network behavior 中文意思是什麼

network behavior 解釋
網路特性
  • network : n. 1. 網眼織物。2. (鐵路、河道等的)網狀系統,網狀組織,廣播網,電視網,廣播[電視]聯播公司。3. 【無線電】網路,電路。4. 【計算機】電腦網路,網。
  • behavior : n 1 行為,品行;舉止,態度,舉動,表現,行動。2 (生物的)習性;(機器等的)特性,性能,狀態;(...
  1. The ids of the paper is network - based anomaly detection system. with the help of data mining technology, we bring forward a measure to describe the normal state of the network traffic and user behavior and extracting the useful rule from large network data. so we can establish the knowledge warehouse which describe the normal state of the network traffic and user behavior. the knowledge warehouse can be the standard in order to judge the normal state. we can find the dubitable connections according to account the state and anomly instances of connections

    論文在描述網路應用和用戶行為時採用數據挖掘技術從海量的網路數據中提取有用的規則,構建了一個描述正常狀態下的網路應用和用戶行為的規則集,這個規則集是用來判斷網路應用和用戶行為是否正常的標準,論文根據這個標準分析當前網路連接的異常情況,將可疑的連接找出來。
  2. This paper studies the npd behavior from an innovative way - network

    本論文從網路的角度來研究新產品開發活動。
  3. In this paper, the rotating machinery at high speed is studied. there are discussed about numerical calculating methods for non - linear dynamical system, the rotor system radial impact and rubbing dynamics behavior analysis having the nonlinear rigidity on the unsteady and non - linear oil film, the rotor system dynamics behavior analysis with bending - torsional - pendular coupling vibrations, application of wavelet, fractal and network in fault diagnosis. the main works in this paper are as follows : ( 1 )

    本文以高速旋轉機械為主要研究對象,系統、深入地研究了非線性動力學系統的數值計算方法、具有非線性剛度的轉子系統在非穩態非線性油膜力作用下的徑向碰摩動力學行為、轉子彎扭擺耦合振動的動力學分析、小波和分形理論及人工神經網路在故障診斷中的應用問題。
  4. Second, proposing a hybrid recommendation strategy which used multi - agent system, collaborative filtering, and top - n together to generate right recommendations for customers in different profitability tiers. in the first part, we have defined customer value from two categories : intrinsic value and network value. based on customer ' s historical behavior, segment them with considering their recency, frequency, and monetary

    明確指出高價值客戶可體現在兩個方面:一是具有高自身價值的客戶,二是具有高網路價值(客戶的網路影響力)的客戶;其次,由顧客的歷史和當前行為,特別是從recency (最近訪問時間) 、 frequency (訪問頻度) 、 mon6t8ry (購買投人)因素出發,進行顧客內部價值挖掘:並通過形式化顧客的網路價值,給出完整的分層演算法和相應實驗。
  5. A simple, robust method is proposed that relies on high - resolution measurements and on - line analysis of network traffic to provide real - time alarms in the incipient phase of network anomalies. the anomaly identification algorithms based on behavior model using path changes, flow shift and packet delay variance

    通過高性能測量和在線分析網路流和路由信息對初始網路異常產生實時報警,提出基於路由變化、流變化和包延遲建立網路行為模型的網路異常檢測演算法。
  6. So studying the changing of university man in psychology and moral standard are becoming more and more important in educational fields. through documentation, questionnaires, demonstration, this thesis investigates the present situation and the developmental trend of the network information, as well as social behavior and psychology of university man

    因此,對這樣一個網路活動最活躍群體進行心理狀態、道德標準、價值觀念、行為方式等諸多方面變化的研究,並根據理論和實例提出相應的對策,就越來越成為當代教育科學領域關心的一個研究課題。
  7. For the protection of system resource, need to establish a active defence machine different from firewall and antivirus software to detection intrusion. by monitoring network or computer systematic development behavior feature intrusion detection system ( ids ) judge whether have invade take

    為保護系統資源,需要建立不同於防火墻和防病毒軟體的主動防禦機制檢測入侵。入侵檢測系統( intrusiondetectionsystem )就是監控網路或計算機系統的動態行為特徵並據此判斷是否有入侵的主動防禦措施。
  8. This also formed some strong strength network game company just like grand, the joint audiences and nine cities and so on. however, the development of which also lead to some questions, such as addictive behavior, without permission server, dummy wealth protect, product homogeneity and so on

    目前,網路游戲已經成為我國網際網路企業的主要盈利點,形成了如盛大、聯眾、九城、騰訊等有著較強實力的網路游戲公司,並形成了自己特有的商業模式與產業鏈條。
  9. Seven main achievements in this paper are as follows : firstly, one network adversary model is proposed, which is composed of three sub - models : network adversary mental sub - model, network adversary attack decision - making sub - model and network adversary attack behavior sub - model

    本義豐要取得七個方面研究成果: 1 )提出了一個網路敵手模型,該模型由三個子模型組成,即網路敵手心智子模型、網路敵手攻擊決策子模型、網路敵手攻擊行為子模型。
  10. The trained neural network model can be used to solve a variety of problems emerged in rf / microwave circuit design, such as in microwave circuit cad, the established model structure can be used to characterize the nonlinear behavior of microwave circuits

    如用於微波電路cad ,可用所建立的模型結構來描述這么一類微波電路的非線性行為特徵;如用於微波電路設計,則可進行如共面波導、晶體管、傳輸線、濾波器和放大器等的設計;如用於微波電路優化,則可用所建立的電路模型優化電路參數,進行阻抗匹配等。
  11. This paper introduces the importance of the decision accounting to the management accounting, analyzes on the features and modes of the decision accounting behavior, and probes into the decision accounting behavior by using the social network theory

    介紹了決策會計對管理會計的重要性,分析了決策會計行為的特點和模型,並用社會網路理論對決策會計行為作了初步的有意義的探討。
  12. In macrosopic theories of foreign direct investment, author mainly describes g. damacdougall ' s international investment benefit distribution, kiyoshi kijima ' s theory of comparative superiority investment, r. aiiber ' s theory of money area, john dunning ' s theory of investment development stratege. in microsopic theories of foreign direct investment, author describes stephen herbert hymer & charles p. kindlebeger ' s toheory of monopolization - superiority, teter j. buckley & mark c. casson ' s internalization special advantage theory, raymond vernon " product circle theory, e. f. heckscher & b. ohlin " locational choice advantage theory, john dunning ' s compromise theory of international product. section 3 analyzes current enterprise intemationization theories which involves theories and model such as uppsala international model ( u - m ), cavugil ' s export behavior theory, international operation driving theory, hagg & johnson, etc. 1 enterprise intemationization network model, rogers ' s the innovating - related intemationization models ( i - m ), prahalard & doz ' s integration and reaction model, farmer, r. n

    在外國直接投資的宏觀理論中,主要論述了麥克道格爾( g . d . a . macdougall )的國際投資利益分配模型;小島清( kiyoshikojima )的比較優勢投資理論;阿利伯( r . aliber )的貨幣區域理論;鄧寧( johndunning )的投資發展階段理論;在外國直接投資的微觀理論中,重點討論了海默( stephenherberthymer )和金德爾伯格( charlesp . kindlebeger )等人的壟斷優勢理論;巴克利( peterj . buckley )和卡森( markc . casson )等人的內部化理論;弗農( raymondvernon )的產品周期理論;赫克歇爾( e . f . heckscher )和俄林( b . ohlin )的區位理論;鄧寧( johndunning )的國際生產折衷理論。
  13. Hi the aspect of symmetry analyzing to the hopfield model neural network with hebbian learning, we study on the dynamical behavior of the state space under the action of isometric transformation group g = z2 ? n, and prove the invariant property of the energy orientation ? / / " ) of the state space under the action of g. we find that the symmetry relationship of the network is sx - sw = sh when the active function of the neuron is odd, where sx is the symmetry of the patterns set x under hebbian learning rule, sh is the symmetry of the network and sw is the symmetry of the weight matrix w of the network

    ) s _ n為手段,研究了網路狀態空間在群g作用下各點的運動情況,證明了群g作用下的不變性。證明了當神經元的激活函數f為奇函數時, hebb法則下存儲樣本集x的對稱性s _ x 、網路對稱性s _ h以及連接矩陣對稱性s _ w三者之間滿足s _ x = s _ w = s _ h的關系;同時,我們還證明了:網路穩定態集vf同一s _ h軌道中的兩個穩定態的動力學行為(能量和吸引域大小)相同;兩個等距網路h和h 1 = g ? h , ( ? ) g (
  14. Be aware that we assume a network deployment installation of websphere application server ; otherwise your default keystore behavior may be different. see using the java secure socket extension in websphere application server

    注意,我們假設您安裝的是websphere application server network deployment ,否則您的預設密鑰存儲區的行為可能有所不同。
  15. The simulation results showed that the intelligent shift control could improve the powertrain efficiency of the engineering vehicle, and could overcome the low realtime behavior of neural network in the meantime

    模擬結果表明,該控制方法提高了工程車輛液力機械傳動系統效率,有效地克服了神經網路控制實時性差,難以在工程實際中應用的問題,實現了換擋控制的智能化。
  16. This task is established in guangzhou radio & television university. in accordance with one of the items of " reform of person with ability cultivation mode and experimental unit of open education " in guangzhou radio & television university, using modern education theories, the author designs and programs a network - based streaming media courseware for science of organizational behavior, which is a compulsory course of the subject of business administration. the courseware is applied to distance education experimentation

    本課題即立足於廣州市廣播電視大學,在現代教育理論指導下,以廣播電視大學「人才培養模式改革與開放教育試點」項目中工商管理專業本科主幹必修課程《組織行為學》為典型,利用網路教學平臺開發了該課程的流媒體課件,並將其應用於遠程教學實驗中,通過單向和雙向訐等量表模型、多因素排序量表模型、 x ~ 2檢驗、 (
  17. Presented a differentiated approach of the broadband residential ethernet - based access network. analyzed per hop behavior and per domain behavior of ef service based on packet scale rate guarantee theo

    提出了一種寬帶社區網的區分服務方法,基於每跳行為和每域行為確保實時業務服務質量,能夠有效地確保voip 、電視、 vod和高速網際網路接入的服務質量:
  18. November, jon of ftc committee member concerns network behavior advertising in express on the conference, we incorporate to this trading analysis and competition and potential competition are concerned, and have nothing to do with privacy

    11月份, ftc委員喬恩在一次有關網路行為廣告的會議上表示,我們對這一合併交易的分析與競爭和潛在的競爭有關,而與隱私無關。
  19. The traditional network traffic analysis is based on linear model, but the traffic actually behaves as a nonlinear system due to complex topology and network behavior

    摘要傳統的流量分析建立在線性模型的基礎上,但是由於復雜的拓撲結構和網路行為,網路流量表現為一個非線性的系統。
  20. An error for example, invalid configuration or network behavior has occurred that can result in a loss of user functionality

    發生了可能導致用戶功能喪失的錯誤(例如,配置或網路行為無效) 。
分享友人