正常行為 的英文怎麼說

中文拼音 [zhēngchánghángwéi]
正常行為 英文
normal behaviour
  • : 正名詞(正月) the first month of the lunar year; the first moon
  • : 行Ⅰ名詞1 (行列) line; row 2 (排行) seniority among brothers and sisters:你行幾? 我行三。where...
  • 正常 : normal; regular; average
  • 行為 : action; behaviour; conduct; deed
  1. However, only did a few pollen germinate in inter - specific hybridization between cerasus fruticosa and c. avian and many pollen tubes are crosswise on stigma and couldn " t penetrated into style. although a few pollen tubes entered, they couldn " t continue to grow due to accumulation of callosity in pollen tubes. in view of above - mentioned results, the irregular growth of pollen was the main reason to cause the incompatibility of distant hybridization between cerasus fruticosa and c. avium

    而草原櫻桃與歐洲甜櫻桃種間雜交授粉后花粉在柱頭上雖少量萌發,但花粉管在柱頭上橫向生長,或盤繞,扭曲不能伸入花柱;個別進入花柱的花粉管先端因沉積胼胝質而中途停止伸長未能進入子房到達胚珠,從而說明這種雜交授粉后花粉管的不正常行為是導致草原櫻桃與歐洲甜櫻桃遠緣雜交不親和的主要原因。
  2. Exploring the scheme about correction of students ' deviant behaviors

    學生偏方案探討
  3. Describing normal behaviors is one of the difficulties that an anomaly detection system faces

    正常行為的描述是異檢測系統必須要解決好的核心問題之一。
  4. The essence of edid is to set up a normal behavior fuzzy sub collection a on the basis of watching the normal system transfer of the privilege process, and set up a fuzzy sub collection b with real time transfer array, then detect with the principle of minimum distance in fuzzy discern method the innovation point of this paper is : put forward the method of edid, can not only reduce efficiently false positive rate and false negative rate, also make real time intrusion detection to become possibility ; have independent and complete character database, according to the classification of monitoring program, design normal behavior and anomaly behavior etc., have raised the strongness of ids ; use tree type structure to preservation the character database, have saved greatly stock space ; in detection invade, carry out frequency prior principle, prior analysis and handling the behavior feature of high frequency in information table, have raised efficiency and the speed of detection, make real time intrusion detection to become possibility ; have at the same time realized anomaly intrusion detection and misuse intrusion detection, have remedied deficiency of unitary detection method

    這種方法的實質是在監控特權進程的系統調用基礎上建立正常行為模糊子集a ,用檢測到的實時調用序列建立模糊子集b ,然後用模糊識別方法中的最小距離原則進檢測。本文的創新點是:通過對特權進程的系統調用及參數序列的研究,提出了基於euclidean距離的入侵檢測方法edid ,不僅能有效降低漏報率和誤報率,而且使實時入侵檢測成可能;設計有獨立而完整的特徵數據庫,根據被監控程序的類別,分別設計正常行為、異等,提高了檢測系統的強健性和可伸縮性;特徵數據庫按樹型結構存儲,大大節省了存儲空間;在檢測入侵時,實頻度優先原則,優先分析和處理信息表中的高頻度特徵,提高檢測的速度和效率,使實時入侵檢測成可能;同時實現了異入侵檢測和誤用入侵檢測,彌補了單一檢測方法的不足。
  5. By individual examination and association examination, the accuracy of nomal behavior model is improved

    通過對多個屬性的分別考察和對其關聯性的考察,提高正常行為描述的準確性。
  6. I forthe irregularitles, for any wrongdolngwhlch took place. i

    I對不正常行為和錯誤的發生負有責任的人. i
  7. To restore normal behavior, set the

    若要還原正常行為,請將
  8. But we suggest that residents report any sightings of unusual behavior

    但我們建議居民應該報告任何不正常行為
  9. This is normal behavior for connection handles controlled by the operating system

    這是操作系統控制的連接句柄的正常行為
  10. This is normal behavior because some warnings relate only to optimized code

    這是正常行為,因一些警告只與優化代碼有關。
  11. Doctors and parents can also look for behaviors that are normal in babies under one year ( of age )

    醫生和父母尋找一歲下小孩子的正常行為
  12. Doctors and parents can also look for behaviors that are normal in babies under one year of age

    醫生和父母也尋找那些1周歲以下嬰兒的正常行為
  13. Furthermore, the affiliated relationship among the trading parties can largely save the business cost, time and promote the trading efficiency. however, on the other hand, if no appropriate supervisions of law are given, the trading parties and listed corporations may take advantage of the trading conditions for the purpose of making unlawful interests for themselves

    那麼其交易屬於市場經濟環境中的一種正常行為,並且,由於交易雙方存在著關聯關系,還可以大量地節約商業活動中所發生的多種交易成本,節約交易時間,提高交易效率。
  14. Wrapping up that unwanted picture frame from last christmas and giving it to someone else as a gift might not be as taboo as it once was, according to a study released on wednesday

    根據美國周三公布的一項調查結果,將去年聖誕節收到的禮物重新包裝后再轉手送給他人基本上已屬于正常行為,盡管人們以前可能不會這樣認
  15. In behavior - based process detection technique, the process is regarded as a series of system call, and the process ’ normal behaviors are presented by the partial system call sequences in series

    在基於的進程檢測技術中,進程被看作一系列系統調用的有序組合,進程的正常行為由該有序組合中出現的局部系統調用序列來刻畫。
  16. This degree of fear often indicates that one has changed their normal behavior in radical ways, and may have become extremely compulsive

    這種程度上的恐懼往往指示出人已經激烈地改變了他們的正常行為,而且可能變得極度強迫。
  17. This paper presents an in - depth study of building normal behavior models. problems such as attributes selecting, event modeling and association analyzing are discussed

    本文從所考察的對象、事件的建模、關聯分析等方面對如何構建正常行為模型進了較深入的探討。
  18. Abstract network traffic anomaly refers to the status that traffic behaviors depart from the normal behaviors. many reasons, such as the misuse of network equipments, network operations anomaly, flash crowd, network intrusion and so on will cause network anomaly

    網路流量異指的是網路的流量偏離其正常行為的情形,引起網路流量異的原因是多種多樣的,例如網路設備的不良運、網路操作異、突發訪問( flashcrowd ) 、網路入侵等。
  19. These two - layer markov chains were used to construct the normal profiles of server process ' s activity, and then to detect anomaly

    這些兩層的馬爾可夫鏈用於構建服務進程的正常行為輪廓和異檢測。
  20. Meanwhile, a major problem in anomaly detection is that system can issue false alarms when there are modifications in the normal system behavior ; therefore, we present an adaptive data - mining framework for anomaly detection. the normal profile can be updated at regular intervals, and as a result, false alarms are significantly reduced

    同時,在異檢測系統中,當用戶或系統輪廓發生變化時,由於檢測所需的規則庫不能及時的更新,容易造成將用戶或系統的正常行為誤報入侵的情況,因此,文中介紹了一個構造自適應系統的方法,通過這種方法,規則庫可以自動的更新,並可以有效的減少誤報。
分享友人