模式匹配法 的英文怎麼說

中文拼音 [shìpèi]
模式匹配法 英文
pattern matching algorithm
  • : 模名詞1. (模子) mould; pattern; matrix 2. (姓氏) a surname
  • : 名詞1 (樣式) type; style 2 (格式) pattern; form 3 (儀式; 典禮) ceremony; ritual 4 (自然科...
  • : Ⅰ動詞(比得上; 相當; 相配) be equal to; be a match for Ⅱ形容詞(單獨) lone Ⅲ量詞1. (用於馬、騾等) 2. (用於整卷的綢或布)
  • : Ⅰ動詞1 (兩性結合) join in marriage 2 (使動物交配) mate (animals) 3 (按適當的標準或比例加以...
  • : Ⅰ名詞1 (由國家制定或認可的行為規則的總稱) law 2 (方法; 方式) way; method; mode; means 3 (標...
  • 模式 : model; mode; pattern; type; schema
  • 匹配 : 1. [書面語] (婚姻配合) mate; marry 2. [電學] matching
  1. The system primarily uses the protocol analysis technology and mode matching arithmetic in realizing network engine. through the combination of the above two, it effectively monishes the target matching scope and improves the detecting speed

    系統在實現網路引擎時,主要使用了協議分析技術和演算,通過兩者的結合,有效地減小目標的范圍,提高了檢測速度。
  2. In this paper, we study focus on building intrusion detection model based the technique of data mining ( dm ). firstly, the paper designed a scheme to modeling intrusion detection based dm and bright forward the idea of descriptive model and classified model to intrusion detection. secondly, we designed and implemented a net data collection system with high performance and a scheme to pretreat net data. thirdly, after studying the algorithms to mine association rule and sequence rule in net data, we extended and improved the algorithms according to the characteristic of net data and the field knowledge of intrusion detection

    首先設計了基於數據挖掘技術的入侵檢測建方案,提出使用該技術建立入侵檢測描述性型和分類型的思想,並用分類判決樹建立了入侵檢測分類型;其次,設計和實現了一個高性能的網路數據採集系統和網路數據預處理的方案;然後,在對關聯規則挖掘和序列規則挖掘演算進行研究的基礎上,結合網路數據的特性和入侵檢測領域的知識對演算進行了擴展和改進,挖掘出了網路數據的關聯和序列;最後,研究了描述性的應用,並設計出基於的入侵檢測引擎,該引擎具有誤用檢測和異常檢測功能。
  3. Next, introduct the technology of the protocol analysis. it means when examin the data packet, wo can use the protocol analysis technology to distinguish the protocol type of the data, then use the corresponding data analysis procedure to examin the data packet. so the examination efficiency can improved. finally, the k - r algorithm used for system data analysis module is parallelized design. and through the comparision the original algorithm and parallel algorithm, we can find that under the

    即在對截獲的數據包進行檢測時,先使用協議分析的技術辨別數據包的協議類型,再使用相應的數據分析程序來檢測數據包,從而提高了系統的檢測效率; 5 )對系統數據分析塊中使用的k - r演算進行了并行化設計,並比較了原演算和并行演算的時間復雜度和執行代價。
  4. Fuzzy control algorithm based on pattern - matching

    基於糊控制演算
  5. This article analyses the characteristic of fingerprint image and brings forward some reasonable supposes which related to the fingerprint image after i collected and analyzed many articles of others that is related to the fingerprint image processing and has published in the resent years. based on these characteristic and supposes, i developed a set of fingerprint image processing arithmetic that are adapt to the fingerprint image gathered by capacitive solid - state device. these include several steps

    作者收集和分析了近年來大量的國內外的關于指紋圖像處理技術的學術文獻基礎上,分析了指紋圖像的特性,提出了對指紋圖像的一些合理的假設,並從這些假設出發,提出了一套適用於電容指紋傳感器採集的指紋圖像的處理演算,這些演算包括指紋圖像的有效區域提取、指紋圖像的質量分析、指紋圖像的分割、指紋圖像濾波、二值指紋圖像的細化、特徵點的提取、特徵點的可靠性分析、指紋圖像的點等步驟。
  6. On the other hand the information cryptogram technology and card identification of 1c appl ication system are also introduced. a novel fingerprint image preprocessing method is studied based on the trend of fingerprint veins, and some feature extraction and fingerprint matching methods based on fingerprint minutia based on a novel multi - fitness genetic algorithm ( mfga ) are also studied

    在分析了國內外指紋識別理論研究的基礎上,研究了一種基於指紋紋線趨勢的指紋圖象預處理方並取得了較好的擬效果;研究了遺傳演算在指紋中的應用,針對遺傳演算的局限性,提出了一種多適應度遺傳演算( mfga ) ,並在此基礎上對原遺傳演算做了進一步的改進。
  7. In order to resolve the problem of low accuracy, computing overhead and the high false negative probability that the current detection technology suffered, the protocol misuage detection becomes one of the research fields in the development of network intrusion detection

    針對基於的誤用檢測技術存在的檢測率低、計算量大和高漏報率等問題,使用協議分析方實現異常檢測技術成了網路入侵檢測的重要研究方向。
  8. In this paper, a processing approach to the complex long sentence based on multi - strategy is proposed, in which the rule - based analysis and case - based consistent matching are combined by using various linguistic features, including sentence length, punctuation, functional words and contextual condition and so on, which is used to segment the complex sentence into several simple sentences and to compose the translation text of these simple sentences together

    本文提出一種多語種通用的基於多策略分析的復雜長句翻譯處理演算,該演算通過基於實例和規則分析相結合的方,綜合利用源語言句子中多種相關的語言特徵,包括語語義特徵、句子長度、標點符號、功能詞以及上下文語境條件等對復雜長句進行切分簡化處理和譯文的復合生成。
  9. Based on the analysis of above drawbacks, this paper proposes frequent access pattern tree algorithm ( fapt ). this algorithm includes two steps : access pattern tree method, through the pattern matching method it saves user ' s visit sequences with tree ; pruning method, it uses frequent degree to prune access pattern tree which is under the frequent degree

    在分析以上不足的基礎上,提出了頻繁訪問樹( fapt )演算,該演算包括以下兩個步驟:訪問樹的生成,通過的方將用戶訪問序列以樹形結構來存儲;修剪的策略,利用頻繁度對訪問樹進行修剪,修剪掉其中低於頻繁度的節點。
  10. The algorithm automatically recognizes and counts the objects in an image via pattern matching

    演算通過對圖像中的目標進行處理,自動識別目標,實現目標的計數功能。
  11. Based on multiple patterns match algorithm - deterministic finite state automata ( dfsa ), a dfa has been designed, which can identify multiple kind numbers

    摘要基於有限自動機的多演算( dfsa演算) ,設計出同時識別多種數的有限自動機。
  12. By using the neural network match technique the method makes the mechanism design automation feasible

    該方利用基於神經網路的技術,為實現機構綜合自動化提供一條可行的途徑。
  13. Fifth, we select two methods of point pattern to match minutiae feature

    選取了基於圖像校準的點模式匹配法和局部向量特徵進行指紋的特徵
  14. In the match method based on picture emendation, we use the changeable sized boundary box which influences the disadvantage of the unchangeable sized boundary box

    在基於圖像校準的點模式匹配法中採用了可變大小的界限盒,改變了固定大小的界限盒的不足。
  15. The performance efficiency of a network intrusion detection system ( nids ) is dominated by pattern matching algorithm

    摘要網路入侵檢測系統的效率取決于演算選擇。
  16. Using time - dependent mode matched scattering matrix method and based on the theory of the interaction between atom and electromagnetic field, we predict the effect that the longitudinal transport of electron is partly blocked by the lateral emitting electromagnetic wave and give detail analysis of the mechanism and the feature of the effect

    第三章我們以光和原子相互作用理論為基礎,用含時散射矩陣方研究了直量子線在太赫茲電磁場部分輻照下的電子輸運性質,並得出橫向電磁輻射對電子縱向運動的阻塞效應。
  17. The goal of this paper is to obtain a method that can compute the kc parameter of each higher mode rapidly and precisely, and then write corresponding programs. on the basis of foreign and domestic references, after carefully comparison, the transverse technique of the mode matching method is adopted in this paper

    本課題的研究目標旨在得到一種能快速、精確地計算脊波導中主及各高次kc的有效方,並編制相應的程序。在廣泛查閱國內外相關資料的基礎上,反復比較,本文採用了模式匹配法的橫向諧振技術以得到有關kc的特徵方程。
  18. In this paper, two parts of the body leg and head are tracked. the lower limb is tracked using geometric characteristics, the original image sequence is first transformed to the distance image sequence, and then the four joints of the leg are tracked on the distance image sequence. based on visual perception, the head is tracked using color information of face and matching is proceeded from coarse to fine matching, fuzzy pattern recognition is also applied during fine matching

    論文中,跟蹤了兩個局部部位腿部和頭部的運動,利用人體腿部的幾何特徵,將原始腿部圖像序列變換到相應的距離圖像上,然後對人體腿部的四個關節點運動進行了跟蹤;根據人類視覺識別特性,採用由粗到細的過程和基於面部的色彩信息對圖像中的頭部進行了檢測,並且在細致中利用了
  19. The former is used to perform primary lexical selection. and the later, on the other hand, is used to do further lexical selection. the semantics patterns used in this system are named fuzzy semantics patterns

    選詞型中,基於語義的選詞演算用來完成詞匯初選工作,目的是減少候選詞集的規以降低后繼選詞步驟的工作量。
  20. Chapter four describes the algorithms of the lexical selection model, including the algorithm basing on fuzzy semantics patterns and the algorithm basing on examples. at last it also brings forward a brief discussion about counter semantics pattern and counter example

    第四章是選詞型的演算實現,包括對基於糊語義的選詞演算以及基於實例比較和統計的選詞語演算的介紹。
分享友人