行為異常 的英文怎麼說
中文拼音 [hángwéiyìcháng]
行為異常
英文
behavior disorder-
Instruction detection technology is core in instruction detection system, it include abnormity instruction and abused instruction detection, on the basis of traditional network security model, ppdr model, instruction detection principle and instruction technology analysis, the author has brought forward instruction detection method based genetic neural networks, adopted genetic algometry and bp neural networks union method, and applied in instruction detection system, solve traditional bp algometry lie in absence about constringency rate slowly and immersion minim value
入侵檢測分析技術是入侵檢測系統的核心,主要分為異常入侵檢測和誤用入侵檢測。作者在對傳統網路安全模型、 ppdr模型、入侵檢測原理以及常用入侵檢測技術進行比較分析的基礎上,提出了一個基於遺傳神經網路的入侵檢測方法,採用遺傳演算法和bp神經網路相結合的方法?遺傳神經網路應用於入侵檢測系統中,解決了傳統的bp演算法的收斂速度慢、易陷入局部最小點的問題。The essence of edid is to set up a normal behavior fuzzy sub collection a on the basis of watching the normal system transfer of the privilege process, and set up a fuzzy sub collection b with real time transfer array, then detect with the principle of minimum distance in fuzzy discern method the innovation point of this paper is : put forward the method of edid, can not only reduce efficiently false positive rate and false negative rate, also make real time intrusion detection to become possibility ; have independent and complete character database, according to the classification of monitoring program, design normal behavior and anomaly behavior etc., have raised the strongness of ids ; use tree type structure to preservation the character database, have saved greatly stock space ; in detection invade, carry out frequency prior principle, prior analysis and handling the behavior feature of high frequency in information table, have raised efficiency and the speed of detection, make real time intrusion detection to become possibility ; have at the same time realized anomaly intrusion detection and misuse intrusion detection, have remedied deficiency of unitary detection method
這種方法的實質是在監控特權進程的正常系統調用基礎上建立正常行為模糊子集a ,用檢測到的實時調用序列建立模糊子集b ,然後用模糊識別方法中的最小距離原則進行檢測。本文的創新點是:通過對特權進程的系統調用及參數序列的研究,提出了基於euclidean距離的入侵檢測方法edid ,不僅能有效降低漏報率和誤報率,而且使實時入侵檢測成為可能;設計有獨立而完整的特徵數據庫,根據被監控程序的類別,分別設計正常行為、異常行為等,提高了檢測系統的強健性和可伸縮性;特徵數據庫按樹型結構存儲,大大節省了存儲空間;在檢測入侵時,實行頻度優先原則,優先分析和處理信息表中的高頻度行為特徵,提高檢測的速度和效率,使實時入侵檢測成為可能;同時實現了異常入侵檢測和誤用入侵檢測,彌補了單一檢測方法的不足。Statistics implies the self - serving attribution behavior is very popular in listed companies and violates the reliability principle for information disclosure
統計數據顯示, 「非典」時期,相關行業公司的自利性歸因行為異常突出,違背了信息披露的「可靠性原則」 。Doctors traditionally consider the possibility of autism only if a child shows delayed speech or unusually repetitive behaviors
傳統醫學認為,只有嬰兒表現出語言發育遲緩或行為異常才有患上自閉癥的可能。In the listing companies, the related trading is so frequent that it has played an extremely active part in adjusting the operational structure, enlarging the scale of enterprises and enhancing the economic strength of listing companies
在我國上市公司中,關聯方交易行為異常頻繁,上市公司通過關聯方交易調整了企業的經營結構,擴大了企業的規模,增強了上市公司的經濟實力,無疑具有積極的作用。Item 40 : use checked exceptions for recoverable conditions and runtime exceptions for programming errors
第40條:為可恢復的條件使用檢查型異常,為編程錯誤使用運行時異常。In c, errors in the program at run time are propagated through the program using a mechanism called exceptions
在c #中,程序中的運行時錯誤使用一種稱為「異常」的機制在程序中傳播。The paths for hydrocarbon migration were dominated by faulting, unconformity, pores or fissure network system, where the driving forces for oil / gas migration would be abnormal high pressure ( niubao formation depositional period ) and hydrostatic pressure ( dinqing lake formation depositional period )
油氣運移沿斷層、不整合、孔隙或裂隙連絡體系進行,運移驅動力在牛堡組沉積期為異常高壓,而丁青湖組沉積期則為靜水壓力。Meditation helps to maintain a more balanced and stable physiological functioning. this, in effect, brings about significant changes in the long - standing aberrant behavior patterns of drug abusers
打坐可以幫助維持生理的平衡及穩定功能,對于濫用藥物所引起長期行為異常的犯人,產生重要的改變。Compass deflection, panda behavior, together with the legacy of disappearances before the benefit of the doubt, the ravine before us suddenly and bewildering up
指南針偏轉、熊貓行為異常,連同之前的失蹤事件遺留的疑點,令黑竹溝在我們面前忽然又撲朔迷離起來。It can show significant difference between normal flows and attack flows in the correlation, which offers a new method to analyze the correlation in anomaly detection. the second analysis method is multi - similarity analysis of network charact - eristics
通過主成分宏觀分析和微觀分析,該方法很好地分析了流量內部微觀的行為和關系,很好地區分了正常網路流和異常網路流在相關性上的不同,為異常發現提供了新的思路。When a managed client calls a com object, the runtime maps the com object s failure hresults to exceptions, which the marshaler throws on return from the call
當託管客戶端調用com對象時,運行庫將com對象的指示失敗的hresult映射為異常,封送拆收器在從調用返回時引發該異常。If you set the interval to 0, it throws a run - time exception
如果將間隔設置為0 ,則它將引發運行時異常。If you set the interval to 0, it will throw a run - time exception
如果將間隔設置為0 ,將引發運行時異常。 visual basic 2005的Children are particularly vulnerable to lead exposure. elevated blood lead in children can also result in learning disabilities, behavioural problems and mental retardation
兒童較成人易受鉛毒傷害,常見的病徵包括學習遲緩行為異常及智力發展障礙。Generally, mental and behavioural disorders are common during childhood and adolescence
總的來說,精神和行為異常在兒童和成人都很常見。31 of them grew into normal adults and shown no physiological and behavior abnormality
健康成年的31隻icsi小鼠,沒有明顯的生理和行為異常。Twenty - five per cent of individuals develop one or more mental or behavioural disorders at some stage in life, in both developed and developing countries
在發達國家和發展中國家, 25 %的兒童和成人在一生中會發生一種或多種精神和行為異常。During the uptake phase, the abnormal behavior of treated fish in 95 % flumorph technical ( 2. 165 mg / l ) was observed, and the growth including weight and length were retarded to some extent
試驗結果表明: 95氟嗎啉原藥2 . 165mg l濃度組的鯉魚在試驗期間其生長發育及行為異常,體重和體長受到不同程度抑制。The system capture the network packet with the help of winpcap, then analysis the packet, mainly analysis ip, tcp, udp and icmp protocol, and then display the data and store the data into the logs that may be analysed anon. and i design a intrusion detection language, and realize a intrusion detection database. after the network packet was captured, it match the packet
其主要流程是數據包捕獲模塊運用winpcap抓取網路數據包,然後對數據包進行協議分析,主要分析了ip , tcp , udp , icmp協議,並且按照數據包的協議類型顯示數據,並把數據記錄在日誌文件中供以後分析使用,同時設計了一個簡單的入侵描述語言,根據該語言的規則建立了一個入侵特徵數據庫,讓已抓獲的數據包與入侵特徵數據庫中的規則進行匹配,如果匹配成功,則說明有異常行為發生,否則,則說明行為正常。分享友人