pattern of the match 中文意思是什麼

pattern of the match 解釋
比賽格式
  • pattern : n 1 模範,榜樣;典範。2 型,模型;模式;雛型;【冶金】原型。3 花樣;式樣;(服裝裁剪的)紙樣;圖...
  • of : OF =Old French 古法語。
  • the : 〈代表用法〉…那樣的東西,…那種東西。1 〈用單數普通名詞代表它的一類時(所謂代表的單數)〉 (a) 〈...
  • match : n (一根)火柴;〈古語〉(從前大炮發火用的)火繩,導火線。 light [strike] a match 擦火柴。 a safe...
  1. When they change to night work the pattern will only gradually go back to match the new routine and the speed with which it does so parallels, broadly speaking, the adaptation of the body as a whole, particularly in terms of performance

    當他們改上夜班時,這個模式又要重新逐漸適應新的情況,這一適應變化的速度與整個身體的適應程度大體一致,從工作表現方面來看更是如此。
  2. Facet is a constraint on the value space of a data type, achieved by constraining the lexical space to literals that match a specific pattern. the value of

    Pattern方面是對數據類型的值空間的約束,這是通過將詞法空間約束為匹配特定模式的文本實現的。
  3. Premise is the blame labor income that is helpful for economic efficiency rising, also become the fraction that can take below market economy moving mechanism to match pattern, if press allocation of factor of production, wait

    前提為有利於經濟效率提高的非勞動收入,也成為在市場經濟運行機制下可以採取的分配方式, ,如按生產要素分配等。
  4. Returns the names of files in the specified directory that match the specified search pattern

    返回指定目錄中與指定搜索模式匹配的文件的名稱。
  5. Bethel menswear garment series match the novel and unique design pattern and the classical and fashion trademark style with fine technology and the fabrics characteristic of high quality

    Bethel伯特利男士服飾系列,以新穎獨特的設計款式經典時尚的品牌風格,配以優良工藝和品質上乘的面料特點。
  6. Based on analyzing the relationship between linear separability and a connected set in boolean space, the particular effect of a restraining neuron in extraction of rules from a bnn is discussed, and that effect is explained through a example called a mis problem in boolean space. in this paper, a pattern match learning algorithm of bnns is proposed. when a bnn has been trained by the algorithm, all the binary neurons of hidden layer belong to one or more ls series, if the logical meanings of those ls series are clear, the knowledge in the bnn can be dug out

    另一個研究成果是在分析線性可分和樣本連通性關系的基礎上,以mis問題為例,討論了抑制神經元在二進神經網路規則提取中的獨特作用,提出了二進神經網路的模式匹配學習演算法,採用這種演算法對布爾空間的樣本集合進行學習,得到的二進神經網路隱層神經元都歸屬於一類或幾類線性可分結構系,只要這幾類線性可分結構系的邏輯意義是清晰的,就可以分析整個學習結果的知識內涵。
  7. The theory of protocol analysis is listed. by explaining the course of nimda virus evades computer and server, it shows the reason why protocol analysis can detect nimda virus. afterwards it lists the advantage that pattern match can " t have

    重點介紹了協議分析的工作原理,並以nimda病毒為例分析了該檢測方法能夠檢測出這種攻擊的原因,並概括出其具有模式匹配無法比擬的優勢。
  8. When a process crashes ( e. g. failure of a bif or a pattern match ) exit signals are sent to all processes to which the failing process is currently linked

    當一個進程掛掉了(例如bif失敗或者模式匹配失敗) ,退出信號將發送給所有和該失效進程相關的其他進程。
  9. In the detection of protocol analysis model, we mainly studied the fragment reassembly of ip packet on the bases study of tcp / ip protocol. in the detection of pattern match model, we analyzed several kinds of pattern match algorithms such as : kmp, bm, bmh and multiple pattern match algorithms ( wang 2002 )

    在基於協議分析的檢測方法中,從tcp / ip協議族的層次結構出發,主要分析了ip包的分片重組技術;在基於模式匹配的檢測方法中,主要分析了多種模式匹配演算法: kmp 、 bm 、 bm的改進演算法以及多模式匹配演算法。
  10. Represents the attributes of a match made using text pattern matching

    表示使用文本樣式匹配所進行的匹配的屬性。
  11. At last, the author introduces how to describe the characteristic of attack and uses an improved pattern match algorithm to do pattern matching

    介紹了如何描述攻擊特徵,使用了改進的字元匹配演算法進行特徵匹配。
  12. The extended finite state automation ( efsa ) is adopted to match pattern written by asl in the thesis. it is also said that the rules are translated into efsa while compiling the rules, the method have high performance in the run time, the pattern matching time is insensitive to the numbers of rules

    文中模式匹配採用了擴展的有限狀態自動機( efsa )演算法,也就是在編譯規則的時候將規則轉換成擴展的有限狀態自動機,這個方法提高了運行時執行的效率,使得匹配的時間與規則的多少基本無關。
  13. First, model, constitutes, category, trend and problem of ids is presented, and then pattern match which is applied widely is introduced from the aspect of theory and technology. principle and performance data of three pattern match algorithms such as bm, bmh and ac _ bm are discussed in detail. previous two algorithms are realized by programming

    本文首先介紹了入侵檢測系統的模型、組成、分類、發展趨勢以及面臨的眾多問題,然後從原理上、技術上介紹了目前使用最廣泛的模式匹配檢測方法,以常用的網路入侵檢測系統snort為例,詳細討論了bm 、 bmh和ac bm三種模式匹配演算法的基本思想以及性能參數,並且編程實現了前兩種演算法。
  14. In the implement of the network engine, the combination of network protocol analysis and pattern match technology is used so that the scope to search is reduced. the foundation of cve - based intrusion detection system rule base gives the update of the ids rule base reliable foundation. we put forward a new form of rule syntax

    以cve標準為建立入侵檢測專家系統規則庫的基準,使得入侵檢測專家系統規則庫升級有了可靠的國際權威標準可以依據,採用基於snort的規則描述語言,這種描述方法簡單、易於實現,能夠描述絕大多數的入侵行為,而且可以及時針對最新的漏洞升級規則。
  15. This regexp will match the entire contents of the three lines we just appended to the pattern space

    這個規則表達式將與剛剛附加到模式空間的三行的全部內容匹配。
  16. Following are the main points of the paper : 1. signature - based intrusion detection system takes advantages of advanced pattern - match algorithms

    文章在如何提高特徵檢測的效率和準確性方面主要做了下面的工作: 1
  17. But the eco - tourism does not match between market scope and resource current situation and the resource potentiality does not produce a good marked effect. the development of eco - tourism needs guide in synthetic developing pattern and investigation in total layout

    但是,生態旅遊市場規模與資源現狀並不匹配,資源潛力沒有很好地發揮出來,生態旅遊開發上也亟待綜合開發模式的指導和總體布局研究。
分享友人