normal behavior 中文意思是什麼

normal behavior 解釋
常態行為
  • normal : adj 1 正常的,平常的,普通的;平均的。2 正規的,標準的,額定的,規定的。3 智力正常的,精神健全的...
  • behavior : n 1 行為,品行;舉止,態度,舉動,表現,行動。2 (生物的)習性;(機器等的)特性,性能,狀態;(...
  1. The ids of the paper is network - based anomaly detection system. with the help of data mining technology, we bring forward a measure to describe the normal state of the network traffic and user behavior and extracting the useful rule from large network data. so we can establish the knowledge warehouse which describe the normal state of the network traffic and user behavior. the knowledge warehouse can be the standard in order to judge the normal state. we can find the dubitable connections according to account the state and anomly instances of connections

    論文在描述網路應用和用戶行為時採用數據挖掘技術從海量的網路數據中提取有用的規則,構建了一個描述正常狀態下的網路應用和用戶行為的規則集,這個規則集是用來判斷網路應用和用戶行為是否正常的標準,論文根據這個標準分析當前網路連接的異常情況,將可疑的連接找出來。
  2. The paper studied tests on three epiboly profiled bar concrete beams, bearing capacity of normal section, stiffness and behavior of cracks, and put forward formulas as advise. based on extant nonlinear concrete theory, a fem model was built by ansys program. the results of fem analysis was verified by tests data. some parameters in fem model were changed to build different models and the analysis results were compared with the advised formulas

    本文通過三根外包型鋼混凝土梁試驗,研究了其正截面承載能力、剛度以及裂縫方面的性質,並提出了一些相關建議公式。同時在現有混凝土非線性分析理論的基礎上,採用ansys有限元分析程序建立了外包型鋼混凝土梁的有限元模型,結合試驗數據對模型進行了驗證,另外還改變了一些參數建立了有限元模型,並和建議公式的結果進行了對比。
  3. Eventually, leaa was using much of its budget to fund experiments, including aversive techniques and psychosurgery, which involved, in some cases, irreversible brain surgery on normal brain tissue for the purpose of changing or controlling behavior and / or emotions

    最終, leaa用了預算中的大部分資金以資助實驗,包括令人厭惡的技術以及外科手術,這包括,在一些案例中的在正常大腦組織上進行的不可逆轉大腦外科,目的是為改變和控制行為和情緒。
  4. There is a difference in personality between the violent offender and the nonviolent crime, and between the schizophrene and normal person with aggressive behavior also

    在精神正常人群中,暴力罪犯和非罪犯有人格方面的差異,精神分裂癥患者和精神正常者的攻擊行為也有不同的人格基礎。
  5. Under such circumstances, some of whom changed their normal behavior to deviation ways. their behaviors were in such a state, as have been denied by rural - urban socioculture. the individual deviating behaviors became the behaving model to other migrants in certain groups, influencing deviating behaviors in the groups and led to the formation of temporary migrants socioculture in certain group

    在這種情況下,某些流動人口的行為逐漸發生異化,既脫離出流出地農村地域文化的認同范圍,又不被城市主流社會文化所接納,變異的個體行為在一定范圍內產生示範作用,影響著群體的變異,逐步導致了流動人口亞文化在某些群體中的形成,體現出行為變異對文化變異的影響作用。
  6. The essence of edid is to set up a normal behavior fuzzy sub collection a on the basis of watching the normal system transfer of the privilege process, and set up a fuzzy sub collection b with real time transfer array, then detect with the principle of minimum distance in fuzzy discern method the innovation point of this paper is : put forward the method of edid, can not only reduce efficiently false positive rate and false negative rate, also make real time intrusion detection to become possibility ; have independent and complete character database, according to the classification of monitoring program, design normal behavior and anomaly behavior etc., have raised the strongness of ids ; use tree type structure to preservation the character database, have saved greatly stock space ; in detection invade, carry out frequency prior principle, prior analysis and handling the behavior feature of high frequency in information table, have raised efficiency and the speed of detection, make real time intrusion detection to become possibility ; have at the same time realized anomaly intrusion detection and misuse intrusion detection, have remedied deficiency of unitary detection method

    這種方法的實質是在監控特權進程的正常系統調用基礎上建立正常行為模糊子集a ,用檢測到的實時調用序列建立模糊子集b ,然後用模糊識別方法中的最小距離原則進行檢測。本文的創新點是:通過對特權進程的系統調用及參數序列的研究,提出了基於euclidean距離的入侵檢測方法edid ,不僅能有效降低漏報率和誤報率,而且使實時入侵檢測成為可能;設計有獨立而完整的特徵數據庫,根據被監控程序的類別,分別設計正常行為、異常行為等,提高了檢測系統的強健性和可伸縮性;特徵數據庫按樹型結構存儲,大大節省了存儲空間;在檢測入侵時,實行頻度優先原則,優先分析和處理信息表中的高頻度行為特徵,提高檢測的速度和效率,使實時入侵檢測成為可能;同時實現了異常入侵檢測和誤用入侵檢測,彌補了單一檢測方法的不足。
  7. According to the load behavior and defection degrees of existed reinforced concrete bridge, the calculating modeles for normal section strength and bearing capacity for reinforced concrete bridge are established by the elasticity analysis and nonlinear analysis of grade stiffness degeneration

    根據既有鋼筋混凝土橋梁的受力特點和損傷程度,採用兩種方法:即《規范》法分析理論和分級剛度退化非線性分析理論,分別建立了既有鋼筋混凝土橋梁正截面強度計算和承載能力評定的計算分析模型。
  8. Integrating the audit system to collect the data of system call and privilege command in the kernel, the raas could analyze datas and compare to the user normal behavior from the normal library

    結合原審計系統,在內核層收集系統調用和特權命令的數據,分析過后與用戶正常庫比較,達到監控的目的。
  9. It is concluded that generator under - excitation operation is a stable and normal behavior, and the difficulty of its carrying - out does not lie in technology but in people ' s understanding

    最後得出了發電機進相運行是一種安全正常工況的結論,並且認為投入進相運行的難點不在於技術,而在於人的思想認識。
  10. To restore normal behavior, set the

    若要還原正常行為,請將
  11. This is normal behavior for connection handles controlled by the operating system

    這是操作系統控制的連接句柄的正常行為。
  12. This is normal behavior because some warnings relate only to optimized code

    這是正常行為,因為一些警告只與優化代碼有關。
  13. Normal behavior and anomaly are distinguished on the basis of observed datum such as network flows and audit records of host. when a training sample set is unlabelled and unbalanced, attack detection is treated as outlier detection or density estimation of samples and one - class svm of hypersphere can be utilized to solve it. when a training sample set is labelled and unbalanced so that the class with small size will reach a much high error rate of classification, a weighted svm algorithm, i

    針對訓練樣本是未標定的不均衡數據集的情況,把攻擊檢測問題視為一個孤立點發現或樣本密度估計問題,採用了超球面上的one - classsvm演算法來處理這類問題;針對有標定的不均衡數據集對于數目較少的那類樣本分類錯誤率較高的情況,引入了加權svm演算法-雙v - svm演算法來進行異常檢測;進一步,基於1998darpa入侵檢測評估數據源,把兩分類svm演算法推廣至多分類svm演算法,並做了多分類svm演算法性能比較實驗。
  14. These learned and shared ways of believing and of doing penetrate our beings at an early age and quickly become part of our taken for granted assumptions concerning normal behavior

    這些後天獲得的共有的思維和行為模式,從小時候就被注入我們的生活中,很快自然而然地成為我們思想的一部分,告訴我們什麼是規范行為。
  15. Based on the mechanism of computer immune system, this paper presents a new anomaly detection technique to detect intrusion into computer system. in this technique, a markov chain model is used to represent a temporal profile of normal behavior of a process. the markov chain model of normal profile can be created by learning the historic data of the sequence of system calls produced by privileged processes running on unix system

    傳統的入侵檢測技術,依照所基於的原則不同,通常分為誤用入侵檢測與異常入侵檢測,本文在入侵研究中所採用的計算機系統免疫思想的基礎上,提出了一種新的異常入侵檢測技術,通過對( unix系統)特權進程系統調用序列的歷史數據的學習,用馬爾可夫鏈模型來建立特權進程的正常時態行為輪廓。
  16. This degree of fear often indicates that one has changed their normal behavior in radical ways, and may have become extremely compulsive

    這種程度上的恐懼往往指示出人已經激烈地改變了他們的正常行為,而且可能變得極度強迫。
  17. Rarely had i had anything to do with my brother, but that day, departing from my normal behavior and without knowing why, i had called and asked him to help me

    我一向不與哥哥來往的,今天也一反常態,不知為什麼給他打電話讓他幫忙。
  18. This paper presents an in - depth study of building normal behavior models. problems such as attributes selecting, event modeling and association analyzing are discussed

    本文從所考察的對象、事件的建模、關聯分析等方面對如何構建正常行為模型進行了較為深入的探討。
  19. The world has learned something about prediction of earthquake from the chinese, who have noted that some animals would change their normal behavior before an earthquake

    世界從中國人那裡學到了一些有關地震預測的東西,中國人注意到在地震來臨之前,一些動物會改變它們通常的行為
  20. The world has learned something concerning earthquake prediction from the chinese, who have noted that before an earthquake, some animals would change their normal behavior

    世界從中國人那裡學到了一些有關地震預測的東西,中國人注意到在地震來臨之前,一些動物會改變它們通常的行為。
分享友人