測漏 的英文怎麼說

中文拼音 [lóu]
測漏 英文
leak hunting
  • : 動詞1. (測量) survey; fathom; measure 2. (測度; 推測) conjecture; infer
  • : Ⅰ動詞1 (從孔或縫中滴下、透出或掉出) leak; drip 2 (泄漏) divulge; disclose; leak 3 (遺漏) le...
  1. Using information of the source term ( information on the magnitude of the radiological release, including the amounts, types and ratios of the released radioactive materials ) and meteorological conditions, the acas models the transport and dispersion of the released radioactive materials and predicts the radiation dose to the public

    根據輻射源項的資料(即事故釋放源的資料,包括放射性物質的釋放總量和各種放射性物質的相對比例等數據)及氣象數據,這套系統模擬是次核事故所泄的放射性物質在空氣中的擴散情況,及預市民可能受到的輻射劑量。
  2. Development and application of the leakage examination system for a spacecraft - airproof - checking room

    飛船檢間氣密性檢系統研製與應用
  3. This kind of investigations have acquired some accomplishments at present, but much of these accomplishments were limited to resolve certain frondose application using certain fixed network model and were far from satisfying the minimizing forecasting faults demands of ids improving. the purpose of this theme is to establish a multi - net - model and make it generally applicable during the arithmetic realization process to content all application demands and thus minimize forecasting faults in the end of this article applying the advanced bp network to the es in ids minimized the false forecasting, further more it discussed the process of using visual c + + to realize these networks

    目前,這方面的研究已有了部分成果,但大多隻局限於應用一種固定的網路模型來解決某一具體的應用,還遠遠不能滿足入侵檢測漏報和誤報率高的問題,本文的研究目的就是要建立一種靈活的網路模型,並在演算法實現過程中使其具有通用性,以滿足各種應用的需要,尤其是使入侵檢報率和誤報率趨于最小化。
  4. In order to remedy the faults of the traditional pipe - leak detector based on the straight - correlation analysis method which has high demand for hardware and high price, the pipe - leak detector based on the polarity correlation algorithm with the cross - zero method is presented, the hardware design and the test is finished, the result only with the error from 1 % to 3 % is gained, and its feasibility is testifies

    針對採用直接相關法的傳統相關測漏儀對硬體要求高、價格較貴的缺點,將極性相關的過零演算法應用於相關測漏,並設計了硬體結構,進行了實驗模擬,在實驗室條件下,量誤差約為1 % ~ 3 % ,驗證了其可行性。
  5. We have advanced equipments in the world, whole set apparatus made in german, special tools used in jatta and audi vehicles, advanced testers, wrong readers, launch tester, inner peeper, advanced repairing machines, automatic lift shaft, wheel balancer and italy automatic lacquer baker, computer print reached ministry standard

    義大利全自動烤漆房,全自動電腦調漆設備,義大利全自動輪胎平衡機,全自動輪胎安拆機義大利吊裝起重設備加拿大車身校正系統汽車電能試驗器廢氣分析儀電腦故障閱讀器空調系統冷媒測漏儀abs試儀噴射試儀機油壓力試儀等。
  6. Test method for leaks using the pressure change measurement

    用壓力變化量檢測漏泄的試驗方法
  7. I do utilize a variety of addresses within the domain i control to detect the source of spam leaks ; but the unfortunate truth is that most spammers get my e - mail address the same way my legitimate correspondents do : from the listing at the top of articles like this, and other public disclosures of my address

    利用了多個地址來檢網」垃圾郵件的來源;但不幸的事實是,大多數垃圾郵件發送者可以用與合法郵件發送者相同的方法獲取到我的電子郵件地址:象這篇文章一樣,從文章的頂部獲得地址列表,以及其它有關我地址方面的公開信息。
  8. Accumulative bonus points are based on every dollar spent of each transaction, richpower members can get 1 point for every 1 dollar spent the following products will get 1 point for every 2 dollar spent only : automotive diagnostic computer scanner, software upgrade, 3m series products, cooling system tester, wash powder

    9 .消費每滿港幣1元,即可獲得1分下列商品消費每滿港幣2元,即可獲得1分:各種計算機車儀器,車儀器升級, 3m化學品,飛機唧,水箱測漏,清手膏。
  9. Subsequently, the co - kriging method may be used to fill in the gaps among rainfall data from the measurement sites

    最後應用共克利金法推估觀測漏失之站,進行雨量補遣工作。
  10. Moreover, a novel algorithm is presented with the ability of checking whether a nonself pattern is a hole or not

    另外論文還提出了一個演算法,用於直接判斷某個nonself模式是否為檢測漏洞。
  11. Technical specification of leakage detection with sf sub6 ; tracer gas in roadways of coal mines

    煤礦巷道用sf sub6 ;示蹤氣體檢測漏風技術規范
  12. In this paper we analyzed the structure, function and characteristics of the private office network, discussed the primary threats to the office network security and common attack methods, based on the p2dr model, we distributed the office network security policy across three layers : network layer, system layer and application layer. the security principle, implement solution and the relationship among these three layers were illustrated in this paper, including physical access control, logical access control, vpn, data encryption, authentication, authorization, audit, ids ( intrusion detection systems ), system leak test and anti - virus protection

    本文中將辦公網路的安全策略由下至上劃分為網路層、系統層和應用層三個層次,分別敘述了各個層次上的安全原則和實現方式,以及各層之間的相互關系,詳細介紹了物理控制、邏輯控制、 vpn與數據加密、用戶認證和授權、審計與入侵檢洞掃描及病毒防護等方面的策略和實現方式。
  13. Roemer ' s security system is capable of detecting bugs

    羅莫的安全系統能檢測漏
  14. Now, the intrusion detection systems all have the problems about failing to report intrusions and distorting intrusions. it ’ s a big problem to the auto defense of intrusions

    當前的入侵檢系統都面臨入侵檢測漏報和誤報的問題,這會對入侵行為的自動響應帶來極大的問題。
  15. Security managment can be connected into the firewall, inbreaking testing software, leak scaning equipment and virus - resistance software so that it can integrate their security functions

    安全管理還可以接入防火墻、入侵檢洞掃描、病毒防治等軟體或設備,集成它們的安全功能。
  16. A new detection hole counting algorithm is developed, with sound time and space complexity

    論文第一次提出了rcb檢規則下的檢測漏洞計量演算法,其時間復雜度和空間復雜度都較為合理。
  17. The central control room of the center adopts the xbrothers advanced professional security and facility control system in the country. this system uses the latest data float processing technology. and it collects, analyzes and disposes number of subsystems in the central room, such as

    系統統採用最新的數據流處理技術,對機房內的供電監控系統環境溫濕度監控系統門禁控制系統防盜報警系統dvr視頻監控系統ups不間斷電源監控系統精密空調監控系統新風機控制系統機房水源測漏系統消防報警系統等多個子系統的數據流進行採集分析處理。
  18. Based on detector generation rules, detection holes under rcb and rch are analyzed

    在生成演算法的基礎上,分析了rcb和rch檢規則下的檢測漏洞。
  19. It describes the techniques of scanning holes and simulating attacks, which are used to find the vulnerability of the tested system ; it provides one way to evaluate the risk level of the tested system

    對檢測漏洞的各種掃描方法和模擬攻擊方法進行了深入的研究,並給出了脆弱性分類方法;對評估被系統的總體安全性等級進行了深入研究和切實有效的探索,並提出了可行的方法。
  20. Since 1996, in addition to mobile leak repair, twd has commissioned specialized leak detecting firms to conduct leak detection in underground pipelines as early as possible and replace repair as soon as possible

    本處從85年起,除機動修外,亦委託專業測漏廠商,實施分區循環水檢,以提早發現地下管線水,即時汰換維修。
分享友人