行為異常 的英文怎麼說

中文拼音 [hángwéicháng]
行為異常 英文
behavior disorder
  • : 行Ⅰ名詞1 (行列) line; row 2 (排行) seniority among brothers and sisters:你行幾? 我行三。where...
  • : 形容詞1 (有分別; 不相同) different 2 (奇異; 特別) strange; unusual; extraordinary 3 (另外的;...
  • 行為 : action; behaviour; conduct; deed
  1. Instruction detection technology is core in instruction detection system, it include abnormity instruction and abused instruction detection, on the basis of traditional network security model, ppdr model, instruction detection principle and instruction technology analysis, the author has brought forward instruction detection method based genetic neural networks, adopted genetic algometry and bp neural networks union method, and applied in instruction detection system, solve traditional bp algometry lie in absence about constringency rate slowly and immersion minim value

    入侵檢測分析技術是入侵檢測系統的核心,主要分入侵檢測和誤用入侵檢測。作者在對傳統網路安全模型、 ppdr模型、入侵檢測原理以及用入侵檢測技術進比較分析的基礎上,提出了一個基於遺傳神經網路的入侵檢測方法,採用遺傳演算法和bp神經網路相結合的方法?遺傳神經網路應用於入侵檢測系統中,解決了傳統的bp演算法的收斂速度慢、易陷入局部最小點的問題。
  2. The essence of edid is to set up a normal behavior fuzzy sub collection a on the basis of watching the normal system transfer of the privilege process, and set up a fuzzy sub collection b with real time transfer array, then detect with the principle of minimum distance in fuzzy discern method the innovation point of this paper is : put forward the method of edid, can not only reduce efficiently false positive rate and false negative rate, also make real time intrusion detection to become possibility ; have independent and complete character database, according to the classification of monitoring program, design normal behavior and anomaly behavior etc., have raised the strongness of ids ; use tree type structure to preservation the character database, have saved greatly stock space ; in detection invade, carry out frequency prior principle, prior analysis and handling the behavior feature of high frequency in information table, have raised efficiency and the speed of detection, make real time intrusion detection to become possibility ; have at the same time realized anomaly intrusion detection and misuse intrusion detection, have remedied deficiency of unitary detection method

    這種方法的實質是在監控特權進程的正系統調用基礎上建立正模糊子集a ,用檢測到的實時調用序列建立模糊子集b ,然後用模糊識別方法中的最小距離原則進檢測。本文的創新點是:通過對特權進程的系統調用及參數序列的研究,提出了基於euclidean距離的入侵檢測方法edid ,不僅能有效降低漏報率和誤報率,而且使實時入侵檢測成可能;設計有獨立而完整的特徵數據庫,根據被監控程序的類別,分別設計正等,提高了檢測系統的強健性和可伸縮性;特徵數據庫按樹型結構存儲,大大節省了存儲空間;在檢測入侵時,實頻度優先原則,優先分析和處理信息表中的高頻度特徵,提高檢測的速度和效率,使實時入侵檢測成可能;同時實現了入侵檢測和誤用入侵檢測,彌補了單一檢測方法的不足。
  3. Statistics implies the self - serving attribution behavior is very popular in listed companies and violates the reliability principle for information disclosure

    統計數據顯示, 「非典」時期,相關業公司的自利性歸因行為異常突出,違背了信息披露的「可靠性原則」 。
  4. Doctors traditionally consider the possibility of autism only if a child shows delayed speech or unusually repetitive behaviors

    傳統醫學認,只有嬰兒表現出語言發育遲緩或行為異常才有患上自閉癥的可能。
  5. In the listing companies, the related trading is so frequent that it has played an extremely active part in adjusting the operational structure, enlarging the scale of enterprises and enhancing the economic strength of listing companies

    在我國上市公司中,關聯方交易行為異常頻繁,上市公司通過關聯方交易調整了企業的經營結構,擴大了企業的規模,增強了上市公司的經濟實力,無疑具有積極的作用。
  6. Item 40 : use checked exceptions for recoverable conditions and runtime exceptions for programming errors

    第40條:可恢復的條件使用檢查型編程錯誤使用運
  7. In c, errors in the program at run time are propagated through the program using a mechanism called exceptions

    在c #中,程序中的運時錯誤使用一種稱」的機制在程序中傳播。
  8. The paths for hydrocarbon migration were dominated by faulting, unconformity, pores or fissure network system, where the driving forces for oil / gas migration would be abnormal high pressure ( niubao formation depositional period ) and hydrostatic pressure ( dinqing lake formation depositional period )

    油氣運移沿斷層、不整合、孔隙或裂隙連絡體系進,運移驅動力在牛堡組沉積期高壓,而丁青湖組沉積期則靜水壓力。
  9. Meditation helps to maintain a more balanced and stable physiological functioning. this, in effect, brings about significant changes in the long - standing aberrant behavior patterns of drug abusers

    打坐可以幫助維持生理的平衡及穩定功能,對于濫用藥物所引起長期行為異常的犯人,產生重要的改變。
  10. Compass deflection, panda behavior, together with the legacy of disappearances before the benefit of the doubt, the ravine before us suddenly and bewildering up

    指南針偏轉、熊貓行為異常,連同之前的失蹤事件遺留的疑點,令黑竹溝在我們面前忽然又撲朔迷離起來。
  11. It can show significant difference between normal flows and attack flows in the correlation, which offers a new method to analyze the correlation in anomaly detection. the second analysis method is multi - similarity analysis of network charact - eristics

    通過主成分宏觀分析和微觀分析,該方法很好地分析了流量內部微觀的和關系,很好地區分了正網路流和網路流在相關性上的不同,發現提供了新的思路。
  12. When a managed client calls a com object, the runtime maps the com object s failure hresults to exceptions, which the marshaler throws on return from the call

    當託管客戶端調用com對象時,運庫將com對象的指示失敗的hresult映射,封送拆收器在從調用返回時引發該
  13. If you set the interval to 0, it throws a run - time exception

    如果將間隔設置0 ,則它將引發運
  14. If you set the interval to 0, it will throw a run - time exception

    如果將間隔設置0 ,將引發運。 visual basic 2005的
  15. Children are particularly vulnerable to lead exposure. elevated blood lead in children can also result in learning disabilities, behavioural problems and mental retardation

    兒童較成人易受鉛毒傷害,見的病徵包括學習遲緩行為異常及智力發展障礙。
  16. Generally, mental and behavioural disorders are common during childhood and adolescence

    總的來說,精神和行為異常在兒童和成人都很見。
  17. 31 of them grew into normal adults and shown no physiological and behavior abnormality

    健康成年的31隻icsi小鼠,沒有明顯的生理和行為異常
  18. Twenty - five per cent of individuals develop one or more mental or behavioural disorders at some stage in life, in both developed and developing countries

    在發達國家和發展中國家, 25 %的兒童和成人在一生中會發生一種或多種精神和行為異常
  19. During the uptake phase, the abnormal behavior of treated fish in 95 % flumorph technical ( 2. 165 mg / l ) was observed, and the growth including weight and length were retarded to some extent

    試驗結果表明: 95氟嗎啉原藥2 . 165mg l濃度組的鯉魚在試驗期間其生長發育及行為異常,體重和體長受到不同程度抑制。
  20. The system capture the network packet with the help of winpcap, then analysis the packet, mainly analysis ip, tcp, udp and icmp protocol, and then display the data and store the data into the logs that may be analysed anon. and i design a intrusion detection language, and realize a intrusion detection database. after the network packet was captured, it match the packet

    其主要流程是數據包捕獲模塊運用winpcap抓取網路數據包,然後對數據包進協議分析,主要分析了ip , tcp , udp , icmp協議,並且按照數據包的協議類型顯示數據,並把數據記錄在日誌文件中供以後分析使用,同時設計了一個簡單的入侵描述語言,根據該語言的規則建立了一個入侵特徵數據庫,讓已抓獲的數據包與入侵特徵數據庫中的規則進匹配,如果匹配成功,則說明有發生,否則,則說明
分享友人