議規定使標準以太幀作為傳送oam信息載體,但使特殊組播目地址域和類型/長度域,以區別普通以太數據。由於協議是2004年剛頒布,所以現有路設備很可能不能識別新oam幀,這就需要在數據鏈路層對數據包進行和構造。
  14. Network engineers used advanced packet capture and filtered on specific words and text strings to confirm suspicions

    路工程師使了先進數據包,對特定詞匯及文本字元串進行過濾,來確認懷疑是否屬實。
  15. According to the basic principle of tcp / ip and the analysis results, the smtp protocol filtering, the port filtering, the address filtering and the kinds filtering can be achieved. e - mails can beattained by the analysis of the smtp protocol and pop3 protocol. the control on the visiting target address can be implemented by using the filtering system on the e - mails and the analysis on the http protocols

    通過利winpcap開發包,實現了路數據包,利tcp / ip協議封裝理論,通過自下而上分析,實現了地址過濾、類型過濾、協議過濾與埠過濾,通過對smtp協議、 pop3協議通信分析,提取了郵件,並通過過濾系統對郵件進行過濾,通過對http協議分析,實現基於目標地址訪問控制。
  16. In this paper, the streaming media technology applied to network video monitor system are researched on the basis of video streaming. the emphases are put on system design, video captures and play, and the design of network transmission module and relevant software development method. in fact, uality of service of the network has unstable characteristics, we have analyzed qos guarantee strategy in video streaming transmission on network, and presents a integrated qos guarantee scheme which based on data encapsulation, buffer storage technology and congestion control on network. this scheme do its best to avoid the big delay or congestion on network based on make full use of network bandwidth, which can guarantee the best qos of the video transmission

    重點討論了系統架構、視頻和播放、路傳輸模塊設計以及相關軟體開發方法。同時,針對實際路中存在服務不穩定性特點,分析了視頻流在路傳輸過程中qos保證技術,並在系統中提出了基於數據封裝、緩存技術以及路擁塞控制機制綜合qos解決方案。該方案使系統在充分利路帶寬情況下最大程度上避免出現大延遲或擁塞,保證了視頻傳輸最佳服務質量。
  17. The thesis describes the common network attack types as well as research condition of network intruding inspection system, and analyses the basic theory of network data packets transfer on account of protocol tcp / ip, and finally discusses network safe system framework on account of p2drr, which takes linux operating system as the development platform, has c as the development tool, uses libpcap as a tool to capture network data packets, and decode according to various protocols, along with the preprocess function on account of such inspection as i / o port scanning, and analyses the misuse inspecting technology deeply on account of key word mode matching, and studies theory abnormal inspecting system on account of data mining. the inspecting and output function of the whole system is designed as mold in plug - mechanism, so as to transplant and extend the system

    論文介紹了路常見攻擊模式及路入侵檢測系統研究現狀,分析了基於tcp ip協議路數據包傳輸基本原理,討論了基於p2drr模型路安全系統架構,本系統以linux操作系統為開發平臺,採c作為開發工具,利1ibpcap庫為工具路數據包,並根據不同協議實現報文解碼,實現了基於埠掃描等檢測預處理功能,對基於關鍵字模式匹配檢測技術作了深入地分析,並對基於數據挖掘異常檢測系統進行了探討,整個系統檢測與輸出功能均以插件機制設計成模塊,以便系統移植和擴展。
  18. The application may be a. helpful and innovational experiment. to each module and technology in the honeynet, for instance, data controlling, data analysis, data capture, virtual machine, intr is ion detection technique and secure communication technology, carry on detailed research and realize, provide intrision decetion source code. through this research about honeynet application in distributed denial of service, it have stated strong vitality on solve the new and old problem existing in network security

    研究了將人工智慧思想引入到蜜可行性?對人工神經路中經典演算法bp演算法在蜜數據檢測和分析中實際應進行了詳細剖析,進行了實現;可以認為是將人工智慧思想引入到蜜一次有益和創新嘗試;對蜜各個模塊和技術,如數據控制、數據分析、數據、虛擬機、入侵檢測技術和安全通信openssh技術等,進行了詳細研究和實現,給出了入侵檢測部分功能源碼。
  19. And the study of user ' s knowledge model includes seizing users " interest in their special domain, building and optimizing model, dealing with user ' s feedback, etc. at the end of the paper an application named sokey system is given out in textile industry. the system ' s whole structure and working flow are introduced and the dynamical refreshment of web pages, the automatic query of document information, segment browsing of result information, receiving and sending of user " information have been realized by using active server page 3. 0, insert language of vbscript and object orient database technology on the platform of windows2000 server

    最後,本文給出了在紡織化纖領域一個應實例- - - sokey系統,介紹了sokey系統總體架構和工作流程,並在windows2000server平臺上使activeserverpage3 . 0 、 vbscript等嵌入式編程語言和面向對象數據庫技術,完成了頁信息動態刷新、文檔信息自動查詢、結果信息分段瀏覽、戶信息收發等功能模塊,使vc完成了路信息自動模塊。
  20. The system adopts different transmission method to improve the transmission efficiency with a view to different transmission characteristic of file data and picture data. it adopts the method of capturing data packets for file data, and storing, sending for picture data

    針對文件數據和圖像數據不同特點,採不同傳輸方式,對于文件數據採數據包加密方式,對于圖像數據採存儲轉發傳輸方式,有效地提高了路傳輸效率。
分享友人