detection network 中文意思是什麼

detection network 解釋
探測網
  • detection : n. 1. 探知;發現,發覺;敗露。2. 【化學】檢定,檢查;【電訊】檢波。
  • network : n. 1. 網眼織物。2. (鐵路、河道等的)網狀系統,網狀組織,廣播網,電視網,廣播[電視]聯播公司。3. 【無線電】網路,電路。4. 【計算機】電腦網路,網。
  1. Application of negative selection algorism in network intrusion detection

    否定選擇演算法在網路入侵檢測中的應用
  2. We use artificial immune principles to design a novel antibody network which based on the immune algorithm and neural network, and use these as in - depth research of the application of our achievement to engineering. in this paper, we built the novel antibody network which based on the two intelligence algorithms and reach the application of its use in the intrusion detection system. furthermore we create an ideal antitype system from it

    本課題以人工免疫系統和神經網路為研究對象,並依託四川省科技廳基礎項目「智能入侵檢測系統的關鍵技術研究」 (項目編號: 04jy029 - 017 - 1 ) ,將人工免疫原理和神經網路技術相結合,提出了應用於入侵檢測系統的新型抗體網路,為該項目在工程領域中的進一步研究、應用提供理論依據
  3. The intrusion detection system chooses the misuse detection technology. the main content of the paper is divided into four sections : section 1 mainly explores the windows network architectonics, analyzed the program of ndis, and introduced the main network data capture schema of lower layer ; then introduced the mechanism of packet capture and filter, and analyzed the framework of winpcap in capture and filter packet on the bases of former work

    本論文主要包括四個方面:第一部分主要分析了windows的網路體系結構,剖析了網路驅動介面規范( ndis )的編程,介紹了低層網路數據的主要的捕獲方案:然後介紹了包捕獲和過濾機制;最後在前兩者的基礎上,分析了本系統開發用工具winpcap數據包捕獲和過濾的的結構。
  4. The thesis design the specification of intrusion detection of the privileged program and network communication in the detail by asl specification

    本文用asl詳細的設計了特權程序和網路數據包的入侵檢測的規范。
  5. 2. practical meteorology : making weather observations ; encoding and decoding of codes in normal use ; manual and computerized plotting of weather charts ; preparation and dissemination of weather bulletins by microcomputers ; principles and exposure requirements of meteorological instruments ; simple fault detection and adjustment of instruments and autographic recorders ; upper - air sounding ; wmo and aftn aeronautical fixed telecommunications network message formats and telecommunications procedures ; handling telephone enquiries

    2 .實用氣象學:天氣觀測編制與翻譯常用電碼以人手及電腦繪畫天氣圖使用微型電腦編排及傳送天氣報告氣象儀器原理及安裝條件儀器及自動記錄器的簡單故障檢查與校正高空探測,世界氣象組織及航空專用電信網電報格式及電信程序接聽電話詢問。
  6. The following are the main achievements : distributed network measurement and analysis infrastructure ( dnmai ), the cooperant result of all the researchers of our workgroup, is discussed in detail, and also the important status of the network intrusion detection and network vulnerability analysis in dnmai

    研究成果如下:系統地介紹了本項目組全體成員共同創作的一種分散式網路測量與分析基礎架構dnmai ( distributednetworkmeasurementandanalysisinfrastructure )及網路入侵檢測系統和網路脆弱性分析系統在其中的重要地位和作用。
  7. Network security techniques include router filter, firewalls, intrusion detection, audit, counteroffensive and etc. in these techniques, router filter and firewalls are static security techniques, and others are dynamic security techniques

    目前網路安全技術包括路由器、防火墻、漏洞防堵、入侵檢測、審計和反攻擊等,其中路由器過濾、防火墻、漏洞防堵屬于靜態安全技術,而入侵檢測、審計和反攻擊等屬于動態防護。
  8. In this paper, a new model of network intrusion detection based on active counterwork response is proposed

    在本論文中,我們提出了基於主動對抗響應的網路入侵檢測模型。
  9. Application of cp neural network to image edge detection

    神經網路在圖像邊緣檢測中的應用
  10. The ids of the paper is network - based anomaly detection system. with the help of data mining technology, we bring forward a measure to describe the normal state of the network traffic and user behavior and extracting the useful rule from large network data. so we can establish the knowledge warehouse which describe the normal state of the network traffic and user behavior. the knowledge warehouse can be the standard in order to judge the normal state. we can find the dubitable connections according to account the state and anomly instances of connections

    論文在描述網路應用和用戶行為時採用數據挖掘技術從海量的網路數據中提取有用的規則,構建了一個描述正常狀態下的網路應用和用戶行為的規則集,這個規則集是用來判斷網路應用和用戶行為是否正常的標準,論文根據這個標準分析當前網路連接的異常情況,將可疑的連接找出來。
  11. Inbreak detection, leak scan ) used in it and corresponding design for each layer, including physical layer, network layer, system layer and application layer, applied. fourthly, with the elaborate deploy of secure product ' on and fully working, chongqing public ip network will be a advanced secure operational, manageable domestic network

    第四,全面的安全產品部署和工程實施,全力打造重慶電信公眾ip網,使之成為全國領先的安全、可靠、可運營、可管理的網路。
  12. After comparing in detail the current popular 24 idss or ids prototypes from the aspects of the granularity, methods, and tune of detection, data - collection, and data - processing, we find out the problems in the most of the current idss that they are generally platform dependent, inefficient in detection methods, lack intelligent in data analysis, inextensible as the network configurations changed or upgraded, and inadaptive when the new attack methods emerge

    本文首先從數據來源、數據處理周期、數據收集和分析、入侵檢測方法、系統運行平臺等七個方面對當前較具有影響力的24種入侵檢測系統或原型進行了詳細的比較,分析了現有入侵檢測系統在系統平臺的異構性、系統檢測方法的效率、入侵數據分析的智能性、面臨新的入侵方法時的適應性和網路配置發生變化時的可擴展性等方面的不足和問題。
  13. We do research on the transitions between states of network protocol, the protocol misusage detection model based on markov chain, the framework of the ids technology and protocol anormity after we discuss the current technology. the main research contents of this paper include : research on transitions between states of network protocol and session process, protocol misuage and the anomaly detection model based on markov chain, the research of intrusion detection framework, more accurately model based on the characteristic of the network traffic and so on

    在分析了現有入侵檢測系統的基礎上,本文圍繞典型網路協議狀態轉換、基於馬爾可夫鏈的檢測模型、入侵檢測技術框架、以及協議異常等幾個方面展開深入研究,主要工作內容包括:典型網路協議轉換狀態的分析和會話過程的研究;基於馬爾可夫鏈的網路異常檢測模型;分散式的檢測架構;針對網路流量特徵而提出了精確的檢測模型等。
  14. Then, the paper present a protocol misusage ids in application layer based on markov chain, and obtain the following results after test : the system can have good effection on detecting the probe packet, dos attack and novelty attack. the system can overcome part of disadvantages in traditional intrusion detection system, and adapt requirements with different network. the experiment shows that the system can improve the detection accuracy rate, reduce the false negatives probability

    通過對檢測系統的測試分析,系統對掃描探測報文、 dos攻擊報文和新的攻擊報文等有較好的檢測率。基於馬爾可夫鏈建立的網路異常檢測系統可以克服傳統入侵檢測系統的部分缺陷,能夠適應不同網路環境的要求,同時也有效提高了系統的檢測能力和檢測效率,降低了誤報率。
  15. An intrusion detection model based on neural network

    基於神經網路的入侵檢測模型
  16. Aiming at the present design fashion of domestic bigger tunnel, simulating a bigger tunnel with catholic characteristic, confirming the parameters of traffic inducement and controlling ( tunnel length, traffic, the selection and location of detection equipments, amount of roadway indicative lamp, etc ) on the base of the analog tunnel, discussing the controlling and revulsive mode of tunnel. briefly discussing the constitution of tunnel surveillance and controlling system and the executive means of traffic controlling and inducement subsystem and network structure of tunnel controlling system. finally discussing the conformation of emulational tunnel ' s database and detailed executive program by programming the computer emulation of controlling induce subsystem

    論文圍繞「交通誘導與控制」這一中心展開,探討長大隧道交通誘導與控制設備及其控制誘導方式;結合國內外對交通流模型研究的成果,提出一套適合長大隧道交通流特點的交通流模型;並針對目前國內長大隧道的普遍設計方式,模擬一個帶有普遍性特徵的長大隧道,確定了關于交通誘導與控制方面的參數(隧道長度、交通量、檢測設備的選取和位置、車道指示燈的數目等) ;以此模擬隧道為基礎,進一步探討隧道的具體控制與誘導方式;簡要探討隧道監控系統的構成、交通控制與誘導子系統的實現方式,隧道控制系統的網路架構;最後通過編程實現控制與誘導子系統的計算機模擬,討論關于模擬隧道數據庫的構建,具體編程實現等。
  17. It was because of the detection network that scientists found out that the nature is full of infra - sounds

    因為有了這些探測網,科學家們得以發現大量自然現象都會產生不同特性的次聲。
  18. In the paper, using the cg lightning data obtained from shandong lightning detection network in 1998 - 2002, the cg lightning spatial and temporal characteristic is analyzed systematically. the result shows that negative cg flashes predominate in total cg lightning, and negative lightning is about 6 times as much as positive one

    本文利用山東省雷電探測網1998 - 2002年獲取的地閃資料,對山東省的雲對地閃電的空間和時間分佈特徵進行系統分析,得出了山東地區地閃的氣候特徵:雲地閃電中負閃占絕大多數,負閃是正閃的6倍多。
  19. Carrier sense multiple access with collision detection network, csma cd network

    帶碰撞檢測的載波偵聽多址訪問網路
  20. The radio detection trainer can use the following three training methods as single. machine training mode, network training mode and radio detection knowledge to perform radio detection individual soldier training, radio detection network military exercises and radio detection knowledge learning

    無線電監測人員可採用單機模式下技偵業務訓練虛擬現實、網路模式下技偵業務訓練虛擬現實和無線電監測知識等三種訓練方法,分別進行無線電監測單兵訓練、無線電監測網上演習和無線電監測知識的學習。
分享友人