用網捕獲的 的英文怎麼說
中文拼音 [yòngwǎngbǔhuòde]
用網捕獲的
英文
netted- 用 : Ⅰ動詞1 (使用) use; employ; apply 2 (多用於否定: 需要) need 3 (敬辭: 吃; 喝) eat; drink Ⅱ名...
- 網 : Ⅰ名詞1 (捕魚捉鳥的器具) net 2 (像網的東西) thing which looks like a net 3 (像網一樣的組織或...
- 捕 : 捕名詞(姓氏) a surname
- 獲 : Ⅰ動詞1. (捉住; 擒住) capture; catch 2. (得到;取得) obtain; win; reap 3. (收割) reap; harvest Ⅱ名詞(姓氏) a surname
- 的 : 4次方是 The fourth power of 2 is direction
- 捕獲 : 1. (捉到; 逮住) catch; capture; succeed in catching; acquire; arrest; seize 2. (俘獲) trapping
-
The intrusion detection system chooses the misuse detection technology. the main content of the paper is divided into four sections : section 1 mainly explores the windows network architectonics, analyzed the program of ndis, and introduced the main network data capture schema of lower layer ; then introduced the mechanism of packet capture and filter, and analyzed the framework of winpcap in capture and filter packet on the bases of former work
本論文主要包括四個方面:第一部分主要分析了windows的網路體系結構,剖析了網路驅動介面規范( ndis )的編程,介紹了低層網路數據的主要的捕獲方案:然後介紹了包捕獲和過濾機制;最後在前兩者的基礎上,分析了本系統開發用工具winpcap數據包捕獲和過濾的的結構。During the procedure of system design and implementation, the author has made some innovative efforts such as : ( d establishing the user interest orientated model, the model receiving user interests continuously and conjecturing user interests by interaction with the user, accumulating user preferences in information demand, thereby achieving self - adaptive retrieval, ? roviding a feedback method which is based on the human - machine interaction, summarizing the user operations on the interface of result presentation, and designing an algorithm for capturing user operation behaviors, by which the changes in user interests and preferences can be learned potentially, ? ffering a method for user interest mining which can extract subjects of information confirmed by user, thereby conjecturing or predicting different kinds of expressions of the same interest or extracting the new interests or unexpressed interests, ? roposing a solution of personalized internet information retrieval based on the user interests in accordance with the above - mentioned work, the solution having very strong feasibility and practicality with taking user interest model as center, employing machine learning ( active learning and passive learning ) and data mining as tools, and being assisted with network robot,
Piirs系統分析與設計過程中所做的創新性的嘗試主要有以下幾個方面:實現了基於用戶興趣的用戶模型,該模型通過與用戶的交互(主動交互和被動交互) ,不斷地接收用戶的興趣和推測用戶的興趣,積累用戶信息需求的偏好,實現自適應的檢索;提供了一種基於人機交互的反饋方法,對用戶在結果呈現界面上的操作進行了歸納總結,設計了用戶操作捕獲演算法, 「隱性地」學習用戶興趣和偏好的變化;提供了一種用戶需求挖掘的方法,對用戶已確定的信息做進一步的主題挖掘,由此推測或預測用戶同一興趣的不同表述方式或者挖掘出用戶新的或未表達出來的興趣;在上述工作基礎上提出了一套完整的基於用戶興趣的個性化網路信息檢索的解決方案,該方案以用戶興趣模型為中心,以機器學習(主動學習和被動學習)和數據挖掘為手段,輔以網路機器人,具有很強的可行性和實用性。There are two series interface installed on the os in advance, the one is called bsd socket designed by berkeley software, with the working mode of blocking synchronization, nonblocking asynchronization and polling, the other is named winsock designed by microsoft, worked via the way of windows message driven. as the foundation of process socket seizing technologies under microsoft windows, api ( application program interface ) hook technology is the core to achieve
Windows進程套接字數據劫持技術的基礎部分, windows應用程序介面api掛接技術,該技術是實現操作系統不支持的特殊功能的應用程序的核心,有相當難度,與傳統的基於網路設備介面規范( ndis )的包過濾技術相比,該技術的不同之處在於它可以在應用層上對任意進程的網路輸入和輸出數據進行捕獲。According the cidf pattern, the system was divided into five fundamental modules : packet capture, network sniffer, rules disposal, data analyze and system reaction. each module mapp ed to different applications and the system function was introduced in brief
根據cidf入侵檢測模型,將系統分為五個基本模塊:數據捕獲、網路監聽、規則處理、數據分析和系統響應模塊,分別對應于不同的應用功能;並對目前開發的系統功能做了簡單的介紹。The predominant fishing method is trawling, which accounted for 86 per cent of the catch, or 145 660 tonnes
他們主要利用拖網捕魚,占漁獲量的86 % ,重量達145660公噸。Functionality that microsoft describes or markets as being part of a microsoft middleware product such as a service pack, upgrade, or bug fix for internet explorer, or that is a version of a microsoft middleware product such as internet explorer 5. 5, shall be considered to be part of that microsoft middleware product
1989年美國在這一法案的修正中又增加了推動其他國家使用既能夠提升海蝦捕獲量,又能使誤入捕蝦網的海得以逃生逃生率97的海排離器ted的條款609條款。Re can be further broken down into the activities of fact - finding ( identification of sources of requirements or stake - holders as we will call them in rest of this document ), information gathering ( getting the “ wish - list ” from all the relevant parties ) and integration ( documenting & refining the “ wish - list ” through repeated analysis until it is self - consistent )
需求捕獲可進一步分為查找需求源(識別需求的提出人或則稱之為風險承擔者,即產品涉及其利益的人,在該文檔其餘部分將繼續使用風險承擔者這個詞) ,網羅信息(收集各方面人員的對產品的要求,得到「期望列表」 )和整和(反復分析「期望列表」直到前後一致,得到文檔化,提煉后的「期望列表」 )等活動。Secondly, to achieve the independent regulation of active and reactive power output from the generator side which is designed for the purpose of tracing the maximum wind - energy capturing. the paper has analyzed the mathematic model of the ac excited doubly - fed machine and the stator field orientation control strategy of the motor as vscf wind power generator. thirdly, it has put forward and designed the dual pwm converter with the capacity of energy flowing bidirectional aimed at the demand of rotor energy bidirectional flow. the author constructed reliable and integrated experimental system and did a series of experimental study including no - load, cutting - in network and power generation at, below and above the synchronous speed
論文首先分析了風機運行特性及其最佳風能利用原理,通過模擬及實驗驗證了採用直流電機的輸出特性模擬風力機的最大輸出功率曲線的可行性,並給出了模擬系統的硬體結構;然後為了實現交流勵磁發電機有功、無功功率獨立調節機理,分析了交流勵磁雙饋發電機的數學模型和在追蹤最大風能捕獲變速恆頻風力發電時必需的定子磁鏈定向矢量控制策略;針對雙饋發電機轉子能量雙向流動的要求,提出並設計了具有能量雙向流動能力的雙pwm交流勵磁用變頻器;最後為實現從理論到實踐的全面研究,研製出了一套小功率完整的雙pwm變頻器交流勵磁的雙饋風力發電機實驗系統,進行了空載、並網、同步速及上、下的發電運行等一系列的運行實驗;所完成的模擬和實驗研究均驗證了理論、模型和控制策略的正確性、可行性。" non - microsoft middleware " means a non - microsoft software product running on a windows operating system product that exposes a range of functionality to isvs through published apis, and that could, if ported to or made interoperable with, a non - microsoft operating system, thereby make it easier for applications that rely in whole or in part on the functionality supplied by that software product to be ported to or run on that non - microsoft operating system
該條款的含義是,推動其他國家使用ted提高海的保護程度。在一定的海域內,如果某國的捕蝦網上沒有使用海排離器,或沒有達到美國保護海的標準,美國將禁止從該國進口捕獲的野生蝦及蝦類製品。Firstly, the paper, combining the characteristic of synchronous pulse bursts and inhibition with the modified pcnn model, presents a way of finding the foveation points in the images adaptively and effectively, and simulates the human vision system. secondly, pcnn is extended to pcnns, based on the properties of information couple and transmission, an algorithm that is used to fuse images of the same target got by several sensors to an image is presented to simulate the human vision system. thirdly, combining the properties of synchronous pulse bursts, capture, and transmission and competition of waves, the paper presents two ways of classification, one is an algorithm based on the properties of neuron to capture and inhibit to classify the data taking on any complex unlinear distribution robustly, the other is based on the restricted distance and modified of the former to remove the influence of inferior samples in classification ; fin ally, based on the accumulative difference pictures, and the forming and transmission of pcnn wave, selecting and controlling the direction of autowave by connecting the neighbouring neurons selectively, the paper presents a way to simulate the tracks of moving object and detect the moving direction
首先結合pcnn的同步脈沖發放和側抑制特性,提出了基於改進型pcnn的圖像凹點檢測演算法,該演算法是一種自適應而有效的圖像凹點檢測方法,並且較好地模擬了人類視覺系統;然後,結合信息傳遞和信息耦合特性,將pcnn擴展成pcnns ( pcnn網路群) ,提出了一種基於pcnns的圖像融合演算法,能夠將多個傳感器獲取的同一目標的圖像信息融合到一幅圖像中,有效模擬了人類視覺系統;另外,結合pcnn的同步脈沖發放特性、捕獲特性和波的傳播競爭特性,開拓地將pcnn用於模式分類中,提出了基於耦合神經元點火捕獲抑制特性的分類方法和改進的約束距離下的pcnn分類方法,前者可實現對樣本空間中任意復雜分佈訓練樣本的穩健非線性分類,而後者能夠消除訓練樣本中刺點對分類的影響;最後,結合累積差分圖像思想、 pcnn波的形成與傳播特性,通過各神經元之間連接取向來選擇與控制自動波的流向,將pcnn用於運動視覺分析中的運動軌跡模擬及運動方向檢測。We use the tms320dm642 as the core of the whole hardware system, configure abundant function module for system adopting modularization design idea, including emif bus configuration module, audio module, video capture module, video display module and network module
整個硬體系統以tms320dm642為核心,採用模塊化設計思想,為系統配置了豐富的功能模塊: emif總線配置模塊、音頻模塊、視頻捕獲模塊、視頻顯示模塊以及網路模塊。According to the similarity between path selection in p2p system and internet route action, every peer is seen as a router and builds its own route table ; 2. to find special peers and store their information in default column of the route table ; 3. to use methods ( integration route table, or hop route table ) to initiatively get the network changes and store those in the route table ; the thesis compares the integration route table method and the hop route table method, then it compares the route table method and directed breadth first search method based on experiments, and draws conclusions
根據網路具有動態變化的特性,用兩種動態路由方法:集成路由表法和跳數路由表法,主動捕獲網路中發生的變化,並把系統中發生的變化進行更新,存儲到路由表中,為進行動態路由提供信息;本文先對集成路由表和跳數路由表方法進行了實驗比較,然後將路由表查找方法與定向廣度優先搜索方法進行了實驗比較,並得出結論:對比開銷和查找性能的提高,可以看出路由表查找方法是一個比較好的查找方法。Efm use ordinary ethernet frame to transport oam information but special destination address and type code field, considering epon protocols were standarded last year, most of the network device may not recognize the oam frame above data link layer, so we use linux access link layer method to construct / capture oam frame at l2
Ieee802 . 3ah協議規定使用標準的以太幀作為傳送oam信息的載體,但使用特殊的組播目的地址域和類型/長度域,以區別普通的以太數據。由於協議是2004年剛頒布的,所以現有的網路設備很可能不能識別新的oam幀,這就需要在數據鏈路層對數據包進行捕獲和構造。Network engineers used advanced packet capture and filtered on specific words and text strings to confirm suspicions
網路工程師使用了先進的數據包捕獲,對特定詞匯及文本字元串進行過濾,來確認懷疑是否屬實。According to the basic principle of tcp / ip and the analysis results, the smtp protocol filtering, the port filtering, the address filtering and the kinds filtering can be achieved. e - mails can beattained by the analysis of the smtp protocol and pop3 protocol. the control on the visiting target address can be implemented by using the filtering system on the e - mails and the analysis on the http protocols
通過利用winpcap開發包,實現了網路數據包的捕獲,利用tcp / ip協議的封裝理論,通過自下而上的分析,實現了地址過濾、類型過濾、協議過濾與埠過濾,通過對smtp協議、 pop3協議通信分析,提取了郵件,並通過過濾系統對郵件進行過濾,通過對http協議分析,實現基於目標地址的訪問控制。In this paper, the streaming media technology applied to network video monitor system are researched on the basis of video streaming. the emphases are put on system design, video captures and play, and the design of network transmission module and relevant software development method. in fact, uality of service of the network has unstable characteristics, we have analyzed qos guarantee strategy in video streaming transmission on network, and presents a integrated qos guarantee scheme which based on data encapsulation, buffer storage technology and congestion control on network. this scheme do its best to avoid the big delay or congestion on network based on make full use of network bandwidth, which can guarantee the best qos of the video transmission
重點討論了系統架構、視頻捕獲和播放、網路傳輸模塊設計以及相關軟體開發方法。同時,針對實際網路中存在的服務不穩定性特點,分析了視頻流在網路傳輸過程中的qos保證技術,並在系統中提出了基於數據封裝、緩存技術以及網路擁塞控制機制的綜合qos解決方案。該方案使系統在充分利用網路帶寬的情況下最大程度上避免出現大的延遲或擁塞,保證了視頻傳輸的最佳服務質量。The thesis describes the common network attack types as well as research condition of network intruding inspection system, and analyses the basic theory of network data packets transfer on account of protocol tcp / ip, and finally discusses network safe system framework on account of p2drr, which takes linux operating system as the development platform, has c as the development tool, uses libpcap as a tool to capture network data packets, and decode according to various protocols, along with the preprocess function on account of such inspection as i / o port scanning, and analyses the misuse inspecting technology deeply on account of key word mode matching, and studies theory abnormal inspecting system on account of data mining. the inspecting and output function of the whole system is designed as mold in plug - mechanism, so as to transplant and extend the system
論文介紹了網路常見的攻擊模式及網路入侵檢測系統的研究現狀,分析了基於tcp ip協議的網路數據包傳輸的基本原理,討論了基於p2drr模型的網路安全系統架構,本系統以linux操作系統為開發平臺,採用c作為開發工具,利用1ibpcap庫為工具捕獲網路數據包,並根據不同協議實現報文的解碼,實現了基於埠掃描等檢測的預處理功能,對基於關鍵字模式匹配的誤用檢測技術作了深入地分析,並對基於數據挖掘的異常檢測系統進行了探討,整個系統的檢測與輸出功能均以插件機制設計成模塊,以便系統的移植和擴展。The application may be a. helpful and innovational experiment. to each module and technology in the honeynet, for instance, data controlling, data analysis, data capture, virtual machine, intr is ion detection technique and secure communication technology, carry on detailed research and realize, provide intrision decetion source code. through this research about honeynet application in distributed denial of service, it have stated strong vitality on solve the new and old problem existing in network security
研究了將人工智慧思想引入到蜜網中的可行性?對人工神經網路中的經典演算法bp演算法在蜜網數據檢測和分析中的實際應用進行了詳細的剖析,進行了實現;可以認為是將人工智慧思想引入到蜜網中的一次有益的和創新的嘗試;對蜜網中的各個模塊和技術,如數據控制、數據分析、數據捕獲、虛擬機、入侵檢測技術和安全通信openssh技術等,進行了詳細的研究和實現,給出了入侵檢測部分功能的源碼。And the study of user ' s knowledge model includes seizing users " interest in their special domain, building and optimizing model, dealing with user ' s feedback, etc. at the end of the paper an application named sokey system is given out in textile industry. the system ' s whole structure and working flow are introduced and the dynamical refreshment of web pages, the automatic query of document information, segment browsing of result information, receiving and sending of user " information have been realized by using active server page 3. 0, insert language of vbscript and object orient database technology on the platform of windows2000 server
最後,本文給出了在紡織化纖領域的一個應用實例- - - sokey系統,介紹了sokey系統的總體架構和工作流程,並在windows2000server平臺上使用activeserverpage3 . 0 、 vbscript等嵌入式編程語言和面向對象的數據庫技術,完成了網頁信息的動態刷新、文檔信息的自動查詢、結果信息的分段瀏覽、用戶信息收發等功能模塊,使用vc完成了網路信息自動捕獲模塊。The system adopts different transmission method to improve the transmission efficiency with a view to different transmission characteristic of file data and picture data. it adopts the method of capturing data packets for file data, and storing, sending for picture data
針對文件數據和圖像數據不同的特點,採用不同的傳輸方式,對于文件數據採用數據包捕獲加密的方式,對于圖像數據採用存儲轉發的傳輸方式,有效地提高了網路傳輸效率。分享友人