誤用 的英文怎麼說

中文拼音 [yòng]
誤用 英文
misuse
  • : Ⅰ名詞(錯誤) mistake; error Ⅱ動詞1 (弄錯) mistake; misunderstand 2 (耽誤) miss 3 (使受損害...
  • : Ⅰ動詞1 (使用) use; employ; apply 2 (多用於否定: 需要) need 3 (敬辭: 吃; 喝) eat; drink Ⅱ名...
  1. The principle of misuse detection is analysed, on the basis of which the correlation techniques are introduced. the construction of misuse detection system is illuminated. the paper mainly designed and realized an antetype system of misuse and detection

    分析比較了基於主機的誤用行為檢測技術和基於網路的誤用行為檢測技術的特點,詳細說明了誤用行為檢測方法的原理和技術。
  2. However, since inside fault of currently financial reporting, its used wrongly, the unsymmetrical appearance of message yet may not relieved, and supply and demand is contradictorily yet very keen

    然而,由於現行財務報告體系的內生缺陷、不正確或誤用,信息不對稱現象仍未得以緩解,供求矛盾仍很尖銳。
  3. Firstly, due to the limitation of acquaintanceship the peasats mutual enthusiasm was wrongly regarded as their socialist enthusiasm, which resulted in the equalitarian distribution and impinged the middle peasants " interests ; secondly, the mistake of " left " was inevitable because the " left " policy was carried through from the top to the lower by executive orders, although the prorincial committee of hunan attempted to resist the mistake of " left " ; thirdly, according to the policy of " uniting middle peasants ", the middle peasants were only the objects of unibus so they might be regarded as friends or enemies as well and they could be united or perished as well

    究其原因,主要是三個方面,第一,由於當時認識水平所限,把農民的互助積極性當作社會主義積極性,實行平均主義,這樣必然會侵犯、損害中農利益。第二,雖然湖南省委對「左」的錯努力堅持加以糾正,但「左」的錯誤用行政命令方式自上而下,無法避免。第三, 「團結中農」在實踐中把中農作看統一戰線對象,則既可做朋友,也可成敵人,也即既可做團結對象,也可成為打擊目標。
  4. 17 report on misuse or losses of guest rooms

    報告客房的誤用或損失。
  5. Statues and formulas, these mechanical tools of a serviceable use, or rather misuse, of his natural faculties, are the ankle - chains of a continuous immaturity

    法則、公理這類與其說利還不如說誤用其天賦的機械工具,是持久不成熟狀態的腳鐐。
  6. According to the statistic result 80 % of told secret and network inbreak come from the inner network. the security problem produced by internal network misuse has become a kind of difficult problem in the research field of network security management

    統計表明,全球80 %以上的泄密和網路入侵來自於網路內部,因此內部網路誤用行為引起的安全問題已日益成為網路安全管理研究領域中的一個難題。
  7. Don t misapply it in a fit of fatigue

    也不會因為疲憊而誤用它) 。
  8. This helps you ensure that nobody else takes your annotation type and misapplies it or, better yet, that

    這樣有助於避免他人誤用您的注釋類型(或者最好的地方是,
  9. In this paper, we study focus on building intrusion detection model based the technique of data mining ( dm ). firstly, the paper designed a scheme to modeling intrusion detection based dm and bright forward the idea of descriptive model and classified model to intrusion detection. secondly, we designed and implemented a net data collection system with high performance and a scheme to pretreat net data. thirdly, after studying the algorithms to mine association rule and sequence rule in net data, we extended and improved the algorithms according to the characteristic of net data and the field knowledge of intrusion detection

    首先設計了基於數據挖掘技術的入侵檢測建模方案,提出使該技術建立入侵檢測描述性模型和分類模型的思想,並分類判決樹建立了入侵檢測分類模型;其次,設計和實現了一個高性能的網路數據採集系統和網路數據預處理的方案;然後,在對關聯規則挖掘和序列規則挖掘演算法進行研究的基礎上,結合網路數據的特性和入侵檢測領域的知識對演算法進行了擴展和改進,挖掘出了網路數據的關聯模式和序列模式;最後,研究了描述性模式的應,並設計出基於模式匹配的入侵檢測引擎,該引擎具有誤用檢測和異常檢測功能。
  10. He discusses nouns, pronouns, articles, verbs, tenses, voices, moods, participles, verbal nouns, narration, prepositions, sentences, words often misused and more

    書中談到名詞、代名詞、冠詞、動詞、時態、語態、語法、分詞、動名詞、敘述法、介詞、句子、常誤用的字等等。
  11. Protect sensitive information from misuse or wrongful disclosure

    防止敏感信息誤用或泄露
  12. Then, we can compare the current action pattern with the pattern in the pattern database to find out the known or unknown misuse intrusions and anomaly intrusions. the system model is extensible for adding new intrusion detection agents or new intrusion models. it adopts data mining technology to cut down the dependency of manual encoding and expert experience

    這些模式可來指導系統屬性的選擇和構造,挖掘生成出有的系統或者戶的行為模式(正常的或者異常的) ;通過比較當前的系統行為模式和已有的模式規則的相似度來發現已知或者未知的誤用入侵和異常入侵活動。
  13. Instruction detection technology is core in instruction detection system, it include abnormity instruction and abused instruction detection, on the basis of traditional network security model, ppdr model, instruction detection principle and instruction technology analysis, the author has brought forward instruction detection method based genetic neural networks, adopted genetic algometry and bp neural networks union method, and applied in instruction detection system, solve traditional bp algometry lie in absence about constringency rate slowly and immersion minim value

    入侵檢測分析技術是入侵檢測系統的核心,主要分為異常入侵檢測和誤用入侵檢測。作者在對傳統網路安全模型、 ppdr模型、入侵檢測原理以及常入侵檢測技術進行比較分析的基礎上,提出了一個基於遺傳神經網路的入侵檢測方法,採遺傳演算法和bp神經網路相結合的方法?遺傳神經網路應於入侵檢測系統中,解決了傳統的bp演算法的收斂速度慢、易陷入局部最小點的問題。
  14. In order to provide a comprehensive and one - stop service, a multi - disciplinary team comprising of social worker, registered nurse and special childcare worker will be formed

    專業團隊包括社會工作員、護士、特殊幼兒工作員;本服務亦與婦產科醫生及物質誤用診所的精神科醫生有緊密聯系及合作。
  15. Most of the book is about using grammar in the real world, but it also covers vocabulary ( including easily confused words ), idioms, formal and informal styles, spelling, cross - references, and differences between american and british english

    作者累積多年的豐富教學經驗,整理出常見的英語錯誤用法,作完整清晰的說明解釋,並加上實例句,幫你?清細微的文法錯,使英語能力更加精進。
  16. Education the genuine article, literature, journalism, prize titbits, up to date billing, hydros and concert tours in english watering resorts packed with theatres, turning money away, duets in italian with the accent perfectly true to nature and a quantity of other things, no necessity of course to tell the world and his wife from the housetops about it and a slice of luck

    教育真正的項目,文學,新聞,珍聞的懸賞小說259 ,最新式的海報,到擠滿劇場的英國海濱療養地去做豪華的旅遊,水療演出兩不義大利語表演二重唱等等,發音十分純正地道。當然,無須乎向世人和老婆廣泛宣傳此事,說自己怎樣交了點好運。
  17. The intrusion detection system employs negative selection algorithm to create detectors, optimizes them continuously and maintains efficient memory dete ctors. so it takes the advantages of anomaly detection and misuse detection, overcomes the natural shortcoming of them and can identify known intrusion and novel intrusion in computer systems

    它同時兼備了異常檢測法和誤用檢測法的優點,克服了兩者固有的缺陷,因此可以識別任何已知或未知的本地主機上的異常行為模式和網路系統中的異常通信模式。
  18. The essence of edid is to set up a normal behavior fuzzy sub collection a on the basis of watching the normal system transfer of the privilege process, and set up a fuzzy sub collection b with real time transfer array, then detect with the principle of minimum distance in fuzzy discern method the innovation point of this paper is : put forward the method of edid, can not only reduce efficiently false positive rate and false negative rate, also make real time intrusion detection to become possibility ; have independent and complete character database, according to the classification of monitoring program, design normal behavior and anomaly behavior etc., have raised the strongness of ids ; use tree type structure to preservation the character database, have saved greatly stock space ; in detection invade, carry out frequency prior principle, prior analysis and handling the behavior feature of high frequency in information table, have raised efficiency and the speed of detection, make real time intrusion detection to become possibility ; have at the same time realized anomaly intrusion detection and misuse intrusion detection, have remedied deficiency of unitary detection method

    這種方法的實質是在監控特權進程的正常系統調基礎上建立正常行為模糊子集a ,檢測到的實時調序列建立模糊子集b ,然後模糊識別方法中的最小距離原則進行檢測。本文的創新點是:通過對特權進程的系統調及參數序列的研究,提出了基於euclidean距離的入侵檢測方法edid ,不僅能有效降低漏報率和報率,而且使實時入侵檢測成為可能;設計有獨立而完整的特徵數據庫,根據被監控程序的類別,分別設計正常行為、異常行為等,提高了檢測系統的強健性和可伸縮性;特徵數據庫按樹型結構存儲,大大節省了存儲空間;在檢測入侵時,實行頻度優先原則,優先分析和處理信息表中的高頻度行為特徵,提高檢測的速度和效率,使實時入侵檢測成為可能;同時實現了異常入侵檢測和誤用入侵檢測,彌補了單一檢測方法的不足。
  19. Design margin and abuse tests for electronic measuring instruments

    電子測量儀器設計余量與模擬誤用試驗
  20. To detect both known and unknown intrusion patterns, the system introduces a blended frame that makes use of both misuse detection approach and anomaly detection approach. the one of the highlight of the architecture is introduction of data mining technique, and the other is introduction of genetic algorithms. the ids uses data mining algorithms to abstract key features of system runtime status from security audit data, and it uses genetic algorithm to select the feature subset to reduce the amount of data that must be obtained from running processes and classified

    本文陳述了所研究系統的主要特點和技術:將智能體( agent )技術應於入侵檢測系統,解決了傳統入侵檢測系統的集中式解決方案的弊病,充分利網路資源協同完成入侵檢測任務;利基於主機和基於網路的數據源,形成一種完整的混合型的結構,從而能收集到更加全面的信息;使了異常檢測技術和誤用檢測技術,採一種混合型的結構,既能檢測已知的攻擊模式,又能發現新的攻擊模式。
分享友人