normal system 中文意思是什麼

normal system 解釋
正規系
  • normal : adj 1 正常的,平常的,普通的;平均的。2 正規的,標準的,額定的,規定的。3 智力正常的,精神健全的...
  • system : n 1 體系,系統;分類法;組織;設備,裝置。2 方式;方法;作業方法。3 制度;主義。4 次序,規律。5 ...
  1. The fabrication of casting sample of normal male canine prostatic duct and acinus system

    犬正常前列腺導管系統鑄型標本的製作
  2. This is called a normal system of differential equations.

    這稱為正規微分方程組。
  3. { ( a a b ) q : q ? / } is tho kernel normal system of p a a

    人)為s上的一個倆足燈閃p
  4. Root - read : some files may not be viewable to normal system users, only to root

    Root讀:有些文件對一般系統用戶是不可見的,而只對root用戶是可見的
  5. 0, then we also show that the kernel normal system of p v crand p a a are characterized in terms of the kernel normal systems of p and a

    : aei為pva的核正規系a八b兒: 。 e為屍八a的核正規系
  6. The essence of edid is to set up a normal behavior fuzzy sub collection a on the basis of watching the normal system transfer of the privilege process, and set up a fuzzy sub collection b with real time transfer array, then detect with the principle of minimum distance in fuzzy discern method the innovation point of this paper is : put forward the method of edid, can not only reduce efficiently false positive rate and false negative rate, also make real time intrusion detection to become possibility ; have independent and complete character database, according to the classification of monitoring program, design normal behavior and anomaly behavior etc., have raised the strongness of ids ; use tree type structure to preservation the character database, have saved greatly stock space ; in detection invade, carry out frequency prior principle, prior analysis and handling the behavior feature of high frequency in information table, have raised efficiency and the speed of detection, make real time intrusion detection to become possibility ; have at the same time realized anomaly intrusion detection and misuse intrusion detection, have remedied deficiency of unitary detection method

    這種方法的實質是在監控特權進程的正常系統調用基礎上建立正常行為模糊子集a ,用檢測到的實時調用序列建立模糊子集b ,然後用模糊識別方法中的最小距離原則進行檢測。本文的創新點是:通過對特權進程的系統調用及參數序列的研究,提出了基於euclidean距離的入侵檢測方法edid ,不僅能有效降低漏報率和誤報率,而且使實時入侵檢測成為可能;設計有獨立而完整的特徵數據庫,根據被監控程序的類別,分別設計正常行為、異常行為等,提高了檢測系統的強健性和可伸縮性;特徵數據庫按樹型結構存儲,大大節省了存儲空間;在檢測入侵時,實行頻度優先原則,優先分析和處理信息表中的高頻度行為特徵,提高檢測的速度和效率,使實時入侵檢測成為可能;同時實現了異常入侵檢測和誤用入侵檢測,彌補了單一檢測方法的不足。
  7. Exceptions to normal system and router configurations increase operational cost and decrease operational stability

    例外的正常系統和路由器配置增加經營成本,降低經營穩定
  8. Let s be a orthdox semiring, b is regular kernal normal system of s, then there is unique congruence p on s such as the regular kernal normal system of p on ( s, + ) is, and p =. conversely, if p is a congruence on s, then the regular kernal normal system of p on ( s, + ) the regular kernal normal system of

    設s猢正半環; b是s的正則核正規系,則存在s上卜的毗八脯廠在民十)上的正則核正規系為b ,且p p各反之如果屍為s上的觸,則屍在歷, )上的正則核正規系是口, , ? )的正則核正規系且屍p卜
  9. Establishing management information database, to collect and analyze all types of information from ccs, such as quality information ( good or poor ), status information ( alarm or normal ), system resource efficiency ( high or low ), etc. 3

    建成管理信息數據庫,實現對指揮調度通信系統各類運行信息、質量狀況信息、通信資源信息的可靠存儲和綜合查詢、統計、分析。
  10. Then a is a kernel normal system of 5 and pa = p

    則我們利用廣和a的核正規系來刻畫pva和屍八a的核正規系
  11. Let. 4 = {. 4, : z ? / } be a kernel normal system of 5

    Yb口川主要結論:令4二《人。 。三八是s的核正規系
  12. B ) ? s x s : 3a " ? w ( a ), b " 6 1 ^ ( 6 ), aa " ~ bb " ~ 06 ", a ' a ~ 6 ' 6 ~ a ' 6 } main result : let > 1 = { ai : i ? / } be a kernel normal system of 5, then p, as defined above, is a strong congruence on 5 and a is the kernel of pa - conversely, let p be a strong congruence on 5, let a be the kernel of p

    則a是s的核正規系,且p 。 l ,在第三節中定義s上的所有強同余的格八」舊)上的同餘0 ,使得每個0類是a k )的完全子格刻畫每個0類的最大強同余
  13. These two regional systems seal the high wax petroleum system and the normal system respectively

    兩套區域封蓋體系分別對高蠟油和正常油的油氣系統起到非常重要的封蓋作用。
  14. In the second part, we give a necessary and sufficient condition for relations to be a congruence on some special strong t - regular semigroups. at last, we discuss the congruence on orthodox semirings by kernal normal system

    一般情況下, h ~ *關系未必是-正則半群的同余關系,本文給出了一類特殊的強-正則半群上h ~ *關系是同余的充要條件。
  15. The installation and for normal system use

    該報表是使用aptitude生成的。
  16. Next you ll need to create some additional directories as pared - down versions of the normal system

    接下來,您將需要創建一些附加的目錄作為常規系統的縮減版本。
  17. Allocates in normal system memory on the mobile device, which is typically slower to use than video memory

    在移動設備上的常規系統內存中分配,通常比使用視頻內存慢。
  18. While single component has explicit functions in runtime after strictly qualified, problems come out with composed components, which developed by different developers in different time. those problems are so called " feature interaction ". and those feature interactions, which influence the normal system operations and decrease the system efficiency, are called " feature interaction problem ", and should be checked out and be resolved

    大多數構件經過了嚴格的質量認證,單獨運行時功能十分明確,但當來自於不同開發者、不同開發時間的構件組裝在一起時,就會發生很多問題,這些問題被稱為「特徵干擾」 ,而其中那些影響系統正常運行或降低系統運行效率的特徵干擾被稱為「特徵干擾問題」 ,這些問題是必須被檢測出來並予以解決的。
  19. Meanwhile, a major problem in anomaly detection is that system can issue false alarms when there are modifications in the normal system behavior ; therefore, we present an adaptive data - mining framework for anomaly detection. the normal profile can be updated at regular intervals, and as a result, false alarms are significantly reduced

    同時,在異常檢測系統中,當用戶或系統行為的正常輪廓發生變化時,由於檢測所需的規則庫不能及時的更新,容易造成將用戶或系統的正常行為誤報為入侵的情況,因此,文中介紹了一個構造自適應系統的方法,通過這種方法,規則庫可以自動的更新,並可以有效的減少誤報。
  20. When faults happen to the actuator but not complete failure, the adaptive neural network could automatically change the weight of the neural network and regulate the control rules on line to accustom to the fault - mode system and make it have the similar performance like the normal system

    當系統執行器出現故障但還沒有完全失效時,自適應模糊神經網路控制器可以在線自動修正網路權值,調整控制規則,適應故障模式下的系統,使系統具有和正常時相近的性能。
分享友人