法網追蹤 的英文怎麼說
中文拼音 [fǎwǎngzhuīzōng]
法網追蹤
英文
the youthful delinquents- 法 : Ⅰ名詞1 (由國家制定或認可的行為規則的總稱) law 2 (方法; 方式) way; method; mode; means 3 (標...
- 網 : Ⅰ名詞1 (捕魚捉鳥的器具) net 2 (像網的東西) thing which looks like a net 3 (像網一樣的組織或...
- 追 : Ⅰ動詞1 (追趕) chase after; run after; pursue; catch up with 2 (追究) trace; look into; get to...
- 蹤 : 名詞(腳印; 蹤跡) footprint; track; trace; trail
- 法網 : the net of justice; the arm of the law
- 追蹤 : have in the wind; follow the trail of; track; trace; pursue
-
The method, firstly, grids the precipitation amount by conicoid, then judges and traces isoline and brings forward a way of how to avoid connection uncertainty of isoline
該方法首先用二次曲面對不規則站點雨量進行格網化,然後在格網上對等雨量點進行判斷、追蹤以及在追蹤過程中如何消除追蹤的二義性。Updates to the site are made every five minutes and the so - called " norad tracks santa " program has german, spanish, french, italian, japanese and english links
網站每5分鐘更新一次,這個所謂的「北美太空防禦司令部追蹤聖誕老人」節目具有德語、西班牙語、法語、義大利語、日語以及英語6種版本的鏈接。Although these methods have their advantages respectively, there are some disadvantages in tracing efficiency, network flux control, communication security and subagent callback for these meth ods more or less
這些方法各有所長,但本身在追蹤效率,網路流量控制、通信安全性和子agent的回收等方面都或多或少存在一些不足。The first part discusses the status quo on the assessment of learning processes. the second part analyzes the design of web - based, dynamic assessment system of learning processes. the third part addresses the development assessment essentials to learning process and the strategies of the development assessment in the web - based , dynamic assessment system
正文分六部分,首先從「面向學習過程評價的現狀」入手,提出對學習過程評價的重要性;第二章研究基於網路的對學習過程的動態追蹤評估系統的開發;第三章對學習過程實施發展性評價的要點和系統運用的發展性評價策略;第四章研究利用該系統開展對學習過程的發展性評價;第五章分析研究利用本系統實施發展性評價的步驟、方法和注意問題。In addition, for regular grid data it presents an effective algorithm for some particularity that there are four isopoints in one grid cell and for random discrete data points it lays emphasis on triangulation. this paper firstly put forward three principles : attribute principle of adjoining isolines, attribute principle of isoregions and inclusion principle of ioslines after studying the character of isolines. the bivalue - topology algorithm based on boundary tracking is given, which is founded on the three principle and is used to fill isoregions
另外,在這兩部分中除了對邊信息鏈表的形成過程以及基於邊信息鏈表的等值線生成做了詳細討論外,還對規則格網數據的等值線追蹤中,一個網格單元上含四個等值點的特殊情形給出了一個比較有效的演算法,並在任意離散點數據部分對平面點集的三角剖分進行了著重討論。Measurement of pressure, temperature and humidity operated in much the same principle as the older version of radiosonde, but computation of wind was made use of the vlf ( very low frequency in the range of 10 - 13 khz ) signals of a world - wide navigational network, omega
該系統量度高空氣壓、氣溫及濕度的方法與舊式無線電探空儀大致相同,但在測風方面則採用了一種新的概念,利用世界性奧米茄導航站網的甚低頻信號( 10 - 13khz )來計算出高空風向和風速,無需用雷達追蹤探空儀位置。In order to coordinate monitoring agents with each other in tracing the source of network attack by sharing the tracing data, a traceback method based on collaborative mechanism was proposed
為了在分散式網路追蹤系統中協調監控代理,及時共享多點採集的追蹤數據合作定位網路攻擊源,提出一種基於協同機制的攻擊源追蹤方法。It reframes the traceback problem as a polynomial reconstruction problem, and uses techniques from algebraic coding theory to provide robust methods of transmission and restriction. the scheme is a new solution to the traceback problem during a dos attack ; the honeypot for ddos, which is a tool of traceback, lures the attacker to believe that he successfully compromised a slave for his needs, convincingly simulating the architecture of a potential ddos attack ; the source - based approach to ddos defense, which is a useful adjunt to traceback systems, deploys a ddos defense system at source - end networks. attacks are detected by monitoring two - way traffic flows, and the attacks originating from source networks are stopped by rate - limiting ; the routing mechanism based on pushback treats ddos attacks as a congestion - control problem
最後,就有關ddos攻擊反向追蹤問題,從四個方面對其解決方案進行了研究:在分析比較幾種反向追蹤演算法的基礎上,著重研究了代數方法編碼反向追蹤信息的方案,該方案把追蹤重構問題當作多項式重構問題,使用代數編碼理論技術提供魯棒的傳送和重構方法,是dos攻擊過程中的反向追蹤問題的一種新的解決方法; ddos陷阱作為反向追蹤的工具,引誘攻擊者相信自己成功與所需的傀儡主機通話,令人信服地模擬出潛在ddos攻擊體系結構;基於源的ddos防禦方法作為反向追蹤有用的補充,將防禦系統部署在源網路,通過監控雙向流量檢測攻擊和限制速率終止來自源的攻擊;基於向後倒推的防禦ddos的路由機制把ddos攻擊看作擁塞控制問題,添加功能到每個路由器來檢測並優先丟棄可能屬于攻擊的包,通過向後倒推上級路由器也得到通知而把這樣的包丟棄。Fem tracing analysis on the limiting load of space trusses
空間網架結構極限載荷的有限元法追蹤分析In forming triangles, i present a new clockwise judge pattern to the arithmetic. in outputing triangles, i set up a topo structure of triangles and output them. these changes can improve efficency of arithmetic. i tested the algorithm with data points and found the time complexity to be linear
2在tsung - paofang和les . piegl提出的delaunay三角網生成演算法的基礎上,本文對演算法作了一些改進和完善,將原演算法的右側追蹤模式,完善和細化為順時針追蹤模式。On loss allocation, the paper first points out the reasonability of loss allocation method based on complex power tracing method by using electricity path equivalence decouple theory
在網損分攤方面,本文利用現有的電氣路徑等值解耦理論,指出了基於復功率追蹤的網損分攤方法是合理的。The system adopt griding - method to build isolines from the two data. the edge - information structure is designed firstly in program and isopoints are deposited in the edge - information linked lists, which is convenient to the tracking and building of isolines
對于這兩種數據,本系統均採用網格序列法來生成等值線。在程序中,首次設計了邊信息結構,採用邊信息鏈表的方式來存儲等值點,大大方便了等值線的追蹤與生成。Later on, after elaborating the disadvantages of the old methods in detecting and recognizing moving objects, a series of corresponding approaches are proposed, such as grid scan, local tracking bug and dynamic window in object tracing to reduce the huge data needed to be processed, maximum and minimum for selecting a proper segmentation threshold and improved conversion from rgb model to hsv and so on to decrease the influence of inhomogeneous lighting and the color noise, a bilinear interpolation in each quadrant to eliminate the bad effect on the recognition precise because of the distortions of the camera. after that, much emphasis is given on application study in pattern recognition with a feed - forward neural network. both the basic bp algorithm and improved bp algorithm in the study process are described in detail, and the later is used to quicken convergence speed and improve validity of the network
然後,分析和闡明了傳統的運動目標檢測方法的不足,並在此基礎上結合研究中的實際實驗環境,提出了一系列解決方法,包括針對降低龐大數據量而提出的網格掃描、局部「跟蟲」追蹤和動態窗口掃描等目標檢測方法,針對實驗環境中光照不均和顏色干擾提出基於人機交互的最大最小值閾值選取方法和引入改進的rgb模型到hsv模型的轉換方法,為消除圖像畸變對識別精度的惡劣影響而採用的通過控制點進行雙線性插值進行畸變校正的方法;緊接著,概述了神經網路的發展歷史和幾種常用神經網路模型的特點,重點研究了前饋型神經網路在模式識別中的應用問題,詳細闡述了基本的bp演算法和學習過程中bp演算法的改進,從而使網路收斂速度更快,解決問題更有效,並在此基礎上,設計了一個基於bp神經網路的運動目標識別系統,給出了實驗結果。2 studies are included in this research. in the first study, case study is used to explore the curative effect and causes on abstaining internet addiction disorder, the study method is psychotherapy of cognitive therapy and behavioral therapy. in the second study, during the isolation period by sasr, questionnaire surveys and interviews are used on 9 middle school students with iad to explore the curative effect and causes on abstaining internet addiction disorder
本研究包含兩個子研究,第一個子研究以個案研究的方式臨床實驗的方法,探討了以認知療法和行為療法為主的心理療法在中學生網路成癮行為的矯治中的療效及原因;第二個子研究是藉助「 sars 」到來所創造的有利機會,以個案研究的方式,問卷法與訪談法的方法,對9名成癮中學生接受強制性措施戒除網癮之療效及原因進行了追蹤研究。" on the consumer front, while the community will enjoy unprecedented benefits across the entire spectrum of communications and services, most of us are blissfully unaware that the internet, our new window on the outside world, is actually a two - way mirror through which technology can record, track and profile all our online endeavours, " mr. lau added
對消費者來說,雖然大家在通訊及服務方面的得益是前所未有的,但大家在極樂中大有可能無法察覺國際網際網路這個令我們可以一窺外間世界的新途徑,實際上是一面雙面的鏡子。透過這面鏡子,我們在網上的一舉一動都有可能被科技追蹤及記錄下來,並且被編製成個人檔案。In the yield data acquire multi - line geometric in a radial pattern is adopted. before theoretical explanations about the non - uniqueness of inversions and the necessity of constrains are illustrated, the description of linear travel - time interpolation ( lti ) calculations, the derivation of jacobian linear equations, and the deductions of solving large sparse matrix equations, i. e. the lsqr iterations, are involved. in order to cope with the uncertainties in tomography, we reach several categories on constraint methods
對於野外數據採集採用多測線上放射狀布置檢波器;圍繞層析成像方法,文章分析了線性差值射線追蹤lti技術,推導出在矩形網格內速度以雙線性關系變化時方程組的解析式,進一步詳細探討方程組的求解方法,即最小平方正交分解法,並給出了迭代公式。Hazards may include unauthorized monitoring of transmissions and / or records of internet counseling sessions
這些危險可包括對傳送未經授權地追蹤和/或者網路咨詢內容的非法錄制。( 2 ) a information weighting model based on the methods of pca and new ppa is presented. the combined model is set up on the principle of optimization. owing to the predominance of dealing with nonlinearity and uncertainty of wuirn net, the back - analysis model of information weighting is established by use of experts " ability of harmonization
( 2 )研究了主成分法及新型投影追蹤演算法,建立信息賦權的正分析模型,並在最優化準則下,建立了信息賦權整合模型;基於偏差單元遞歸神經網路的處理大壩監測中非線性和不明確性等問題的獨特優勢,憑借專家對指標權重的協調能力,建立了指標信息賦權的反分析模型。分享友人