法網追蹤 的英文怎麼說

中文拼音 [wǎngzhuīzōng]
法網追蹤 英文
the youthful delinquents
  • : Ⅰ名詞1 (由國家制定或認可的行為規則的總稱) law 2 (方法; 方式) way; method; mode; means 3 (標...
  • : Ⅰ名詞1 (捕魚捉鳥的器具) net 2 (像網的東西) thing which looks like a net 3 (像網一樣的組織或...
  • : Ⅰ動詞1 (追趕) chase after; run after; pursue; catch up with 2 (追究) trace; look into; get to...
  • : 名詞(腳印; 蹤跡) footprint; track; trace; trail
  • 法網 : the net of justice; the arm of the law
  • 追蹤 : have in the wind; follow the trail of; track; trace; pursue
  1. The method, firstly, grids the precipitation amount by conicoid, then judges and traces isoline and brings forward a way of how to avoid connection uncertainty of isoline

    該方首先用二次曲面對不規則站點雨量進行格化,然後在格上對等雨量點進行判斷、以及在過程中如何消除的二義性。
  2. Updates to the site are made every five minutes and the so - called " norad tracks santa " program has german, spanish, french, italian, japanese and english links

    站每5分鐘更新一次,這個所謂的「北美太空防禦司令部聖誕老人」節目具有德語、西班牙語、語、義大利語、日語以及英語6種版本的鏈接。
  3. Although these methods have their advantages respectively, there are some disadvantages in tracing efficiency, network flux control, communication security and subagent callback for these meth ods more or less

    這些方各有所長,但本身在效率,路流量控制、通信安全性和子agent的回收等方面都或多或少存在一些不足。
  4. The first part discusses the status quo on the assessment of learning processes. the second part analyzes the design of web - based, dynamic assessment system of learning processes. the third part addresses the development assessment essentials to learning process and the strategies of the development assessment in the web - based , dynamic assessment system

    正文分六部分,首先從「面向學習過程評價的現狀」入手,提出對學習過程評價的重要性;第二章研究基於路的對學習過程的動態評估系統的開發;第三章對學習過程實施發展性評價的要點和系統運用的發展性評價策略;第四章研究利用該系統開展對學習過程的發展性評價;第五章分析研究利用本系統實施發展性評價的步驟、方和注意問題。
  5. In addition, for regular grid data it presents an effective algorithm for some particularity that there are four isopoints in one grid cell and for random discrete data points it lays emphasis on triangulation. this paper firstly put forward three principles : attribute principle of adjoining isolines, attribute principle of isoregions and inclusion principle of ioslines after studying the character of isolines. the bivalue - topology algorithm based on boundary tracking is given, which is founded on the three principle and is used to fill isoregions

    另外,在這兩部分中除了對邊信息鏈表的形成過程以及基於邊信息鏈表的等值線生成做了詳細討論外,還對規則格數據的等值線中,一個格單元上含四個等值點的特殊情形給出了一個比較有效的演算,並在任意離散點數據部分對平面點集的三角剖分進行了著重討論。
  6. Measurement of pressure, temperature and humidity operated in much the same principle as the older version of radiosonde, but computation of wind was made use of the vlf ( very low frequency in the range of 10 - 13 khz ) signals of a world - wide navigational network, omega

    該系統量度高空氣壓、氣溫及濕度的方與舊式無線電探空儀大致相同,但在測風方面則採用了一種新的概念,利用世界性奧米茄導航站的甚低頻信號( 10 - 13khz )來計算出高空風向和風速,無需用雷達探空儀位置。
  7. In order to coordinate monitoring agents with each other in tracing the source of network attack by sharing the tracing data, a traceback method based on collaborative mechanism was proposed

    為了在分散式系統中協調監控代理,及時共享多點採集的數據合作定位路攻擊源,提出一種基於協同機制的攻擊源
  8. It reframes the traceback problem as a polynomial reconstruction problem, and uses techniques from algebraic coding theory to provide robust methods of transmission and restriction. the scheme is a new solution to the traceback problem during a dos attack ; the honeypot for ddos, which is a tool of traceback, lures the attacker to believe that he successfully compromised a slave for his needs, convincingly simulating the architecture of a potential ddos attack ; the source - based approach to ddos defense, which is a useful adjunt to traceback systems, deploys a ddos defense system at source - end networks. attacks are detected by monitoring two - way traffic flows, and the attacks originating from source networks are stopped by rate - limiting ; the routing mechanism based on pushback treats ddos attacks as a congestion - control problem

    最後,就有關ddos攻擊反向問題,從四個方面對其解決方案進行了研究:在分析比較幾種反向演算的基礎上,著重研究了代數方編碼反向信息的方案,該方案把重構問題當作多項式重構問題,使用代數編碼理論技術提供魯棒的傳送和重構方,是dos攻擊過程中的反向問題的一種新的解決方; ddos陷阱作為反向的工具,引誘攻擊者相信自己成功與所需的傀儡主機通話,令人信服地模擬出潛在ddos攻擊體系結構;基於源的ddos防禦方作為反向有用的補充,將防禦系統部署在源路,通過監控雙向流量檢測攻擊和限制速率終止來自源的攻擊;基於向後倒推的防禦ddos的路由機制把ddos攻擊看作擁塞控制問題,添加功能到每個路由器來檢測並優先丟棄可能屬于攻擊的包,通過向後倒推上級路由器也得到通知而把這樣的包丟棄。
  9. Fem tracing analysis on the limiting load of space trusses

    空間架結構極限載荷的有限元分析
  10. In forming triangles, i present a new clockwise judge pattern to the arithmetic. in outputing triangles, i set up a topo structure of triangles and output them. these changes can improve efficency of arithmetic. i tested the algorithm with data points and found the time complexity to be linear

    2在tsung - paofang和les . piegl提出的delaunay三角生成演算的基礎上,本文對演算作了一些改進和完善,將原演算的右側模式,完善和細化為順時針模式。
  11. On loss allocation, the paper first points out the reasonability of loss allocation method based on complex power tracing method by using electricity path equivalence decouple theory

    損分攤方面,本文利用現有的電氣路徑等值解耦理論,指出了基於復功率損分攤方是合理的。
  12. The system adopt griding - method to build isolines from the two data. the edge - information structure is designed firstly in program and isopoints are deposited in the edge - information linked lists, which is convenient to the tracking and building of isolines

    對于這兩種數據,本系統均採用格序列來生成等值線。在程序中,首次設計了邊信息結構,採用邊信息鏈表的方式來存儲等值點,大大方便了等值線的與生成。
  13. Later on, after elaborating the disadvantages of the old methods in detecting and recognizing moving objects, a series of corresponding approaches are proposed, such as grid scan, local tracking bug and dynamic window in object tracing to reduce the huge data needed to be processed, maximum and minimum for selecting a proper segmentation threshold and improved conversion from rgb model to hsv and so on to decrease the influence of inhomogeneous lighting and the color noise, a bilinear interpolation in each quadrant to eliminate the bad effect on the recognition precise because of the distortions of the camera. after that, much emphasis is given on application study in pattern recognition with a feed - forward neural network. both the basic bp algorithm and improved bp algorithm in the study process are described in detail, and the later is used to quicken convergence speed and improve validity of the network

    然後,分析和闡明了傳統的運動目標檢測方的不足,並在此基礎上結合研究中的實際實驗環境,提出了一系列解決方,包括針對降低龐大數據量而提出的格掃描、局部「跟蟲」和動態窗口掃描等目標檢測方,針對實驗環境中光照不均和顏色干擾提出基於人機交互的最大最小值閾值選取方和引入改進的rgb模型到hsv模型的轉換方,為消除圖像畸變對識別精度的惡劣影響而採用的通過控制點進行雙線性插值進行畸變校正的方;緊接著,概述了神經路的發展歷史和幾種常用神經路模型的特點,重點研究了前饋型神經路在模式識別中的應用問題,詳細闡述了基本的bp演算和學習過程中bp演算的改進,從而使路收斂速度更快,解決問題更有效,並在此基礎上,設計了一個基於bp神經路的運動目標識別系統,給出了實驗結果。
  14. 2 studies are included in this research. in the first study, case study is used to explore the curative effect and causes on abstaining internet addiction disorder, the study method is psychotherapy of cognitive therapy and behavioral therapy. in the second study, during the isolation period by sasr, questionnaire surveys and interviews are used on 9 middle school students with iad to explore the curative effect and causes on abstaining internet addiction disorder

    本研究包含兩個子研究,第一個子研究以個案研究的方式臨床實驗的方,探討了以認知療和行為療為主的心理療在中學生路成癮行為的矯治中的療效及原因;第二個子研究是藉助「 sars 」到來所創造的有利機會,以個案研究的方式,問卷與訪談的方,對9名成癮中學生接受強制性措施戒除癮之療效及原因進行了研究。
  15. " on the consumer front, while the community will enjoy unprecedented benefits across the entire spectrum of communications and services, most of us are blissfully unaware that the internet, our new window on the outside world, is actually a two - way mirror through which technology can record, track and profile all our online endeavours, " mr. lau added

    對消費者來說,雖然大家在通訊及服務方面的得益是前所未有的,但大家在極樂中大有可能無察覺國際路這個令我們可以一窺外間世界的新途徑,實際上是一面雙面的鏡子。透過這面鏡子,我們在上的一舉一動都有可能被科技及記錄下來,並且被編製成個人檔案。
  16. In the yield data acquire multi - line geometric in a radial pattern is adopted. before theoretical explanations about the non - uniqueness of inversions and the necessity of constrains are illustrated, the description of linear travel - time interpolation ( lti ) calculations, the derivation of jacobian linear equations, and the deductions of solving large sparse matrix equations, i. e. the lsqr iterations, are involved. in order to cope with the uncertainties in tomography, we reach several categories on constraint methods

    對於野外數據採集採用多測線上放射狀布置檢波器;圍繞層析成像方,文章分析了線性差值射線lti技術,推導出在矩形格內速度以雙線性關系變化時方程組的解析式,進一步詳細探討方程組的求解方,即最小平方正交分解,並給出了迭代公式。
  17. Hazards may include unauthorized monitoring of transmissions and / or records of internet counseling sessions

    這些危險可包括對傳送未經授權地和/或者路咨詢內容的非錄制。
  18. ( 2 ) a information weighting model based on the methods of pca and new ppa is presented. the combined model is set up on the principle of optimization. owing to the predominance of dealing with nonlinearity and uncertainty of wuirn net, the back - analysis model of information weighting is established by use of experts " ability of harmonization

    ( 2 )研究了主成分及新型投影演算,建立信息賦權的正分析模型,並在最優化準則下,建立了信息賦權整合模型;基於偏差單元遞歸神經路的處理大壩監測中非線性和不明確性等問題的獨特優勢,憑借專家對指標權重的協調能力,建立了指標信息賦權的反分析模型。
分享友人