false method 中文意思是什麼

false method 解釋
正誤法
  • false : adj (opp true)1 虛偽的,虛假的,捏造的;撒謊的,不誠實的;錯誤的。2 不正的,非法的。3 假造的;...
  • method : n 1 方法,方式;順序。2 (思想、言談上的)條理,規律,秩序。3 【生物學】分類法。4 〈M 〉【戲劇】...
  1. The exclusively comparative method brought in a set of false notions.

    這種單純的比較方法引起了一系列錯誤的觀念。
  2. Analysis of abnormal data in the measurement of film magnetostriction by false neighbor method

    偽鄰近點法分析薄膜磁致伸縮測試中異常數據
  3. Dig labeled probe hybridization with solid pcr product was performed as well as electrophoresis of liquid product, this method combines rna purification, pcr amplification and nucleotide probe hybridization detection together and has many advantages including better rna purity, less time consumption, reliable positive reaction and 10 times sensitivity as rt - pcr gel running detection, reduce false positive result, unpurified nucleotide requirement, loug infected plant organism can be detected by solid hybridization

    2 )結果可靠,雜交特異性誘捕目的片段,同時去除了核酸中存在的pcr抑制物質,減少了因核酸提取不純造成的漏檢現象,結果輸出通過雙重判定保證了結果的可靠性。 3 )靈敏度高,通過雜交進行結果判定,靈敏度比傳統的rt干cr大約高10倍。
  4. For phase space reconstruction of ship - radiated noise, using auto correlation function and mutual information to select the delay - time, and using false nearest neighbors method to select the embedding dimension

    從自相關函數及互信息嫡兩個方面討論了相空間重構中延遲時間的選擇。
  5. The synchronization of frequency hopping method referenced the jtrs radio system of usa military, and designed a synchronization method used in our radio include creating the frequency hopping map and the base band frame architecture in frequency hopping mode. the paper also analyzed the synchronization capability on theory. it has been proved correct on theory by showing the false probability, capture probability and the synchronization time

    對跳頻圖案的產生和跳頻的幀結構,本文不僅從理論上分析了同步性能,給出了虛警概率和檢測概率,估算了同步的捕獲時間,證明均能滿足系統指標要求,而且通過與合作單位進行的整機聯調和實測證實了該方案的可行性。
  6. The essence of edid is to set up a normal behavior fuzzy sub collection a on the basis of watching the normal system transfer of the privilege process, and set up a fuzzy sub collection b with real time transfer array, then detect with the principle of minimum distance in fuzzy discern method the innovation point of this paper is : put forward the method of edid, can not only reduce efficiently false positive rate and false negative rate, also make real time intrusion detection to become possibility ; have independent and complete character database, according to the classification of monitoring program, design normal behavior and anomaly behavior etc., have raised the strongness of ids ; use tree type structure to preservation the character database, have saved greatly stock space ; in detection invade, carry out frequency prior principle, prior analysis and handling the behavior feature of high frequency in information table, have raised efficiency and the speed of detection, make real time intrusion detection to become possibility ; have at the same time realized anomaly intrusion detection and misuse intrusion detection, have remedied deficiency of unitary detection method

    這種方法的實質是在監控特權進程的正常系統調用基礎上建立正常行為模糊子集a ,用檢測到的實時調用序列建立模糊子集b ,然後用模糊識別方法中的最小距離原則進行檢測。本文的創新點是:通過對特權進程的系統調用及參數序列的研究,提出了基於euclidean距離的入侵檢測方法edid ,不僅能有效降低漏報率和誤報率,而且使實時入侵檢測成為可能;設計有獨立而完整的特徵數據庫,根據被監控程序的類別,分別設計正常行為、異常行為等,提高了檢測系統的強健性和可伸縮性;特徵數據庫按樹型結構存儲,大大節省了存儲空間;在檢測入侵時,實行頻度優先原則,優先分析和處理信息表中的高頻度行為特徵,提高檢測的速度和效率,使實時入侵檢測成為可能;同時實現了異常入侵檢測和誤用入侵檢測,彌補了單一檢測方法的不足。
  7. In analyze the deficiency of traditional intrusion detection system, a new kind of intrusion detection method, which named edid ( an intrusion detection method based on euclidean distance ) is put forward for reduce false positive rate

    在此基礎上,將歐氏距離( euclideandistance )引入了入侵檢測系統以降低入侵檢測系統的誤報率,並提出了基於euclidean距離的入侵檢測方法intrusiondetectionbasedoneuclideandistance ( edid ) 。
  8. This method utilizes the distribution property of image intensity. given the false alarm probability, the threshold for likelihood difference can be determined

    該方法利用sar圖像的強度分佈特性,根據虛警率確定相鄰區域之間存在邊界的似然差函數的閾值。
  9. This predictor has a high prediction speed, and the false alarm rate and missing alarm rate can be adjusted randomly. the method is simply and universalizable

    同時該預報器還具有速度快、誤檢率和漏檢率可人為調整的特點;設計方法簡單。
  10. At last, the model and practical data including mutating data are processed with this method and e processing results show that the false points of data section are completely rejected without losing the useful information, and it is easy to be interpreted

    最後用該方法對含有突變點的剖面模型數據和野外實測數據斷面進行處理,處理結果表明,突變點被完全剔除,但不損失有用信息,易於對其進行推斷解釋。
  11. Subsequently, weighted association rules algorithm is given in order to solve the problem of improving detection rate but increasing false positive rate when association rules are applied to the detection system. the method can to some extent improve detection rate of the intrusion detection system, confine the produce of uninteresting rules, and decrease false

    為了解決將關聯規則演算法應用於入侵檢測系統提高系統檢測率的同時也增加系統誤報率的問題,論文把加權關聯規則演算法應用於入侵檢測系統,此方法能在一定程度上提高了入侵檢測的檢測率也限制了無趣規則的產生,並降低了誤報率。
  12. Subsequently, it in the paper gives weighted association rules algorithm in order to solve the problem of improving detection rate but increasing false positive rate when association rules are applied to the detection system. the method can to some extent improve detection rate of the intrusion detection system, confine the produce of uninteresting rules, and decrease false positive rate

    首先我研究了關聯規則的各種實用演算法及其改進演算法,之後為了解決將關聯規則演算法應用於入侵檢測系統提高系統檢測率的同時也增加系統誤報率的問題,論文給出加權關聯規則詳細的演算法說明,並將此方法應用於入侵檢測。
  13. At present, the most important method to detect malignant nodules is fine - needle aspiration biopsy ( fna, but this technique can produce false - negative results, which can delay treatment and lead to local invasion

    目前,鑒別惡性節結最重要的手段是細針穿刺( fna ) ,然而這種方法仍有假陰性,這會導致治療延誤並致使局部轉移。
  14. Surrounding these special problems met in gas hydrates exploration and through study of high - precision magnetic survey, the sea test by r / v haiyang 1y that is owned by guangzhou marine geological survey in dongsha area of the south china sea, systematical analysis of the test result and combination interpretation of magnetic survey with seismic profile, the authors successfully employ the method to recognize the truth or false of the diapir in seismic profile by integrating total field of high - precision marine magnetic measurement with its gradient change

    本文就目前天然氣水合物調查中存在的這些特殊技術問題,通過對海上高精度磁力測量技術方法研究、廣州海洋地質調查局「海洋四號」船在南海北部東沙海域的海上試驗、對試驗結果的系統研究分析以及磁測和地震剖面兩種手段的綜合解釋,成功地嘗試了用高精度海洋磁測成果中的磁力總場和梯度變化特徵來識別水合物勘探中高解析度地震剖面上的泥底辟構造真偽的技術方法。
  15. A new method for intrinsic terminator prediction based on rnall, an rna local secondary structure prediction algorithm developed recently, and two u - tail score schemas are developed. by optimizing three parameters thermodynamic energy of rna hairpin structure, u - tail t weight, and u - tail hybridization energy, the method can recognize 92. 25 of known terminators while rejecting 98. 48 of predicted rna local secondary structures in coding regions negative control as false intrinsic terminators in e. coli. this method was applied to scan the genome of synechococcus sp

    在過去二十年中,不少研究者已開始研究如何用計算方法來預測轉錄終止信號,如brendel和trifonov的雙核苷酸分佈矩陣法dinucleotide distribution matrix carafa等的統計方法transterm和rnamotif法等,這些方法都從不同方面考慮了rna二級結構和u -尾部的特徵,而gester的預測模型則設定rna二級發夾結構是不依賴終止子的唯一因素。
  16. Experiences from application of flexible shielding method on false quadrilateral

    柔性掩護支架採煤方法在次急傾斜煤層中的應用
  17. Basis " the whole nation year section and fete have a holiday method " regulation, the festival that minority is used to, by the local people government of area of each minority inhabit a region, according to each this nation habit, the regulation puts false date

    根據《全國年節及紀念日放假辦法》的規定,少數民族習慣的節日,由各少數民族聚居地區的地方人民政府,按照各該民族習慣,規定放假日期。
  18. False valuation can mislead to make a strategic decision of invest, and disturb the method of economy market. it also produces unfavorable affect to economy development

    無形資產評估中存在著一些失真現象,而評估失真,就會誤導投資決策,擾亂市場經濟秩序,對我國經濟建設產生非常不利的影響。
  19. Most intrusion detection systems use simple signature match and / or simple statistical analyze as the main detect method. these methods may produce large volume of alarm message and may produce false alarm or miss some alarm

    目前的入侵檢測系統大都採用簡單的特徵比配和統計分析技術,報警量大、誤警和漏警問題一直是一個難以解決的困擾。
  20. After that, it discusses the capture and tailing method for the false random code spreading code, including correlation and non - correlation method. between the two method, the correlation method is fit for the wireless communication

    接下來討論了偽隨機擴頻碼的捕獲和跟蹤方法,包括相干的方法和非相干的方法,其中非相干的方法更適合用於無線通信中。
分享友人